last executing test programs: 4.444480987s ago: executing program 2 (id=2714): socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x8, 0x0, 0x7, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x0, 0x0, 0x0, 0xf60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x394}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8b1a, &(0x7f0000000000)={'wlan1\x00', @random="0000230c1100"}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x5411, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b04, &(0x7f0000000000)={'wlan1\x00', @random="0200"}) socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f00000008c0), 0x43) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x42000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x30a) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @multicast}) r4 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f00000008c0), 0x43) write$cgroup_subtree(r4, &(0x7f0000000040)=ANY=[], 0x101d0) sendmsg$kcm(r4, &(0x7f0000000880)={0x0, 0x0, 0x0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x0) r6 = socket$kcm(0xa, 0x2, 0x3a) sendmsg$inet(r6, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x41044) sendmsg$kcm(r6, &(0x7f0000000440)={&(0x7f0000000800)=@in6={0xa, 0x0, 0x0, @mcast2, 0x1a}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000780)="80005b020eaa4da2", 0xfdef}], 0x1, 0x0, 0x0, 0x900}, 0x0) sendmsg$kcm(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000002940)="2000000020008107090f9becdb4cb96b0200000000fbff010000000000000000", 0x20}], 0x1, 0x0, 0x0, 0x81000000}, 0x4) 3.202892133s ago: executing program 1 (id=2724): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1b, 0x4, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$kcm(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8918, &(0x7f0000000000)={0xffffffffffffffff}) socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000005, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000300), 0x4}, 0x35c0, 0xfffffffffffffffe, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1f, 0xc, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESHEX=r0, @ANYRES16=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x69, 0x11, 0x4b}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x70) socket$kcm(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) getpid() sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r5, &(0x7f0000001a00)=ANY=[@ANYBLOB="13100000520091ef"], 0xfe33) recvmsg$kcm(r5, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001a40)=""/4095, 0xfff}], 0x1}, 0x0) recvmsg$kcm(r5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x50be}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="5400020029000b05d25a806f8c6394f90424fc602f0011002f2f2f00053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x5000000}, 0x0) recvmsg$kcm(r6, &(0x7f0000000240)={&(0x7f00000002c0)=@ax25={{}, [@bcast, @remote, @default, @rose, @default, @remote, @rose, @bcast]}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000100)=""/58, 0x3a}, {&(0x7f0000000340)=""/235, 0xeb}, {&(0x7f00000005c0)=""/253, 0xfd}, {&(0x7f0000000840)=""/133, 0x85}, {&(0x7f0000000900)=""/180, 0xb4}], 0x5, &(0x7f00000001c0)=""/52, 0x34}, 0x2000) recvmsg$kcm(r5, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) r7 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001180)=[{&(0x7f00000000c0)="1400000027000bff001b05290000000000000000", 0x14}], 0x1}, 0x4080) 2.670977782s ago: executing program 0 (id=2729): socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x8, 0x0, 0x7, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x0, 0x0, 0x0, 0xf60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x394}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8b1a, &(0x7f0000000000)={'wlan1\x00', @random="0000230c1100"}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x5411, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b04, &(0x7f0000000000)={'wlan1\x00', @random="0200"}) socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f00000008c0), 0x43) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x42000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x30a) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @multicast}) r4 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f00000008c0), 0x43) write$cgroup_subtree(r4, &(0x7f0000000040)=ANY=[], 0x101d0) sendmsg$kcm(r4, &(0x7f0000000880)={0x0, 0x0, 0x0}, 0x40) socket$kcm(0x10, 0x2, 0x0) r5 = socket$kcm(0xa, 0x2, 0x3a) sendmsg$inet(r5, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x41044) sendmsg$kcm(r5, &(0x7f0000000440)={&(0x7f0000000800)=@in6={0xa, 0x0, 0x0, @mcast2, 0x1a}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000780)="80005b020eaa4da2", 0xfdef}], 0x1, 0x0, 0x0, 0x900}, 0x0) 2.605976995s ago: executing program 1 (id=2730): r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x100, @remote}, 0x80, 0x0, 0x0, &(0x7f00000001c0)=[{0x18, 0x29, 0xb, "31d7"}], 0x18}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1b) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x7, 0x22004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0a000000030000000700000006"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r2}, 0x25) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_int(r3, 0x0, 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB='N-N:N/NN'], 0x6a) 2.47526413s ago: executing program 2 (id=2732): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.1GB.limit_in_bytes\x00', 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000040)="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", 0x281}], 0x1}, 0x0) write$cgroup_subtree(r1, &(0x7f00000002c0)=ANY=[], 0x8) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x480283, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x9900000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.1GB.limit_in_bytes\x00', 0x2, 0x0) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000040)="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", 0x281}], 0x1}, 0x0) (async) write$cgroup_subtree(r1, &(0x7f00000002c0)=ANY=[], 0x8) (async) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x480283, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) syz_clone(0x9900000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 2.375109883s ago: executing program 1 (id=2733): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0x1, 0xffffffffffffffff}, 0x4) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="89000000120081ae08060cdc030ec0007f03e3f70000000000e2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec08120c000200080001400400446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r0}, 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext, 0x10c002, 0x89}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="10000000040000000800000002"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xd, 0x4, 0x4, 0xc, 0x0, r2}, 0x50) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1053e0, 0x2, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000320081044e81f782db44b904021d080005000000e8fe55a1180015000600142603600e120900210000000401a8001600040001400600", 0x3a}], 0x1}, 0x48400) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="563f00001800599c6d0eab070004000523"], 0xfe33) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfe33) r5 = socket$kcm(0xa, 0x3, 0x73) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000f40)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) socket$kcm(0xa, 0x2, 0x73) sendmsg$inet(r5, 0x0, 0x9fc) 2.292635016s ago: executing program 2 (id=2735): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe123, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0xd, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x66137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r5 = bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r4}, 0x8) write$cgroup_int(r5, &(0x7f00000001c0), 