last executing test programs: 2m46.764569305s ago: executing program 4 (id=1225): r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x10, 0x8000004, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000080)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r3, &(0x7f0000000380)}, 0x20) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000200)=r1, 0x4) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xbd, 0x5, 0x80, 0x7, 0x0, 0x7fffffff, 0x7a5d4, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xdfffffff, 0x0, @perf_bp={0x0, 0xe}, 0x2, 0x1, 0x7, 0x4, 0x81, 0x8, 0x9, 0x0, 0x20002, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c040, 0xac5d, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000023000000030000000020000000000000000000003000000000400000003000000fbdbffff000000000000000d00000000000000000000000a020000000000"], &(0x7f0000000100)=""/223, 0x4a, 0xdf, 0x1}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x2, 0x17, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000004000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000076000000bf0900000000000026090600000003e7040000000600000018010000756c6c2500000000002020207d9af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b703000000000000140000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket$kcm(0x10, 0x2, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xe, 0x4, 0x8, 0x7}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000a00)={r6, &(0x7f0000000900)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="5400020029000b05d25a806f8c6394f90424fc602f0011002e2f0100053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 2m45.536696996s ago: executing program 4 (id=1233): r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x4000040) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x3, 0xc2ba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) syz_clone(0x2024011, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0x80000ac5d, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r1, &(0x7f00000031c0)={&(0x7f00000006c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000840)="b5640aae1e407af01eecff9e22e152a958b96c15ffd051d17c6c702f21a8abb26b561e7af56b164829c35642692c102092e1f43782559cb76acaa20f83d5e807ad43b3e153c8df10b894d755e849d01e91b7b49af88a501bc937c19203d32e33610f", 0x62}, {&(0x7f00000003c0)="5c6817db84aafc4ba93b3b7b773c1f5c014e2a4405abce2e2192542afa9748dcd0a777a42e01d2f6290d970e2f9a1d422ca71d4207e563f192538f527923b0f362103e5bbeda2dca0d9d2b5e5238329691753f1860286f1aaa0786be123a788ba8d0e1205af7751df76effba5cb644966e7b7566d2960bab4c", 0x79}, {&(0x7f0000000740)="9eb8a2c0e241fb0402ac85631cf8ff8e5a36a410dc8d04ecbcf2464879d3bd8110c8472dd79b443d283855fdba1e1dc6283591a8", 0x34}, {&(0x7f0000001200)}], 0x4}, 0x8080) sendmsg$kcm(r1, &(0x7f0000000440)={&(0x7f0000000100)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000640)}], 0x1, 0x0, 0x0, 0x900}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce620300fe"], 0xfe1b) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000060000000b00000000000000", @ANYRES32, @ANYBLOB='@\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000227a9c7a80b4439d4492c58f1b6fd7cf5fb6285f49eb8766530460ae599d0a3e497ba3b75ccd8cb02e732b05e98277e83b6b0be27aaa07c02fc2d55e06e66de85a15ed72597957af10f109007dac0d2cbf8002de24ae1da3d9cae819f6573f7156b0716d851f9226552559edd4d3528fe6dda4d3bb0598a4c948737824e392460000000000"], 0x50) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380), 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="563f0000180059"], 0xfe33) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000100081044e81f782db44b904021d08000b000000e8fe55a1180015000600142603600e1209000d0000000401a80016000a00014006000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x4) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfe33) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000040)="2e00000010008188e6b62aa73772cc9f1ba1f848430000005e140602000000000e000a00100000000280", 0x2a}, {0x0}], 0x2}, 0x40) syz_clone(0x160480, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f0000000780)=ANY=[@ANYBLOB], &(0x7f00000009c0)=""/129, 0x2e, 0x81, 0x1}, 0x28) socket$kcm(0x21, 0x2, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000001340)=@hci={0x1f, 0x8, 0x2}, 0x80, 0x0}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f0000000240), 0x1}, 0x10c002, 0xac5d, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x14, 0x0, 0x0) 2m42.747162867s ago: executing program 4 (id=1237): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d35, 0x1c092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0xb3e, 0xfffffffffffffff8}, 0x840, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xb, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="b7020000f53f6314bfa300000000000024020000fffeff7f7a03f0fff0ffffff79a4f0ff00000000b7060000ffffffff2e64050000000000750afaff07cd02020404000000247d60b7030000030a00006a0a00fe0000000c8500000011000000b7000090ffffff2995000000000000001da5ad3548ebb63d18c5071c7e821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c0ec908abb6e7325ec1956bd8660bf3664148a2c96752fe2bb328dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8ef040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdbb126eb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b782ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb9f35e4f41a6211e52bb3598e9b5d4f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75b0100000042127a8f84538a9a311c757f7169f006f3f5c95177fbd0b14b36259e2905ef911785c88a16aae46084d676d8ef8aa6ecc2d32e3f4ee367c5a769c0a606636c9f4a4413c098f4fcc96623b7c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c436432b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef100bbf76063d3f6ffffb73d70e9c3d7b90aecf48e7565efff2dbbb512218c98442406333c890923a797e00b75481739952fe87fde27ce81893f54ec0ea8e792414f639bc9ce1fea3f6ac0d7025759d4b45576c205c70631e8ad585951950e521f4e210b6494e3c52d927195737945cc03d5668483151710de246420a1b6c55b73876a6ed7fd0d9338923789a1edcd8043fe83919088383268324a25df14010c8ed6b8d43400eaa00ff9bc46e1cfecbdc0e451ac53b409d04544d3a7edd4d447d2fb431e226ae182b8dcc86fe09b404e0b7c723d3b19c3dc382fa91fb0fb8f9f3f13296bb1758b24aad0922091d49e2bc408a5a37deee7a60b903d2d9fe9d451cafcc8dc389671c2d08b6e264150a6b9445b00cee4585af04fa69e0380be0d66649dcf3bf8a906b029faca75ce34c41aec7aa86e596119109ea8b3f7c65c902499227c087301643baab1c95bb22cedd913b22dcaa197ccc34586dc50bd9f4628e3e77a0de32e356521df06f995cb57f97052fc4158250ccecfb67ea8faf509593fadc7eafb613327b052397af1ede94d87590ce90a0a7579766f0e5eb09d38ac46e99e7ec4fcd3cb0b1a8c531724d5ef6b334803cedaa9cedf16dc3af6e0b67f62a83a256474c97c925d9d447175b535c87dbdeb0dcca5303eed6689ea91e1665c691df736368dde47e6672e93a314c5f60e7b68c2242bd0f0d8c66449d8687dcf2d0f76668b2b9bf8b32b99b7daf34b2d825d192ade90a1162acfe9749d516d014cef5f99126324ea02baea5808c430985749901b09e4902a6f5addc0103756b894418e4591c624a9b206abbfb888d413d923b0d7c9d997d6d8e64787c4d397f57a15b6e0b4212b6cb55b9c207bbe08f483b1bea05f41b9a1d3af087047c568ae6ebfc0bb5ec10b6290dc757a4903a88fb2c035b2349b6d2f0c051b8b7718384eebd5fc19928cea713ff09e179c308fbe9bd64374d96ef2447a2a4af5ca0c39e7ca2e801e57560a55e9cfa095cf3f74398219ad1030a79517a88de7596429a20793e12616aa32b3e720c6521fbe93963e9536d16f3db211fca7dd99c0a0125ff8ef534b93dcb34e1da2c008a9f2a29e30823bf0ec3639cadaf9be9608358e1e5ab17eea477b1754f78f45468c9568471667f82f5e250b979b9f2bd0d1b6bc03d11811ac6eec9a3ecd9e3c3299ee5eb3c6cac8fbd06514b7ee743ece79c04566d02a08fd5fcabbab3d129c0cced3ce11dafa380700000000000000c114d0b423e64c6157fac5e4e2168f33541daeff9983d0e488a78bef538f870b84798272b2101e0abf1cd64500b79e01e11d727389653bd80a39d5bbe2e23d2f5ff10047423429981bd9b4ce680e174c266391e3e7689452654e5cd5ada6e025327a1942b5a068f15fa58eaa267d4e0881783dddbdd777f8be0824ffdf6d06c621880dbbe9534f15e8c2e364d3ec67deb6ab9f2a0f03212972dbd38500000008173553a67be48633103809eee0be51d67d7ce230b389607b4c3b18da1c48f3180f2e0d79e54565fdd9a099b5b5ba2761905b88b7cbfc39c35dd153609da3da263438f12769602c2195245ff83e249119d4f6cabfbdef84ada19ef4a67ed66d7043036515d0be5a231f99e71aba5d5ae04676eff3e85f0844c41bbcfde7a931d1ec55c01f703bfd1b97756bfe55a91f6b379f34a018906339771157c66dbd7471d1beec7f029ef552cf5e92a1a0db21b59355763967ce26a577bc514b6d22a09c385c5ba6caf524e1688fc0f29f8bb35ae7bc8eb5ba51aebdf7d972c3267cedbe77ed70d9c539bc455a6f88b39196c8a224b0acf4d796fea59a07baa34cc270fb096ef330fbebdf872d7d0bc4f9a963355c554abc5cdb91464faabcd09cd9a53f5d1b2ea7e96f428f7cd6735c19c61dc9942d30bf29ef85ed01c2fcd6060aa40eeff971477b4fde48507b7bad95a496540adff7e4a72fd1f94d7c703ab1525c946c54e0da3d7ebfcc8cea2e84c3b310aaea5a1627df898c00a9aaf2d88a36afa4c5b1816384310600001c33125ad7f7970beeb256aec06e39fc6c66544e1d1dc5fea4b68a82e3568ca30aea9a1d097f06f11dc362f4bae5ef57c67686a15855cd351bf26f40fb1348cfce79897682228e6d9643530c81bab27bf7b1c4a76a5be180bb830cf06827c3f38a9c9c580c732c30aaceda78b0297de35a922b1375b129655beb31899e26052cc216f832fdb0a0015f93c9cff77f59cda1ec5f3e358848756cebb074266a47e39ae26e80e8c65aaf73c24925458520a9ca98760d1005c9f81846459ae6d5baa4f02807939ddc29c3520f7c58ed9bc5a569c7a1bc33cf4f330a18276ffb4550b9166c3939e8041094bec034aa0ec6638b74fe34f0f1ec6903a1135808d5d8d26c9203c3f87e66c407b7c5c0888d4558dd657cc0213efad68e76fdd7b23e68064fd4b271ed79c50abacdd2871b0c1f8c971df59a5a1901ddf804bed43e391f882d2a45c51cdbba86b2a1b7c0c4923642a731ea4dcbad2b6ebbebe787a8e28e781d75beee924b3b1e390750f316648133922c021f98fd2d5d71a7a3679397ef6cf432837b7e264831ec01c4c3146ba0caac3b13d55945ec00e978a1c1712cd51187936200606c9cd6877b2f72125295c54721f8e15df2ae282a8becb99a726fd92acc92141e1f574b4b0b3c992a61af3372d0d9217776b1a42cd2cee816a70bf1ddd69b590d53e28ba356e74b38e23e50d898e95cdc7cc809e462c884b53f672aab1411ecfd4c91e7a9782fc6763f0efd4bcbaf1fc3a00000000000000000000000000000000500000000000000000000000048e510340087caf22439d5304bd704a6a78a512269a9b1cbd13bea78c807bbc73853ae187cbb768673e9d1bf74a3b0a6c234accd8506adf314f4c5e08174540b69d3c0da660052b43b86baf49e7ac64d9c21598b1e01dc1e1b5a53626b090496dbf7af441e397016c3c094d5c91ffe0a7ceacfd225ed9a6c905f79ad7052747dd6cceef4c310e0e935311118bc6bf0e5ca6c7cca7d5c03be570308da8a40578b4db14961fbccf6e2f2d56e9509c434126515b56d032e20c12e830d1bc64826fc9b318da5911e466878dbb81edeff69363fb75af5cd80536f14d2eaa7764db23acdbd394bbbbccfd8b129258bb0a93cee1d44f8665172c06933d20f184b78b435462c52a85149451ffd564c56a7cbf11a1127c77242915e43b2bc"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) 2m42.331527328s ago: executing program 4 (id=1239): socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2063) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x6, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x2, 0x3}]}, @func_proto, @type_tag={0x4, 0x0, 0x0, 0x12, 0x3}]}, {0x0, [0x57, 0xe5e919b5517ad0d3, 0x61, 0x61]}}, &(0x7f0000001f00)=""/4083, 0x4a, 0xff3, 0x3}, 0x28) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1000}) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xa, 0x1, 0x0, 0x3, 0x0, 0x10000000000, 0x1218, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={0x0, 0x6}, 0x4108, 0x1, 0xfffffffc, 0x6, 0x8, 0x5, 0x806, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x13, &(0x7f00000001c0)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7786}, [@printk={@p, {0x3, 0x3, 0x3, 0xa, 0x1, 0xfe00}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @printk={@llx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x7b}}]}, 0x0, 0x5, 0x0, 0x0, 0x41000, 0xc}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x13, &(0x7f00000001c0)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0xfffffffffffffd5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b1b, &(0x7f0000000000)={'wlan1\x00', @broadcast}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) 2m41.836047803s ago: executing program 4 (id=1245): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', @random='\x00\x00\x00\x00\x00 '}) 2m41.472351612s ago: executing program 4 (id=1251): socket$kcm(0x2, 0x7d7b9883159fba0, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, &(0x7f00000003c0)=[{0x0, 0x0, 0x80000000}, {0x1000000a, 0x4}], 0x10, 0x4}, 0x2) close(0x3) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x611, 0x0, @perf_config_ext={0x1}, 0x8008, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000200)=[0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x67, &(0x7f0000000240), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0xe5, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000690400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x41100, 0x0, '\x00', r2, @cgroup_skb}, 0x94) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x14869, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0xfffffe08, {0xa, 0x4e21, 0x0, @mcast2}}, 0x80, 0x0}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2m26.386382964s ago: executing program 32 (id=1251): socket$kcm(0x2, 0x7d7b9883159fba0, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, &(0x7f00000003c0)=[{0x0, 0x0, 0x80000000}, {0x1000000a, 0x4}], 0x10, 0x4}, 0x2) close(0x3) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x611, 0x0, @perf_config_ext={0x1}, 0x8008, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000200)=[0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x67, &(0x7f0000000240), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0xe5, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000690400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x41100, 0x0, '\x00', r2, @cgroup_skb}, 0x94) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x14869, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0xfffffe08, {0xa, 0x4e21, 0x0, @mcast2}}, 0x80, 0x0}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 9.563764336s ago: executing program 0 (id=2037): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0xc2ba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x7400}, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000140)=@framed={{0x18, 0x2, 0x0, 0x0, 0xffffffff}, [@call={0x85, 0x0, 0x0, 0x27}, @printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x17}}]}, &(0x7f00000001c0)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{r2, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000240)='%+9llu \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r3, 0xffffffffffffffff}, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001500)={0x1f, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070000000b7080000000000007b8af8ff00000000b7080000000005007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r5}, 0xc) write$cgroup_subtree(r0, &(0x7f0000000580)=ANY=[], 0xfe33) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x1, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) r8 = socket$kcm(0x23, 0x2, 0x0) sendmsg$kcm(r8, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000200)={r8}) setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f0000000240)=r7, 0x4) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) r10 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x202, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8010, 0x5, 0x43a1bd76, 0x3, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r10, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) 9.161705187s ago: executing program 0 (id=2042): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0600000004000000990500000a00000000000000f0c378f1", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000009000000000000000000000905000000070000000000000e0500000000000000000000000000000202000000000000000000000d000000000000000000000002000000000000000000000061"], 0x0, 0x61}, 0x28) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r0, 0x0, 0x1ba8847c99}, 0x38) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'pim6reg1\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x336) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @link_local}) close(0x3) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfe33) 7.803124596s ago: executing program 2 (id=2048): openat$tun(0xffffffffffffff9c, 0x0, 0xc1842, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8913, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x4, 0x0, 0x0, &(0x7f00000006c0)}, 0x20000090) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x4, 0xf, &(0x7f0000000980)=ANY=[], &(0x7f0000000980)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x2800, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x58, &(0x7f0000000200)}, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="d8000000310081044e81f782db44b904021d080005000000e8fe55a1180015000600142603600e120900210000000401a8001600a40001", 0x37}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="7a0a00ff00000000711069000000000095dfd4c900000000000000"], 0x0, 0x1}, 0x94) socket$kcm(0x10, 0x2, 0x0) 5.14879891s ago: executing program 0 (id=2055): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000200000000000000100850000007b0000001801000020786c250000000000ff20207b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8}, 0x18, &(0x7f0000000340)=[{&(0x7f0000000100)="b7", 0x1}], 0x1}, 0x40080c0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0}, 0x94) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x1c000, r2, 0x4}, 0x38) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000480), 0x4) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="b40000000000000079100000000000006200000000000000950074000000000002bf7ac06b0bba6dae5599772183b0be1ce6508a4bcdfe52782f28f91e7fdaa8e2e6dbedd2309cbbdb7835c610f677b40089f20c1250843791e0e134073a88cfcabe01ba5e03ab30"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x21) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000240)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e618294938037e70e4509c5bb515e456df3a53e030d4090003f4b051c0c25135cec", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg(r1, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=""/48, 0x30}, 0x40000000) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x36d, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x2a, &(0x7f0000000100)=r5, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r6) syz_clone(0x80001008, 0x0, 0x0, 0x0, 0x0, 0x0) 5.060107374s ago: executing program 1 (id=2058): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd3e8fedb2bf482a7) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x8, 0x8}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) socketpair(0x1, 0x1, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f0000"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001680)={{r1}, &(0x7f0000001600), &(0x7f0000001640)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0xd, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 5.026391186s ago: executing program 2 (id=2059): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x16, 0x2, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801, 0x0, @perf_bp={0x0, 0x6}, 0x100000, 0xca, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000001}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0xe, &(0x7f0000002380)=ANY=[@ANYBLOB="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"/3002], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x3f) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0xc2ba, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r3, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0d00ff0000000000830000000000000045"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xa, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x81, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f3, &(0x7f0000000080)) syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 4.629093226s ago: executing program 1 (id=2061): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb01001889000700000000000c0000000000000a01000000005f30613000"], &(0x7f0000000400)=""/196, 0x2a, 0xc4, 0x1}, 0x28) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000100)=0x1) write$cgroup_int(r1, &(0x7f0000000200)=0x1, 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xc, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="b4108900d20c0000182300"/20, @ANYRES32=r1, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000140), 0x8, 0x10, &(0x7f0000000080)={0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) 4.188743578s ago: executing program 1 (id=2063): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x46) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x45}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x4}, {0x6, 0x0, 0xa}, {}, {}, {0x85, 0x0, 0x0, 0x33}}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 3.861044215s ago: executing program 5 (id=2064): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x40020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r1 = socket$kcm(0x1e, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000280)=@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x80, 0x0}, 0x0) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x105840, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, &(0x7f0000000080)=[{}], 0x8, 0x10, &(0x7f0000001f00), &(0x7f0000000540), 0x8, 0x53, 0x8, 0x0, 0x0}}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001158000000000000800000850000006d00000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01e318"], &(0x7f0000001f80)=""/226, 0x26, 0xe2, 0x2}, 0x28) 3.841328596s ago: executing program 1 (id=2066): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe, 0x8}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r3, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 3.701499563s ago: executing program 2 (id=2067): r0 = perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x8, 0x8, 0x7, 0x0, 0x2, 0x42130, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x810, 0xa4, 0x7, 0x0, 0x8, 0x40, 0x9, 0x0, 0xd, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x0, 0xcd, 0x1, 0x9, 0x0, 0x8, 0x4000c, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x53a8, 0x1, @perf_bp={&(0x7f0000000000), 0x4}, 0x80, 0x9, 0x9, 0x9, 0x10000, 0x7fff, 0x9ff, 0x0, 0x9, 0x0, 0x5}, 0x0, 0x5, r0, 0x8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f00000001c0)='devices.deny\x00', 0x2, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x1, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x18, 0x2, 0xa9a, 0x5, 0x1813, r2, 0x1, '\x00', r3, 0xffffffffffffffff, 0x2, 0x2}, 0x50) mkdir(&(0x7f0000000380)='./file0\x00', 0x14a) r5 = openat$cgroup_devices(r1, &(0x7f00000003c0)='devices.allow\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000400)={0xffffffffffffffff}, 0x4) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r6, 0x4) r7 = gettid() r8 = perf_event_open$cgroup(&(0x7f0000000480)={0x0, 0x80, 0x2, 0x7, 0x2, 0xfe, 0x0, 0x7fff, 0x800, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7fff, 0x3, @perf_config_ext={0x5, 0xfffffffffffff001}, 0x108421, 0x9, 0x5, 0x0, 0x966, 0x7, 0xffff, 0x0, 0x8, 0x0, 0x6}, r1, 0x0, 0xffffffffffffffff, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={r7, r8, 0x0, 