0xfffffdef) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r6) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={0xffffffffffffffff, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socket$kcm(0x10, 0x2, 0x10) 2.142628842s ago: executing program 4 (id=2736): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = socket$kcm(0x29, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x2, 0x3}, @const={0x0, 0x0, 0x0, 0xb}, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x3e}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB], &(0x7f0000000140)='GPL\x00'}, 0x94) r2 = socket$kcm(0x2, 0x1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000002f40)=@base={0x5, 0x4, 0xc, 0xc}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xd, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x8}]}, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r4, r3}, 0xc) sendmsg$inet(r2, 0x0, 0x20000891) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r2, r1}) sendmsg$kcm(r0, &(0x7f0000002080)={0x0, 0x0, 0x0}, 0x0) 2.112624223s ago: executing program 1 (id=2737): r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x602, 0x0, 0x8, 0x0, 0x4000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x400}, 0x100080, 0x0, 0x0, 0x8, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x3}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x4}, @typedef={0x0, 0x0, 0x0, 0x2}, @volatile={0x0, 0x0, 0x0, 0xa, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x52}, 0x28) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0xf, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x21}, 0x94) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="d80000001800eb054e81f783db4cb9040a1d080006007c09e8fc55a10a0015000600142603600e1208000f00060004010c00080008000c4004000000035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cb8b4c2ee5a7cef4090000001fb71b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e002c2a73ae028d1b34ff4f8cc430bb5a360db598262f3d40fad9e3bb9ad809d5e1cace81ed0bffece8b42a9ecbee5de6", 0xbd}], 0x1}, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x21, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="b4000000000000007911a800000000001e000000000000009500000c00000000e8275ffe7f4201"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x41000, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) r3 = socket$kcm(0xa, 0x2, 0x0) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f00000002c0)={0x2, 0x4e22, @local}, 0x10, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000007000000890704e068000000110000000000000000dbc790ad000000fc000000000000001400000000000000000000000200000004000000000000001c"], 0x68}, 0x0) r4 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x11, 0x68, &(0x7f0000000100), 0x120) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000001c0)) 2.111950593s ago: executing program 3 (id=2738): r0 = socket$kcm(0x10, 0x2, 0x10) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0xc2ba, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001240)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000aecd48d6494d614dcc6fab5335ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad94ed406f21caf5adcf920569c00cc1199684fa75814709fea019af247c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c1faca0f9d9924be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fca4e0b6fab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afd8cc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b79db2e3d5986c82b5aa94e539b204d58f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c7160ec83070000020000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab8b4b380a00d72b0000000000001cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2cc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78ac02ca3cdf6a662db1c9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad943e392955f4f979ea13201bafedcd2063d11dd665647223c78a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cda6cb799c6e924966a7f90bf8fd1e75ee76bd89346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca2533659edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffca9ec9a7a3755e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e561a9845e4ff29e2bdb1d0b923b272341c5e093fd66a294351c5356c1d06c92cf8ce3c7c56cd31121624d74517fd3666277f670e812b28e2f30d035cee5d0e77a3c7220000000000000005a474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f034b8d3ebce68663ef5af469abe75b314fae31a0445859a5ece8fb11a4ee8e46354c9c3a041e12282ce24463aaf28345bd168b4177ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f09000000000000004fc4bda3453602004535a976eacd3adaa4d2ee6fe0d072ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d401adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb40f7f02f750d6c977a191852c9ae031db044b2353199546609f9f69a6cfefdf879d447df53f3b9b70d10355b00300000000000000553d18a6cc50feeb7bfad9b7be3283b6450d264e7712d2f1d7004548b19162cef04d18d4f58fab987baab97a9bfbd8f185b5631820420bf5b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe527340935aa3c0b4f3f45b418a18217747ae442e31560e5b741445ea2a1acee2a81425ff000000d2a0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa6623920dacc107f532348cc21164efe794874eac73381e961f3d9c8c21578fe3245097c280abe51423b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f88735fce5115dc83ed73d8ee4a91322608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf5000000000000fa08ad0631c4b839688b22c4da2a6bc4cf45854d221a2d5f96bc64647f15daa2ba79cd0f4254ed55217912ef84bd2927df82fc061aef2920c49b2a90886da75561173fa186cb7ee86dd4285c4721eb428c953296bb2f5d825da54dbef07c1b349b4901e093d13e6b9a0000009b5b22e887bc061d40bcaf0aa18623fd9b7179ccc692ba74b531b65c4decf9d080a8ac7e82d4cde1267aa64b2a94fd87a009e6742c2ddc3a9d7eccbb1831b1fa218277c2814a91cab7cb59c697166d6f1bb1a360470000000000000000000000000000000000000000000000000000f9f9b4ce7e871f507084c8c88e0652decbe579b03ed84ea94597dd1059620a050f69ea03b99b4e19d35f4a3b54e96ae2172effecec80f6baa4bf69a6ebf5392882df78b0983e662dc0cb64b77f3f006b6b25443197ae93f0be6de5a703d003f00720943c0e4b33af00000000000000000021a688b2d7007fcc4b59f719afb0b3b7e0aee306ca70fe42bf4984a68f40e1fc043a03a17e4744359b87dc27c82d51cbeb64e52a28daeb6a78d6fe06181ecc840000"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020032000b07d25a806f8c6394f90624fc602f0000000a740100051382c137153e370248018000f01700", 0x2c}], 0x1}, 0x0) 1.780962975s ago: executing program 3 (id=2739): r0 = perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x8, 0x3, 0xe}, 0x50) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xc2ba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 1.780670255s ago: executing program 4 (id=2740): r0 = socket$kcm(0x11, 0x200000000000002, 0x300) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000580)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12t\x02\x006\xe3\xd7\\b\x00\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x01\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(\x04\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x02\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x04.\x9aL\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb01001800000000000000410000004100000003000000020000000000000e0500000002000000010000000300000f0100000002000000ff070000ff07dbd5ce3a42ffea0b55f98650000002000000030000000300000003000000810000"], &(0x7f00000002c0)=""/149, 0x5f, 0x95, 0x1, 0x5}, 0x28) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x15, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000005c0)='GPL\x00'}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x34, &(0x7f0000000040)=r5, 0x4) write$cgroup_int(r4, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r4, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc, 0x8}}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000003c0), 0x8}, 0x0, 0x0, 0xc2ba, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001240)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8941, &(0x7f0000000080)) socket$kcm(0x2, 0xa, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x100000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r6, 0x891b, &(0x7f0000000400)={'rose0\x00', @random="0200ff7fffff"}) 1.551861733s ago: executing program 3 (id=2742): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1b, 0x4, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$kcm(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8918, &(0x7f0000000000)={0xffffffffffffffff}) socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000005, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000300), 0x4}, 0x35c0, 0xfffffffffffffffe, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1f, 0xc, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESHEX=r0, @ANYRES16=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x69, 0x11, 0x4b}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x70) socket$kcm(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) getpid() sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r5, &(0x7f0000001a00)=ANY=[@ANYBLOB="13100000520091ef"], 0xfe33) recvmsg$kcm(r5, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001a40)=""/4095, 0xfff}], 0x1}, 0x0) recvmsg$kcm(r5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x50be}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="5400020029000b05d25a806f8c6394f90424fc602f0011002f2f2f00053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x5000000}, 0x0) recvmsg$kcm(r6, &(0x7f0000000240)={&(0x7f00000002c0)=@ax25={{}, [@bcast, @remote, @default, @rose, @default, @remote, @rose, @bcast]}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000100)=""/58, 0x3a}, {&(0x7f0000000340)=""/235, 0xeb}, {&(0x7f00000005c0)=""/253, 0xfd}, {&(0x7f0000000840)=""/133, 0x85}, {&(0x7f0000000900)=""/180, 0xb4}], 0x5, &(0x7f00000001c0)=""/52, 0x34}, 0x2000) recvmsg$kcm(r5, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) r7 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001180)=[{&(0x7f00000000c0)="1400000027000bff001b05290000000000000000", 0x14}], 0x1}, 0x4080) 1.551489073s ago: executing program 1 (id=2743): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r1 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0xf, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000009000000000000000500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b72300000000000085000000830000000000000055090100000000009500000000000000bf91000000000000b70200000000000085000b000000000000000000000000009500000a0000000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x21}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400001c008103e00f80ecdb4cb9f207c804a00f00000088080ffb0a0002000a0ada1b40d80800c500c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) socket$kcm(0x10, 0x400000002, 0x0) r4 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r4, &(0x7f0000003780)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="020b0700fc670000e4a17c45c8d260c9", 0x33fe0}], 0x1, 0x0, 0x0, 0x400300}, 0x0) 1.117943789s ago: executing program 1 (id=2744): socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x8, 0x0, 0x7, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x0, 0x0, 0x0, 0xf60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x394}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8b1a, &(0x7f0000000000)={'wlan1\x00', @random="0000230c1100"}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x5411, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b04, &(0x7f0000000000)={'wlan1\x00', @random="0200"}) socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f00000008c0), 0x43) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x42000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x30a) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @multicast}) r4 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f00000008c0), 0x43) write$cgroup_subtree(r4, &(0x7f0000000040)=ANY=[], 0x101d0) sendmsg$kcm(r4, &(0x7f0000000880)={0x0, 0x0, 0x0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x0) r6 = socket$kcm(0xa, 0x2, 0x3a) sendmsg$inet(r6, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x41044) sendmsg$kcm(r6, &(0x7f0000000440)={&(0x7f0000000800)=@in6={0xa, 0x0, 0x0, @mcast2, 0x1a}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000780)="80005b020eaa4da2", 0xfdef}], 0x1, 0x0, 0x0, 0x900}, 0x0) sendmsg$kcm(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000002940)="2000000020008107090f9becdb4cb96b0200000000fbff010000000000000000", 0x20}], 0x1, 0x0, 0x0, 0x81000000}, 0x4) 1.08232685s ago: executing program 0 (id=2745): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x10, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x6, 0x3}, 0x1c286, 0xac5d, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$kcm(0xa, 0x3, 0x3a) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="eb00a000000200", @ANYRES32=0x1, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000500"/21], 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffff"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000e40)='ns/time\x00') ioctl$SIOCSIFHWADDR(r2, 0x40305839, &(0x7f0000000280)={'lo\x00', @multicast}) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000480)={r1}, 0xc) socket$kcm(0xa, 0x2, 0x3a) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2b, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) close(r0) setsockopt$sock_attach_bpf(r3, 0x6, 0xa, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x50) r4 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r4, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x4008804) perf_event_open(0x0, 0x0, 0x400b, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000180081064e81f782db44b904021d08000600", 0x16}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="563f00001a00599c6d0e000091"], 0xfe33) 1.07462539s ago: executing program 2 (id=2746): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000001c0)="d800000010008104687da3aa7143a0b8c81d080b25000000e8fe55a19c9d8714060014000000000508000a0043000040a80012001200014006000d00036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a9d765dd11683296b7947968c7c0b7a196e6f661", 0x6e}, {&(0x7f0000000140)="aa581ff83dac4a519b67538bfa897e210c31e1446808358248cf2d795634b12c4ce81c3876aff89235b78ea0e5c5badfa122797d62c09ada7441b4f31cd5e6fc4b2a325fb5e811fead55530751e6f4bc4b40d94743ed5bd8ec1fff7b0abcc6eaabeb7a2f5f985467a8db", 0x6a}], 0x2}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 735.010183ms ago: executing program 0 (id=2747): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a1c, 0x29, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x3}, 0x3900, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x10, 0x400000002, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) openat$ppp(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000000001}, 0x0, 0x0, 0xc2ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB="fdffffff00"/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="01000000010000000300"/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000240), &(0x7f0000000280)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xfffffffffffffe08, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xfffffffffffffeef) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540), ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0xe3, &(0x7f0000000380)=[{}, {}, {}], 0x18, 0x0, 0x0, &(0x7f0000000740), 0x8, 0xa5, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xa, 0x18, &(0x7f0000000300)=ANY=[@ANYBLOB="18120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000dd", @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="000000000000850000000c000000b70000b0da390bbe00", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000"], 0x0, 0x4, 0x0, 0x0, 0x41100, 