0x1, &(0x7f0000000500)='\x00'}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000580)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)=@o_path={&(0x7f00000005c0)='./file0\x00', r6, 0x4000, r8}, 0x18) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x8, '\x00', r3, 0xffffffffffffffff, 0x5, 0x3}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={r9, 0x58, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000780)={0xffffffffffffffff}) sendmsg$tipc(r11, &(0x7f0000000b00)={&(0x7f00000007c0)=@id={0x1e, 0x3, 0x1, {0x4e21}}, 0x10, &(0x7f0000000a00)=[{&(0x7f0000000800)="33be9aa45f42b9b36cee8e5eaa60a6a5c4f1d28eb71be004fefd733aa5a2626af4bca599c7d8274e74c30af338c508702d55758db3d874e78485e24a18a8a13cbdc23caa9b7d653ca24904449ad3b965f5037871d877da0a129f444d3a47d789199d423af684b212f4c7050966e8f1863371e90a2e469c24dfd2eeb84a12a3675f242edf42e8368937ac881fd841fc7e43ccb72fc137c289b42449ffd66a79c3ee", 0xa1}, {&(0x7f00000008c0)="1162f463aa6001033a2a39261ad889ef87f2116dd64b9e9b638555fc39b8e973fc98fa9b4a0fa9e45ac71bdd6ab253e26f9073c5412cbe582b76", 0x3a}, {&(0x7f0000000900)="b4ee853966e28cbd434bd943ec46ce4abebdb0ab5cc261f1255e75cd54fc1f5fc64032ec6813482fefb8fd97ba767b13994b805cc527edd4cfab39fd9b2631676709a290abf1025052d8f48354e0ab56d1a2653dc59b62ed45e601a1f73f161963ae051022017f9b44005e7d4404e96565505a14415ccc1ae8e59e86fbf5c04211c575", 0x83}, {&(0x7f00000009c0)="501c46dabd4d12fc66d201537a48af50008f645965d8b487efac2a6f48e3303934c8dc554b4233c0137d7af607b822e53ddc98", 0x33}], 0x4, &(0x7f0000000a40)="fffbf0b1e56ae5412be1c96567e32d1562c63aee3159adc9a1c2d883c91e31624d9e6a05d7f378ce2321c6f30fbe7d300dca7edb435f3e6ca7fb01d43d76ddcaa434766ff62db569b7c7e5a0fb49148679eee9a41752f6045c0f0066c0457e8c57b67f1c2877cdf349e97d83ea4b990e6712fc18362283d0e2f66de68beae941319027ba48f9", 0x86, 0x14}, 0x801) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b40)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x5, '\x00', r10, r2, 0x2, 0x2, 0x4}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000c40)={{r12}, &(0x7f0000000bc0), &(0x7f0000000c00)='%pB \x00'}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000d80)={@fallback=r0, 0x0, 0x0, 0x0, &(0x7f0000000c80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000cc0)=[0x0], &(0x7f0000000d00)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000d40)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000dc0)={@fallback=r2, r6, 0x4, 0x2000, r6, @value=r5, @void, @void, @void, r14}, 0x20) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000e00)=""/208) perf_event_open(&(0x7f0000000f40)={0x4, 0x80, 0x5, 0x6, 0x11, 0xef, 0x0, 0x101, 0x3bf18667e9e94975, 0x8, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000f00)}, 0x110420, 0x8, 0x3, 0x5, 0x8, 0x7ff, 0xf, 0x0, 0x10, 0x0, 0xd52d}, 0x0, 0xffffffffffffffff, r13, 0xd) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000fc0)={@map=r13, r13, 0x34, 0x0, 0x0, @void, @value=r6, @void, @void, r14}, 0x20) write$cgroup_devices(r5, &(0x7f0000001000)={'b', ' *:* ', 'rwm\x00'}, 0xa) write$cgroup_devices(r13, &(0x7f0000001040)={'c', ' *:* ', 'wm\x00'}, 0x9) 3.503505963s ago: executing program 5 (id=2069): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000006000000000000000000000018010000786c6c2d00000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000a62200008500000006000000850000000f00000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r0}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40002100) write$cgroup_subtree(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63fc80fc020c2f"], 0xfdef) r3 = socket$kcm(0x10, 0x2, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x8) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e02002200356bd25a806f8c6394f91124fc60040006000a7403004700000037153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) write$cgroup_devices(r2, &(0x7f0000000040)={'a', ' *:* ', 'rw\x00'}, 0x9) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10041, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x0, 0x4}, 0x205681, 0xfffffffffffffffc, 0x0, 0x2, 0x3, 0x0, 0x7, 0x0, 0x7, 0x0, 0x4136}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x5, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xfffffd67}, 0x48) 3.501892093s ago: executing program 1 (id=2070): r0 = socket$kcm(0x29, 0x6, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000400)}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x489a60d1fb03ba39, 0xd, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @ringbuf_query, @generic={0xfe, 0x3, 0x3, 0x5, 0x80000001}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x70, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x2, 0x6, 0x40}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000380)=[0xffffffffffffffff, r0, 0xffffffffffffffff], &(0x7f00000003c0)=[{0x2, 0x5, 0x6, 0xd}, {0x3, 0x2, 0xb, 0x7}, {0x1, 0x4, 0xe, 0x3}], 0x10, 0x400}, 0x94) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x8000000000000000}, 0x8210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000005c0)={@fallback=r3, r2, 0xd, 0x4038}, 0x20) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000500)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0xe, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x0, 0x9, 0x0, 0x0, 0xfffffffffff7bc02, 0x0, 0x0, 0x0, 0x5ff}, 0x0, 0x400, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 3.430826677s ago: executing program 0 (id=2071): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x80000000, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x2000000, 0xe, 0x48, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x10102) write$cgroup_type(r3, &(0x7f0000000340), 0x9) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xd) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x7fffffff, 0x20000}, 0x4001, 0x0, 0x0, 0x6, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) socket$kcm(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', @random='\x00\x00\x00\x00\x00 '}) 3.264689425s ago: executing program 1 (id=2072): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3}, 0x50) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x1ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x4, 0x0}, 0x8) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xc, 0x26, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_query, @generic={0x64, 0x2, 0x7, 0x4, 0x5}, @call={0x85, 0x0, 0x0, 0xbb}, @exit, @map_val={0x18, 0x9, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x5}, @generic={0x5, 0x8, 0x2, 0x1, 0x13c024c8}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xd}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xb8}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x448b}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000240)='syzkaller\x00', 0x5, 0x67, &(0x7f0000000280)=""/103, 0x41000, 0x6d, '\x00', r3, @fallback=0x1f, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xb, 0x3, 0x2}, 0x10, r4, 0xffffffffffffffff, 0x9, &(0x7f0000000480), &(0x7f00000004c0)=[{0x5, 0x1, 0xc, 0x8}, {0x3, 0x5, 0xe, 0x4}, {0x3, 0x2, 0xc, 0x5}, {0x5, 0x1, 0x1, 0xc}, {0x2, 0x1, 0xa, 0x6}, {0x0, 0x2, 0x1, 0x778ca03c05ba2bf9}, {0x0, 0x1, 0x5, 0x4}, {0x4, 0x1, 0xa}, {0x3, 0x3, 0x4, 0x6}], 0x10, 0x9}, 0x94) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000640)=@nameseq={0x1e, 0x1, 0x3, {0x1, 0x2, 0x2}}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000680)="ca1bebfcdb474770c0adefa69ae13f7fb0b31f6a20393e0235aa30d308db73c6303f841de64c317b1ebeca3f7c8dccb20d3074548efedd8cf8f3528bca0a5762cdbb8b7e4eb775511595bd9e4e7221815d4c095a15d337535c86c1c28959462240e3697de052bf9f709ebdfbc8d874ed8c2ee9ade4d3aabf513e0438fb0803efae42063f7827fbfcece548ce375a08ec9d15184af915fac58560ccec34cfff1f7d684e834242045c974a156f86b5f13e17a2b17d1c6853ab55edec93", 0xbc}, {&(0x7f0000000740)="3823a2b4b1da4664806d7d2df09309506b8ba8c3426d2ffe177871133c5a30bf2e24d51d816a45ed160f117cc13e0c6c828ed29bd727238cfb13ec1782f25efebf8ee06eb340aaabf06327531e48e9b320f8a1b781cb680d25c6dbeec26f5e942ee5e928852e299167e91b21cc8453be03cf7cdb85c020", 0x77}], 0x2, &(0x7f0000000800)="10c672c5906516e367e88dc20c08a0f06b3747917176ea13ac7d6351fcf7b242d186d199012d635bcaa92e8224d0ea2208862ffeb9e3c5854549e0ef779d5174", 0x40, 0x4004}, 0x10) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000880)='./cgroup/syz0\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f00000008c0)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000900)={r7}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000940)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001b40)={&(0x7f0000000980)="281d4b4ae24cdad0950545b11bc6188fe542f626fbc67681314980d86528d41ea49654ea877467ebbe719c697310f1c3eee847b60f8b13397413668e889a20a49ea9573d4eb3f422199074c4c37d52edb9dc4c2cd393ebb4dd9663f29ce8ee7e094152f3e3cb9ecb10c673a7437f23285e561c8fc51e375ca3ff879866d23465d74e0de4f0bca230426510365e6b795f2fb1f8ab1168d5431e391ca3f269f3d2e0bfa6816fad4d3b91d51087c4aac1", &(0x7f0000000a40)=""/4096, &(0x7f0000001a40)="1119b1e082c6eae36c85597b1bf61062a3c4e9234aa32b96126b965b1bb42f8b641e2c9b2f90bf62cfbf8c1c8fb0e8c846a9a8508afa6994620d7aba8c72525c8e813be3025fc5a3f9346586218c9e2d18ef06e2aa982612b02d194ee6181322573a67ff7eb32a85", &(0x7f0000001ac0)="cee97af12effb624c33888f8006125c104ed658b4490610501d6bb957f6dd57723bad57b860faa91a1c297a8d08cf6b8efb418def340f10cc4cb0d912d1628a8daa57028de4bcb0f5791473d3801685bfb3732e5fc34362973d309e0d742979b9a719376bf844c5b31", 0x3ff, r7, 0x4}, 0x38) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001b80)='./cgroup.net/syz0\x00', 0x1ff) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000001bc0)={'batadv0\x00', 0x10}) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0x2) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000001c00)={0x0, 0x6, [@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2b}, @broadcast, @broadcast]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003040)={r7, 0xe0, &(0x7f0000002f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000002d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000002d80)=[0x0, 0x0], &(0x7f0000002dc0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x62, &(0x7f0000002e00)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000002e80), &(0x7f0000002ec0), 0x8, 0xc1, 0x8, 0x8, &(0x7f0000002f00)}}, 0x10) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000003080)={r2, 0x3, 0x18}, 0xc) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000030c0)={0x1b, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x3}, 0x50) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000003140)={r7}, 0x8) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000003200)={0x1, 0xf, &(0x7f0000001c40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001cc0)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000001d00)=""/4096, 0x41100, 0x1, '\x00', r3, @fallback=0x26, 0xffffffffffffffff, 0x8, &(0x7f0000002d00)={0x8, 0x5}, 0x8, 0x10, 0x0, 0x0, r9, r5, 0x4, &(0x7f0000003180)=[r0, r10, r11, r0, r1, r12], &(0x7f00000031c0)=[{0x3, 0x1, 0x1, 0xb}, {0x4, 0x5, 0xd, 0x3}, {0x0, 0x1, 0x1, 0x5}, {0x3, 0x2, 0x8}], 0x10, 0x10000}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003580)={r13, 0xe0, &(0x7f0000003480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000032c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000003300)=[0x0, 0x0], &(0x7f0000003340)=[0x0, 0x0], 0x0, 0x21, &(0x7f0000003380)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000033c0), &(0x7f0000003400), 0x8, 0xa, 0x8, 0x8, &(0x7f0000003440)}}, 0x10) r15 = bpf$MAP_CREATE(0x0, &(0x7f00000035c0)=@bloom_filter={0x1e, 0x0, 0x0, 0x3, 0x8080, r7, 0x3, '\x00', r3, r7, 0x0, 0x2, 0x3, 0xe, @value=r12}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000003640)=@base={0xb, 0x1, 0x10, 0x4, 0x42, r15, 0x1, '\x00', r14, r6, 0x4, 0x2, 0x3}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x40082406, &(0x7f00000036c0)='%$^\\$\x00') bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003700)={0x2, 0x4, 0x8, 0x1, 0x80, r8, 0x8, '\x00', r3, r7, 0x3, 0x3, 0x4}, 0x50) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0xa36) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003980)={&(0x7f0000003780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd0, 0xd0, 0x5, [@type_tag={0x8, 0x0, 0x0, 0x12, 0x5}, @func={0xc, 0x0, 0x0, 0xc, 0x5}, @struct={0x7, 0xa, 0x0, 0x4, 0x0, 0x2, [{0xf, 0x1, 0x2}, {0xb, 0x0, 0x4}, {0x1, 0x0, 0x7}, {0x5, 0x3, 0x400}, {0xa, 0x3, 0x1000}, {0x9, 0x1, 0x3dbb}, {0x9, 0x3, 0x8}, {0xe, 0x1}, {0x9, 0x0, 0x4}, {0x4, 0x4, 0x6992ee8d}]}, @typedef={0x10, 0x0, 0x0, 0x8, 0x4}, @decl_tag={0x8, 0x0, 0x0, 0x11, 0x5, 0x8}, @restrict={0x5, 0x0, 0x0, 0xb, 0x2}, @restrict={0x0, 0x0, 0x0, 0xb, 0x4}]}, {0x0, [0x0, 0x61, 0x5f]}}, &(0x7f0000003880)=""/236, 0xed, 0xec, 0x0, 0x3}, 0x28) mkdirat$cgroup(r7, &(0x7f00000039c0)='syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000003a00)='./cgroup/syz0\x00', 0x1ff) 3.264401735s ago: executing program 2 (id=2073): socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2063) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x57, 0xe5e919b5517ad0d3, 0x61, 0x61]}}, &(0x7f0000001f00)=""/4083, 0x1e, 0xff3, 0x3}, 0x28) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1000}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xa, 0x1, 0x0, 0x3, 0x0, 0x10000000000, 0x1218, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={0x0, 0x6}, 0x4108, 0x1, 0xfffffffc, 0x6, 0x8, 0x5, 0x806, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x13, &(0x7f00000001c0)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r3 = socket$kcm(0x18, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x40047459, &(0x7f00000000c0)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b1b, &(0x7f0000000000)={'wlan1\x00', @broadcast}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ff, 0x2122, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x9, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) 2.701117193s ago: executing program 3 (id=2075): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe, 0x8}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 2.699729284s ago: executing program 2 (id=2085): socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2063) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x57, 0xe5e919b5517ad0d3, 0x61, 0x61]}}, &(0x7f0000001f00)=""/4083, 0x1e, 0xff3, 0x3}, 0x28) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1000}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xa, 0x1, 0x0, 0x3, 0x0, 0x10000000000, 0x1218, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={0x0, 0x6}, 0x4108, 0x1, 0xfffffffc, 0x6, 0x8, 0x5, 0x806, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x13, &(0x7f00000001c0)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r3 = socket$kcm(0x18, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x40047459, &(0x7f00000000c0)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b1b, &(0x7f0000000000)={'wlan1\x00', @broadcast}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ff, 0x2122, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x9, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) 2.288976474s ago: executing program 5 (id=2076): openat$tun(0xffffffffffffff9c, 0x0, 0xc1842, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8913, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x4, 0x0, 0x0, &(0x7f00000006c0)}, 0x20000090) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x4, 0xf, &(0x7f0000000980)=ANY=[], &(0x7f0000000980)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x2800, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x58, &(0x7f0000000200)}, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="d8000000310081044e81f782db44b904021d080005000000e8fe55a1180015000600142603600e120900210000000401a8001600a40001", 0x37}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="7a0a00ff00000000711069000000000095dfd4c900000000000000"], 0x0, 0x1}, 0x94) socket$kcm(0x10, 0x2, 0x0) 2.270598665s ago: executing program 0 (id=2077): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd3e8fedb2bf482a7) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x8, 0x8}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) socketpair(0x1, 0x1, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f0000"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001680)={{r1}, &(0x7f0000001600), &(0x7f0000001640)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0xd, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.253377196s ago: executing program 3 (id=2078): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, &(0x7f00000003c0)=[{0x0, 0x0, 0x80000000}, {0x1000000a, 0x4}], 0x10, 0x4}, 0x2) close(0x3) socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x611, 0x0, @perf_config_ext={0x1}, 0x8008, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @dev, 0x6, 0x10000}, 0x80, 0x0}, 0xd0a0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r2, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000200)=[0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x67, &(0x7f0000000240), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0xe5, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 2.130765032s ago: executing program 2 (id=2079): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0600000004000000990500000a00000000000000f0c378f1", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000009000000000000000000000905000000070000000000000e0500000000000000000000000000000202000000000000000000000d000000000000000000000002000000000000000000000061"], 0x0, 0x61}, 0x28) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r0, 0x0, 0x1ba8847c99}, 0x38) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'pim6reg1\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x336) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @link_local}) close(0x3) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfe33) 2.000713899s ago: executing program 5 (id=2080): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe, 0x8}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r3, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.946646091s ago: executing program 3 (id=2081): r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0xa, 0x1, 0x106) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f00000001c0)={0x6, 0x80, 0x82, 0x7, 0x5, 0x7e, 0x0, 0xffffffffffffffff, 0x880, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x4f04}, 0x10020, 0xf, 0x59e, 0x6, 0x0, 0x0, 0x7f, 0x0, 0xd5ff, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x3, 0x2, 0x1}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYRES32=0x1, @ANYBLOB="0300000000c4000000000000000000a0e00d220000000000cf1ceeba38beb74a8e94ec34632299306d6fc7a99a1d5bbc0efa6d22581483be09107a4f4706d88c1e47383c88cc73cf9e", @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB="01000000040000000200"/21], 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000780)={0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x2a, &(0x7f0000000100)=r4, 0x4) bpf$TOKEN_CREATE(0x24, &(0x7f0000000240)={0x0, r2}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@bloom_filter={0x1e, 0x40, 0x4, 0xaa, 0x3603, 0x1, 0x5b70, '\x00', 0x0, r0, 0x0, 0x3, 0x3, 0xf}, 0x50) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r5, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000020000007b8a00fe0000000087080000000000007b8af0ff00000000bda100000000000027000000f8ffffffbfa400000000000007120000f0ffffffb70200000000000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b704000008000000850000001a00000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)=0x900000001000) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)=0x8000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000005c0), 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_tracing={0x1a, 0x29, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}, {}, {}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @exit, @jmp={0x5, 0x0, 0x7, 0x4, 0x1, 0x10, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x470df80facf1cacf, 0x10, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000080)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0x5, 0x7, 0x6}, 0x10, 0x96e8, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000740)=[{0x1, 0x3, 0xf, 0x2}, {0x4, 0x4, 0x10}, {0x5, 0x3, 0xd, 0x8}], 0x10, 0x4}, 0x94) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000002000000000000000000082295"], &(0x7f0000000040)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r7, 0x1f4, 0x20, 0x0, &(0x7f0000000100)="ff410800b083dcc1010b3efc88643acd3aaf000c0057bd21762ae3fe8892b69c", 0x0, 0x300, 0x300, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe, 0x4}, 0x50) 1.812075418s ago: executing program 0 (id=2082): perf_event_open(0x0, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cgroup.freeze\x00', 0x26e1, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="8f03000000000060007538e486dd630ace2200102f00fe80000000000000875a65059ff57b0000000000000000cf42000000ac1414aa000086dd"], 0xcfa4) 1.623704928s ago: executing program 5 (id=2083): socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000b80)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca^\xf9\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x96\x86\xdb\xa9\xd3\x01\xb2\xc7\xf8G\x069\x90,\xda\xf6\xc5\xcd\xec\xa3B\xc3\"4\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\x7f\xec\xb2\xc5E\x00\xdd\xf2e\xa8\xf1<\xb2\xc82\xbf=o\x00`\xc1A\'\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x92\xbb\xe3Y\x97\xc2') close(0x3) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x10000, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x18008, 0xc5, 0x1, 0x0, 0x0, 0x9, 0x80}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000040)={0x1, 0x80, 0xe, 0x8, 0x80, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000000, 0x2, @perf_bp={&(0x7f0000000000), 0xf}, 0xa024, 0x0, 0x5, 0x7, 0x4, 0x2, 0x7, 0x0, 0x3, 0x0, 0x100}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8100, 0x0, 0x0, 0x0, 0x0, 0xd531}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f00000004c0)=ANY=[], 0xfdef) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x3, [@fwd={0xfffffa18}, @typedef={0x7}, @typedef={0x2, 0x0, 0x0, 0x8, 0x5}, @ptr={0x1, 0x0, 0x0, 0x2, 0x3}, @struct={0xa, 0x2, 0x0, 0x4, 0x1, 0x6, [{0xf, 0x0, 0x400}, {0xa, 0x3, 0x2}]}, @union={0x9, 0x4, 0x0, 0x5, 0x1, 0x6, [{0xd, 0x2, 0x191}, {0xf, 0x4, 0x31}, {0xf, 0x0, 0x1}, {0xd, 0x5, 0x3}]}, @func={0x2, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x0]}}, &(0x7f0000000840)=""/143, 0xb7, 0x8f, 0x1, 0x7fffffff}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000006000000090000000400000000000000", @ANYRES32=r3, @ANYBLOB="0600"/20, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="000000000100000000000000000000000000000000001000000000009926629ae5bb78768fadebd252261748fd46da4f845120c0c1eb13e5be773197e605390a706d37eef47e30b9e8f4bba4953e49ed68f9c8de84d0c4193e3aacb2142bef113f8b56fee221d1f6125931bff1135be0d3cd787fbadd6139d8c0516165e7c13b5fa355c2be59dd000000000000000000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x14, 