0x1, '\x00', r9, @fallback=0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, r10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0xfffffffffffffd98, &(0x7f0000000000)=[{&(0x7f0000000040)="2e00000010008188e6b62aa73772cc9f1ba1f848480000005e140602000000000e000a000f000000028000001294", 0x2e}], 0x1}, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)=@generic={&(0x7f0000000a00)='./file0\x00'}, 0x18) r11 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r11, &(0x7f0000000440)={&(0x7f0000000080)=@phonet={0x23, 0xa, 0x6, 0x2}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="20000009000000977ba4bfe7273fdf2e9dac6dd52d0900000000000000070000"], 0x20}, 0x0) perf_event_open(&(0x7f0000000bc0)={0x3, 0x80, 0xec, 0x0, 0x4, 0x0, 0x0, 0x4800000000000009, 0xd54b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={&(0x7f0000000500), 0x8}, 0xbffa, 0x1, 0x4, 0x1, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x1c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x13, &(0x7f0000000300)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r13 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r13, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000000000000000000007000000830704ac14140f0011000000000000000000000001000000fc0000000000000014000000000000000100000041"], 0x4c}, 0x20009840) r14 = openat$cgroup_ro(r3, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r14, 0x801054db, &(0x7f0000000100)=""/51) ioctl$TUNSETTXFILTER(r14, 0x400454d1, 0x0) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000006c0)="5c00000013006bcd9e3fe3dc6e48aa310b6b8703100000001f03000000000000040014000d000a000d0000009ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x4014) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 650.447176ms ago: executing program 3 (id=2748): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0x1, 0xffffffffffffffff}, 0x4) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="89000000120081ae08060cdc030ec0007f03e3f70000000000e2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec08120c000200080001400400446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r0}, 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext, 0x10c002, 0x89}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="10000000040000000800000002"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xd, 0x4, 0x4, 0xc, 0x0, r2}, 0x50) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1053e0, 0x2, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000320081044e81f782db44b904021d080005000000e8fe55a1180015000600142603600e120900210000000401a8001600040001400600", 0x3a}], 0x1}, 0x48400) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="563f00001800599c6d0eab070004000523"], 0xfe33) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfe33) r5 = socket$kcm(0xa, 0x3, 0x73) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000f40)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) socket$kcm(0xa, 0x2, 0x73) sendmsg$inet(r5, 0x0, 0x9fc) 585.869788ms ago: executing program 2 (id=2749): r0 = socket$kcm(0x10, 0x2, 0x10) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0xc2ba, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020032000b07d25a806f8c6394f90624fc602f0000000a740100051382c137153e370248018000f01700", 0x2c}], 0x1}, 0x0) 554.169699ms ago: executing program 4 (id=2750): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000000)="d80000003100b904021d080005000400e8fe55a1180015000600142603600e120900210000090401a80016000a00014006000000036010faa000cf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06b", 0x59}], 0x1}, 0x0) socket$kcm(0xa, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x20000}, 0x0, 0x0, 0x0, 0x6, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x6eab22e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0xfffffffffffffcde) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r2, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000280)="180000003d000b08d25a80648c7494f90324fc600b0002400a0000", 0x1b}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x0, 0x14, 0x0, 0x0) close(r0) r4 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000010880)=@base={0x5, 0x4, 0x8, 0xc, 0x3}, 0x50) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5d31, 0x80001, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f00000001c0)) r5 = socket$kcm(0xa, 0x2, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, r4, 0x4) sendmsg$kcm(r5, &(0x7f00000002c0)={&(0x7f0000000100)=@in6={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x800) socket$kcm(0x10, 0x2, 0x0) 347.049607ms ago: executing program 0 (id=2751): socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x98240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x1f, &(0x7f0000000040), 0xcf) 313.954679ms ago: executing program 2 (id=2752): r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x602, 0x0, 0x8, 0x0, 0x4000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x400}, 0x100080, 0x0, 0x0, 0x8, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x3}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x4}, @typedef={0x0, 0x0, 0x0, 0x2}, @volatile={0x0, 0x0, 0x0, 0xa, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x52}, 0x28) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0xf, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x21}, 0x94) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="d80000001800eb054e81f783db4cb9040a1d080006007c09e8fc55a10a0015000600142603600e1208000f00060004010c00080008000c4004000000035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cb8b4c2ee5a7cef4090000001fb71b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e002c2a73ae028d1b34ff4f8cc430bb5a360db598262f3d40fad9e3bb9ad809d5e1cace81ed0bffece8b42a9ecbee5de6", 0xbd}], 0x1}, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x21, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="b4000000000000007911a800000000001e000000000000009500000c00000000e8275ffe7f4201"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x41000, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) r3 = socket$kcm(0xa, 0x2, 0x0) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f00000002c0)={0x2, 0x4e22, @local}, 0x10, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000007000000890704e068000000110000000000000000dbc790ad000000fc000000000000001400000000000000000000000200000004000000000000001c"], 0x68}, 0x0) r4 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x11, 0x68, &(0x7f0000000100), 0x120) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000001c0)) 292.872509ms ago: executing program 4 (id=2753): r0 = perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x8, 0x3, 0xe}, 0x50) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xc2ba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 257.536381ms ago: executing program 3 (id=2754): r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x100, @remote}, 0x80, 0x0, 0x0, &(0x7f00000001c0)=[{0x18, 0x29, 0xb, "31d7"}], 0x18}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1b) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x7, 0x22004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0a000000030000000700000006"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r2}, 0x25) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000380)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r4, 0x0, 0x6a) 153.723784ms ago: executing program 0 (id=2755): perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0xc29a, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x48}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 44.618438ms ago: executing program 3 (id=2756): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x66137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r4 = bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r3}, 0x8) write$cgroup_int(r4, &(0x7f00000001c0), 0xfffffdef) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r5) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={0xffffffffffffffff, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socket$kcm(0x10, 0x2, 0x10) 3.05351ms ago: executing program 4 (id=2757): sendmsg$sock(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@txtime={{0x18, 0x1, 0x3d, 0xe}}], 0x18}, 0x0) socketpair(0xa, 0x1, 0x4, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000440)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @private2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000280)=""/202, 0xca}, {&(0x7f0000000500)=""/152, 0x98}, {&(0x7f00000005c0)=""/234, 0xea}, {&(0x7f00000006c0)=""/190, 0xbe}], 0x4, &(0x7f0000000ac0)=""/246, 0xf6}, 0x40) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) write$cgroup_devices(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b2388a84b"], 0xffdd) r2 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8920, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x8850) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{}, &(0x7f0000000a00), &(0x7f0000000a40)=r3}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{}, &(0x7f0000000880), &(0x7f00000008c0)=r3}, 0x20) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1400000016000b63d25a80648c2594f90b24fc60", 0x8c0}], 0x1}, 0x0) 0s ago: executing program 0 (id=2758): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r1 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0xf, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000009000000000000000500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b72300000000000085000000830000000000000055090100000000009500000000000000bf91000000000000b70200000000000085000b000000000000000000000000009500000a0000000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x21}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400001c008103e00f80ecdb4cb9f207c804a00f00000088080ffb0a0002000a0ada1b40d80800c500c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000730117"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14}, 0x94) r4 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r4, &(0x7f0000003780)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="020b0700fc670000e4a17c45c8d260c9", 0x33fe0}], 0x1, 0x0, 0x0, 0x400300}, 0x0) kernel console output (not intermixed with test programs): 0x130 [ 688.302943][ T9492] simple_read_from_buffer+0xe3/0x150 [ 688.308332][ T9492] proc_fail_nth_read+0x1a6/0x220 [ 688.313367][ T9492] ? proc_fault_inject_write+0x310/0x310 [ 688.319025][ T9492] ? fsnotify_perm+0x248/0x550 [ 688.323816][ T9492] ? proc_fault_inject_write+0x310/0x310 [ 688.329455][ T9492] vfs_read+0x2de/0xa00 [ 688.333624][ T9492] ? kernel_read+0x1e0/0x1e0 [ 688.338235][ T9492] ? __fget_files+0x28/0x4b0 [ 688.342841][ T9492] ? __fget_files+0x28/0x4b0 [ 688.347438][ T9492] ? __fget_files+0x43d/0x4b0 [ 688.352141][ T9492] ? __fdget_pos+0x2ae/0x360 [ 688.356913][ T9492] ? ksys_read+0x71/0x250 [ 688.361269][ T9492] ksys_read+0x14c/0x250 [ 688.365539][ T9492] ? vfs_write+0xa30/0xa30 [ 688.369982][ T9492] ? lockdep_hardirqs_on+0x94/0x140 [ 688.375213][ T9492] do_syscall_64+0x4c/0xa0 [ 688.379653][ T9492] ? clear_bhb_loop+0x60/0xb0 [ 688.384345][ T9492] ? clear_bhb_loop+0x60/0xb0 [ 688.389036][ T9492] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 688.394964][ T9492] RIP: 0033:0x7f382255cfce [ 688.399397][ T9492] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 688.419102][ T9492] RSP: 002b:00007f38207f5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 688.427533][ T9492] RAX: ffffffffffffffda RBX: 00007f38207f66c0 RCX: 00007f382255cfce [ 688.435527][ T9492] RDX: 000000000000000f RSI: 00007f38207f60a0 RDI: 0000000000000005 [ 688.443504][ T9492] RBP: 00007f38207f6090 R08: 0000000000000000 R09: 0000000000000000 [ 688.451494][ T9492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 688.459473][ T9492] R13: 00007f3822816038 R14: 00007f3822815fa0 R15: 00007ffc71b32e08 [ 688.467469][ T9492] [ 688.573968][ T9498] netlink: 16186 bytes leftover after parsing attributes in process `syz.1.1658'. [ 688.609146][ T9500] netlink: 65039 bytes leftover after parsing attributes in process `syz.3.1657'. [ 688.849219][ T9509] validate_nla: 6 callbacks suppressed [ 688.849256][ T9509] netlink: 'syz.1.1660': attribute type 2 has an invalid length. [ 689.417108][ T9520] netlink: 'syz.4.1664': attribute type 21 has an invalid length. [ 689.685441][ T9520] netlink: 156 bytes leftover after parsing attributes in process `syz.4.1664'. [ 690.004522][ T9527] netlink: 160 bytes leftover after parsing attributes in process `syz.1.1668'. [ 690.248236][ T9531] netlink: 16186 bytes leftover after parsing attributes in process `syz.1.1670'. [ 690.562475][ T9534] netlink: 'syz.4.1669': attribute type 10 has an invalid length. [ 690.786035][ T9534] team0: Port device dummy0 added [ 691.379243][ T9554] tc_dump_action: action bad kind [ 691.940574][ T9558] netlink: 'syz.1.1677': attribute type 21 has an invalid length. [ 692.021222][ T9558] netlink: 156 bytes leftover after parsing attributes in process `syz.1.1677'. [ 692.215549][ T9566] netlink: 65039 bytes leftover after parsing attributes in process `syz.0.1678'. [ 692.307174][ T9571] netlink: 160 bytes leftover after parsing attributes in process `syz.4.1680'. [ 692.523784][ T9565] netlink: 'syz.3.1679': attribute type 21 has an invalid length. [ 692.556464][ T9565] netlink: 156 bytes leftover after parsing attributes in process `syz.3.1679'. [ 692.645258][ T9580] device syzkaller0 entered promiscuous mode [ 692.670560][ T9579] PF_CAN: dropped non conform CAN skbuff: dev type 280, len 65487 [ 693.113473][ T9584] netlink: 16186 bytes leftover after parsing attributes in process `syz.3.1684'. [ 693.700560][ T9604] netlink: 'syz.3.1690': attribute type 21 has an invalid length. [ 693.763420][ T9604] netlink: 'syz.3.1690': attribute type 6 has an invalid length. [ 693.823052][ T9604] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1690'. [ 694.020509][ T9614] FAULT_INJECTION: forcing a failure. [ 694.020509][ T9614] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 694.110250][ T9614] CPU: 1 PID: 9614 Comm: syz.4.1693 Not tainted syzkaller #0 [ 694.117789][ T9614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 694.127883][ T9614] Call Trace: [ 694.131185][ T9614] [ 694.134137][ T9614] dump_stack_lvl+0x188/0x24e [ 694.138849][ T9614] ? show_regs_print_info+0x12/0x12 [ 694.144080][ T9614] ? load_image+0x400/0x400 [ 694.148605][ T9614] ? __lock_acquire+0x7d10/0x7d10 [ 694.153743][ T9614] should_fail_ex+0x399/0x4d0 [ 694.158619][ T9614] _copy_from_user+0x2c/0x170 [ 694.163597][ T9614] ___sys_sendmsg+0x1c3/0x360 [ 694.168305][ T9614] ? __sys_sendmsg+0x290/0x290 [ 694.173118][ T9614] ? __lock_acquire+0x7d10/0x7d10 [ 694.178191][ T9614] __se_sys_sendmsg+0x1bb/0x2a0 [ 694.183068][ T9614] ? __x64_sys_sendmsg+0x80/0x80 [ 694.188045][ T9614] ? lockdep_hardirqs_on+0x94/0x140 [ 694.193279][ T9614] do_syscall_64+0x4c/0xa0 [ 694.197720][ T9614] ? clear_bhb_loop+0x60/0xb0 [ 694.202420][ T9614] ? clear_bhb_loop+0x60/0xb0 [ 694.207215][ T9614] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 694.213228][ T9614] RIP: 0033:0x7fb494d9c799 [ 694.217662][ T9614] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 694.237309][ T9614] RSP: 002b:00007fb495d05028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 694.245759][ T9614] RAX: ffffffffffffffda RBX: 00007fb495015fa0 RCX: 00007fb494d9c799 [ 694.253851][ T9614] RDX: 0000000000000000 RSI: 0000200000003780 RDI: 0000000000000003 [ 694.261895][ T9614] RBP: 00007fb495d05090 R08: 0000000000000000 R09: 0000000000000000 [ 694.269897][ T9614] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 694.278003][ T9614] R13: 00007fb495016038 R14: 00007fb495015fa0 R15: 00007ffe15129438 [ 694.286041][ T9614] [ 695.833457][ T9611] netlink: 'syz.0.1691': attribute type 10 has an invalid length. [ 695.884740][ T9611] device dummy0 