0x13, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f00000003c0)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x9d2dec72f53cffdb, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x4}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000500)=[0x1], &(0x7f0000000540)=[{0x0, 0x5, 0xc, 0xa}, {0x2, 0x5, 0x9, 0x2}, {0x5, 0x1, 0xc, 0x6}], 0x10, 0xfffffff7}, 0x94) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000200)) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2d0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x10c002, 0xac5d, 0x10000200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000940)=ANY=[@ANYRESDEC=r2], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x58, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff9c, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffeba}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r5, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x94) bpf$MAP_CREATE(0x1800000000000000, &(0x7f00000000c0)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x50) r6 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r6, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e24, @loopback}}, 0x80, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x200008c0) sendmsg$kcm(r6, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, 0x0, 0x0, &(0x7f0000000140)=ANY=[], 0x18}, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) write$cgroup_pressure(r7, &(0x7f0000000100)={'some', 0x20, 0x8b56, 0x20, 0x2}, 0x2f) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 951.383192ms ago: executing program 3 (id=2084): socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x6, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x2, 0x3}]}, @func_proto, @type_tag={0x4, 0x0, 0x0, 0x12, 0x3}]}, {0x0, [0x57, 0xe5e919b5517ad0d3, 0x61, 0x61]}}, &(0x7f0000001f00)=""/4083, 0x4a, 0xff3, 0x3}, 0x28) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xa, 0x1, 0x0, 0x3, 0x0, 0x10000000000, 0x1218, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={0x0, 0x6}, 0x4108, 0x1, 0xfffffffc, 0x6, 0x8, 0x5, 0x806, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x13, &(0x7f00000001c0)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7786}, [@printk={@p, {0x3, 0x3, 0x3, 0xa, 0x1, 0xfe00}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @printk={@llx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x7b}}]}, 0x0, 0x5, 0x0, 0x0, 0x41000, 0xc}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x13, &(0x7f00000001c0)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0xfffffffffffffd5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b1b, &(0x7f0000000000)={'wlan1\x00', @broadcast}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) 559.293411ms ago: executing program 3 (id=2086): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0, 0xd}, 0x21, 0x0, 0x0, 0x6, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x160) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x2, 0xfffffffe, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @sched_cls}, 0x48) 164.098532ms ago: executing program 5 (id=2087): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x184104, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x4, 0x4}, 0x100600, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfdd9}, r1, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x6, 0x20, 0x2, 0x40, 0x0, 0x7fffffffffffffff, 0x8, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x2ee8, 0x4}, 0x108208, 0x4, 0x4, 0x4, 0x7, 0x1, 0x6, 0x0, 0x5, 0x0, 0x7fffffffffffffff}, r1, 0x4, r0, 0x9) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)}, {&(0x7f0000000140)="7e3f15d6d2ee", 0x6}], 0x2, 0x0, 0x0, 0x1f00c00e}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r3) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000000) r4 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1ff, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xaffffffffffffffc, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="61123000000000006113100000000000bf2000000000000016000200071b48013d030100000000009500000000000000bc26000000000000bf67000000000000070200000fff07276702000003003400360600000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a83683d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf5fe7030586"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) 0s ago: executing program 3 (id=2088): sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xc2ba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001100)=[{0x0}], 0x1}, 0x10000) r1 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="100000002d000b02d25a806f8c6394f9101a04000a7401", 0x17}], 0x1}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="93430000520033d487277b9b100b4ab50a", @ANYRES32, @ANYRES8=r1], 0xfe33) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x15, 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0x4024050) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x48) socket$kcm(0x2, 0x5, 0x84) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001700)={0xa, 0x8, &(0x7f0000001880)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0x10, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = socket$kcm(0xa, 0x922000000003, 0x11) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="2e00000038000511d25a80698c63940d0124fc602f6e35400a000200001ec00037153e370a00018025581d00d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x39c}, 0x8010) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x5, 0xb, 0x8000, 0x4}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r8, &(0x7f00000009c0), 0x0}, 0x20) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000000140)={0x0, 0x12, &(0x7f00000001c0)=[{&(0x7f0000000500)="d8000000200081044e81f782db44b90402000000e8fe55a1180015000600142603600e1209000b000000043542c92f50c85a929e01a80016000a00114006000000036010fab94dcf5c0468c1d67f6f94007134cf6ee0808856e408e8d8cbf7a7ff4841ef62b49816277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b10d614f00004d9db22fe7c9f8775730d16a4683f1aea4edbb57a5025ccca9e00360db70100000040fad95667e006d8df969b3ef35ce3bb9ad809d561cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d", 0xd8}], 0x1}, 0x40004000) setsockopt$sock_attach_bpf(r6, 0x29, 0x24, &(0x7f00000000c0), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) sendmsg$kcm(r5, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000001900)="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", 0x1000}, {&(0x7f0000000700)="a4ee99e5caca16bd976a5f0ed5492d33b2d9c1ccd141ec242f917ce6d31ac548672e4051a3b190", 0x27}, {&(0x7f00000007c0)="fa313c7544cb6ccab9", 0x9}, {&(0x7f0000000800)="ea5d54eba79a37adb50f8af5ccf18b7028369d3c6694f7b140eb3549a61097eb32c831cbe07acba6f0bc2cc20a960a91bb5e6162fcf66c0de2fb9dc65f0f6101809a0398452cffff3a7d82bb6e749a4b67a13a52974e051ce37068b981b05c50062c5f5ddb2028415a9d93ac37d95483d41ae155c787852d00ae766e3846ec51afad4ad14c4cc1cc87b2eb0f512b6a4f8040c251cb3eebef763aeffac7", 0x9d}, {&(0x7f00000008c0)="fe8f08b25653cdacc4ea3c26b42e40c0eb405f9219b61261713a736f91047b48aeeeeb9cef8039d3e1e9f3c0d217e766dd3c3f24be96d534a90c28667c958518432b7d1e52a6e44631bd77993fcb2a03dc525a12ad46096c863544477d38c5534204fedfb2ae8951244f46085d70979c9c48457e23b0732135bd5d84d77b32bc3cc8025a6e0217", 0x87}, {&(0x7f0000000980)="8753a2ffbec728d14ef1e0da57e5c31936f6f3aa49cea8dc7762454e135c28df7ee42dd61f89b43b548a7fd6a2ee062467fb134b137192a83fb65c48bf957a87714982285b0afc9b1d7fac5d853034f3474808ec8c14a546c6c8c5e14b9547a3481ff47e", 0x64}, {&(0x7f0000000a00)="c7b2adb574ea27cb3837b8e695e5891bd1e47be95f2702cddb24d621b52f78d6e71fa5545b7ea3121a28c57ca20fcda3cde187d2cab52fa39b40034e646c2656c10477dbbe77ece1203c64f14b72d3c3ae3340ebc96acd1f2f05124feca5412c79eecf60f8232ed2dba86b77c06f981091d9ec23c91f655c8ff6a1c878a7a269961874915ddc5536ee4b119196dbcf6f2e6e9a42bc559b49d9acf66aa246497ad4336268434b45fac13e49207341abeb5863cbd7b3f51c2d2b477648975cda4735e67294", 0xc4}, {&(0x7f0000000b00)}, {&(0x7f0000000b40)="3723057409e70926fc25b68357fd911933ec9ebb3ca72fe4a54b53faff80b0d0175a19138dd32d67fef9770375ec60b652de137e477307a9c2bf31ef2d90e46aa82e567f297ac75ff8d9b57424a54df4a62d80e14c2a56247ccaee7c0b733594a6867d0636a53645fac57c9cd941a6c65f9fd125e3e88522a80f57f8b5dd190a78493ab61cd4a19251c49d8bfe9fcd2f8e8f5c9af2148500fe7ed7b8e1080e29cd0c5e74a4d1352c4523", 0xaa}], 0x9}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) kernel console output (not intermixed with test programs): 10 [ 84.066192][ T4425] ? __fget_files+0x28/0x4b0 [ 84.070816][ T4425] should_fail_ex+0x399/0x4d0 [ 84.075523][ T4425] _copy_from_user+0x2c/0x170 [ 84.080221][ T4425] generic_map_update_batch+0x4f3/0x810 [ 84.085814][ T4425] ? rcu_read_unlock+0xa0/0xa0 [ 84.090616][ T4425] ? __fdget+0x17c/0x200 [ 84.094881][ T4425] ? rcu_read_unlock+0xa0/0xa0 [ 84.099660][ T4425] bpf_map_do_batch+0x466/0x600 [ 84.104538][ T4425] __sys_bpf+0x6f7/0x780 [ 84.108804][ T4425] ? bpf_link_show_fdinfo+0x380/0x380 [ 84.114239][ T4425] ? lock_chain_count+0x20/0x20 [ 84.119126][ T4425] __x64_sys_bpf+0x78/0x90 [ 84.123563][ T4425] do_syscall_64+0x4c/0xa0 [ 84.127995][ T4425] ? clear_bhb_loop+0x60/0xb0 [ 84.132686][ T4425] ? clear_bhb_loop+0x60/0xb0 [ 84.137382][ T4425] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 84.143292][ T4425] RIP: 0033:0x7f5f7739c799 [ 84.147724][ T4425] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 84.167348][ T4425] RSP: 002b:00007f5f7822f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 84.175802][ T4425] RAX: ffffffffffffffda RBX: 00007f5f77615fa0 RCX: 00007f5f7739c799 [ 84.183810][ T4425] RDX: 0000000000000038 RSI: 0000200000000040 RDI: 000000000000001a [ 84.191806][ T4425] RBP: 00007f5f7822f090 R08: 0000000000000000 R09: 0000000000000000 [ 84.199805][ T4425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 84.207795][ T4425] R13: 00007f5f77616038 R14: 00007f5f77615fa0 R15: 00007fffcc32f0b8 [ 84.215805][ T4425] [ 86.573900][ T4453] netlink: 'syz.4.33': attribute type 21 has an invalid length. [ 86.651482][ T4454] netlink: 68 bytes leftover after parsing attributes in process `syz.2.32'. [ 86.682129][ T4448] netlink: 'syz.0.30': attribute type 10 has an invalid length. [ 86.701910][ T4448] netlink: 65015 bytes leftover after parsing attributes in process `syz.0.30'. [ 88.423589][ T4483] device syzkaller0 entered promiscuous mode [ 88.773255][ T4498] FAULT_INJECTION: forcing a failure. [ 88.773255][ T4498] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 88.796353][ T4498] CPU: 1 PID: 4498 Comm: syz.3.45 Not tainted syzkaller #0 [ 88.803622][ T4498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 88.813715][ T4498] Call Trace: [ 88.817027][ T4498] [ 88.819991][ T4498] dump_stack_lvl+0x188/0x24e [ 88.824745][ T4498] ? show_regs_print_info+0x12/0x12 [ 88.830017][ T4498] ? load_image+0x400/0x400 [ 88.834571][ T4498] ? __lock_acquire+0x7d10/0x7d10 [ 88.839656][ T4498] should_fail_ex+0x399/0x4d0 [ 88.844382][ T4498] _copy_from_user+0x2c/0x170 [ 88.849108][ T4498] generic_map_update_batch+0x4f3/0x810 [ 88.854745][ T4498] ? rcu_read_unlock+0xa0/0xa0 [ 88.859573][ T4498] ? __fdget+0x17c/0x200 [ 88.863870][ T4498] ? rcu_read_unlock+0xa0/0xa0 [ 88.868660][ T4498] bpf_map_do_batch+0x466/0x600 [ 88.873528][ T4498] __sys_bpf+0x6f7/0x780 [ 88.877857][ T4498] ? bpf_link_show_fdinfo+0x380/0x380 [ 88.883327][ T4498] ? lock_chain_count+0x20/0x20 [ 88.888262][ T4498] __x64_sys_bpf+0x78/0x90 [ 88.893083][ T4498] do_syscall_64+0x4c/0xa0 [ 88.897544][ T4498] ? clear_bhb_loop+0x60/0xb0 [ 88.902265][ T4498] ? clear_bhb_loop+0x60/0xb0 [ 88.906976][ T4498] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 88.912872][ T4498] RIP: 0033:0x7f224c99c799 [ 88.917378][ T4498] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 88.936995][ T4498] RSP: 002b:00007f224d8ff028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 88.945512][ T4498] RAX: ffffffffffffffda RBX: 00007f224cc15fa0 RCX: 00007f224c99c799 [ 88.953516][ T4498] RDX: 0000000000000038 RSI: 0000200000000040 RDI: 000000000000001a [ 88.961851][ T4498] RBP: 00007f224d8ff090 R08: 0000000000000000 R09: 0000000000000000 [ 88.969831][ T4498] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 88.977810][ T4498] R13: 00007f224cc16038 R14: 00007f224cc15fa0 R15: 00007ffd03173708 [ 88.985801][ T4498] [ 90.396419][ T4502] netlink: 68 bytes leftover after parsing attributes in process `syz.3.46'. [ 91.972975][ T4539] netlink: 129384 bytes leftover after parsing attributes in process `syz.2.56'. [ 92.424593][ T4546] FAULT_INJECTION: forcing a failure. [ 92.424593][ T4546] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 92.483834][ T4546] CPU: 0 PID: 4546 Comm: syz.4.58 Not tainted syzkaller #0 [ 92.491122][ T4546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 92.501219][ T4546] Call Trace: [ 92.504615][ T4546] [ 92.507567][ T4546] dump_stack_lvl+0x188/0x24e [ 92.512294][ T4546] ? show_regs_print_info+0x12/0x12 [ 92.517527][ T4546] ? load_image+0x400/0x400 [ 92.522055][ T4546] ? __lock_acquire+0x7d10/0x7d10 [ 92.527101][ T4546] ? __fget_files+0x28/0x4b0 [ 92.531743][ T4546] should_fail_ex+0x399/0x4d0 [ 92.536442][ T4546] _copy_from_user+0x2c/0x170 [ 92.541144][ T4546] generic_map_update_batch+0x4a1/0x810 [ 92.546748][ T4546] ? rcu_read_unlock+0xa0/0xa0 [ 92.551537][ T4546] ? __fdget+0x17c/0x200 [ 92.555818][ T4546] ? rcu_read_unlock+0xa0/0xa0 [ 92.560612][ T4546] bpf_map_do_batch+0x466/0x600 [ 92.565495][ T4546] __sys_bpf+0x6f7/0x780 [ 92.569763][ T4546] ? bpf_link_show_fdinfo+0x380/0x380 [ 92.575180][ T4546] ? lock_chain_count+0x20/0x20 [ 92.580115][ T4546] __x64_sys_bpf+0x78/0x90 [ 92.584589][ T4546] do_syscall_64+0x4c/0xa0 [ 92.589041][ T4546] ? clear_bhb_loop+0x60/0xb0 [ 92.593797][ T4546] ? clear_bhb_loop+0x60/0xb0 [ 92.598581][ T4546] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 92.604490][ T4546] RIP: 0033:0x7f5f7739c799 [ 92.608930][ T4546] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 92.628558][ T4546] RSP: 002b:00007f5f7822f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 92.637167][ T4546] RAX: ffffffffffffffda RBX: 00007f5f77615fa0 RCX: 00007f5f7739c799 [ 92.645156][ T4546] RDX: 0000000000000038 RSI: 0000200000000040 RDI: 000000000000001a [ 92.653174][ T4546] RBP: 00007f5f7822f090 R08: 0000000000000000 R09: 0000000000000000 [ 92.661159][ T4546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 92.669156][ T4546] R13: 00007f5f77616038 R14: 00007f5f77615fa0 R15: 00007fffcc32f0b8 [ 92.677172][ T4546] [ 93.084968][ T4558] device syzkaller0 entered promiscuous mode [ 97.872880][ T4575] netlink: 'syz.4.67': attribute type 10 has an invalid length. [ 97.885412][ T4575] netlink: 55 bytes leftover after parsing attributes in process `syz.4.67'. [ 98.013725][ T4608] FAULT_INJECTION: forcing a failure. [ 98.013725][ T4608] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 98.027780][ T4608] CPU: 1 PID: 4608 Comm: syz.2.76 Not tainted syzkaller #0 [ 98.035046][ T4608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 98.045136][ T4608] Call Trace: [ 98.048439][ T4608] [ 98.051406][ T4608] dump_stack_lvl+0x188/0x24e [ 98.056141][ T4608] ? show_regs_print_info+0x12/0x12 [ 98.061355][ T4608] ? load_image+0x400/0x400 [ 98.065886][ T4608] ? __lock_acquire+0x7d10/0x7d10 [ 98.071102][ T4608] ? __fget_files+0x28/0x4b0 [ 98.075732][ T4608] should_fail_ex+0x399/0x4d0 [ 98.080418][ T4608] _copy_from_user+0x2c/0x170 [ 98.085108][ T4608] generic_map_update_batch+0x4f3/0x810 [ 98.090717][ T4608] ? rcu_read_unlock+0xa0/0xa0 [ 98.095524][ T4608] ? __fdget+0x17c/0x200 [ 98.099781][ T4608] ? rcu_read_unlock+0xa0/0xa0 [ 98.104546][ T4608] bpf_map_do_batch+0x466/0x600 [ 98.109440][ T4608] __sys_bpf+0x6f7/0x780 [ 98.113735][ T4608] ? bpf_link_show_fdinfo+0x380/0x380 [ 98.119153][ T4608] ? lock_chain_count+0x20/0x20 [ 98.124027][ T4608] __x64_sys_bpf+0x78/0x90 [ 98.128470][ T4608] do_syscall_64+0x4c/0xa0 [ 98.132923][ T4608] ? clear_bhb_loop+0x60/0xb0 [ 98.137624][ T4608] ? clear_bhb_loop+0x60/0xb0 [ 98.142334][ T4608] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 98.148251][ T4608] RIP: 0033:0x7f2555f9c799 [ 98.152779][ T4608] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 98.172389][ T4608] RSP: 002b:00007f2556da1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 98.180812][ T4608] RAX: ffffffffffffffda RBX: 00007f2556215fa0 RCX: 00007f2555f9c799 [ 98.188801][ T4608] RDX: 0000000000000038 RSI: 0000200000000040 RDI: 000000000000001a [ 98.196801][ T4608] RBP: 00007f2556da1090 R08: 0000000000000000 R09: 0000000000000000 [ 98.204780][ T4608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 98.212777][ T4608] R13: 00007f2556216038 R14: 00007f2556215fa0 R15: 00007ffea9d7e168 [ 98.220802][ T4608] [ 100.133869][ T4658] netlink: 132 bytes leftover after parsing attributes in process `syz.1.91'. [ 100.684956][ T4666] netlink: 'syz.1.94': attribute type 2 has an invalid length. [ 100.753330][ T4666] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.94'. [ 100.803410][ T4672] netlink: 'syz.0.97': attribute type 11 has an invalid length. [ 100.834385][ T4672] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.97'. [ 100.866652][ T4671] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 103.573364][ T4711] netlink: 'syz.0.108': attribute type 19 has an invalid length. [ 103.591642][ T4711] netlink: 40 bytes leftover after parsing attributes in process `syz.0.108'. [ 103.903463][ T4722] netlink: 'syz.2.113': attribute type 21 has an invalid length. [ 108.052373][ T4759] netlink: 188 bytes leftover after parsing attributes in process `syz.2.121'. [ 108.091880][ T4761] device syzkaller0 entered promiscuous mode [ 108.483232][ T4805] netlink: 'syz.1.131': attribute type 39 has an invalid length. [ 108.542658][ T4806] FAULT_INJECTION: forcing a failure. [ 108.542658][ T4806] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 108.610038][ T4813] Zero length message leads to an empty skb [ 108.627323][ T4806] CPU: 1 PID: 4806 Comm: syz.3.130 Not tainted syzkaller #0 [ 108.634728][ T4806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 108.644840][ T4806] Call Trace: [ 108.648178][ T4806] [ 108.651152][ T4806] dump_stack_lvl+0x188/0x24e [ 108.656080][ T4806] ? show_regs_print_info+0x12/0x12 [ 108.661334][ T4806] ? load_image+0x400/0x400 [ 108.665908][ T4806] ? __lock_acquire+0x7d10/0x7d10 [ 108.671087][ T4806] ? __fget_files+0x28/0x4b0 [ 108.675801][ T4806] should_fail_ex+0x399/0x4d0 [ 108.680537][ T4806] _copy_from_user+0x2c/0x170 [ 108.685278][ T4806] generic_map_update_batch+0x4a1/0x810 [ 108.690913][ T4806] ? rcu_read_unlock+0xa0/0xa0 [ 108.695752][ T4806] ? __fdget+0x17c/0x200 [ 108.700044][ T4806] ? rcu_read_unlock+0xa0/0xa0 [ 108.704943][ T4806] bpf_map_do_batch+0x466/0x600 [ 108.709937][ T4806] __sys_bpf+0x6f7/0x780 [ 108.714235][ T4806] ? bpf_link_show_fdinfo+0x380/0x380 [ 108.719692][ T4806] ? lock_chain_count+0x20/0x20 [ 108.724626][ T4806] __x64_sys_bpf+0x78/0x90 [ 108.729199][ T4806] do_syscall_64+0x4c/0xa0 [ 108.733653][ T4806] ? clear_bhb_loop+0x60/0xb0 [ 108.738383][ T4806] ? clear_bhb_loop+0x60/0xb0 [ 108.743200][ T4806] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 108.749149][ T4806] RIP: 0033:0x7f224c99c799 [ 108.753612][ T4806] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 108.773364][ T4806] RSP: 002b:00007f224d8ff028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 108.781823][ T4806] RAX: ffffffffffffffda RBX: 00007f224cc15fa0 RCX: 00007f224c99c799 [ 108.789824][ T4806] RDX: 0000000000000038 RSI: 0000200000000040 RDI: 000000000000001a [ 108.797814][ T4806] RBP: 00007f224d8ff090 R08: 0000000000000000 R09: 0000000000000000 [ 108.805799][ T4806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 108.813806][ T4806] R13: 00007f224cc16038 R14: 00007f224cc15fa0 R15: 00007ffd03173708 [ 108.821830][ T4806] [ 109.430509][ T4831] netlink: 'syz.2.138': attribute type 9 has an invalid length. [ 109.556625][ T4831] netlink: 209852 bytes leftover after parsing attributes in process `syz.2.138'. [ 110.128757][ T4842] netlink: 'syz.1.141': attribute type 15 has an invalid length. [ 110.156940][ T4842] netlink: 'syz.1.141': attribute type 7 has an invalid length. [ 110.248639][ T4849] netlink: 'syz.3.143': attribute type 9 has an invalid length. [ 110.282365][ T4849] netlink: 126588 bytes leftover after parsing attributes in process `syz.3.143'. [ 110.442688][ T4853] netlink: 'syz.4.146': attribute type 10 has an invalid length. [ 110.523209][ T4853] batman_adv: batadv0: Adding interface: netdevsim0 [ 110.608440][ T4853] batman_adv: batadv0: The MTU of interface netdevsim0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 110.651942][ T4853] batman_adv: batadv0: Not using interface netdevsim0 (retrying later): interface not active [ 112.767291][ T4863] FAULT_INJECTION: forcing a failure. [ 112.767291][ T4863] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 112.793896][ T4863] CPU: 1 PID: 4863 Comm: syz.3.147 Not tainted syzkaller #0 [ 112.801253][ T4863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 112.811429][ T4863] Call Trace: [ 112.814728][ T4863] [ 112.817730][ T4863] dump_stack_lvl+0x188/0x24e [ 112.822436][ T4863] ? show_regs_print_info+0x12/0x12 [ 112.827740][ T4863] ? load_image+0x400/0x400 [ 112.832260][ T4863] ? __lock_acquire+0x7d10/0x7d10 [ 112.837304][ T4863] ? bpf_percpu_hash_update+0x69/0x200 [ 112.842782][ T4863] should_fail_ex+0x399/0x4d0 [ 112.847474][ T4863] _copy_from_user+0x2c/0x170 [ 112.852164][ T4863] generic_map_update_batch+0x4f3/0x810 [ 112.857743][ T4863] ? rcu_read_unlock+0xa0/0xa0 [ 112.862526][ T4863] ? __fdget+0x17c/0x200 [ 112.866784][ T4863] ? rcu_read_unlock+0xa0/0xa0 [ 112.871560][ T4863] bpf_map_do_batch+0x466/0x600 [ 112.876431][ T4863] __sys_bpf+0x6f7/0x780 [ 112.880708][ T4863] ? bpf_link_show_fdinfo+0x380/0x380 [ 112.886109][ T4863] ? lock_chain_count+0x20/0x20 [ 112.891070][ T4863] __x64_sys_bpf+0x78/0x90 [ 112.895590][ T4863] do_syscall_64+0x4c/0xa0 [ 112.900021][ T4863] ? clear_bhb_loop+0x60/0xb0 [ 112.904714][ T4863] ? clear_bhb_loop+0x60/0xb0 [ 112.909402][ T4863] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 112.915306][ T4863] RIP: 0033:0x7f224c99c799 [ 112.919735][ T4863] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 112.939353][ T4863] RSP: 002b:00007f224d8de028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 112.947786][ T4863] RAX: ffffffffffffffda RBX: 00007f224cc16090 RCX: 00007f224c99c799 [ 112.955770][ T4863] RDX: 0000000000000038 RSI: 0000200000000040 RDI: 000000000000001a [ 112.963760][ T4863] RBP: 00007f224d8de090 R08: 0000000000000000 R09: 0000000000000000 [ 112.971827][ T4863] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 112.979803][ T4863] R13: 00007f224cc16128 R14: 00007f224cc16090 R15: 00007ffd03173708 [ 112.987802][ T4863] [ 115.455004][ T4912] delete_channel: no stack [ 116.242624][ T4923] FAULT_INJECTION: forcing a failure. [ 116.242624][ T4923] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 116.327308][ T4923] CPU: 0 PID: 4923 Comm: syz.1.164 Not tainted syzkaller #0 [ 116.334695][ T4923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 116.344797][ T4923] Call Trace: [ 116.348118][ T4923] [ 116.351095][ T4923] dump_stack_lvl+0x188/0x24e [ 116.355826][ T4923] ? show_regs_print_info+0x12/0x12 [ 116.361095][ T4923] ? load_image+0x400/0x400 [ 116.365654][ T4923] ? __lock_acquire+0x7d10/0x7d10 [ 116.370789][ T4923] ? __fget_files+0x28/0x4b0 [ 116.375450][ T4923] should_fail_ex+0x399/0x4d0 [ 116.380184][ T4923] _copy_from_user+0x2c/0x170 [ 116.384998][ T4923] generic_map_update_batch+0x4a1/0x810 [ 116.390618][ T4923] ? rcu_read_unlock+0xa0/0xa0 [ 116.395427][ T4923] ? __fdget+0x17c/0x200 [ 116.399699][ T4923] ? rcu_read_unlock+0xa0/0xa0 [ 116.404477][ T4923] bpf_map_do_batch+0x466/0x600 [ 116.409446][ T4923] __sys_bpf+0x6f7/0x780 [ 116.413713][ T4923] ? bpf_link_show_fdinfo+0x380/0x380 [ 116.419122][ T4923] ? lock_chain_count+0x20/0x20 [ 116.424002][ T4923] __x64_sys_bpf+0x78/0x90 [ 116.428524][ T4923] do_syscall_64+0x4c/0xa0 [ 116.433044][ T4923] ? clear_bhb_loop+0x60/0xb0 [ 116.437734][ T4923] ? clear_bhb_loop+0x60/0xb0 [ 116.442425][ T4923] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 116.448333][ T4923] RIP: 0033:0x7f49e119c799 [ 116.452767][ T4923] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 116.472383][ T4923] RSP: 002b:00007f49e1fb3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 116.480822][ T4923] RAX: ffffffffffffffda RBX: 00007f49e1416090 RCX: 00007f49e119c799 [ 116.488805][ T4923] RDX: 0000000000000038 RSI: 0000200000000040 RDI: 000000000000001a [ 116.496785][ T4923] RBP: 00007f49e1fb3090 R08: 0000000000000000 R09: 0000000000000000 [ 116.504769][ T4923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 116.512757][ T4923] R13: 00007f49e1416128 R14: 00007f49e1416090 R15: 00007ffdff7b1d28 [ 116.520758][ T4923] [ 118.348060][ T4956] netlink: 'syz.3.173': attribute type 10 has an invalid length. [ 120.928563][ T4956] team0: Port device geneve1 added [ 121.018862][ T4967] syz.0.179 uses obsolete (PF_INET,SOCK_PACKET) [ 121.356997][ T4972] device syzkaller0 entered promiscuous mode [ 121.631658][ T4990] FAULT_INJECTION: forcing a failure. [ 121.631658][ T4990] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 121.693671][ T4990] CPU: 0 PID: 4990 Comm: syz.0.186 Not tainted syzkaller #0 [ 121.701046][ T4990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 121.711140][ T4990] Call Trace: [ 121.714459][ T4990] [ 121.717428][ T4990] dump_stack_lvl+0x188/0x24e [ 121.722168][ T4990] ? show_regs_print_info+0x12/0x12 [ 121.727421][ T4990] ? load_image+0x400/0x400 [ 121.731983][ T4990] ? __lock_acquire+0x7d10/0x7d10 [ 121.737025][ T4990] ? __fget_files+0x28/0x4b0 [ 121.741764][ T4990] should_fail_ex+0x399/0x4d0 [ 121.746509][ T4990] _copy_from_user+0x2c/0x170 [ 121.751246][ T4990] generic_map_update_batch+0x4f3/0x810 [ 121.756953][ T4990] ? rcu_read_unlock+0xa0/0xa0 [ 121.761778][ T4990] ? __fdget+0x17c/0x200 [ 121.766165][ T4990] ? rcu_read_unlock+0xa0/0xa0 [ 121.770972][ T4990] bpf_map_do_batch+0x466/0x600 [ 121.775883][ T4990] __sys_bpf+0x6f7/0x780 [ 121.780255][ T4990] ? bpf_link_show_fdinfo+0x380/0x380 [ 121.785675][ T4990] ? lock_chain_count+0x20/0x20 [ 121.790582][ T4990] __x64_sys_bpf+0x78/0x90 [ 121.795058][ T4990] do_syscall_64+0x4c/0xa0 [ 121.799589][ T4990] ? clear_bhb_loop+0x60/0xb0 [ 121.804311][ T4990] ? clear_bhb_loop+0x60/0xb0 [ 121.809035][ T4990] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 121.814972][ T4990] RIP: 0033:0x7fad8459c799 [ 121.819441][ T4990] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 121.839105][ T4990] RSP: 002b:00007fad853c2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 121.847577][ T4990] RAX: ffffffffffffffda RBX: 00007fad84815fa0 RCX: 00007fad8459c799 [ 121.855596][ T4990] RDX: 0000000000000038 RSI: 0000200000000040 RDI: 000000000000001a [ 121.863612][ T4990] RBP: 00007fad853c2090 R08: 0000000000000000 R09: 0000000000000000 [ 121.871625][ T4990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 121.879729][ T4990] R13: 00007fad84816038 R14: 00007fad84815fa0 R15: 00007ffc5bee64a8 [ 121.887774][ T4990] [ 124.611762][ T5028] netlink: 'syz.2.195': attribute type 21 has an invalid length. [ 124.925305][ T5035] netlink: 61967 bytes leftover after parsing attributes in process `syz.0.197'. [ 125.475597][ T5040] FAULT_INJECTION: forcing a failure. [ 125.475597][ T5040] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 125.503778][ T5040] CPU: 1 PID: 5040 Comm: syz.2.199 Not tainted syzkaller #0 [ 125.511150][ T5040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 125.521246][ T5040] Call Trace: [ 125.524656][ T5040] [ 125.527631][ T5040] dump_stack_lvl+0x188/0x24e [ 125.532412][ T5040] ? show_regs_print_info+0x12/0x12 [ 125.537677][ T5040] ? load_image+0x400/0x400 [ 125.542232][ T5040] ? __lock_acquire+0x7d10/0x7d10 [ 125.547301][ T5040] ? __fget_files+0x28/0x4b0 [ 125.551958][ T5040] should_fail_ex+0x399/0x4d0 [ 125.556711][ T5040] _copy_from_user+0x2c/0x170 [ 125.561439][ T5040] generic_map_update_batch+0x4a1/0x810 [ 125.567065][ T5040] ? rcu_read_unlock+0xa0/0xa0 [ 125.571891][ T5040] ? __fdget+0x17c/0x200 [ 125.576390][ T5040] ? rcu_read_unlock+0xa0/0xa0 [ 125.581205][ T5040] bpf_map_do_batch+0x466/0x600 [ 125.586121][ T5040] __sys_bpf+0x6f7/0x780 [ 125.590415][ T5040] ? bpf_link_show_fdinfo+0x380/0x380 [ 125.595873][ T5040] ? lock_chain_count+0x20/0x20 [ 125.600792][ T5040] __x64_sys_bpf+0x78/0x90 [ 125.605394][ T5040] do_syscall_64+0x4c/0xa0 [ 125.609868][ T5040] ? clear_bhb_loop+0x60/0xb0 [ 125.614602][ T5040] ? clear_bhb_loop+0x60/0xb0 [ 125.619328][ T5040] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 125.625278][ T5040] RIP: 0033:0x7f2555f9c799 [ 125.629750][ T5040] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 125.649825][ T5040] RSP: 002b:00007f2556da1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 125.658249][ T5040] RAX: ffffffffffffffda RBX: 00007f2556215fa0 RCX: 00007f2555f9c799 [ 125.666219][ T5040] RDX: 0000000000000038 RSI: 0000200000000040 RDI: 000000000000001a [ 125.674224][ T5040] RBP: 00007f2556da1090 R08: 0000000000000000 R09: 0000000000000000 [ 125.682391][ T5040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 125.690412][ T5040] R13: 00007f2556216038 R14: 00007f2556215fa0 R15: 00007ffea9d7e168 [ 125.698641][ T5040] [ 125.881570][ T5048] netlink: 'syz.0.201': attribute type 21 has an invalid length. [ 127.660667][ T5081] netlink: 61967 bytes leftover after parsing attributes in process `syz.4.212'. [ 127.917865][ T5084] FAULT_INJECTION: forcing a failure. [ 127.917865][ T5084] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 128.043495][ T5084] CPU: 0 PID: 5084 Comm: syz.2.213 Not tainted syzkaller #0 [ 128.050853][ T5084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 128.061031][ T5084] Call Trace: [ 128.064343][ T5084] [ 128.067302][ T5084] dump_stack_lvl+0x188/0x24e [ 128.072111][ T5084] ? show_regs_print_info+0x12/0x12 [ 128.077346][ T5084] ? load_image+0x400/0x400 [ 128.081982][ T5084] ? __lock_acquire+0x7d10/0x7d10 [ 128.087051][ T5084] should_fail_ex+0x399/0x4d0 [ 128.091848][ T5084] _copy_from_user+0x2c/0x170 [ 128.096649][ T5084] generic_map_update_batch+0x4f3/0x810 [ 128.102339][ T5084] ? rcu_read_unlock+0xa0/0xa0 [ 128.107145][ T5084] ? __fdget+0x17c/0x200 [ 128.111434][ T5084] ? rcu_read_unlock+0xa0/0xa0 [ 128.116230][ T5084] bpf_map_do_batch+0x466/0x600 [ 128.121128][ T5084] __sys_bpf+0x6f7/0x780 [ 128.125415][ T5084] ? bpf_link_show_fdinfo+0x380/0x380 [ 128.131020][ T5084] ? lock_chain_count+0x20/0x20 [ 128.135926][ T5084] __x64_sys_bpf+0x78/0x90 [ 128.140377][ T5084] do_syscall_64+0x4c/0xa0 [ 128.144831][ T5084] ? clear_bhb_loop+0x60/0xb0 [ 128.149546][ T5084] ? clear_bhb_loop+0x60/0xb0 [ 128.154260][ T5084] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 128.160193][ T5084] RIP: 0033:0x7f2555f9c799 [ 128.164723][ T5084] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 128.184359][ T5084] RSP: 002b:00007f2556d80028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 128.192901][ T5084] RAX: ffffffffffffffda RBX: 00007f2556216090 RCX: 00007f2555f9c799 [ 128.200995][ T5084] RDX: 0000000000000038 RSI: 0000200000000040 RDI: 000000000000001a [ 128.209023][ T5084] RBP: 00007f2556d80090 R08: 0000000000000000 R09: 0000000000000000 [ 128.217027][ T5084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 128.225026][ T5084] R13: 00007f2556216128 R14: 00007f2556216090 R15: 00007ffea9d7e168 [ 128.233053][ T5084] [ 128.609668][ T5092] FAULT_INJECTION: forcing a failure. [ 128.609668][ T5092] name failslab, interval 1, probability 0, space 0, times 1 [ 128.648829][ T5092] CPU: 0 PID: 5092 Comm: syz.0.215 Not tainted syzkaller #0 [ 128.656207][ T5092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 128.666296][ T5092] Call Trace: [ 128.669605][ T5092] [ 128.672736][ T5092] dump_stack_lvl+0x188/0x24e [ 128.677457][ T5092] ? show_regs_print_info+0x12/0x12 [ 128.682725][ T5092] ? load_image+0x400/0x400 [ 128.687261][ T5092] ? __lock_acquire+0x7d10/0x7d10 [ 128.692410][ T5092] should_fail_ex+0x399/0x4d0 [ 128.697207][ T5092] should_failslab+0x5/0x20 [ 128.701758][ T5092] slab_pre_alloc_hook+0x59/0x310 [ 128.706817][ T5092] ? verify_lock_unused+0x140/0x140 [ 128.712066][ T5092] ? bpf_test_init+0x9f/0x140 [ 128.716885][ T5092] __kmem_cache_alloc_node+0x4f/0x260 [ 128.722303][ T5092] ? bpf_test_init+0x9f/0x140 [ 128.727008][ T5092] __kmalloc+0xa0/0x240 [ 128.731188][ T5092] bpf_test_init+0x9f/0x140 [ 128.735734][ T5092] bpf_prog_test_run_xdp+0x484/0xf10 [ 128.741072][ T5092] ? dev_put+0x80/0x80 [ 128.745279][ T5092] ? dev_put+0x80/0x80 [ 128.749558][ T5092] bpf_prog_test_run+0x31e/0x390 [ 128.754613][ T5092] __sys_bpf+0x62b/0x780 [ 128.758907][ T5092] ? bpf_link_show_fdinfo+0x380/0x380 [ 128.764345][ T5092] ? lock_chain_count+0x20/0x20 [ 128.769255][ T5092] __x64_sys_bpf+0x78/0x90 [ 128.773722][ T5092] do_syscall_64+0x4c/0xa0 [ 128.778182][ T5092] ? clear_bhb_loop+0x60/0xb0 [ 128.782893][ T5092] ? clear_bhb_loop+0x60/0xb0 [ 128.787597][ T5092] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 128.793509][ T5092] RIP: 0033:0x7fad8459c799 [ 128.797945][ T5092] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 128.817573][ T5092] RSP: 002b:00007fad853c2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 128.826093][ T5092] RAX: ffffffffffffffda RBX: 00007fad84815fa0 RCX: 00007fad8459c799 [ 128.834079][ T5092] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 000000000000000a [ 128.842060][ T5092] RBP: 00007fad853c2090 R08: 0000000000000000 R09: 0000000000000000 [ 128.850299][ T5092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 128.858279][ T5092] R13: 00007fad84816038 R14: 00007fad84815fa0 R15: 00007ffc5bee64a8 [ 128.866273][ T5092] [ 130.590567][ T5127] netlink: 61967 bytes leftover after parsing attributes in process `syz.1.227'. [ 131.731123][ T5135] device syzkaller0 entered promiscuous mode [ 131.741994][ T5138] FAULT_INJECTION: forcing a failure. [ 131.741994][ T5138] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 131.762865][ T5138] CPU: 0 PID: 5138 Comm: syz.0.230 Not tainted syzkaller #0 [ 131.770234][ T5138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 131.780333][ T5138] Call Trace: [ 131.783702][ T5138] [ 131.786696][ T5138] dump_stack_lvl+0x188/0x24e [ 131.791542][ T5138] ? show_regs_print_info+0x12/0x12 [ 131.796788][ T5138] ? load_image+0x400/0x400 [ 131.801342][ T5138] ? __lock_acquire+0x7d10/0x7d10 [ 131.806434][ T5138] should_fail_ex+0x399/0x4d0 [ 131.811137][ T5138] _copy_from_user+0x2c/0x170 [ 131.815824][ T5138] generic_map_update_batch+0x4a1/0x810 [ 131.821391][ T5138] ? rcu_read_unlock+0xa0/0xa0 [ 131.826188][ T5138] ? __fdget+0x17c/0x200 [ 131.830441][ T5138] ? rcu_read_unlock+0xa0/0xa0 [ 131.835211][ T5138] bpf_map_do_batch+0x466/0x600 [ 131.840076][ T5138] __sys_bpf+0x6f7/0x780 [ 131.844367][ T5138] ? bpf_link_show_fdinfo+0x380/0x380 [ 131.849846][ T5138] ? lock_chain_count+0x20/0x20 [ 131.854739][ T5138] __x64_sys_bpf+0x78/0x90 [ 131.859171][ T5138] do_syscall_64+0x4c/0xa0 [ 131.863590][ T5138] ? clear_bhb_loop+0x60/0xb0 [ 131.868278][ T5138] ? clear_bhb_loop+0x60/0xb0 [ 131.872961][ T5138] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 131.878864][ T5138] RIP: 0033:0x7fad8459c799 [ 131.883295][ T5138] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 131.902988][ T5138] RSP: 002b:00007fad853c2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 131.911409][ T5138] RAX: ffffffffffffffda RBX: 00007fad84815fa0 RCX: 00007fad8459c799 [ 131.919452][ T5138] RDX: 0000000000000038 RSI: 0000200000000040 RDI: 000000000000001a [ 131.927436][ T5138] RBP: 00007fad853c2090 R08: 0000000000000000 R09: 0000000000000000 [ 131.935446][ T5138] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 131.943426][ T5138] R13: 00007fad84816038 R14: 00007fad84815fa0 R15: 00007ffc5bee64a8 [ 131.951513][ T5138] [ 132.243267][ T5143] FAULT_INJECTION: forcing a failure. [ 132.243267][ T5143] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 132.256840][ T5143] CPU: 0 PID: 5143 Comm: syz.0.232 Not tainted syzkaller #0 [ 132.264188][ T5143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 132.274366][ T5143] Call Trace: [ 132.277660][ T5143] [ 132.280664][ T5143] dump_stack_lvl+0x188/0x24e [ 132.285372][ T5143] ? show_regs_print_info+0x12/0x12 [ 132.290585][ T5143] ? load_image+0x400/0x400 [ 132.295109][ T5143] ? __lock_acquire+0x7d10/0x7d10 [ 132.300151][ T5143] ? __virt_addr_valid+0x188/0x540 [ 132.305364][ T5143] should_fail_ex+0x399/0x4d0 [ 132.310053][ T5143] _copy_from_user+0x2c/0x170 [ 132.314887][ T5143] bpf_test_init+0xde/0x140 [ 132.319411][ T5143] bpf_prog_test_run_xdp+0x484/0xf10 [ 132.324718][ T5143] ? dev_put+0x80/0x80 [ 132.328814][ T5143] ? dev_put+0x80/0x80 [ 132.332898][ T5143] bpf_prog_test_run+0x31e/0x390 [ 132.337855][ T5143] __sys_bpf+0x62b/0x780 [ 132.342120][ T5143] ? bpf_link_show_fdinfo+0x380/0x380 [ 132.347548][ T5143] ? lock_chain_count+0x20/0x20 [ 132.352514][ T5143] __x64_sys_bpf+0x78/0x90 [ 132.356951][ T5143] do_syscall_64+0x4c/0xa0 [ 132.361449][ T5143] ? clear_bhb_loop+0x60/0xb0 [ 132.366223][ T5143] ? clear_bhb_loop+0x60/0xb0 [ 132.370928][ T5143] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 132.376829][ T5143] RIP: 0033:0x7fad8459c799 [ 132.381253][ T5143] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 132.400879][ T5143] RSP: 002b:00007fad853a1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 132.409309][ T5143] RAX: ffffffffffffffda RBX: 00007fad84816090 RCX: 00007fad8459c799 [ 132.417295][ T5143] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 000000000000000a [ 132.425277][ T5143] RBP: 00007fad853a1090 R08: 0000000000000000 R09: 0000000000000000 [ 132.433262][ T5143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 132.441248][ T5143] R13: 00007fad84816128 R14: 00007fad84816090 R15: 00007ffc5bee64a8 [ 132.449238][ T5143] [ 132.911377][ T1278] ieee802154 phy0 wpan0: encryption failed: -22 [ 132.926473][ T1278] ieee802154 phy1 wpan1: encryption failed: -22 [ 134.276706][ T5146] mac80211_hwsim hwsim8 »»»»»»: renamed from wlan0 [ 134.581033][ T5154] netlink: 4595 bytes leftover after parsing attributes in process `syz.2.239'. [ 134.627243][ T5154] netlink: 4595 bytes leftover after parsing attributes in process `syz.2.239'. [ 134.757375][ T5160] netlink: 4595 bytes leftover after parsing attributes in process `syz.2.239'. [ 134.940209][ T5163] Ÿë: port 1(gretap0) entered blocking state [ 134.998028][ T5163] Ÿë: port 1(gretap0) entered disabled state [ 135.061834][ T5163] device gretap0 entered promiscuous mode [ 136.517743][ T5190] device syzkaller0 entered promiscuous mode [ 136.546975][ T5192] FAULT_INJECTION: forcing a failure. [ 136.546975][ T5192] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 136.577255][ T5192] CPU: 0 PID: 5192 Comm: syz.4.248 Not tainted syzkaller #0 [ 136.584622][ T5192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 136.594725][ T5192] Call Trace: [ 136.598046][ T5192] [ 136.601018][ T5192] dump_stack_lvl+0x188/0x24e [ 136.605752][ T5192] ? show_regs_print_info+0x12/0x12 [ 136.611016][ T5192] ? load_image+0x400/0x400 [ 136.615583][ T5192] ? __lock_acquire+0x7d10/0x7d10 [ 136.620778][ T5192] ? __rcu_read_unlock+0x78/0xd0 [ 136.625784][ T5192] should_fail_ex+0x399/0x4d0 [ 136.630511][ T5192] _copy_to_user+0x2c/0x130 [ 136.635062][ T5192] bpf_test_finish+0x198/0x600 [ 136.639889][ T5192] ? convert___skb_to_skb+0x580/0x580 [ 136.645318][ T5192] ? convert_skb_to___skb+0x420/0x420 [ 136.650746][ T5192] ? bpf_test_init+0x119/0x140 [ 136.655562][ T5192] bpf_prog_test_run_xdp+0x80a/0xf10 [ 136.660901][ T5192] ? dev_put+0x80/0x80 [ 136.665113][ T5192] ? dev_put+0x80/0x80 [ 136.669220][ T5192] bpf_prog_test_run+0x31e/0x390 [ 136.674203][ T5192] __sys_bpf+0x62b/0x780 [ 136.678479][ T5192] ? bpf_link_show_fdinfo+0x380/0x380 [ 136.683885][ T5192] ? lock_chain_count+0x20/0x20 [ 136.688782][ T5192] __x64_sys_bpf+0x78/0x90 [ 136.693301][ T5192] do_syscall_64+0x4c/0xa0 [ 136.697749][ T5192] ? clear_bhb_loop+0x60/0xb0 [ 136.702434][ T5192] ? clear_bhb_loop+0x60/0xb0 [ 136.707124][ T5192] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 136.713028][ T5192] RIP: 0033:0x7f5f7739c799 [ 136.717455][ T5192] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 136.737158][ T5192] RSP: 002b:00007f5f7822f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 136.745587][ T5192] RAX: ffffffffffffffda RBX: 00007f5f77615fa0 RCX: 00007f5f7739c799 [ 136.753578][ T5192] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 000000000000000a [ 136.761566][ T5192] RBP: 00007f5f7822f090 R08: 0000000000000000 R09: 0000000000000000 [ 136.769550][ T5192] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 136.777646][ T5192] R13: 00007f5f77616038 R14: 00007f5f77615fa0 R15: 00007fffcc32f0b8 [ 136.785726][ T5192] [ 140.128627][ T5227] FAULT_INJECTION: forcing a failure. [ 140.128627][ T5227] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 140.164803][ T5227] CPU: 1 PID: 5227 Comm: syz.3.272 Not tainted syzkaller #0 [ 140.172191][ T5227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 140.182379][ T5227] Call Trace: [ 140.185679][ T5227] [ 140.188628][ T5227] dump_stack_lvl+0x188/0x24e [ 140.193460][ T5227] ? show_regs_print_info+0x12/0x12 [ 140.198700][ T5227] ? load_image+0x400/0x400 [ 140.203233][ T5227] ? __lock_acquire+0x7d10/0x7d10 [ 140.208284][ T5227] ? __fget_files+0x28/0x4b0 [ 140.212945][ T5227] should_fail_ex+0x399/0x4d0 [ 140.217654][ T5227] _copy_from_user+0x2c/0x170 [ 140.222365][ T5227] generic_map_update_batch+0x4f3/0x810 [ 140.227959][ T5227] ? rcu_read_unlock+0xa0/0xa0 [ 140.232752][ T5227] ? __fdget+0x17c/0x200 [ 140.237021][ T5227] ? rcu_read_unlock+0xa0/0xa0 [ 140.241812][ T5227] bpf_map_do_batch+0x466/0x600 [ 140.246692][ T5227] __sys_bpf+0x6f7/0x780 [ 140.250988][ T5227] ? bpf_link_show_fdinfo+0x380/0x380 [ 140.256406][ T5227] ? lock_chain_count+0x20/0x20 [ 140.261298][ T5227] __x64_sys_bpf+0x78/0x90 [ 140.265860][ T5227] do_syscall_64+0x4c/0xa0 [ 140.270322][ T5227] ? clear_bhb_loop+0x60/0xb0 [ 140.275043][ T5227] ? clear_bhb_loop+0x60/0xb0 [ 140.279762][ T5227] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 140.285776][ T5227] RIP: 0033:0x7f224c99c799 [ 140.290209][ T5227] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 140.309920][ T5227] RSP: 002b:00007f224d8ff028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 140.318354][ T5227] RAX: ffffffffffffffda RBX: 00007f224cc15fa0 RCX: 00007f224c99c799 [ 140.326343][ T5227] RDX: 0000000000000038 RSI: 0000200000000040 RDI: 000000000000001a [ 140.334332][ T5227] RBP: 00007f224d8ff090 R08: 0000000000000000 R09: 0000000000000000 [ 140.342498][ T5227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 140.350486][ T5227] R13: 00007f224cc16038 R14: 00007f224cc15fa0 R15: 00007ffd03173708 [ 140.358593][ T5227] [ 141.310560][ T5251] netlink: 'syz.4.269': attribute type 13 has an invalid length. [ 141.542024][ T5254] FAULT_INJECTION: forcing a failure. [ 141.542024][ T5254] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 141.593984][ T5254] CPU: 0 PID: 5254 Comm: syz.0.270 Not tainted syzkaller #0 [ 141.601361][ T5254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 141.611543][ T5254] Call Trace: [ 141.614859][ T5254] [ 141.617812][ T5254] dump_stack_lvl+0x188/0x24e [ 141.622520][ T5254] ? show_regs_print_info+0x12/0x12 [ 141.627769][ T5254] ? load_image+0x400/0x400 [ 141.632378][ T5254] ? __lock_acquire+0x7d10/0x7d10 [ 141.637419][ T5254] ? __rcu_read_unlock+0x78/0xd0 [ 141.642375][ T5254] should_fail_ex+0x399/0x4d0 [ 141.647063][ T5254] _copy_to_user+0x2c/0x130 [ 141.651596][ T5254] bpf_test_finish+0x266/0x600 [ 141.656374][ T5254] ? convert___skb_to_skb+0x580/0x580 [ 141.661760][ T5254] ? convert_skb_to___skb+0x420/0x420 [ 141.667168][ T5254] ? bpf_test_init+0x119/0x140 [ 141.672220][ T5254] bpf_prog_test_run_xdp+0x80a/0xf10 [ 141.677620][ T5254] ? dev_put+0x80/0x80 [ 141.681706][ T5254] ? dev_put+0x80/0x80 [ 141.685786][ T5254] bpf_prog_test_run+0x31e/0x390 [ 141.690743][ T5254] __sys_bpf+0x62b/0x780 [ 141.695174][ T5254] ? bpf_link_show_fdinfo+0x380/0x380 [ 141.700668][ T5254] ? lock_chain_count+0x20/0x20 [ 141.705543][ T5254] __x64_sys_bpf+0x78/0x90 [ 141.709982][ T5254] do_syscall_64+0x4c/0xa0 [ 141.714409][ T5254] ? clear_bhb_loop+0x60/0xb0 [ 141.719110][ T5254] ? clear_bhb_loop+0x60/0xb0 [ 141.723799][ T5254] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 141.729703][ T5254] RIP: 0033:0x7fad8459c799 [ 141.734128][ T5254] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 141.753835][ T5254] RSP: 002b:00007fad853c2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 141.762267][ T5254] RAX: ffffffffffffffda RBX: 00007fad84815fa0 RCX: 00007fad8459c799 [ 141.770248][ T5254] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 000000000000000a [ 141.778235][ T5254] RBP: 00007fad853c2090 R08: 0000000000000000 R09: 0000000000000000 [ 141.786215][ T5254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 141.794202][ T5254] R13: 00007fad84816038 R14: 00007fad84815fa0 R15: 00007ffc5bee64a8 [ 141.802200][ T5254] [ 142.321158][ T5278] FAULT_INJECTION: forcing a failure. [ 142.321158][ T5278] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 142.367273][ T5278] CPU: 0 PID: 5278 Comm: syz.2.280 Not tainted syzkaller #0 [ 142.374663][ T5278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 142.384774][ T5278] Call Trace: [ 142.388100][ T5278] [ 142.391068][ T5278] dump_stack_lvl+0x188/0x24e [ 