entered promiscuous mode [ 695.905752][ T9611] team0: Port device dummy0 added [ 695.928340][ T9623] netlink: 16186 bytes leftover after parsing attributes in process `syz.4.1695'. [ 696.014979][ T9622] netlink: 'syz.3.1694': attribute type 21 has an invalid length. [ 696.041881][ T9622] netlink: 156 bytes leftover after parsing attributes in process `syz.3.1694'. [ 696.106512][ T9629] netlink: 'syz.2.1697': attribute type 10 has an invalid length. [ 696.123230][ T9629] netlink: 65015 bytes leftover after parsing attributes in process `syz.2.1697'. [ 696.613610][ T9639] netlink: 'syz.0.1699': attribute type 10 has an invalid length. [ 696.655696][ T9639] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1699'. [ 697.616337][ T9670] netlink: 'syz.2.1709': attribute type 10 has an invalid length. [ 699.156749][ T9670] bond0: (slave dummy0): Releasing backup interface [ 699.177912][ T9670] device dummy0 entered promiscuous mode [ 699.184215][ T9670] team0: Port device dummy0 added [ 699.194807][ T9675] netlink: 'syz.1.1710': attribute type 21 has an invalid length. [ 699.206090][ T9675] netlink: 156 bytes leftover after parsing attributes in process `syz.1.1710'. [ 699.388938][ T9693] netlink: 'syz.1.1716': attribute type 10 has an invalid length. [ 699.401456][ T9693] netlink: 65015 bytes leftover after parsing attributes in process `syz.1.1716'. [ 699.448387][ T9696] netlink: 'syz.2.1726': attribute type 21 has an invalid length. [ 699.456541][ T9696] netlink: 156 bytes leftover after parsing attributes in process `syz.2.1726'. [ 700.021620][ T9719] netlink: 'syz.1.1719': attribute type 39 has an invalid length. [ 700.507878][ T9742] netlink: 'syz.4.1731': attribute type 10 has an invalid length. [ 700.515930][ T9742] netlink: 65015 bytes leftover after parsing attributes in process `syz.4.1731'. [ 701.584528][ T9747] bond0: (slave dummy0): Releasing backup interface [ 701.612981][ T9747] device dummy0 entered promiscuous mode [ 701.659662][ T9747] team0: Port device dummy0 added [ 702.021332][ T9771] validate_nla: 1 callbacks suppressed [ 702.021411][ T9771] netlink: 'syz.1.1737': attribute type 10 has an invalid length. [ 702.040228][ T9771] netlink: 40 bytes leftover after parsing attributes in process `syz.1.1737'. [ 702.053938][ T9771] device veth0_vlan left promiscuous mode [ 702.066890][ T9771] device veth0_vlan entered promiscuous mode [ 702.111017][ T9771] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 702.181363][ T4705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 702.197665][ T4705] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 702.231919][ T4705] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 702.444504][ T9791] netlink: 'syz.0.1743': attribute type 25 has an invalid length. [ 703.445504][ T9805] netlink: 'syz.0.1748': attribute type 2 has an invalid length. [ 704.081576][ T9823] FAULT_INJECTION: forcing a failure. [ 704.081576][ T9823] name failslab, interval 1, probability 0, space 0, times 0 [ 704.134776][ T9823] CPU: 1 PID: 9823 Comm: syz.4.1754 Not tainted syzkaller #0 [ 704.142239][ T9823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 704.152425][ T9823] Call Trace: [ 704.155741][ T9823] [ 704.158711][ T9823] dump_stack_lvl+0x188/0x24e [ 704.163458][ T9823] ? show_regs_print_info+0x12/0x12 [ 704.168717][ T9823] ? load_image+0x400/0x400 [ 704.173285][ T9823] ? __might_sleep+0xd0/0xd0 [ 704.177925][ T9823] ? __lock_acquire+0x7d10/0x7d10 [ 704.183031][ T9823] should_fail_ex+0x399/0x4d0 [ 704.187770][ T9823] should_failslab+0x5/0x20 [ 704.192305][ T9823] slab_pre_alloc_hook+0x59/0x310 [ 704.197347][ T9823] ? tomoyo_encode+0x27e/0x540 [ 704.202126][ T9823] __kmem_cache_alloc_node+0x4f/0x260 [ 704.207518][ T9823] ? tomoyo_encode+0x27e/0x540 [ 704.212289][ T9823] __kmalloc+0xa0/0x240 [ 704.216466][ T9823] tomoyo_encode+0x27e/0x540 [ 704.221097][ T9823] tomoyo_realpath_from_path+0x58e/0x5d0 [ 704.226764][ T9823] ? tomoyo_path_number_perm+0x205/0x650 [ 704.232424][ T9823] tomoyo_path_number_perm+0x22f/0x650 [ 704.237914][ T9823] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 704.243395][ T9823] ? ksys_write+0x1c0/0x250 [ 704.247953][ T9823] ? common_file_perm+0x171/0x1c0 [ 704.253055][ T9823] ? __fget_files+0x28/0x4b0 [ 704.257655][ T9823] ? __fget_files+0x28/0x4b0 [ 704.262380][ T9823] security_file_ioctl+0x6c/0xa0 [ 704.267334][ T9823] __se_sys_ioctl+0x48/0x170 [ 704.272046][ T9823] do_syscall_64+0x4c/0xa0 [ 704.276556][ T9823] ? clear_bhb_loop+0x60/0xb0 [ 704.281239][ T9823] ? clear_bhb_loop+0x60/0xb0 [ 704.285998][ T9823] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 704.291904][ T9823] RIP: 0033:0x7fb494d9c799 [ 704.296359][ T9823] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 704.315970][ T9823] RSP: 002b:00007fb495d05028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 704.324408][ T9823] RAX: ffffffffffffffda RBX: 00007fb495015fa0 RCX: 00007fb494d9c799 [ 704.332460][ T9823] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000009 [ 704.340755][ T9823] RBP: 00007fb495d05090 R08: 0000000000000000 R09: 0000000000000000 [ 704.348931][ T9823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 704.357436][ T9823] R13: 00007fb495016038 R14: 00007fb495015fa0 R15: 00007ffe15129438 [ 704.365570][ T9823] [ 704.434178][ T9823] ERROR: Out of memory at tomoyo_realpath_from_path. [ 706.215576][ T9823] bridge0: port 3(erspan0) entered blocking state [ 706.223590][ T9823] bridge0: port 3(erspan0) entered disabled state [ 706.231114][ T9823] device erspan0 entered promiscuous mode [ 706.237465][ T9823] bridge0: port 3(erspan0) entered blocking state [ 706.243955][ T9823] bridge0: port 3(erspan0) entered forwarding state [ 706.251778][ T9825] netlink: 'syz.2.1755': attribute type 10 has an invalid length. [ 706.266898][ T9825] netlink: 40 bytes leftover after parsing attributes in process `syz.2.1755'. [ 706.276595][ T9830] netlink: 'syz.3.1756': attribute type 21 has an invalid length. [ 706.297838][ T9830] netlink: 156 bytes leftover after parsing attributes in process `syz.3.1756'. [ 706.574229][ T9843] netlink: 'syz.4.1760': attribute type 21 has an invalid length. [ 706.652764][ T9843] netlink: 156 bytes leftover after parsing attributes in process `syz.4.1760'. [ 706.698811][ T9855] netlink: 64859 bytes leftover after parsing attributes in process `syz.0.1763'. [ 706.761343][ T9845] netlink: 'syz.1.1771': attribute type 10 has an invalid length. [ 706.821732][ T9845] netlink: 40 bytes leftover after parsing attributes in process `syz.1.1771'. [ 706.903394][ T9845] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 707.366730][ T9867] netlink: 'syz.2.1766': attribute type 10 has an invalid length. [ 707.383810][ T9868] netlink: 'syz.4.1767': attribute type 2 has an invalid length. [ 707.401483][ T9867] netlink: 40 bytes leftover after parsing attributes in process `syz.2.1766'. [ 708.906702][ T9888] FAULT_INJECTION: forcing a failure. [ 708.906702][ T9888] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 708.920426][ T9888] CPU: 0 PID: 9888 Comm: syz.0.1776 Not tainted syzkaller #0 [ 708.927831][ T9888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 708.938002][ T9888] Call Trace: [ 708.941300][ T9888] [ 708.944262][ T9888] dump_stack_lvl+0x188/0x24e [ 708.948974][ T9888] ? show_regs_print_info+0x12/0x12 [ 708.954186][ T9888] ? load_image+0x400/0x400 [ 708.958710][ T9888] ? __lock_acquire+0x7d10/0x7d10 [ 708.963740][ T9888] should_fail_ex+0x399/0x4d0 [ 708.968417][ T9888] _copy_from_iter+0x1c0/0x1130 [ 708.973364][ T9888] ? __lock_acquire+0x7d10/0x7d10 [ 708.978407][ T9888] ? sock_alloc_send_pskb+0x89d/0x9a0 [ 708.983804][ T9888] ? copyout_mc+0x110/0x110 [ 708.988322][ T9888] ? __virt_addr_valid+0x188/0x540 [ 708.993573][ T9888] ? __virt_addr_valid+0x188/0x540 [ 708.998713][ T9888] ? __virt_addr_valid+0x465/0x540 [ 709.003917][ T9888] ? __check_object_size+0x500/0xa40 [ 709.009292][ T9888] skb_copy_datagram_from_iter+0xef/0x690 [ 709.015017][ T9888] ? skb_put+0x117/0x210 [ 709.019349][ T9888] tun_get_user+0xb81/0x3c70 [ 709.024040][ T9888] ? rcu_read_unlock+0xa0/0xa0 [ 709.028810][ T9888] ? tun_get+0x1c/0x2e0 [ 709.032964][ T9888] ? __lock_acquire+0x7d10/0x7d10 [ 709.038082][ T9888] ? tun_get+0x1c/0x2e0 [ 709.042335][ T9888] tun_chr_write_iter+0x112/0x1f0 [ 709.047369][ T9888] vfs_write+0x4b1/0xa30 [ 709.051625][ T9888] ? file_end_write+0x250/0x250 [ 709.056487][ T9888] ? __fget_files+0x43d/0x4b0 [ 709.061170][ T9888] ? __fdget_pos+0x1d4/0x360 [ 709.065846][ T9888] ? ksys_write+0x71/0x250 [ 709.070264][ T9888] ksys_write+0x14c/0x250 [ 709.074601][ T9888] ? __ia32_sys_read+0x80/0x80 [ 709.079379][ T9888] ? lockdep_hardirqs_on+0x94/0x140 [ 709.084585][ T9888] do_syscall_64+0x4c/0xa0 [ 709.089001][ T9888] ? clear_bhb_loop+0x60/0xb0 [ 709.093784][ T9888] ? clear_bhb_loop+0x60/0xb0 [ 709.098472][ T9888] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 709.104540][ T9888] RIP: 0033:0x7fdd2539c799 [ 709.109212][ T9888] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 709.128823][ T9888] RSP: 002b:00007fdd262b7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 709.137407][ T9888] RAX: ffffffffffffffda RBX: 00007fdd25615fa0 RCX: 00007fdd2539c799 [ 709.145379][ T9888] RDX: 000000000000fdef RSI: 0000200000000300 RDI: 00000000000000c8 [ 709.153456][ T9888] RBP: 00007fdd262b7090 R08: 0000000000000000 R09: 0000000000000000 [ 709.161469][ T9888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 709.169456][ T9888] R13: 00007fdd25616038 R14: 00007fdd25615fa0 R15: 00007ffe80e72e38 [ 709.177444][ T9888] [ 709.210113][ T9891] netlink: 64859 bytes leftover after parsing attributes in process `syz.1.1775'. [ 709.384731][ T9900] netlink: 'syz.2.1777': attribute type 10 has an invalid length. [ 709.416110][ T9900] netlink: 40 bytes leftover after parsing attributes in process `syz.2.1777'. [ 712.792521][ T9946] netlink: 'syz.0.1797': attribute type 21 has an invalid length. [ 712.808951][ T9947] netlink: 'syz.2.1788': attribute type 2 has an invalid length. [ 712.851801][ T9946] netlink: 156 bytes leftover after parsing attributes in process `syz.0.1797'. [ 713.847783][ T9968] netlink: 'syz.0.1791': attribute type 10 has an invalid length. [ 713.870613][ T9968] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1791'. [ 714.163537][ T9981] netlink: 'syz.4.1799': attribute type 10 has an invalid length. [ 714.188127][ T9981] netlink: 40 bytes leftover after parsing attributes in process `syz.4.1799'. [ 714.422571][ T9988] netlink: 'syz.2.1800': attribute type 21 has an invalid length. [ 714.458978][ T9988] netlink: 156 bytes leftover after parsing attributes in process `syz.2.1800'. [ 714.605992][ T9998] netlink: 'syz.1.1803': attribute type 21 has an invalid length. [ 714.681021][ T9998] netlink: 156 bytes leftover after parsing attributes in process `syz.1.1803'. [ 714.763617][T10002] netlink: 'syz.2.1806': attribute type 2 has an invalid length. [ 715.689841][T10021] FAULT_INJECTION: forcing a failure. [ 715.689841][T10021] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 715.751816][T10021] CPU: 0 PID: 10021 Comm: syz.2.1812 Not tainted syzkaller #0 [ 715.759341][T10021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 715.769506][T10021] Call Trace: [ 715.772802][T10021] [ 715.775831][T10021] dump_stack_lvl+0x188/0x24e [ 715.780545][T10021] ? show_regs_print_info+0x12/0x12 [ 715.785774][T10021] ? load_image+0x400/0x400 [ 715.790302][T10021] ? __might_fault+0xa6/0x120 [ 715.795013][T10021] should_fail_ex+0x399/0x4d0 [ 715.799713][T10021] copyin+0x1b/0x120 [ 715.803640][T10021] _copy_from_iter+0x447/0x1130 [ 715.808520][T10021] ? sock_alloc_send_pskb+0x89d/0x9a0 [ 715.813925][T10021] ? copyout_mc+0x110/0x110 [ 715.818452][T10021] ? __virt_addr_valid+0x188/0x540 [ 715.823601][T10021] ? __virt_addr_valid+0x188/0x540 [ 715.828746][T10021] ? __virt_addr_valid+0x465/0x540 [ 715.833887][T10021] ? __check_object_size+0x500/0xa40 [ 715.839204][T10021] skb_copy_datagram_from_iter+0xef/0x690 [ 715.844963][T10021] ? skb_put+0x117/0x210 [ 715.849242][T10021] packet_sendmsg+0x3727/0x4e60 [ 715.854199][T10021] ? trace_event_raw_event_lock_acquire+0x2c0/0x2c0 [ 715.861140][T10021] ? __might_sleep+0xd0/0xd0 [ 715.865726][T10021] ? verify_lock_unused+0x140/0x140 [ 715.871030][T10021] ? aa_sk_perm+0x81f/0x950 [ 715.875548][T10021] ? packet_getsockopt+0x9a0/0x9a0 [ 715.880663][T10021] ? aa_sock_msg_perm+0x94/0x150 [ 715.885599][T10021] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 715.890990][T10021] ? security_socket_sendmsg+0x7c/0xa0 [ 715.896519][T10021] ? packet_getsockopt+0x9a0/0x9a0 [ 715.901793][T10021] ____sys_sendmsg+0x5be/0x970 [ 715.906787][T10021] ? __sys_sendmsg_sock+0x30/0x30 [ 715.911956][T10021] ? __import_iovec+0x315/0x500 [ 715.916825][T10021] ? import_iovec+0x6f/0xa0 [ 715.921384][T10021] ___sys_sendmsg+0x2a2/0x360 [ 715.926112][T10021] ? __sys_sendmsg+0x290/0x290 [ 715.930970][T10021] ? __lock_acquire+0x7d10/0x7d10 [ 715.936301][T10021] __se_sys_sendmsg+0x1bb/0x2a0 [ 715.941275][T10021] ? __x64_sys_sendmsg+0x80/0x80 [ 715.946334][T10021] ? lockdep_hardirqs_on+0x94/0x140 [ 715.951547][T10021] do_syscall_64+0x4c/0xa0 [ 715.956078][T10021] ? clear_bhb_loop+0x60/0xb0 [ 715.960851][T10021] ? clear_bhb_loop+0x60/0xb0 [ 715.965527][T10021] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 715.971422][T10021] RIP: 0033:0x7f382259c799 [ 715.975834][T10021] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 715.995437][T10021] RSP: 002b:00007f38207f6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 716.003854][T10021] RAX: ffffffffffffffda RBX: 00007f3822815fa0 RCX: 00007f382259c799 [ 716.011911][T10021] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000003 [ 716.020006][T10021] RBP: 00007f38207f6090 R08: 0000000000000000 R09: 0000000000000000 [ 716.027972][T10021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 716.036200][T10021] R13: 00007f3822816038 R14: 00007f3822815fa0 R15: 00007ffc71b32e08 [ 716.044358][T10021] [ 716.242320][T10026] netlink: 'syz.4.1813': attribute type 10 has an invalid length. [ 716.302199][T10026] netlink: 40 bytes leftover after parsing attributes in process `syz.4.1813'. [ 716.386139][T10033] netlink: 'syz.3.1816': attribute type 10 has an invalid length. [ 716.407157][T10033] netlink: 40 bytes leftover after parsing attributes in process `syz.3.1816'. [ 716.429632][T10033] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 716.593582][T10039] netlink: 'syz.1.1818': attribute type 28 has an invalid length. [ 716.656906][T10039] netlink: 2 bytes leftover after parsing attributes in process `syz.1.1818'. [ 717.159730][T10048] netlink: 156 bytes leftover after parsing attributes in process `syz.3.1819'. [ 717.357264][T10056] netlink: 128124 bytes leftover after parsing attributes in process `syz.1.1822'. [ 717.506004][T10056] device syzkaller0 entered promiscuous mode [ 720.536460][T10078] validate_nla: 1 callbacks suppressed [ 720.536478][T10078] netlink: 'syz.2.1829': attribute type 10 has an invalid length. [ 720.563649][T10078] netlink: 40 bytes leftover after parsing attributes in process `syz.2.1829'. [ 720.574166][T10089] netlink: 'syz.0.1832': attribute type 21 has an invalid length. [ 720.589102][T10089] netlink: 156 bytes leftover after parsing attributes in process `syz.0.1832'. [ 720.870120][T10100] netlink: 'syz.2.1838': attribute type 25 has an invalid length. [ 720.885132][T10100] netlink: 'syz.2.1838': attribute type 9 has an invalid length. [ 720.893715][T10096] netlink: 'syz.1.1845': attribute type 21 has an invalid length. [ 720.903180][T10096] netlink: 156 bytes leftover after parsing attributes in process `syz.1.1845'. [ 720.918193][T10104] netlink: 'syz.3.1837': attribute type 