142.395810][ T5278] ? show_regs_print_info+0x12/0x12 [ 142.401075][ T5278] ? load_image+0x400/0x400 [ 142.405744][ T5278] ? __lock_acquire+0x7d10/0x7d10 [ 142.410843][ T5278] ? __fget_files+0x28/0x4b0 [ 142.415500][ T5278] should_fail_ex+0x399/0x4d0 [ 142.420275][ T5278] _copy_from_user+0x2c/0x170 [ 142.425030][ T5278] generic_map_update_batch+0x4a1/0x810 [ 142.430669][ T5278] ? rcu_read_unlock+0xa0/0xa0 [ 142.435502][ T5278] ? __fdget+0x17c/0x200 [ 142.439817][ T5278] ? rcu_read_unlock+0xa0/0xa0 [ 142.444639][ T5278] bpf_map_do_batch+0x466/0x600 [ 142.449558][ T5278] __sys_bpf+0x6f7/0x780 [ 142.453865][ T5278] ? bpf_link_show_fdinfo+0x380/0x380 [ 142.459302][ T5278] ? lock_chain_count+0x20/0x20 [ 142.464225][ T5278] __x64_sys_bpf+0x78/0x90 [ 142.468773][ T5278] do_syscall_64+0x4c/0xa0 [ 142.473223][ T5278] ? clear_bhb_loop+0x60/0xb0 [ 142.477931][ T5278] ? clear_bhb_loop+0x60/0xb0 [ 142.482646][ T5278] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 142.488566][ T5278] RIP: 0033:0x7f2555f9c799 [ 142.493004][ T5278] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 142.512653][ T5278] RSP: 002b:00007f2556da1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 142.521097][ T5278] RAX: ffffffffffffffda RBX: 00007f2556215fa0 RCX: 00007f2555f9c799 [ 142.529087][ T5278] RDX: 0000000000000038 RSI: 0000200000000040 RDI: 000000000000001a [ 142.537078][ T5278] RBP: 00007f2556da1090 R08: 0000000000000000 R09: 0000000000000000 [ 142.545106][ T5278] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 142.553130][ T5278] R13: 00007f2556216038 R14: 00007f2556215fa0 R15: 00007ffea9d7e168 [ 142.561156][ T5278] [ 143.227682][ T5286] delete_channel: no stack [ 143.392762][ T5281] mac80211_hwsim hwsim4 »»»»»»: renamed from wlan0 [ 143.572612][ T5296] FAULT_INJECTION: forcing a failure. [ 143.572612][ T5296] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 143.586090][ T5296] CPU: 1 PID: 5296 Comm: syz.3.287 Not tainted syzkaller #0 [ 143.593429][ T5296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 143.603647][ T5296] Call Trace: [ 143.606956][ T5296] [ 143.609930][ T5296] dump_stack_lvl+0x188/0x24e [ 143.614668][ T5296] ? show_regs_print_info+0x12/0x12 [ 143.620018][ T5296] ? load_image+0x400/0x400 [ 143.624585][ T5296] ? __lock_acquire+0x7d10/0x7d10 [ 143.629647][ T5296] ? __rcu_read_unlock+0x78/0xd0 [ 143.634624][ T5296] should_fail_ex+0x399/0x4d0 [ 143.639431][ T5296] _copy_to_user+0x2c/0x130 [ 143.643975][ T5296] bpf_test_finish+0x4a2/0x600 [ 143.648803][ T5296] ? convert___skb_to_skb+0x580/0x580 [ 143.654251][ T5296] ? convert_skb_to___skb+0x420/0x420 [ 143.659664][ T5296] ? bpf_test_init+0x119/0x140 [ 143.664458][ T5296] bpf_prog_test_run_xdp+0x80a/0xf10 [ 143.669815][ T5296] ? dev_put+0x80/0x80 [ 143.673934][ T5296] ? dev_put+0x80/0x80 [ 143.678040][ T5296] bpf_prog_test_run+0x31e/0x390 [ 143.683015][ T5296] __sys_bpf+0x62b/0x780 [ 143.687298][ T5296] ? bpf_link_show_fdinfo+0x380/0x380 [ 143.692762][ T5296] ? lock_chain_count+0x20/0x20 [ 143.697668][ T5296] __x64_sys_bpf+0x78/0x90 [ 143.702209][ T5296] do_syscall_64+0x4c/0xa0 [ 143.706668][ T5296] ? clear_bhb_loop+0x60/0xb0 [ 143.711377][ T5296] ? clear_bhb_loop+0x60/0xb0 [ 143.716087][ T5296] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 143.722017][ T5296] RIP: 0033:0x7f224c99c799 [ 143.726469][ T5296] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 143.746104][ T5296] RSP: 002b:00007f224d8de028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 143.754548][ T5296] RAX: ffffffffffffffda RBX: 00007f224cc16090 RCX: 00007f224c99c799 [ 143.762547][ T5296] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 000000000000000a [ 143.770547][ T5296] RBP: 00007f224d8de090 R08: 0000000000000000 R09: 0000000000000000 [ 143.778536][ T5296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 143.786525][ T5296] R13: 00007f224cc16128 R14: 00007f224cc16090 R15: 00007ffd03173708 [ 143.794539][ T5296] [ 144.158820][ T5311] netlink: 15231 bytes leftover after parsing attributes in process `syz.0.291'. [ 147.927554][ T5421] netlink: 'syz.1.301': attribute type 10 has an invalid length. [ 148.053637][ T5421] team0: Port device dummy0 added [ 148.067294][ T5441] netlink: 'syz.4.305': attribute type 3 has an invalid length. [ 148.088092][ T5441] netlink: 132 bytes leftover after parsing attributes in process `syz.4.305'. [ 148.385095][ T5445] device syzkaller0 entered promiscuous mode [ 153.410017][ T5452] netlink: 'syz.1.308': attribute type 41 has an invalid length. [ 155.505400][ T5516] netlink: 65047 bytes leftover after parsing attributes in process `syz.4.326'. [ 156.736903][ T5531] device syzkaller0 entered promiscuous mode [ 158.322898][ T5559] Illegal XDP return value 3647004754 on prog (id 245) dev N/A, expect packet loss! [ 160.441933][ T5571] netlink: 168 bytes leftover after parsing attributes in process `syz.2.342'. [ 161.578132][ T5601] netlink: 'syz.4.353': attribute type 27 has an invalid length. [ 161.585949][ T5601] netlink: 'syz.4.353': attribute type 3 has an invalid length. [ 161.662908][ T5601] netlink: 132 bytes leftover after parsing attributes in process `syz.4.353'. [ 164.595819][ T5639] netlink: 16186 bytes leftover after parsing attributes in process `syz.0.368'. [ 164.616961][ T5639] netlink: 132 bytes leftover after parsing attributes in process `syz.0.368'. [ 167.144032][ T5682] netlink: 'syz.3.382': attribute type 12 has an invalid length. [ 167.222818][ T5682] netlink: 172 bytes leftover after parsing attributes in process `syz.3.382'. [ 167.272060][ T5685] netlink: 64519 bytes leftover after parsing attributes in process `syz.3.382'. [ 169.294871][ T5704] netlink: 132 bytes leftover after parsing attributes in process `syz.2.389'. [ 169.653075][ T5720] netlink: 16186 bytes leftover after parsing attributes in process `syz.0.394'. [ 169.756463][ T5722] netlink: 16186 bytes leftover after parsing attributes in process `syz.0.394'. [ 170.343009][ T5728] device syzkaller0 entered promiscuous mode [ 175.125884][ T5785] can: request_module (can-proto-5) failed. [ 177.968563][ T5405] wlan1: Trigger new scan to find an IBSS to join [ 178.986804][ T5814] device syzkaller0 entered promiscuous mode [ 181.497372][ T5831] netlink: 'syz.3.422': attribute type 10 has an invalid length. [ 181.521481][ T5831] team0: Port device wlan1 added [ 181.542250][ T5822] netlink: 14 bytes leftover after parsing attributes in process `syz.1.421'. [ 181.656959][ T5822] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 181.680697][ T5836] netlink: 'syz.2.424': attribute type 2 has an invalid length. [ 181.713546][ T5822] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 181.756446][ T5822] bond0 (unregistering): Released all slaves [ 182.122888][ T5836] device 0 entered promiscuous mode [ 182.244503][ T5847] netlink: 'syz.4.427': attribute type 19 has an invalid length. [ 183.000765][ T5392] wlan1: Trigger new scan to find an IBSS to join [ 184.026634][ T5878] netlink: 122896 bytes leftover after parsing attributes in process `syz.3.437'. [ 184.051282][ T5397] wlan1: Creating new IBSS network, BSSID b6:5a:5f:91:9c:0e [ 185.222438][ T5914] netlink: 14 bytes leftover after parsing attributes in process `syz.2.444'. [ 185.487432][ T5914] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 186.006909][ T5914] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 186.020926][ T5914] bond0 (unregistering): Released all slaves [ 186.050282][ T5919] netlink: 'syz.0.446': attribute type 19 has an invalid length. [ 187.594311][ T5949] delete_channel: no stack [ 187.603936][ T5949] delete_channel: no stack [ 188.051993][ T5955] netlink: 132 bytes leftover after parsing attributes in process `syz.4.458'. [ 188.878686][ T5982] netlink: 132 bytes leftover after parsing attributes in process `syz.4.469'. [ 189.326330][ T5982] netlink: 188 bytes leftover after parsing attributes in process `syz.4.469'. [ 189.353783][ T5981] delete_channel: no stack [ 189.454535][ T5992] netlink: 'syz.0.472': attribute type 10 has an invalid length. [ 189.473434][ T5992] netlink: 40 bytes leftover after parsing attributes in process `syz.0.472'. [ 189.508274][ T5992] bridge0: port 3(veth0_vlan) entered blocking state [ 189.515127][ T5992] bridge0: port 3(veth0_vlan) entered disabled state [ 189.528050][ T5992] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 191.309262][ T4268] Bluetooth: hci1: command 0x0406 tx timeout [ 191.315545][ T4268] Bluetooth: hci2: command 0x0406 tx timeout [ 191.321762][ T4273] Bluetooth: hci3: command 0x0406 tx timeout [ 191.321797][ T4273] Bluetooth: hci4: command 0x0406 tx timeout [ 191.346535][ T4281] Bluetooth: hci0: command 0x0406 tx timeout [ 192.643048][ T6065] netlink: 'syz.3.500': attribute type 29 has an invalid length. [ 193.328387][ T6065] netlink: 'syz.3.500': attribute type 29 has an invalid length. [ 193.583877][ T6087] netlink: 'syz.3.506': attribute type 10 has an invalid length. [ 193.618157][ T6087] netlink: 152 bytes leftover after parsing attributes in process `syz.3.506'. [ 194.352839][ T1278] ieee802154 phy0 wpan0: encryption failed: -22 [ 194.359262][ T1278] ieee802154 phy1 wpan1: encryption failed: -22 [ 194.664997][ T6104] device syzkaller0 entered promiscuous mode [ 194.854794][ T6106] device syzkaller0 entered promiscuous mode [ 196.912754][ T6125] netlink: 'syz.4.518': attribute type 21 has an invalid length. [ 196.924012][ T6125] netlink: 164 bytes leftover after parsing attributes in process `syz.4.518'. [ 196.937193][ T6127] netlink: 'syz.0.520': attribute type 10 has an invalid length. [ 196.958790][ T6127] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.967000][ T6127] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.035039][ T6127] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.042272][ T6127] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.050849][ T6127] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.058061][ T6127] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.127781][ T6127] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 198.267022][ T6163] netlink: 'syz.0.531': attribute type 2 has an invalid length. [ 198.367732][ T6163] netlink: 'syz.0.531': attribute type 1 has an invalid length. [ 198.457948][ T6163] netlink: 170140 bytes leftover after parsing attributes in process `syz.0.531'. [ 198.950743][ T6182] netlink: 14548 bytes leftover after parsing attributes in process `syz.2.535'. [ 199.370141][ T6176] device syzkaller0 entered promiscuous mode [ 203.913075][ T6247] device syzkaller0 entered promiscuous mode [ 204.554433][ T6260] netlink: 'syz.2.561': attribute type 2 has an invalid length. [ 204.563170][ T6260] netlink: 17267 bytes leftover after parsing attributes in process `syz.2.561'. [ 206.863106][ T6254] netlink: 'syz.3.560': attribute type 10 has an invalid length. [ 206.883784][ T6254] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.891352][ T6254] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.917867][ T6254] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.925080][ T6254] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.932824][ T6254] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.940041][ T6254] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.961008][ T6254] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 207.784384][ T6281] device syzkaller0 entered promiscuous mode [ 208.145706][ T6298] netlink: 'syz.1.573': attribute type 11 has an invalid length. [ 208.228923][ T6298] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.573'. [ 208.543997][ T6304] netlink: 'syz.3.575': attribute type 3 has an invalid length. [ 208.663671][ T6304] netlink: 105116 bytes leftover after parsing attributes in process `syz.3.575'. [ 208.999059][ T6291] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 210.293598][ T6326] netlink: 'syz.1.580': attribute type 29 has an invalid length. [ 211.544043][ T6326] netlink: 'syz.1.580': attribute type 29 has an invalid length. [ 211.561262][ T6330] device bridge_slave_1 left promiscuous mode [ 211.645142][ T6330] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.866937][ T6330] device bridge_slave_0 left promiscuous mode [ 211.873671][ T6330] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.099122][ T6330] bond0: (slave bridge0): Releasing backup interface [ 212.426459][ T6359] netlink: 'syz.2.587': attribute type 11 has an invalid length. [ 212.464444][ T6359] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.587'. [ 213.274425][ T6353] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 213.463669][ T6376] device syzkaller0 entered promiscuous mode [ 214.052607][ T5413] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 215.423184][ T6393] netlink: 126588 bytes leftover after parsing attributes in process `syz.4.598'. [ 215.699352][ T6396] device bridge_slave_1 left promiscuous mode [ 215.719364][ T6396] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.917492][ T6396] device bridge_slave_0 left promiscuous mode [ 215.940968][ T6396] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.018459][ T6396] bond0: (slave bridge0): Releasing backup interface [ 216.829654][ T6415] netlink: 'syz.4.604': attribute type 11 has an invalid length. [ 216.867252][ T6415] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.604'. [ 217.467796][ T6417] netlink: 134728 bytes leftover after parsing attributes in process `syz.2.605'. [ 217.573760][ T6403] netlink: 'syz.0.602': attribute type 1 has an invalid length. [ 217.593020][ T6403] netlink: 105120 bytes leftover after parsing attributes in process `syz.0.602'. [ 217.675002][ T6411] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 218.000215][ T6428] netlink: 'syz.2.609': attribute type 3 has an invalid length. [ 218.095490][ T6428] netlink: 105116 bytes leftover after parsing attributes in process `syz.2.609'. [ 219.584688][ T6463] netlink: 'syz.0.619': attribute type 11 has an invalid length. [ 219.617501][ T6463] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.619'. [ 219.629044][ T6455] netlink: 164 bytes leftover after parsing attributes in process `syz.1.620'. [ 220.646314][ T6460] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 220.910182][ T6486] netlink: 26 bytes leftover after parsing attributes in process `syz.3.627'. [ 221.174151][ T6486] netlink: 'syz.3.627': attribute type 10 has an invalid length. [ 221.886993][ T6508] netlink: 'syz.4.634': attribute type 39 has an invalid length. [ 222.605500][ T6507] netlink: 'syz.4.634': attribute type 39 has an invalid length. [ 222.853220][ T6524] netlink: 'syz.4.640': attribute type 2 has an invalid length. [ 222.862441][ T6524] netlink: 'syz.4.640': attribute type 1 has an invalid length. [ 222.871013][ T6524] netlink: 212408 bytes leftover after parsing attributes in process `syz.4.640'. [ 225.062276][ T6561] netlink: 160 bytes leftover after parsing attributes in process `syz.0.652'. [ 225.158101][ T6561] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 225.948653][ T6578] device syzkaller0 entered promiscuous mode [ 230.859438][ T6602] netlink: 68 bytes leftover after parsing attributes in process `syz.4.666'. [ 232.098684][ T6617] netlink: 'syz.2.670': attribute type 22 has an invalid length. [ 232.177979][ T6617] netlink: 4 bytes leftover after parsing attributes in process `syz.2.670'. [ 232.700876][ T6630] netlink: 'syz.3.674': attribute type 10 has an invalid length. [ 232.976542][ T6630] bond0: (slave bond_slave_0): Releasing backup interface [ 233.122408][ T6636] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.677'. [ 233.427031][ T6643] device syzkaller0 entered promiscuous mode [ 235.204968][ T6690] netlink: 3783 bytes leftover after parsing attributes in process `syz.2.691'. [ 235.353105][ T6692] netlink: 122896 bytes leftover after parsing attributes in process `syz.2.691'. [ 237.982672][ T6692] debugfs: Directory '.!' with parent 'ieee80211' already present! [ 238.002049][ T6705] netlink: 'syz.0.693': attribute type 10 has an invalid length. [ 238.016037][ T6705] bond0: (slave bond_slave_0): Releasing backup interface [ 238.804985][ T6725] netlink: 'syz.0.700': attribute type 1 has an invalid length. [ 239.122356][ T6734] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 239.696639][ T6749] netlink: 154788 bytes leftover after parsing attributes in process `syz.2.707'. [ 239.747207][ T6749] openvswitch: netlink: Message has 48126 unknown bytes. [ 239.786905][ T6745] device syzkaller0 entered promiscuous mode [ 239.874708][ T6747] netlink: 'syz.2.707': attribute type 33 has an invalid length. [ 239.968030][ T6747] netlink: 152 bytes leftover after parsing attributes in process `syz.2.707'. [ 240.020022][ T6759] netlink: 'syz.1.709': attribute type 10 has an invalid length. [ 244.987228][ T5384] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 245.653816][ T6830] netlink: 60 bytes leftover after parsing attributes in process `syz.2.733'. [ 246.308940][ T6840] device syzkaller0 entered promiscuous mode [ 250.189070][ T6875] netlink: 'syz.3.750': attribute type 1 has an invalid length. [ 250.251440][ T6875] netlink: 15998 bytes leftover after parsing attributes in process `syz.3.750'. [ 251.354727][ T6895] netlink: 'syz.2.754': attribute type 10 has an invalid length. [ 251.666679][ T6904] netlink: 'syz.3.758': attribute type 1 has an invalid length. [ 251.709553][ T6904] netlink: 181400 bytes leftover after parsing attributes in process `syz.3.758'. [ 251.916099][ T6913] netlink: 'syz.1.760': attribute type 3 has an invalid length. [ 251.924428][ T6913] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.760'. [ 252.112734][ T6895] team0 (unregistering): Port device team_slave_0 removed [ 253.376837][ T6895] team0 (unregistering): Port device team_slave_1 removed [ 254.925495][ T6912] netlink: 132 bytes leftover after parsing attributes in process `syz.3.758'. [ 255.789806][ T1278] ieee802154 phy0 wpan0: encryption failed: -22 [ 255.796202][ T1278] ieee802154 phy1 wpan1: encryption failed: -22 [ 256.926956][ T6945] netlink: 'syz.3.770': attribute type 3 has an invalid length. [ 256.956069][ T6945] netlink: 105116 bytes leftover after parsing attributes in process `syz.3.770'. [ 257.251388][ T6961] Dead loop on virtual device ip6_vti0, fix it urgently! [ 259.699966][ T6965] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 260.378648][ T6975] netlink: 'syz.3.780': attribute type 3 has an invalid length. [ 260.403252][ T6975] netlink: 132 bytes leftover after parsing attributes in process `syz.3.780'. [ 261.326064][ T6982] delete_channel: no stack [ 261.833123][ T6984] netlink: 13695 bytes leftover after parsing attributes in process `syz.0.782'. [ 261.988207][ T7005] netlink: 132 bytes leftover after parsing attributes in process `syz.2.789'. [ 262.329127][ T7021] netlink: 'syz.0.792': attribute type 3 has an invalid length. [ 262.343465][ T7017] delete_channel: no stack [ 262.352589][ T7021] netlink: 105116 bytes leftover after parsing attributes in process `syz.0.792'. [ 262.359887][ T7017] delete_channel: no stack [ 263.144088][ T7043] netlink: 134056 bytes leftover after parsing attributes in process `syz.0.800'. [ 263.932783][ T7043] syz.0.800 (7043) used greatest stack depth: 18096 bytes left [ 265.269408][ T7100] netlink: 'syz.3.818': attribute type 10 has an invalid length. [ 265.368790][ T7100] team0 (unregistering): Port device team_slave_0 removed [ 265.410287][ T7100] team0 (unregistering): Port device team_slave_1 removed [ 265.438183][ T7100] team0 (unregistering): Port device geneve1 removed [ 265.464276][ T7100] team0 (unregistering): Port device wlan1 removed [ 270.625121][ T7191] netlink: 134056 bytes leftover after parsing attributes in process `syz.2.849'. [ 275.406278][ T7191] platform regulatory.0: loading /lib/firmware/regulatory.db failed with error -12 [ 275.420621][ T7191] platform regulatory.0: Direct firmware load for regulatory.db failed with error -12 [ 275.430953][ T7191] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 275.971465][ T7232] netlink: 'syz.0.861': attribute type 1 has an invalid length. [ 275.990670][ T7232] netlink: 'syz.0.861': attribute type 1 has an invalid length. [ 276.010658][ T7231] device syzkaller0 entered promiscuous mode [ 276.012489][ T7232] netlink: 116376 bytes leftover after parsing attributes in process `syz.0.861'. [ 276.107401][ T5413] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 278.182088][ T7241] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 278.190274][ T7241] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 278.199484][ T7241] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 278.208569][ T7241] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 278.247563][ T7242] netlink: 156 bytes leftover after parsing attributes in process `syz.1.863'. [ 280.063457][ T7299] device syzkaller0 entered promiscuous mode [ 286.649900][ T7338] netlink: 56863 bytes leftover after parsing attributes in process `syz.3.886'. [ 287.206396][ T4270] Bluetooth: hci1: ACL packet too small [ 290.344574][ T7384] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.663904][ T7384] device bridge_slave_0 left promiscuous mode [ 290.674817][ T7384] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.704309][ T7392] netlink: 'syz.3.902': attribute type 2 has an invalid length. [ 290.730332][ T7392] netlink: 'syz.3.902': attribute type 8 has an invalid length. [ 290.759937][ T7392] netlink: 132 bytes leftover after parsing attributes in process `syz.3.902'. [ 293.051325][ T7441] netlink: 'syz.4.917': attribute type 2 has an invalid length. [ 293.112210][ T7441] netlink: 132 bytes leftover after parsing attributes in process `syz.4.917'. [ 293.194197][ T7443] netlink: 'syz.4.917': attribute type 21 has an invalid length. [ 293.212710][ T7443] netlink: 16166 bytes leftover after parsing attributes in process `syz.4.917'. [ 293.553284][ T7452] device veth1_macvtap left promiscuous mode [ 293.672405][ T7456] bridge0: port 3(erspan0) entered blocking state [ 293.679308][ T7456] bridge0: port 3(erspan0) entered disabled state [ 293.717142][ T7456] device erspan0 entered promiscuous mode [ 293.718023][ T7455] netlink: 'syz.3.920': attribute type 29 has an invalid length. [ 293.724132][ T7456] bridge0: port 3(erspan0) entered blocking state [ 293.724233][ T7456] bridge0: port 3(erspan0) entered forwarding state [ 293.762476][ T7455] netlink: 'syz.3.920': attribute type 29 has an invalid length. [ 296.216462][ T7490] netlink: 15007 bytes leftover after parsing attributes in process `syz.4.932'. [ 296.543624][ T7499] netlink: 'syz.1.935': attribute type 1 has an invalid length. [ 296.602824][ T7499] netlink: 157116 bytes leftover after parsing attributes in process `syz.1.935'. [ 297.933408][ T4270] Bluetooth: hci2: ISO packet for unknown connection handle 1854 [ 299.248002][ T7563] netlink: 14556 bytes leftover after parsing attributes in process `syz.1.956'. [ 299.939355][ T7580] netlink: 144 bytes leftover after parsing attributes in process `syz.0.961'. [ 307.271743][ T5413] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 309.936831][ T7638] netlink: 65047 bytes leftover after parsing attributes in process `syz.4.980'. [ 310.102809][ T7638] device wg2 entered promiscuous mode [ 310.255804][ T7645] netlink: 'syz.0.983': attribute type 16 has an invalid length. [ 310.626688][ T7653] netlink: 'syz.3.984': attribute type 1 has an invalid length. [ 310.637231][ T7653] netlink: 83992 bytes leftover after parsing attributes in process `syz.3.984'. [ 312.806041][ T7685] netlink: 'syz.2.996': attribute type 29 has an invalid length. [ 312.899101][ T7685] netlink: 'syz.2.996': attribute type 29 has an invalid length. [ 312.976696][ T7686] netlink: 'syz.2.996': attribute type 10 has an invalid length. [ 313.027525][ T7686] device hsr0 entered promiscuous mode [ 313.081514][ T7688] netlink: 127868 bytes leftover after parsing attributes in process `syz.4.997'. [ 313.099629][ T7688] netlink: 6955 bytes leftover after parsing attributes in process `syz.4.997'. [ 313.865344][ T7690] netlink: 'syz.2.998': attribute type 10 has an invalid length. [ 314.142261][ T7706] netlink: 65047 bytes leftover after parsing attributes in process `syz.0.1002'. [ 314.580554][ T7706] device wg2 entered promiscuous mode [ 315.205546][ T7719] netlink: 'syz.0.1009': attribute type 21 has an invalid length. [ 315.259251][ T7719] netlink: 128 bytes leftover after parsing attributes in process `syz.0.1009'. [ 316.653050][ T7747] netlink: 65051 bytes leftover after parsing attributes in process `syz.0.1016'. [ 317.040580][ T7755] netlink: 65047 bytes leftover after parsing attributes in process `syz.3.1018'. [ 317.207626][ T7762] device wg2 entered promiscuous mode [ 317.377549][ T1278] ieee802154 phy0 wpan0: encryption failed: -22 [ 317.384344][ T1278] ieee802154 phy1 wpan1: encryption failed: -22 [ 318.231198][ T7785] netlink: 'syz.1.1026': attribute type 19 has an invalid length. [ 318.263364][ T7785] netlink: 55 bytes leftover after parsing attributes in process `syz.1.1026'. [ 318.533215][ T7788] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1026'. [ 319.414738][ T7811] raw_sendmsg: syz.2.1034 forgot to set AF_INET. Fix it! [ 319.449562][ T7810] netlink: 'syz.2.1034': attribute type 21 has an invalid length. [ 319.453395][ T7813] FAULT_INJECTION: forcing a failure. [ 319.453395][ T7813] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 319.490896][ T7810] netlink: 156 bytes leftover after parsing attributes in process `syz.2.1034'. [ 319.561021][ T7813] CPU: 1 PID: 7813 Comm: syz.0.1035 Not tainted syzkaller #0 [ 319.568479][ T7813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 319.578575][ T7813] Call Trace: [ 319.581885][ T7813] [ 319.584848][ T7813] dump_stack_lvl+0x188/0x24e [ 319.589579][ T7813] ? show_regs_print_info+0x12/0x12 [ 319.594850][ T7813] ? load_image+0x400/0x400 [ 319.599497][ T7813] ? __lock_acquire+0x7d10/0x7d10 [ 319.604574][ T7813] should_fail_ex+0x399/0x4d0 [ 319.609296][ T7813] _copy_from_user+0x2c/0x170 [ 319.614020][ T7813] __sys_bpf+0x2ea/0x780 [ 319.618317][ T7813] ? bpf_link_show_fdinfo+0x380/0x380 [ 319.623745][ T7813] ? lock_chain_count+0x20/0x20 [ 319.628657][ T7813] __x64_sys_bpf+0x78/0x90 [ 319.633125][ T7813] do_syscall_64+0x4c/0xa0 [ 319.637580][ T7813] ? clear_bhb_loop+0x60/0xb0 [ 319.642294][ T7813] ? clear_bhb_loop+0x60/0xb0 [ 319.647009][ T7813] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 319.652977][ T7813] RIP: 0033:0x7fad8459c799 [ 319.657491][ T7813] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 319.677141][ T7813] RSP: 002b:00007fad853c2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 319.685612][ T7813] RAX: ffffffffffffffda RBX: 00007fad84815fa0 RCX: 00007fad8459c799 [ 319.693641][ T7813] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 319.701652][ T7813] RBP: 00007fad853c2090 R08: 0000000000000000 R09: 0000000000000000 [ 319.709660][ T7813] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 319.717660][ T7813] R13: 00007fad84816038 R14: 00007fad84815fa0 R15: 00007ffc5bee64a8 [ 319.725688][ T7813] [ 322.864904][ T7880] netlink: 'syz.1.1058': attribute type 2 has an invalid length. [ 322.927155][ T7880] netlink: 'syz.1.1058': attribute type 8 has an invalid length. [ 322.987271][ T7880] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1058'. [ 327.608584][ T7942] netlink: 'syz.2.1080': attribute type 11 has an invalid length. [ 327.704693][ T7942] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.1080'. [ 328.242455][ T7937] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 332.883755][ T7969] netlink: 'syz.0.1091': attribute type 29 has an invalid length. [ 332.950435][ T7969] netlink: 'syz.0.1091': attribute type 29 has an invalid length. [ 333.075624][ T7969] netlink: 'syz.0.1091': attribute type 29 has an invalid length. [ 333.890090][ T7984] netlink: 'syz.1.1095': attribute type 17 has an invalid length. [ 333.922233][ T7984] netlink: 'syz.1.1095': attribute type 16 has an invalid length. [ 333.957967][ T7984] netlink: 152 bytes leftover after parsing attributes in process `syz.1.1095'. [ 334.522627][ T7988] netlink: 'syz.1.1095': attribute type 3 has an invalid length. [ 334.541215][ T7988] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.1095'. [ 336.719000][ T8008] delete_channel: no stack [ 337.487568][ T8041] netlink: 'syz.0.1113': attribute type 10 has an invalid length. [ 337.495465][ T8041] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1113'. [ 337.608425][ T8041] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 338.389096][ T8064] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1124'. [ 338.775548][ T5384] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 340.093216][ T8113] netlink: 'syz.3.1142': attribute type 2 has an invalid length. [ 340.106474][ T8113] netlink: 10 bytes leftover after parsing attributes in process `syz.3.1142'. [ 340.128136][ T8113] netlink: 'syz.3.1142': attribute type 10 has an invalid length. [ 341.474605][ T8150] netlink: 16186 bytes leftover after parsing attributes in process `syz.1.1155'. [ 341.596165][ T8147] device aaaaaaaaaaaaaaa entered promiscuous mode [ 341.623970][ T8147] netlink: 'syz.0.1153': attribute type 3 has an invalid length. [ 341.646638][ T8147] netlink: 163968 bytes leftover after parsing attributes in process `syz.0.1153'. [ 342.202690][ T8166] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1160'. [ 342.426754][ T8166] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1160'. [ 342.439476][ T8169] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1160'. [ 343.750607][ T8194] netlink: 'syz.4.1172': attribute type 17 has an invalid length. [ 343.760602][ T8194] netlink: 'syz.4.1172': attribute type 16 has an invalid length. [ 343.770659][ T8194] netlink: 152 bytes leftover after parsing attributes in process `syz.4.1172'. [ 344.002181][ T8199] netlink: 'syz.4.1172': attribute type 3 has an invalid length. [ 344.057305][ T8199] netlink: 105116 bytes leftover after parsing attributes in process `syz.4.1172'. [ 347.663498][ T8296] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1207'. [ 348.016290][ T8311] netlink: 'syz.2.1212': attribute type 10 has an invalid length. [ 348.067315][ T8311] netlink: 55 bytes leftover after parsing attributes in process `syz.2.1212'. [ 348.609733][ T8327] : port 1(ip6gretap0) entered blocking state [ 348.634642][ T8327] : port 1(ip6gretap0) entered disabled state [ 348.656592][ T8327] device ip6gretap0 entered promiscuous mode [ 348.952254][ T8337] netlink: 'syz.0.1220': attribute type 1 has an invalid length. [ 348.982472][ T8337] netlink: 15743 bytes leftover after parsing attributes in process `syz.0.1220'. [ 350.213054][ T8354] netlink: 122896 bytes leftover after parsing attributes in process `syz.4.1225'. [ 350.462230][ T8354] debugfs: Directory '.!' with parent 'ieee80211' already present! [ 350.684297][ T8372] device syzkaller0 entered promiscuous mode [ 353.274992][ T8379] netlink: 'syz.4.1233': attribute type 13 has an invalid length. [ 353.283060][ T8379] netlink: 152 bytes leftover after parsing attributes in process `syz.4.1233'. [ 353.294360][ T8379] syz_tun: refused to change device tx_queue_len [ 353.301071][ T8379] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. [ 353.678032][ T8386] netlink: 'syz.1.1235': attribute type 10 has an invalid length. [ 353.686071][ T8386] netlink: 2 bytes leftover after parsing attributes in process `syz.1.1235'. [ 353.698124][ T8386] device batadv_slave_1 entered promiscuous mode [ 354.764329][ T8426] netlink: 122896 bytes leftover after parsing attributes in process `syz.2.1249'. [ 354.926033][ T8426] sysfs: cannot create duplicate filename '/class/ieee80211/.!' [ 354.936029][ T8426] CPU: 1 PID: 8426 Comm: syz.2.1249 Not tainted syzkaller #0 [ 354.943468][ T8426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 354.953566][ T8426] Call Trace: [ 354.956890][ T8426] [ 354.959860][ T8426] dump_stack_lvl+0x188/0x24e [ 354.964600][ T8426] ? show_regs_print_info+0x12/0x12 [ 354.969845][ T8426] ? load_image+0x400/0x400 [ 354.974488][ T8426] sysfs_warn_dup+0x8a/0xa0 [ 354.979052][ T8426] sysfs_do_create_link_sd+0xc0/0x110 [ 354.984476][ T8426] device_add+0x7ed/0xfb0 [ 354.988867][ T8426] wiphy_register+0x1d9f/0x2ac0 [ 354.993775][ T8426] ? cfg80211_event_work+0x40/0x40 [ 354.998930][ T8426] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 355.005141][ T8426] ? ieee80211_register_hw+0x2b34/0x39f0 [ 355.010838][ T8426] ieee80211_register_hw+0x2d00/0x39f0 [ 355.016444][ T8426] ? ieee80211_register_hw+0xee1/0x39f0 [ 355.022037][ T8426] ? ieee80211_register_hw+0xee1/0x39f0 [ 355.027635][ T8426] ? ieee80211_tasklet_handler+0x20/0x20 [ 355.033294][ T8426] ? __hrtimer_init+0x25/0x270 [ 355.038076][ T8426] ? memset+0x1e/0x40 [ 355.042068][ T8426] ? __hrtimer_init+0x186/0x270 [ 355.047028][ T8426] mac80211_hwsim_new_radio+0x28c2/0x4c40 [ 355.052791][ T8426] hwsim_new_radio_nl+0xafa/0xce0 [ 355.057847][ T8426] genl_family_rcv_msg_doit+0x22a/0x330 [ 355.063407][ T8426] ? end_current_label_crit_section+0x170/0x170 [ 355.069668][ T8426] ? genl_family_rcv_msg_dumpit+0x3c0/0x3c0 [ 355.075577][ T8426] ? bpf_lsm_capable+0x5/0x10 [ 355.080286][ T8426] ? security_capable+0x85/0xb0 [ 355.085159][ T8426] genl_rcv_msg+0x604/0x790 [ 355.089690][ T8426] ? genl_bind+0x360/0x360 [ 355.094116][ T8426] ? hwsim_tx_info_frame_received_nl+0xfc0/0xfc0 [ 355.100693][ T8426] netlink_rcv_skb+0x1fb/0x450 [ 355.105511][ T8426] ? genl_bind+0x360/0x360 [ 355.109957][ T8426] ? netlink_ack+0x1170/0x1170 [ 355.114752][ T8426] ? down_read+0x1a8/0x2d0 [ 355.119200][ T8426] genl_rcv+0x24/0x40 [ 355.123276][ T8426] netlink_unicast+0x74d/0x8d0 [ 355.128067][ T8426] netlink_sendmsg+0x8ad/0xbd0 [ 355.132943][ T8426] ? netlink_getsockopt+0x550/0x550 [ 355.138256][ T8426] ? netlink_getsockopt+0x550/0x550 [ 355.143467][ T8426] ____sys_sendmsg+0x5be/0x970 [ 355.148258][ T8426] ? __sys_sendmsg_sock+0x30/0x30 [ 355.153295][ T8426] ? __import_iovec+0x315/0x500 [ 355.158167][ T8426] ? import_iovec+0x6f/0xa0 [ 355.162693][ T8426] ___sys_sendmsg+0x2a2/0x360 [ 355.167387][ T8426] ? try_to_wake_up+0x67c/0x1080 [ 355.172344][ T8426] ? __sys_sendmsg+0x290/0x290 [ 355.177208][ T8426] __se_sys_sendmsg+0x1bb/0x2a0 [ 355.182111][ T8426] ? __x64_sys_sendmsg+0x80/0x80 [ 355.187093][ T8426] ? lockdep_hardirqs_on+0x94/0x140 [ 355.192306][ T8426] do_syscall_64+0x4c/0xa0 [ 355.196743][ T8426] ? clear_bhb_loop+0x60/0xb0 [ 355.201433][ T8426] ? clear_bhb_loop+0x60/0xb0 [ 355.206213][ T8426] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 355.212119][ T8426] RIP: 0033:0x7f2555f9c799 [ 355.216549][ T8426] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 355.236513][ T8426] RSP: 002b:00007f2556da1028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 355.245031][ T8426] RAX: ffffffffffffffda RBX: 00007f2556215fa0 RCX: 00007f2555f9c799 [ 355.253013][ T8426] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 000000000000000e [ 355.260998][ T8426] RBP: 00007f2556032c99 R08: 0000000000000000 R09: 0000000000000000 [ 355.268991][ T8426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 355.276977][ T8426] R13: 00007f2556216038 R14: 00007f2556215fa0 R15: 00007ffea9d7e168 [ 355.285190][ T8426] [ 355.615263][ T8444] FAULT_INJECTION: forcing a failure. [ 355.615263][ T8444] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 355.634506][ T8444] CPU: 0 PID: 8444 Comm: syz.1.1257 Not tainted syzkaller #0 [ 355.641967][ T8444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 355.652061][ T8444] Call Trace: [ 355.655347][ T8444] [ 355.658289][ T8444] dump_stack_lvl+0x188/0x24e [ 355.662983][ T8444] ? show_regs_print_info+0x12/0x12 [ 355.668208][ T8444] ? load_image+0x400/0x400 [ 355.672731][ T8444] ? __lock_acquire+0x7d10/0x7d10 [ 355.677771][ T8444] ? unix_ioctl+0x25d/0x660 [ 355.682283][ T8444] should_fail_ex+0x399/0x4d0 [ 355.686972][ T8444] _copy_from_user+0x2c/0x170 [ 355.691687][ T8444] sock_do_ioctl+0x18c/0x320 [ 355.696292][ T8444] ? sock_show_fdinfo+0xb0/0xb0 [ 355.701261][ T8444] sock_ioctl+0x4d2/0x710 [ 355.705605][ T8444] ? sock_poll+0x410/0x410 [ 355.710070][ T8444] ? bpf_lsm_file_ioctl+0x5/0x10 [ 355.715019][ T8444] ? security_file_ioctl+0x7c/0xa0 [ 355.720148][ T8444] ? sock_poll+0x410/0x410 [ 355.724579][ T8444] __se_sys_ioctl+0xfa/0x170 [ 355.729198][ T8444] do_syscall_64+0x4c/0xa0 [ 355.733716][ T8444] ? clear_bhb_loop+0x60/0xb0 [ 355.738419][ T8444] ? clear_bhb_loop+0x60/0xb0 [ 355.743110][ T8444] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 355.749096][ T8444] RIP: 0033:0x7f49e119c799 [ 355.753656][ T8444] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 355.773290][ T8444] RSP: 002b:00007f49e1fd4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 355.781812][ T8444] RAX: ffffffffffffffda RBX: 00007f49e1415fa0 RCX: 00007f49e119c799 [ 355.789890][ T8444] RDX: 0000200000000040 RSI: 0000000000008946 RDI: 0000000000000003 [ 355.797887][ T8444] RBP: 00007f49e1fd4090 R08: 0000000000000000 R09: 0000000000000000 [ 355.805957][ T8444] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 355.813940][ T8444] R13: 00007f49e1416038 R14: 00007f49e1415fa0 R15: 00007ffdff7b1d28 [ 355.822125][ T8444] [ 356.171919][ T8459] device syzkaller0 entered promiscuous mode [ 357.512733][ T8518] FAULT_INJECTION: forcing a failure. [ 357.512733][ T8518] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 357.607230][ T8518] CPU: 0 PID: 8518 Comm: syz.2.1268 Not tainted syzkaller #0 [ 357.614787][ T8518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 357.624911][ T8518] Call Trace: [ 357.628225][ T8518] [ 357.631201][ T8518] dump_stack_lvl+0x188/0x24e [ 357.635927][ T8518] ? show_regs_print_info+0x12/0x12 [ 357.641182][ T8518] ? load_image+0x400/0x400 [ 357.645732][ T8518] ? __lock_acquire+0x7d10/0x7d10 [ 357.650800][ T8518] should_fail_ex+0x399/0x4d0 [ 357.655582][ T8518] _copy_from_user+0x2c/0x170 [ 357.660273][ T8518] dev_ethtool+0xc2/0x12f0 [ 357.664708][ T8518] ? ethtool_get_module_eeprom_call+0x170/0x170 [ 357.670971][ T8518] ? __lock_acquire+0x7d10/0x7d10 [ 357.676029][ T8518] ? __kmem_cache_free+0xb6/0x1f0 [ 357.681068][ T8518] ? full_name_hash+0x8e/0xe0 [ 357.685760][ T8518] ? dev_load+0x1d/0x1e0 [ 357.690011][ T8518] ? dev_load+0x1d/0x1e0 [ 357.694263][ T8518] dev_ioctl+0x474/0xe80 [ 357.698609][ T8518] sock_do_ioctl+0x245/0x320 [ 357.703293][ T8518] ? sock_show_fdinfo+0xb0/0xb0 [ 357.708177][ T8518] sock_ioctl+0x4d2/0x710 [ 357.712604][ T8518] ? sock_poll+0x410/0x410 [ 357.717053][ T8518] ? bpf_lsm_file_ioctl+0x5/0x10 [ 357.722003][ T8518] ? security_file_ioctl+0x7c/0xa0 [ 357.727126][ T8518] ? sock_poll+0x410/0x410 [ 357.731556][ T8518] __se_sys_ioctl+0xfa/0x170 [ 357.736159][ T8518] do_syscall_64+0x4c/0xa0 [ 357.740594][ T8518] ? clear_bhb_loop+0x60/0xb0 [ 357.745283][ T8518] ? clear_bhb_loop+0x60/0xb0 [ 357.749970][ T8518] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 357.755875][ T8518] RIP: 0033:0x7f2555f9c799 [ 357.760486][ T8518] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 357.780102][ T8518] RSP: 002b:00007f2556da1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 357.788537][ T8518] RAX: ffffffffffffffda RBX: 00007f2556215fa0 RCX: 00007f2555f9c799 [ 357.796534][ T8518] RDX: 0000200000000040 RSI: 0000000000008946 RDI: 0000000000000003 [ 357.804516][ T8518] RBP: 00007f2556da1090 R08: 0000000000000000 R09: 0000000000000000 [ 357.812503][ T8518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 357.820569][ T8518] R13: 00007f2556216038 R14: 00007f2556215fa0 R15: 00007ffea9d7e168 [ 357.828567][ T8518] [ 358.770158][ T8534] netlink: 'syz.3.1273': attribute type 3 has an invalid length. [ 358.787201][ T8534] netlink: 105116 bytes leftover after parsing attributes in process `syz.3.1273'. [ 359.419568][ T8558] FAULT_INJECTION: forcing a failure. [ 359.419568][ T8558] name failslab, interval 1, probability 0, space 0, times 0 [ 359.437645][ T8558] CPU: 0 PID: 8558 Comm: syz.3.1281 Not tainted syzkaller #0 [ 359.445173][ T8558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 359.455343][ T8558] Call Trace: [ 359.458655][ T8558] [ 359.461614][ T8558] dump_stack_lvl+0x188/0x24e [ 359.466336][ T8558] ? show_regs_print_info+0x12/0x12 [ 359.471574][ T8558] ? load_image+0x400/0x400 [ 359.476108][ T8558] ? __might_sleep+0xd0/0xd0 [ 359.480734][ T8558] ? __lock_acquire+0x7d10/0x7d10 [ 359.485886][ T8558] should_fail_ex+0x399/0x4d0 [ 359.490691][ T8558] should_failslab+0x5/0x20 [ 359.495233][ T8558] slab_pre_alloc_hook+0x59/0x310 [ 359.500292][ T8558] ? dev_ethtool+0x125/0x12f0 [ 359.505006][ T8558] __kmem_cache_alloc_node+0x4f/0x260 [ 359.510497][ T8558] ? dev_ethtool+0x125/0x12f0 [ 359.515206][ T8558] kmalloc_trace+0x26/0xe0 [ 359.519759][ T8558] dev_ethtool+0x125/0x12f0 [ 359.524302][ T8558] ? ethtool_get_module_eeprom_call+0x170/0x170 [ 359.530577][ T8558] ? __lock_acquire+0x7d10/0x7d10 [ 359.535634][ T8558] ? __kmem_cache_free+0xb6/0x1f0 [ 359.540688][ T8558] ? full_name_hash+0x8e/0xe0 [ 359.545478][ T8558] ? dev_load+0x1d/0x1e0 [ 359.549745][ T8558] ? dev_load+0x1d/0x1e0 [ 359.554029][ T8558] dev_ioctl+0x474/0xe80 [ 359.558298][ T8558] sock_do_ioctl+0x245/0x320 [ 359.562916][ T8558] ? sock_show_fdinfo+0xb0/0xb0 [ 359.567806][ T8558] sock_ioctl+0x4d2/0x710 [ 359.572169][ T8558] ? sock_poll+0x410/0x410 [ 359.576614][ T8558] ? bpf_lsm_file_ioctl+0x5/0x10 [ 359.581573][ T8558] ? security_file_ioctl+0x7c/0xa0 [ 359.586727][ T8558] ? sock_poll+0x410/0x410 [ 359.591183][ T8558] __se_sys_ioctl+0xfa/0x170 [ 359.595914][ T8558] do_syscall_64+0x4c/0xa0 [ 359.600450][ T8558] ? clear_bhb_loop+0x60/0xb0 [ 359.605154][ T8558] ? clear_bhb_loop+0x60/0xb0 [ 359.609862][ T8558] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 359.615777][ T8558] RIP: 0033:0x7f224c99c799 [ 359.620228][ T8558] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 359.639861][ T8558] RSP: 002b:00007f224d8ff028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 359.648299][ T8558] RAX: ffffffffffffffda RBX: 00007f224cc15fa0 RCX: 00007f224c99c799 [ 359.656308][ T8558] RDX: 0000200000000040 RSI: 0000000000008946 RDI: 0000000000000003 [ 359.664315][ T8558] RBP: 00007f224d8ff090 R08: 0000000000000000 R09: 0000000000000000 [ 359.672319][ T8558] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 359.680318][ T8558] R13: 00007f224cc16038 R14: 00007f224cc15fa0 R15: 00007ffd03173708 [ 359.688423][ T8558] [ 361.168273][ T8590] syzkaller0: tun_chr_ioctl cmd 1074025680 [ 361.402637][ T8601] netlink: 156 bytes leftover after parsing attributes in process `syz.3.1297'. [ 361.413885][ T8604] FAULT_INJECTION: forcing a failure. [ 361.413885][ T8604] name failslab, interval 1, probability 0, space 0, times 0 [ 361.434436][ T8604] CPU: 1 PID: 8604 Comm: syz.2.1296 Not tainted syzkaller #0 [ 361.441892][ T8604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 361.451993][ T8604] Call Trace: [ 361.455302][ T8604] [ 361.458264][ T8604] dump_stack_lvl+0x188/0x24e [ 361.462988][ T8604] ? show_regs_print_info+0x12/0x12 [ 361.468238][ T8604] ? load_image+0x400/0x400 [ 361.472873][ T8604] ? __might_sleep+0xd0/0xd0 [ 361.477497][ T8604] ? __lock_acquire+0x7d10/0x7d10 [ 361.482567][ T8604] should_fail_ex+0x399/0x4d0 [ 361.487279][ T8604] should_failslab+0x5/0x20 [ 361.491886][ T8604] slab_pre_alloc_hook+0x59/0x310 [ 361.496928][ T8604] ? perf_trace_lock+0xf8/0x390 [ 361.501789][ T8604] ? dev_ethtool+0x125/0x12f0 [ 361.506624][ T8604] __kmem_cache_alloc_node+0x4f/0x260 [ 361.512056][ T8604] ? dev_ethtool+0x125/0x12f0 [ 361.516763][ T8604] kmalloc_trace+0x26/0xe0 [ 361.521204][ T8604] dev_ethtool+0x125/0x12f0 [ 361.525728][ T8604] ? ethtool_get_module_eeprom_call+0x170/0x170 [ 361.531989][ T8604] ? __lock_acquire+0x7d10/0x7d10 [ 361.537086][ T8604] ? __kmem_cache_free+0xb6/0x1f0 [ 361.542133][ T8604] ? full_name_hash+0x8e/0xe0 [ 361.546821][ T8604] ? dev_load+0x1d/0x1e0 [ 361.551073][ T8604] ? dev_load+0x1d/0x1e0 [ 361.555330][ T8604] dev_ioctl+0x474/0xe80 [ 361.559586][ T8604] sock_do_ioctl+0x245/0x320 [ 361.564188][ T8604] ? sock_show_fdinfo+0xb0/0xb0 [ 361.569064][ T8604] sock_ioctl+0x4d2/0x710 [ 361.573492][ T8604] ? sock_poll+0x410/0x410 [ 361.577929][ T8604] ? bpf_lsm_file_ioctl+0x5/0x10 [ 361.582880][ T8604] ? security_file_ioctl+0x7c/0xa0 [ 361.588006][ T8604] ? sock_poll+0x410/0x410 [ 361.592429][ T8604] __se_sys_ioctl+0xfa/0x170 [ 361.597066][ T8604] do_syscall_64+0x4c/0xa0 [ 361.601509][ T8604] ? clear_bhb_loop+0x60/0xb0 [ 361.606205][ T8604] ? clear_bhb_loop+0x60/0xb0 [ 361.610988][ T8604] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 361.616984][ T8604] RIP: 0033:0x7f2555f9c799 [ 361.621415][ T8604] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 361.641054][ T8604] RSP: 002b:00007f2556da1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 361.649499][ T8604] RAX: ffffffffffffffda RBX: 00007f2556215fa0 RCX: 00007f2555f9c799 [ 361.657502][ T8604] RDX: 0000200000000040 RSI: 0000000000008946 RDI: 0000000000000003 [ 361.665497][ T8604] RBP: 00007f2556da1090 R08: 0000000000000000 R09: 0000000000000000 [ 361.673485][ T8604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 361.681557][ T8604] R13: 00007f2556216038 R14: 00007f2556215fa0 R15: 00007ffea9d7e168 [ 361.689556][ T8604] [ 363.857635][ T8674] netlink: 'syz.1.1309': attribute type 10 has an invalid length. [ 364.229274][ T8678] FAULT_INJECTION: forcing a failure. [ 364.229274][ T8678] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 364.242776][ T8678] CPU: 1 PID: 8678 Comm: syz.1.1310 Not tainted syzkaller #0 [ 364.250183][ T8678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 364.260357][ T8678] Call Trace: [ 364.263662][ T8678] [ 364.266615][ T8678] dump_stack_lvl+0x188/0x24e [ 364.271338][ T8678] ? show_regs_print_info+0x12/0x12 [ 364.276577][ T8678] ? load_image+0x400/0x400 [ 364.281114][ T8678] ? __lock_acquire+0x7d10/0x7d10 [ 364.286173][ T8678] ? full_name_hash+0x8e/0xe0 [ 364.290881][ T8678] should_fail_ex+0x399/0x4d0 [ 364.295603][ T8678] _copy_to_user+0x2c/0x130 [ 364.300154][ T8678] put_user_ifreq+0x74/0xb0 [ 364.304789][ T8678] sock_do_ioctl+0x272/0x320 [ 364.309424][ T8678] ? sock_show_fdinfo+0xb0/0xb0 [ 364.314500][ T8678] sock_ioctl+0x4d2/0x710 [ 364.318947][ T8678] ? sock_poll+0x410/0x410 [ 364.323401][ T8678] ? bpf_lsm_file_ioctl+0x5/0x10 [ 364.328456][ T8678] ? security_file_ioctl+0x7c/0xa0 [ 364.333605][ T8678] ? sock_poll+0x410/0x410 [ 364.338064][ T8678] __se_sys_ioctl+0xfa/0x170 [ 364.342691][ T8678] do_syscall_64+0x4c/0xa0 [ 364.347145][ T8678] ? clear_bhb_loop+0x60/0xb0 [ 364.351853][ T8678] ? clear_bhb_loop+0x60/0xb0 [ 364.356546][ T8678] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 364.362452][ T8678] RIP: 0033:0x7f49e119c799 [ 364.366880][ T8678] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 364.386511][ T8678] RSP: 002b:00007f49e1fd4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 364.394961][ T8678] RAX: ffffffffffffffda RBX: 00007f49e1415fa0 RCX: 00007f49e119c799 [ 364.402983][ T8678] RDX: 0000200000000040 RSI: 0000000000008946 RDI: 0000000000000003 [ 364.410973][ T8678] RBP: 00007f49e1fd4090 R08: 0000000000000000 R09: 0000000000000000 [ 364.418953][ T8678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 364.426932][ T8678] R13: 00007f49e1416038 R14: 00007f49e1415fa0 R15: 00007ffdff7b1d28 [ 364.435108][ T8678] [ 366.609371][ T8712] netlink: 'syz.1.1322': attribute type 39 has an invalid length. [ 366.994837][ T8720] device syzkaller0 entered promiscuous mode [ 367.023056][ T8720] netlink: 'syz.3.1324': attribute type 29 has an invalid length. [ 367.050100][ T8720] netlink: 'syz.3.1324': attribute type 29 has an invalid length. [ 367.066372][ T8724] netlink: 20 bytes leftover after parsing attributes in process `syz.2.1325'. [ 369.803807][ T5413] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 370.059971][ T4281] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 370.069242][ T4281] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 370.084630][ T4281] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 370.093135][ T4273] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 370.108580][ T4273] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 370.116278][ T4273] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 370.208484][ T8727] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1326'. [ 370.217950][ T8727] tc_dump_action: action bad kind [ 371.157654][ T8761] netlink: 'syz.0.1335': attribute type 1 has an invalid length. [ 371.209220][ T8761] netlink: 105120 bytes leftover after parsing attributes in process `syz.0.1335'. [ 371.211522][ T8765] device syzkaller0 entered promiscuous mode [ 371.729805][ T8782] netlink: 134056 bytes leftover after parsing attributes in process `syz.2.1341'. [ 372.189149][ T4273] Bluetooth: hci5: command 0x0409 tx timeout [ 373.813659][ T8782] platform regulatory.0: loading /lib/firmware/regulatory.db failed with error -12 [ 373.823249][ T8782] platform regulatory.0: Direct firmware load for regulatory.db failed with error -12 [ 373.833023][ T8782] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 373.858021][ T8742] chnl_net:caif_netlink_parms(): no params data found [ 373.988171][ T8742] bridge0: port 1(bridge_slave_0) entered blocking state [ 373.995562][ T8742] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.004952][ T8742] device bridge_slave_0 entered promiscuous mode [ 374.021334][ T8742] bridge0: port 2(bridge_slave_1) entered blocking state [ 374.028795][ T8742] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.041001][ T8742] device bridge_slave_1 entered promiscuous mode [ 374.082196][ T8742] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 374.098054][ T8742] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 374.132182][ T8742] team0: Port device team_slave_0 added [ 374.159370][ T8790] delete_channel: no stack [ 374.173666][ T8742] team0: Port device team_slave_1 added [ 374.263173][ T8742] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 374.270781][ T4273] Bluetooth: hci5: command 0x041b tx timeout [ 374.297191][ T8742] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 374.477286][ T8742] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 374.541811][ T8742] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 374.558769][ T8742] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 374.585500][ T8742] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 375.315563][ T8742] device hsr_slave_0 entered promiscuous mode [ 375.346441][ T8742] device hsr_slave_1 entered promiscuous mode [ 375.412884][ T8742] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 375.435647][ T8742] Cannot create hsr debugfs directory [ 375.552416][ T8817] netlink: 'syz.1.1353': attribute type 2 has an invalid length. [ 376.357535][ T4273] Bluetooth: hci5: command 0x040f tx timeout [ 376.691956][ T8742] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 376.740627][ T8742] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 376.791434][ T8742] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 376.888339][ T8828] netlink: 36 bytes leftover after parsing attributes in process `syz.2.1357'. [ 376.937908][ T8742] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 377.262152][ T8742] 8021q: adding VLAN 0 to HW filter on device bond0 [ 377.319572][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 377.336195][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 377.355996][ T8742] 8021q: adding VLAN 0 to HW filter on device team0 [ 377.497111][ T1103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 377.517499][ T1103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 377.526270][ T1103] bridge0: port 1(bridge_slave_0) entered blocking state [ 377.533440][ T1103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 377.728728][ T1103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 377.882581][ T5401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 377.953444][ T5401] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 378.053230][ T5401] bridge0: port 2(bridge_slave_1) entered blocking state [ 378.060473][ T5401] bridge0: port 2(bridge_slave_1) entered forwarding state [ 378.230682][ T5401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 378.294984][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 378.338396][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 378.427313][ T4273] Bluetooth: hci5: command 0x0419 tx timeout [ 378.454384][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 378.554066][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 378.618038][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 378.635363][ T8742] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 378.663443][ T8853] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1365'. [ 378.675061][ T1278] ieee802154 phy0 wpan0: encryption failed: -22 [ 378.675156][ T1278] ieee802154 phy1 wpan1: encryption failed: -22 [ 378.687176][ T8742] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 378.780757][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 378.827825][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 378.889256][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 378.953164][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 378.984471][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 378.993431][ T8853] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1365'. [ 379.013474][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 379.828019][ T8875] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1372'. [ 379.883766][ T8875] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1372'. [ 379.959606][ T1103] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 379.979965][ T1103] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 380.049033][ T8878] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1372'. [ 380.146447][ T8881] netlink: 63503 bytes leftover after parsing attributes in process `syz.3.1372'. [ 380.221874][ T8742] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 382.183559][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 382.219507][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 382.297370][ T5407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 382.337776][ T5407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 382.361933][ T5407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 382.398376][ T5407] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 382.424857][ T8742] device veth0_vlan entered promiscuous mode [ 382.510727][ T8742] device veth1_vlan entered promiscuous mode [ 382.692584][ T5407] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 382.811735][ T5407] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 382.878521][ T5407] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 382.911223][ T5407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 382.943034][ T8742] device veth0_macvtap entered promiscuous mode [ 382.986829][ T8742] device veth1_macvtap entered promiscuous mode [ 383.098583][ T8742] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 383.183263][ T8742] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 383.241730][ T8742] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 383.272963][ T8742] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 383.336075][ T8742] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 383.363026][ T8742] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 383.410174][ T8742] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 383.461724][ T8742] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 383.521590][ T8742] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 383.591922][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 383.621672][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 383.684777][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 383.745885][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 383.798913][ T8742] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 383.834442][ T8742] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 383.845788][ T8742] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 383.872657][ T8742] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 383.976132][ T8742] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 384.031194][ T8742] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 384.042019][ T8742] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 384.052535][ T8742] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 384.068928][ T8742] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 384.079045][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 384.088732][ T5413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 384.787659][ T8964] netlink: 'syz.1.1400': attribute type 21 has an invalid length. [ 384.802313][ T8964] netlink: 'syz.1.1400': attribute type 22 has an invalid length. [ 384.811466][ T8964] netlink: 14380 bytes leftover after parsing attributes in process `syz.1.1400'. [ 384.921530][ T8951] device syzkaller0 entered promiscuous mode [ 384.975283][ T8742] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 384.993134][ T8742] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 385.034364][ T8742] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 385.053029][ T8742] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 387.520886][ T8974] netlink: 'syz.1.1404': attribute type 22 has an invalid length. [ 387.716163][ T1103] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 387.738289][ T1103] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 387.756238][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 387.873048][ T9] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 387.918908][ T9] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 387.988686][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 392.459234][ T9079] netlink: 'syz.0.1428': attribute type 2 has an invalid length. [ 392.515695][ T9079] device 0 entered promiscuous mode [ 394.230888][ T9108] tap0: tun_chr_ioctl cmd 2148553947 [ 394.247472][ T9107] ref_ctr_offset mismatch. inode: 0x2e offset: 0x0 ref_ctr_offset(old): 0x7602 ref_ctr_offset(new): 0x0 [ 394.457039][ T9108] netlink: 199836 bytes leftover after parsing attributes in process `syz.3.1440'. [ 394.576783][ T9113] tap0: tun_chr_ioctl cmd 2147767521 [ 395.369327][ T9125] netlink: 122896 bytes leftover after parsing attributes in process `syz.0.1442'. [ 395.391119][ T9125] debugfs: Directory '.!' with parent 'ieee80211' already present! [ 395.686518][ T9138] netlink: 'syz.2.1444': attribute type 10 has an invalid length. [ 395.732944][ T9138] netlink: 55 bytes leftover after parsing attributes in process `syz.2.1444'. [ 396.525688][ T9150] sctp: [Deprecated]: syz.5.1449 (pid 9150) Use of struct sctp_assoc_value in delayed_ack socket option. [ 396.525688][ T9150] Use struct sctp_sack_info instead [ 397.145128][ T9171] tap0: tun_chr_ioctl cmd 2148553947 [ 397.412394][ T9171] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.1457'. [ 397.455853][ T9175] tap0: tun_chr_ioctl cmd 2147767521 [ 398.456965][ T9204] netlink: 'syz.5.1468': attribute type 3 has an invalid length. [ 398.557477][ T9204] netlink: 105116 bytes leftover after parsing attributes in process `syz.5.1468'. [ 398.671220][ T9207] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1470'. [ 398.879843][ T9210] netlink: 'syz.1.1471': attribute type 3 has an invalid length. [ 398.897950][ T9210] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.1471'. [ 399.400786][ T9222] tap0: tun_chr_ioctl cmd 2148553947 [ 399.655595][ T9224] tap0: tun_chr_ioctl cmd 2147767521 [ 399.672394][ T9222] netlink: 199836 bytes leftover after parsing attributes in process `syz.5.1476'. [ 400.885607][ T5409] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 401.482722][ T9251] netlink: 'syz.5.1482': attribute type 10 has an invalid length. [ 401.507378][ T9251] netlink: 55 bytes leftover after parsing attributes in process `syz.5.1482'. [ 402.597458][ T9270] netlink: 'syz.1.1492': attribute type 11 has an invalid length. [ 403.104207][ T9286] tap0: tun_chr_ioctl cmd 2148553947 [ 403.295705][ T9286] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.1496'. [ 403.354435][ T9288] tap0: tun_chr_ioctl cmd 2147767521 [ 404.108934][ T9296] netlink: 65039 bytes leftover after parsing attributes in process `syz.0.1499'. [ 404.858117][ T9318] netlink: 'syz.0.1505': attribute type 10 has an invalid length. [ 404.866052][ T9318] netlink: 55 bytes leftover after parsing attributes in process `syz.0.1505'. [ 406.392201][ T9353] netlink: 'syz.2.1520': attribute type 2 has an invalid length. [ 406.473116][ T9353] device 0 entered promiscuous mode [ 406.594774][ T9349] netlink: 'syz.5.1518': attribute type 25 has an invalid length. [ 407.231333][ T9369] netlink: 'syz.3.1526': attribute type 21 has an invalid length. [ 407.256575][ T9369] netlink: 'syz.3.1526': attribute type 1 has an invalid length. [ 407.284525][ T9369] netlink: 144 bytes leftover after parsing attributes in process `syz.3.1526'. [ 408.256540][ T9386] netlink: 'syz.3.1532': attribute type 10 has an invalid length. [ 408.277629][ T9386] netlink: 55 bytes leftover after parsing attributes in process `syz.3.1532'. [ 408.890266][ T9397] netlink: 'syz.2.1534': attribute type 6 has an invalid length. [ 408.935536][ T9397] netlink: 1034 bytes leftover after parsing attributes in process `syz.2.1534'. [ 409.664224][ T9407] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1539'. [ 411.435806][ T9435] device syzkaller0 entered promiscuous mode [ 413.343891][ T9463] netlink: 'syz.1.1557': attribute type 29 has an invalid length. [ 413.438272][ T9465] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.1557'. [ 414.539578][ T9463] netlink: 'syz.1.1557': attribute type 29 has an invalid length. [ 414.552680][ T9465] netlink: 'syz.1.1557': attribute type 10 has an invalid length. [ 414.567433][ T9465] device hsr0 entered promiscuous mode [ 414.585583][ T9467] netlink: 40 bytes leftover after parsing attributes in process `syz.5.1559'. [ 414.633675][ T9467] bridge0: port 1(bridge_slave_0) entered disabled state [ 414.845670][ T9467] device bridge_slave_0 left promiscuous mode [ 414.870368][ T9467] bridge0: port 1(bridge_slave_0) entered disabled state [ 415.844622][ T9505] device syzkaller0 entered promiscuous mode [ 419.522825][ T9525] netlink: 'syz.5.1577': attribute type 28 has an invalid length. [ 419.570013][ T9525] netlink: 'syz.5.1577': attribute type 29 has an invalid length. [ 419.615654][ T9525] netlink: 132 bytes leftover after parsing attributes in process `syz.5.1577'. [ 419.888124][ T9528] netlink: 'syz.5.1578': attribute type 1 has an invalid length. [ 419.904881][ T9528] netlink: 126288 bytes leftover after parsing attributes in process `syz.5.1578'. [ 419.914534][ T9528] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1578'. [ 420.181717][ T9531] netlink: 'syz.5.1579': attribute type 2 has an invalid length. [ 420.224793][ T9531] netlink: 'syz.5.1579': attribute type 1 has an invalid length. [ 420.240349][ T9531] netlink: 170140 bytes leftover after parsing attributes in process `syz.5.1579'. [ 422.085332][ T9571] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1592'. [ 422.675591][ T9576] : port 1(ip6gretap0) entered blocking state [ 422.738450][ T9576] : port 1(ip6gretap0) entered disabled state [ 423.033643][ T9576] device ip6gretap0 entered promiscuous mode [ 424.528207][ T9613] netlink: 'syz.0.1607': attribute type 10 has an invalid length. [ 424.637307][ T9613] team0: Port device wlan1 added [ 424.692422][ T9615] netlink: 'syz.1.1608': attribute type 2 has an invalid length. [ 424.709514][ T9615] netlink: 'syz.1.1608': attribute type 8 has an invalid length. [ 424.734695][ T9615] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1608'. [ 425.396234][ T9629] : port 1(ip6gretap0) entered blocking state [ 425.452930][ T9629] : port 1(ip6gretap0) entered disabled state [ 425.852615][ T9629] device ip6gretap0 entered promiscuous mode [ 425.906876][ T9641] netlink: 161700 bytes leftover after parsing attributes in process `syz.1.1616'. [ 425.958067][ T9640] netlink: 161700 bytes leftover after parsing attributes in process `syz.1.1616'. [ 425.988636][ T9641] openvswitch: netlink: Key 2 has unexpected len 41210 expected 4 [ 426.037351][ T9640] openvswitch: netlink: Key 2 has unexpected len 41210 expected 4 [ 426.765936][ T9660] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1622'. [ 426.854813][ T9660] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1622'. [ 426.957261][ T9661] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1622'. [ 428.488626][ T9690] netlink: 4595 bytes leftover after parsing attributes in process `syz.0.1631'. [ 428.524122][ T9692] netlink: 'syz.2.1632': attribute type 10 has an invalid length. [ 428.575816][ T9692] netlink: 56823 bytes leftover after parsing attributes in process `syz.2.1632'. [ 428.652644][ T9690] netlink: 4595 bytes leftover after parsing attributes in process `syz.0.1631'. [ 428.667816][ T9694] netlink: 4595 bytes leftover after parsing attributes in process `syz.0.1631'. [ 430.600129][ T9731] netlink: 'syz.0.1645': attribute type 2 has an invalid length. [ 430.618596][ T9731] netlink: 'syz.0.1645': attribute type 1 has an invalid length. [ 430.628170][ T9731] netlink: 'syz.0.1645': attribute type 8 has an invalid length. [ 430.668876][ T9731] __nla_validate_parse: 1 callbacks suppressed [ 430.668896][ T9731] netlink: 88 bytes leftover after parsing attributes in process `syz.0.1645'. [ 430.704130][ T9734] netlink: 'syz.2.1647': attribute type 21 has an invalid length. [ 430.783392][ T9734] netlink: 'syz.2.1647': attribute type 10 has an invalid length. [ 430.827240][ T9734] netlink: 56823 bytes leftover after parsing attributes in process `syz.2.1647'. [ 430.909339][ T9734] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 430.915560][ T9734] syzkaller0: linktype set to 778 [ 430.922251][ T9734] syzkaller0: tun_chr_ioctl cmd 21731 [ 430.970901][ T9734] syzkaller0: tun_chr_ioctl cmd 1074025698 [ 431.051390][ T9742] netlink: 4595 bytes leftover after parsing attributes in process `syz.3.1650'. [ 431.084182][ T9742] netlink: 4595 bytes leftover after parsing attributes in process `syz.3.1650'. [ 431.187889][ T9742] netlink: 4595 bytes leftover after parsing attributes in process `syz.3.1650'. [ 431.202211][ T9747] netlink: 4595 bytes leftover after parsing attributes in process `syz.3.1650'. [ 432.271614][ T5409] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 434.241522][ T9795] netlink: 4595 bytes leftover after parsing attributes in process `syz.1.1664'. [ 434.798656][ T9795] netlink: 4595 bytes leftover after parsing attributes in process `syz.1.1664'. [ 434.844032][ T9805] netlink: 4595 bytes leftover after parsing attributes in process `syz.1.1664'. [ 435.077375][ T9807] netlink: 4595 bytes leftover after parsing attributes in process `syz.1.1664'. [ 435.926511][ T9836] netlink: 'syz.0.1680': attribute type 29 has an invalid length. [ 435.970931][ T9836] netlink: 'syz.0.1680': attribute type 29 has an invalid length. [ 436.061260][ T9839] netlink: 'syz.0.1680': attribute type 29 has an invalid length. [ 437.052658][ T9865] netlink: 'syz.5.1690': attribute type 3 has an invalid length. [ 437.118062][ T9865] netlink: 199824 bytes leftover after parsing attributes in process `syz.5.1690'. [ 437.382544][ T9870] netlink: 144 bytes leftover after parsing attributes in process `syz.5.1692'. [ 437.590111][ T9870] team0: Port device team_slave_0 removed [ 437.601924][ T9878] netlink: 'syz.1.1696': attribute type 2 has an invalid length. [ 437.635797][ T9870] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 437.976792][ T9878] device 0 entered promiscuous mode [ 438.287657][ T9893] netlink: 'syz.0.1702': attribute type 27 has an invalid length. [ 438.325357][ T9893] netlink: 164 bytes leftover after parsing attributes in process `syz.0.1702'. [ 438.757356][ T9908] openvswitch: netlink: Flow get message rejected, Key attribute missing. [ 438.899216][ T9911] netlink: 14 bytes leftover after parsing attributes in process `syz.0.1709'. [ 439.124267][ C0] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 439.733519][ T9916] netlink: 144 bytes leftover after parsing attributes in process `syz.1.1707'. [ 439.800909][ T9916] team0: Port device team_slave_0 removed [ 439.810710][ T9916] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 440.167848][ T1278] ieee802154 phy0 wpan0: encryption failed: -22 [ 440.174245][ T1278] ieee802154 phy1 wpan1: encryption failed: -22 [ 440.430733][ T9938] netlink: 'syz.2.1717': attribute type 10 has an invalid length. [ 440.537999][ T9938] netlink: 2 bytes leftover after parsing attributes in process `syz.2.1717'. [ 440.599573][ T9938] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 440.639473][ T9938] bridge0: port 1(hsr0) entered blocking state [ 440.657550][ T9938] bridge0: port 1(hsr0) entered disabled state [ 440.706936][ T9938] bridge0: port 1(hsr0) entered blocking state [ 440.713360][ T9938] bridge0: port 1(hsr0) entered forwarding state [ 440.939986][ T9954] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1723'. [ 440.973876][ T9954] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1723'. [ 441.037595][ T9954] netlink: 152 bytes leftover after parsing attributes in process `syz.0.1723'. [ 441.923608][ T9967] netlink: 'syz.0.1727': attribute type 1 has an invalid length. [ 442.017250][ T9967] netlink: 157116 bytes leftover after parsing attributes in process `syz.0.1727'. [ 446.673240][T10075] device syzkaller0 entered promiscuous mode [ 447.896773][T10077] delete_channel: no stack [ 450.440540][T10113] __nla_validate_parse: 1 callbacks suppressed [ 450.440561][T10113] netlink: 14 bytes leftover after parsing attributes in process `syz.5.1774'. [ 450.764303][T10120] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1778'. [ 451.625645][T10140] netlink: 'syz.5.1783': attribute type 3 has an invalid length. [ 451.687200][T10140] netlink: 105116 bytes leftover after parsing attributes in process `syz.5.1783'. [ 451.995083][T10144] device syzkaller0 entered promiscuous mode [ 452.544238][T10155] syz.2.1789[10155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 452.544351][T10155] syz.2.1789[10155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 454.975342][T10169] netlink: 15487 bytes leftover after parsing attributes in process `syz.2.1796'. [ 455.192362][T10169] netlink: 'syz.2.1796': attribute type 17 has an invalid length. [ 455.203341][T10183] netlink: 122896 bytes leftover after parsing attributes in process `syz.0.1798'. [ 456.057182][T10181] netlink: 'syz.1.1797': attribute type 3 has an invalid length. [ 456.064998][T10181] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.1797'. [ 456.559371][T10194] netlink: 63503 bytes leftover after parsing attributes in process `syz.2.1803'. [ 456.686297][T10201] netlink: 'syz.5.1805': attribute type 10 has an invalid length. [ 456.794931][T10201] bond0: (slave bond_slave_0): Releasing backup interface [ 457.149918][T10205] device syzkaller0 entered promiscuous mode [ 457.490958][T10219] netlink: 'syz.5.1811': attribute type 29 has an invalid length. [ 460.117774][T10219] netlink: 'syz.5.1811': attribute type 29 has an invalid length. [ 460.130838][T10229] netlink: 15487 bytes leftover after parsing attributes in process `syz.3.1814'. [ 460.140817][T10230] netlink: 'syz.3.1814': attribute type 17 has an invalid length. [ 460.157284][T10239] platform regulatory.0: loading /lib/firmware/regulatory.db failed with error -12 [ 460.187556][T10239] platform regulatory.0: Direct firmware load for regulatory.db failed with error -12 [ 460.217679][T10239] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 460.765745][T10251] netlink: 'syz.2.1821': attribute type 29 has an invalid length. [ 460.866112][T10245] netlink: 63503 bytes leftover after parsing attributes in process `syz.3.1820'. [ 461.001580][T10251] netlink: 'syz.2.1821': attribute type 29 has an invalid length. [ 461.043202][T10254] netlink: 'syz.2.1821': attribute type 29 has an invalid length. [ 461.898335][T10273] device syzkaller0 entered promiscuous mode [ 461.900994][T10276] netlink: 'syz.2.1829': attribute type 29 has an invalid length. [ 462.013572][T10276] netlink: 'syz.2.1829': attribute type 29 has an invalid length. [ 463.912883][ T5387] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 465.480544][T10284] netlink: 'syz.2.1829': attribute type 29 has an invalid length. [ 465.928452][T10346] netlink: 14 bytes leftover after parsing attributes in process `syz.1.1850'. [ 466.000978][T10346] device hsr_slave_0 left promiscuous mode [ 466.080684][T10346] device hsr_slave_1 left promiscuous mode [ 467.201723][T10351] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1851'. [ 469.113104][T10404] netlink: 'syz.2.1866': attribute type 21 has an invalid length. [ 469.150085][T10404] netlink: 128 bytes leftover after parsing attributes in process `syz.2.1866'. [ 469.206594][T10404] netlink: 'syz.2.1866': attribute type 4 has an invalid length. [ 469.227283][T10404] netlink: 'syz.2.1866': attribute type 5 has an invalid length. [ 469.319726][T10404] netlink: 3 bytes leftover after parsing attributes in process `syz.2.1866'. [ 471.790907][T10474] netlink: 'syz.0.1888': attribute type 21 has an invalid length. [ 471.839788][T10474] netlink: 128 bytes leftover after parsing attributes in process `syz.0.1888'. [ 472.079980][T10474] netlink: 'syz.0.1888': attribute type 4 has an invalid length. [ 472.130150][T10474] netlink: 'syz.0.1888': attribute type 5 has an invalid length. [ 472.139556][T10474] netlink: 3 bytes leftover after parsing attributes in process `syz.0.1888'. [ 473.946634][T10501] netlink: 'syz.3.1898': attribute type 28 has an invalid length. [ 475.471264][T10521] netlink: 'syz.3.1904': attribute type 10 has an invalid length. [ 475.543173][T10521] netlink: 55 bytes leftover after parsing attributes in process `syz.3.1904'. [ 477.648251][T10536] netlink: 'syz.2.1910': attribute type 2 has an invalid length. [ 478.136616][T10536] device 1 entered promiscuous mode [ 478.549961][T10551] netlink: 48 bytes leftover after parsing attributes in process `syz.1.1914'. [ 479.120609][T10561] netlink: 'syz.5.1917': attribute type 1 has an invalid length. [ 479.167251][T10561] netlink: 'syz.5.1917': attribute type 1 has an invalid length. [ 479.187214][T10561] netlink: 116376 bytes leftover after parsing attributes in process `syz.5.1917'. [ 481.380923][T10592] netlink: 48 bytes leftover after parsing attributes in process `syz.0.1929'. [ 482.707800][T10618] netlink: 'syz.1.1934': attribute type 1 has an invalid length. [ 482.715636][T10618] netlink: 'syz.1.1934': attribute type 1 has an invalid length. [ 482.852715][T10618] netlink: 116376 bytes leftover after parsing attributes in process `syz.1.1934'. [ 486.047286][T10643] netlink: 'syz.1.1944': attribute type 10 has an invalid length. [ 486.055303][T10643] netlink: 55 bytes leftover after parsing attributes in process `syz.1.1944'. [ 487.634225][T10660] netlink: 48 bytes leftover after parsing attributes in process `syz.2.1949'. [ 488.360471][T10669] netlink: 'syz.0.1952': attribute type 1 has an invalid length. [ 488.387143][T10669] netlink: 'syz.0.1952': attribute type 1 has an invalid length. [ 488.415575][T10669] netlink: 116376 bytes leftover after parsing attributes in process `syz.0.1952'. [ 490.512267][T10701] netlink: 'syz.5.1964': attribute type 1 has an invalid length. [ 490.567145][T10701] netlink: 105120 bytes leftover after parsing attributes in process `syz.5.1964'. [ 490.978808][ T4273] Bluetooth: hci0: SCO packet for unknown connection handle 2622 [ 491.943762][T10746] FAULT_INJECTION: forcing a failure. [ 491.943762][T10746] name failslab, interval 1, probability 0, space 0, times 0 [ 491.974701][T10746] CPU: 1 PID: 10746 Comm: syz.1.1981 Not tainted syzkaller #0 [ 491.982251][T10746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 491.992361][T10746] Call Trace: [ 491.995680][T10746] [ 491.998669][T10746] dump_stack_lvl+0x188/0x24e [ 492.003406][T10746] ? show_regs_print_info+0x12/0x12 [ 492.009022][T10746] ? load_image+0x400/0x400 [ 492.013584][T10746] ? __might_sleep+0xd0/0xd0 [ 492.018300][T10746] ? __lock_acquire+0x7d10/0x7d10 [ 492.023374][T10746] should_fail_ex+0x399/0x4d0 [ 492.028111][T10746] should_failslab+0x5/0x20 [ 492.032666][T10746] slab_pre_alloc_hook+0x59/0x310 [ 492.037744][T10746] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 492.043526][T10746] __kmem_cache_alloc_node+0x4f/0x260 [ 492.048950][T10746] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 492.054981][T10746] __kmalloc+0xa0/0x240 [ 492.059198][T10746] tomoyo_realpath_from_path+0xdf/0x5d0 [ 492.064896][T10746] ? tomoyo_path_number_perm+0x205/0x650 [ 492.070581][T10746] tomoyo_path_number_perm+0x22f/0x650 [ 492.076089][T10746] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 492.081610][T10746] ? ktime_get+0x7b/0x270 [ 492.085979][T10746] ? ktime_get+0x7b/0x270 [ 492.090471][T10746] ? seqcount_lockdep_reader_access+0x177/0x1d0 [ 492.096972][T10746] ? __fget_files+0x28/0x4b0 [ 492.101610][T10746] ? __fget_files+0x28/0x4b0 [ 492.106266][T10746] security_file_ioctl+0x6c/0xa0 [ 492.111251][T10746] __se_sys_ioctl+0x48/0x170 [ 492.115890][T10746] do_syscall_64+0x4c/0xa0 [ 492.120343][T10746] ? clear_bhb_loop+0x60/0xb0 [ 492.125215][T10746] ? clear_bhb_loop+0x60/0xb0 [ 492.129998][T10746] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 492.136010][T10746] RIP: 0033:0x7f49e119c799 [ 492.140435][T10746] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 492.160053][T10746] RSP: 002b:00007f49e1fd4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 492.168854][T10746] RAX: ffffffffffffffda RBX: 00007f49e1415fa0 RCX: 00007f49e119c799 [ 492.176877][T10746] RDX: 0000200000000040 RSI: 0000000000008946 RDI: 0000000000000008 [ 492.185051][T10746] RBP: 00007f49e1fd4090 R08: 0000000000000000 R09: 0000000000000000 [ 492.193040][T10746] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 492.201118][T10746] R13: 00007f49e1416038 R14: 00007f49e1415fa0 R15: 00007ffdff7b1d28 [ 492.209114][T10746] [ 492.254565][T10746] ERROR: Out of memory at tomoyo_realpath_from_path. [ 493.394517][ T4270] Bluetooth: hci5: command 0x0406 tx timeout [ 494.964653][ T5385] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 495.865920][T10774] netlink: 'syz.1.1990': attribute type 27 has an invalid length. [ 495.904897][T10774] netlink: 'syz.1.1990': attribute type 3 has an invalid length. [ 495.931644][T10774] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1990'. [ 496.273204][T10788] Â: renamed from pim6reg1 [ 498.279581][T10814] netlink: 'syz.2.2003': attribute type 3 has an invalid length. [ 498.298103][T10814] netlink: 'syz.2.2003': attribute type 1 has an invalid length. [ 498.465042][T10818] netlink: 'syz.2.2003': attribute type 27 has an invalid length. [ 500.336584][T10854] Â: renamed from pim6reg1 [ 500.655120][T10859] device syzkaller0 entered promiscuous mode [ 501.550959][ T1278] ieee802154 phy0 wpan0: encryption failed: -22 [ 501.557495][ T1278] ieee802154 phy1 wpan1: encryption failed: -22 [ 505.846461][T10885] netlink: 6 bytes leftover after parsing attributes in process `syz.5.2027'. [ 505.877094][T10886] netlink: 180 bytes leftover after parsing attributes in process `syz.5.2027'. [ 506.518286][T10911] netlink: 55631 bytes leftover after parsing attributes in process `syz.1.2034'. [ 506.551730][T10911] netlink: 6324 bytes leftover after parsing attributes in process `syz.1.2034'. [ 506.585385][T10911] netlink: 2 bytes leftover after parsing attributes in process `syz.1.2034'. [ 507.824780][T10938] netlink: 'syz.3.2043': attribute type 10 has an invalid length. [ 507.946912][T10936] device syzkaller0 entered promiscuous mode [ 508.552897][T10961] delete_channel: no stack [ 509.213309][T10975] netlink: 188 bytes leftover after parsing attributes in process `syz.1.2053'. [ 510.887426][T10967] netlink: 'syz.3.2051': attribute type 10 has an invalid length. [ 510.895531][T10967] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2051'. [ 510.904768][T10967] device batadv0 entered promiscuous mode [ 510.912317][T10967] A link change request failed with some changes committed already. Interface batadv0 may have been left with an inconsistent configuration, please check. [ 510.928235][T10977] netlink: 'syz.1.2054': attribute type 21 has an invalid length. [ 510.947262][T10977] IPv6: Can't replace route, no match found [ 511.205719][T10982] netlink: 'syz.0.2055': attribute type 29 has an invalid length. [ 511.369754][T10982] netlink: 'syz.0.2055': attribute type 29 has an invalid length. [ 512.068168][T10994] netlink: 'syz.0.2055': attribute type 29 has an invalid length. [ 514.635574][T11058] device syzkaller0 entered promiscuous mode [ 516.267684][ T28] INFO: task syz.4.1251:8431 blocked for more than 143 seconds. [ 516.275606][ T28] Not tainted syzkaller #0 [ 516.284218][T11076] netlink: 14975 bytes leftover after parsing attributes in process `syz.3.2088'. [ 516.293803][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 516.304655][ T28] task:syz.4.1251 state:D stack:27888 pid:8431 ppid:4277 flags:0x00004004 [ 516.324614][ T28] Call Trace: [ 516.328593][ T28] [ 516.334791][ T28] __schedule+0x11d1/0x40e0 [ 516.346704][ T28] ? __mutex_lock+0x1ab/0xaf0 [ 516.361270][ T28] ? __sched_text_start+0x8/0x8 [ 516.372033][ T28] ? task_work_cancel+0xa1/0x220 [ 516.384432][ T28] ? task_work_cancel_func+0x210/0x210 [ 516.396905][ T28] ? __mutex_unlock_slowpath+0x1b0/0x6c0 [ 516.410026][ T28] ? _free_event+0xfd/0x10a0 [ 516.419621][ T28] schedule+0xb9/0x180 [ 516.429660][ T28] _free_event+0x171/0x10a0 [ 516.478891][ T28] ? perf_mmap+0x13d0/0x13d0 [ 516.497223][ T28] ? perf_mmap+0x13d0/0x13d0 [ 516.519832][ T28] perf_event_release_kernel+0x83e/0x8d0 [ 516.542071][ T28] ? __might_sleep+0xd0/0xd0 [ 516.557036][ T28] ? calc_timer_values+0x410/0x410 [ 516.566315][T11078] netlink: 'syz.3.2088': attribute type 2 has an invalid length. [ 516.575839][ T28] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 516.602564][ T28] ? perf_mmap+0x13d0/0x13d0 [ 516.622820][ T28] perf_release+0x37/0x40 [ 516.643163][ T28] __fput+0x22c/0x920 [ 516.663889][ T28] task_work_run+0x1d0/0x260 [ 516.685552][ T28] ? task_work_cancel+0x220/0x220 [ 516.711956][ T28] ? exit_to_user_mode_loop+0x3b/0x110 [ 516.733608][ T28] exit_to_user_mode_loop+0xe6/0x110 [ 516.740876][ T28] exit_to_user_mode_prepare+0xee/0x180 [ 516.747717][ T28] syscall_exit_to_user_mode+0x16/0x40 [ 516.753620][ T28] do_syscall_64+0x58/0xa0 [ 516.759105][ T28] ? clear_bhb_loop+0x60/0xb0 [ 516.764161][ T28] ? clear_bhb_loop+0x60/0xb0 [ 516.769167][ T28] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 516.775448][ T28] RIP: 0033:0x7f5f7739c799 [ 516.780285][ T28] RSP: 002b:00007f5f7822f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 516.789176][ T28] RAX: 0000000000000000 RBX: 00007f5f77615fa0 RCX: 00007f5f7739c799 [ 516.797604][ T28] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 516.805973][ T28] RBP: 00007f5f77432c99 R08: 0000000000000000 R09: 0000000000000000 [ 516.814193][ T28] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 516.822870][ T28] R13: 00007f5f77616038 R14: 00007f5f77615fa0 R15: 00007fffcc32f0b8 [ 516.840318][ T28] [ 516.843866][ T28] [ 516.843866][ T28] Showing all locks held in the system: [ 516.855222][ T28] 1 lock held by rcu_tasks_kthre/12: [ 516.861015][ T28] #0: ffffffff8cb2dfb0 (rcu_tasks.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x33/0xf00 [ 516.874220][ T28] 1 lock held by rcu_tasks_trace/13: [ 516.879794][ T28] #0: ffffffff8cb2e7d0 (rcu_tasks_trace.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x33/0xf00 [ 516.891262][ T28] 1 lock held by khungtaskd/28: [ 516.896308][ T28] #0: ffffffff8cb2d620 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x51/0x290 [ 516.906711][ T28] 2 locks held by getty/4030: [ 516.914014][ T28] #0: ffff88802fd6e098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 [ 516.924342][ T28] #1: ffffc9000327b2f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x429/0x1390 [ 516.934956][ T28] 2 locks held by kworker/0:5/4312: [ 516.940580][ T28] #0: ffff888017472138 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_one_work+0x7b0/0x1160 [ 516.962134][ T28] #1: ffffc900044afd00 ((work_completion)(&rew->rew_work)){+.+.}-{0:0}, at: process_one_work+0x7b0/0x1160 [ 516.975597][ T28] 3 locks held by kworker/u4:24/5401: [ 516.987634][ T28] #0: ffff888017479138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x7b0/0x1160 [ 517.005538][ T28] #1: ffffc90003bc7d00 ((work_completion)(&map->work)){+.+.}-{0:0}, at: process_one_work+0x7b0/0x1160 [ 517.018838][ T28] #2: ffffffff8cb332f8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x3c0/0x890 [ 517.037319][ T28] 1 lock held by syz.2.2079/11049: [ 517.044339][ T28] #0: ffffffff8dd469e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3d/0x1b0 [ 517.064827][ T28] 1 lock held by syz.2.2079/11054: [ 517.072682][ T28] #0: ffffffff8dd469e8 (rtnl_mutex){+.+.}-{3:3}, at: dev_ioctl+0x54d/0xe80 [ 517.081992][ T28] 2 locks held by syz.0.2082/11056: [ 517.087767][ T28] #0: ffffffff8dd469e8 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3d/0x1b0 [ 517.097216][ T28] #1: ffffffff8cb332f8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x3c0/0x890 [ 517.108660][ T28] 1 lock held by syz.5.2087/11071: [ 517.113831][ T28] #0: ffffffff8cb826a8 (event_mutex){+.+.}-{3:3}, at: perf_trace_destroy+0x2a/0x140 [ 517.123861][ T28] 1 lock held by syz.5.2087/11073: [ 517.129304][ T28] #0: ffffffff8dd469e8 (rtnl_mutex){+.+.}-{3:3}, at: __tun_chr_ioctl+0x3fc/0x1e60 [ 517.140955][ T28] 1 lock held by syz.3.2088/11075: [ 517.146193][ T28] #0: ffffffff8cb826a8 (event_mutex){+.+.}-{3:3}, at: perf_trace_destroy+0x2a/0x140 [ 517.161562][ T28] 1 lock held by syz.3.2088/11076: [ 517.166869][ T28] #0: ffffffff8dd469e8 (rtnl_mutex){+.+.}-{3:3}, at: dev_ioctl+0x5e7/0xe80 [ 517.184414][ T28] 1 lock held by syz.3.2088/11079: [ 517.193176][ T28] #0: ffffffff8dd469e8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x824/0xfc0 [ 517.210780][ T28] [ 517.226133][ T28] ============================================= [ 517.226133][ T28] [ 517.258003][ T28] NMI backtrace for cpu 0 [ 517.262403][ T28] CPU: 0 PID: 28 Comm: khungtaskd Not tainted syzkaller #0 [ 517.269631][ T28] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 517.279842][ T28] Call Trace: [ 517.283137][ T28] [ 517.286087][ T28] dump_stack_lvl+0x188/0x24e [ 517.290784][ T28] ? ct_irq_enter_irqson+0x170/0x170 [ 517.296081][ T28] ? show_regs_print_info+0x12/0x12 [ 517.301295][ T28] ? load_image+0x400/0x400 [ 517.305805][ T28] ? vprintk_emit+0x59f/0x6a0 [ 517.310497][ T28] ? nmi_cpu_backtrace+0x1cb/0x460 [ 517.315627][ T28] nmi_cpu_backtrace+0x3e6/0x460 [ 517.320605][ T28] ? nmi_trigger_cpumask_backtrace+0x450/0x450 [ 517.326782][ T28] ? _printk+0xda/0x130 [ 517.330942][ T28] ? load_image+0x400/0x400 [ 517.335486][ T28] ? load_image+0x400/0x400 [ 517.340086][ T28] ? nmi_trigger_cpumask_backtrace+0xf3/0x450 [ 517.346166][ T28] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 517.352272][ T28] nmi_trigger_cpumask_backtrace+0x1d4/0x450 [ 517.358296][ T28] watchdog+0xeee/0xf30 [ 517.362483][ T28] ? watchdog+0x1ed/0xf30 [ 517.366837][ T28] kthread+0x29d/0x330 [ 517.370914][ T28] ? hungtask_pm_notify+0x40/0x40 [ 517.375953][ T28] ? kthread_blkcg+0xd0/0xd0 [ 517.380569][ T28] ret_from_fork+0x1f/0x30 [ 517.385020][ T28] [ 517.389051][ T28] Sending NMI from CPU 0 to CPUs 1: [ 517.394493][ C1] NMI backtrace for cpu 1 [ 517.394506][ C1] CPU: 1 PID: 5353 Comm: kworker/u4:10 Not tainted syzkaller #0 [ 517.394522][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 517.394531][ C1] Workqueue: bat_events batadv_nc_worker [ 517.394559][ C1] RIP: 0010:check_preemption_disabled+0x56/0x110 [ 517.394579][ C1] Code: 74 1f 65 48 8b 0c 25 28 00 00 00 48 3b 4c 24 08 0f 85 c4 00 00 00 48 83 c4 10 5b 41 5e 41 5f 5d c3 48 c7 04 24 00 00 00 00 9c <8f> 04 24 f7 04 24 00 02 00 00 74 cc 65 4c 8b 3d a6 54 d5 75 41 f6 [ 517.394592][ C1] RSP: 0018:ffffc90003987a80 EFLAGS: 00000046 [ 517.394604][ C1] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 0000000080000000 [ 517.394615][ C1] RDX: 0000000000000000 RSI: ffffffff8a8c1f00 RDI: ffffffff8adf0f60 [ 517.394633][ C1] RBP: ffffc90003987bc8 R08: ffffffff8e1fd76f R09: 1ffffffff1c3faed [ 517.394644][ C1] R10: dffffc0000000000 R11: fffffbfff1c3faee R12: 0000000000000001 [ 517.394654][ C1] R13: 1ffff92000730f64 R14: 0000000000000246 R15: dffffc0000000000 [ 517.394664][ C1] FS: 0000000000000000(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000 [ 517.394677][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 517.394688][ C1] CR2: 0000000100000000 CR3: 000000005bc95000 CR4: 00000000003506e0 [ 517.394703][ C1] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000 [ 517.394713][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 517.394723][ C1] Call Trace: [ 517.394728][ C1] [ 517.394735][ C1] lock_acquire+0x181/0x4a0 [ 517.394760][ C1] ? read_lock_is_recursive+0x10/0x10 [ 517.394780][ C1] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 517.394800][ C1] ? batadv_nc_worker+0xce/0x600 [ 517.394816][ C1] ? batadv_nc_worker+0xce/0x600 [ 517.394832][ C1] batadv_nc_worker+0xeb/0x600 [ 517.394846][ C1] ? batadv_nc_worker+0xce/0x600 [ 517.394864][ C1] ? process_one_work+0x7b0/0x1160 [ 517.394880][ C1] process_one_work+0x8a2/0x1160 [ 517.394902][ C1] ? worker_detach_from_pool+0x240/0x240 [ 517.394917][ C1] ? _raw_spin_lock_irq+0x86/0xf0 [ 517.394934][ C1] ? _raw_spin_lock_irq+0xb7/0xf0 [ 517.394947][ C1] ? _raw_spin_lock_irqsave+0x100/0x100 [ 517.394962][ C1] ? kthread_data+0x4b/0xc0 [ 517.394983][ C1] worker_thread+0xaa2/0x1270 [ 517.395012][ C1] kthread+0x29d/0x330 [ 517.395023][ C1] ? worker_clr_flags+0x1a0/0x1a0 [ 517.395038][ C1] ? kthread_blkcg+0xd0/0xd0 [ 517.395052][ C1] ret_from_fork+0x1f/0x30 [ 517.395077][ C1] [ 517.666069][ T28] Kernel panic - not syncing: hung_task: blocked tasks [ 517.672998][ T28] CPU: 0 PID: 28 Comm: khungtaskd Not tainted syzkaller #0 [ 517.680236][ T28] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 517.690502][ T28] Call Trace: [ 517.693814][ T28] [ 517.696778][ T28] dump_stack_lvl+0x188/0x24e [ 517.701507][ T28] ? memcpy+0x3c/0x60 [ 517.705529][ T28] ? show_regs_print_info+0x12/0x12 [ 517.710770][ T28] ? load_image+0x400/0x400 [ 517.715329][ T28] panic+0x2e5/0x730 [ 517.719346][ T28] ? schedule_preempt_disabled+0x20/0x20 [ 517.725021][ T28] ? bpf_jit_dump+0xd0/0xd0 [ 517.729567][ T28] ? nmi_trigger_cpumask_backtrace+0x35b/0x450 [ 517.735777][ T28] ? nmi_trigger_cpumask_backtrace+0x360/0x450 [ 517.741996][ T28] watchdog+0xf2d/0xf30 [ 517.746197][ T28] ? watchdog+0x1ed/0xf30 [ 517.750674][ T28] kthread+0x29d/0x330 [ 517.754774][ T28] ? hungtask_pm_notify+0x40/0x40 [ 517.759845][ T28] ? kthread_blkcg+0xd0/0xd0 [ 517.764475][ T28] ret_from_fork+0x1f/0x30 [ 517.769033][ T28] [ 517.773573][ T28] Kernel Offset: disabled [ 517.777935][ T28] Rebooting in 86400 seconds..