12 has an invalid length. [ 721.086941][T10104] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1837'. [ 721.482882][T10110] netlink: 'syz.4.1835': attribute type 21 has an invalid length. [ 721.519709][T10110] netlink: 156 bytes leftover after parsing attributes in process `syz.4.1835'. [ 721.998960][T10114] netlink: 'syz.3.1841': attribute type 1 has an invalid length. [ 722.017700][T10114] netlink: 105120 bytes leftover after parsing attributes in process `syz.3.1841'. [ 722.114064][T10131] netlink: 'syz.4.1844': attribute type 10 has an invalid length. [ 722.165933][T10131] netlink: 40 bytes leftover after parsing attributes in process `syz.4.1844'. [ 723.564964][T10167] netlink: 'syz.3.1852': attribute type 21 has an invalid length. [ 723.574366][T10167] netlink: 156 bytes leftover after parsing attributes in process `syz.3.1852'. [ 723.920424][T10180] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.1866'. [ 724.875692][T10206] netlink: 180 bytes leftover after parsing attributes in process `syz.1.1865'. [ 727.630060][T10225] sock: sock_set_timeout: `syz.0.1870' (pid 10225) tries to set negative timeout [ 728.034839][T10235] netlink: 16399 bytes leftover after parsing attributes in process `syz.1.1874'. [ 728.172530][T10238] validate_nla: 1 callbacks suppressed [ 728.173174][T10238] netlink: 'syz.2.1873': attribute type 21 has an invalid length. [ 728.191426][T10238] netlink: 156 bytes leftover after parsing attributes in process `syz.2.1873'. [ 728.263394][T10245] netlink: 'syz.3.1876': attribute type 2 has an invalid length. [ 728.413227][T10245] netlink: 'syz.3.1876': attribute type 10 has an invalid length. [ 728.530766][T10245] 8021q: adding VLAN 0 to HW filter on device team0 [ 728.611958][T10245] bond0: (slave team0): Enslaving as an active interface with an up link [ 729.169088][T10259] netlink: 63503 bytes leftover after parsing attributes in process `syz.4.1881'. [ 729.902154][T10282] netlink: 'syz.4.1889': attribute type 21 has an invalid length. [ 729.911365][T10282] netlink: 156 bytes leftover after parsing attributes in process `syz.4.1889'. [ 730.274775][T10296] netlink: 'syz.4.1895': attribute type 10 has an invalid length. [ 730.298562][T10296] netlink: 40 bytes leftover after parsing attributes in process `syz.4.1895'. [ 730.327353][T10296] device ipvlan1 left promiscuous mode [ 730.349755][T10296] bridge0: port 4(ipvlan1) entered blocking state [ 730.375192][T10296] bridge0: port 4(ipvlan1) entered disabled state [ 730.415250][T10296] A link change request failed with some changes committed already. Interface ipvlan1 may have been left with an inconsistent configuration, please check. [ 730.453371][T10299] netlink: 'syz.2.1898': attribute type 27 has an invalid length. [ 730.793046][T10313] netlink: 'syz.2.1904': attribute type 21 has an invalid length. [ 730.821272][T10313] netlink: 156 bytes leftover after parsing attributes in process `syz.2.1904'. [ 730.893389][T10321] netlink: 'syz.1.1906': attribute type 49 has an invalid length. [ 731.032414][T10324] netlink: 'syz.3.1908': attribute type 10 has an invalid length. [ 731.043843][T10324] netlink: 40 bytes leftover after parsing attributes in process `syz.3.1908'. [ 731.061540][T10324] bridge0: port 1(veth0_vlan) entered blocking state [ 731.087063][T10324] bridge0: port 1(veth0_vlan) entered disabled state [ 731.120112][T10324] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 731.171601][T10333] device syzkaller0 entered promiscuous mode [ 732.083670][T10353] netlink: 'syz.4.1918': attribute type 4 has an invalid length. [ 732.092483][T10353] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.1918'. [ 733.097740][T10346] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1916'. [ 733.108455][T10350] platform regulatory.0: loading /lib/firmware/regulatory.db failed with error -12 [ 733.127059][T10350] platform regulatory.0: Direct firmware load for regulatory.db failed with error -12 [ 733.145607][T10350] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 733.725297][T10371] delete_channel: no stack [ 733.749493][T10371] delete_channel: no stack [ 734.103128][T10382] netlink: 'syz.0.1931': attribute type 21 has an invalid length. [ 734.139340][T10382] netlink: 156 bytes leftover after parsing attributes in process `syz.0.1931'. [ 734.376017][T10394] netlink: 'syz.1.1933': attribute type 1 has an invalid length. [ 734.404004][T10394] netlink: 157116 bytes leftover after parsing attributes in process `syz.1.1933'. [ 734.796478][T10400] netlink: 132 bytes leftover after parsing attributes in process `syz.2.1936'. [ 734.973242][T10404] FAULT_INJECTION: forcing a failure. [ 734.973242][T10404] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 735.069105][T10408] netlink: 'syz.0.1940': attribute type 1 has an invalid length. [ 735.090630][T10404] CPU: 1 PID: 10404 Comm: syz.3.1938 Not tainted syzkaller #0 [ 735.098343][T10404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 735.108444][T10404] Call Trace: [ 735.111743][T10404] [ 735.114702][T10404] dump_stack_lvl+0x188/0x24e [ 735.119419][T10404] ? show_regs_print_info+0x12/0x12 [ 735.124656][T10404] ? load_image+0x400/0x400 [ 735.129202][T10404] ? __might_fault+0xa6/0x120 [ 735.134360][T10404] should_fail_ex+0x399/0x4d0 [ 735.139081][T10404] copyin+0x1b/0x120 [ 735.143108][T10404] _copy_from_iter+0x559/0x1130 [ 735.148089][T10404] ? copyout_mc+0x110/0x110 [ 735.152711][T10404] ? __virt_addr_valid+0x188/0x540 [ 735.157871][T10404] ? __virt_addr_valid+0x188/0x540 [ 735.163178][T10404] ? __virt_addr_valid+0x465/0x540 [ 735.168309][T10404] ? __check_object_size+0x500/0xa40 [ 735.173616][T10404] skb_copy_datagram_from_iter+0xef/0x690 [ 735.179351][T10404] ? skb_put+0x117/0x210 [ 735.183599][T10404] packet_sendmsg+0x3727/0x4e60 [ 735.188546][T10404] ? __might_sleep+0xd0/0xd0 [ 735.193130][T10404] ? verify_lock_unused+0x140/0x140 [ 735.198444][T10404] ? aa_sk_perm+0x81f/0x950 [ 735.202950][T10404] ? packet_getsockopt+0x9a0/0x9a0 [ 735.208064][T10404] ? aa_sock_msg_perm+0x94/0x150 [ 735.213003][T10404] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 735.218284][T10404] ? security_socket_sendmsg+0x7c/0xa0 [ 735.223934][T10404] ? packet_getsockopt+0x9a0/0x9a0 [ 735.229043][T10404] ____sys_sendmsg+0x5be/0x970 [ 735.233907][T10404] ? __sys_sendmsg_sock+0x30/0x30 [ 735.239291][T10404] ? __import_iovec+0x315/0x500 [ 735.244153][T10404] ? import_iovec+0x6f/0xa0 [ 735.248657][T10404] ___sys_sendmsg+0x2a2/0x360 [ 735.253345][T10404] ? __sys_sendmsg+0x290/0x290 [ 735.258209][T10404] ? __lock_acquire+0x7d10/0x7d10 [ 735.263250][T10404] __se_sys_sendmsg+0x1bb/0x2a0 [ 735.268105][T10404] ? __x64_sys_sendmsg+0x80/0x80 [ 735.273141][T10404] ? lockdep_hardirqs_on+0x94/0x140 [ 735.278338][T10404] do_syscall_64+0x4c/0xa0 [ 735.282750][T10404] ? clear_bhb_loop+0x60/0xb0 [ 735.287508][T10404] ? clear_bhb_loop+0x60/0xb0 [ 735.292182][T10404] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 735.298158][T10404] RIP: 0033:0x7fdc6e39c799 [ 735.302654][T10404] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 735.322344][T10404] RSP: 002b:00007fdc6f21d028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 735.330760][T10404] RAX: ffffffffffffffda RBX: 00007fdc6e615fa0 RCX: 00007fdc6e39c799 [ 735.338727][T10404] RDX: 0000000000008001 RSI: 0000200000000040 RDI: 0000000000000004 [ 735.346687][T10404] RBP: 00007fdc6f21d090 R08: 0000000000000000 R09: 0000000000000000 [ 735.354649][T10404] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 735.362613][T10404] R13: 00007fdc6e616038 R14: 00007fdc6e615fa0 R15: 00007ffcd9546c88 [ 735.370594][T10404] [ 735.482120][T10414] netlink: 'syz.1.1941': attribute type 10 has an invalid length. [ 735.786324][T10414] device team0 left promiscuous mode [ 735.826696][T10414] device team_slave_0 left promiscuous mode [ 735.895444][T10414] device team_slave_1 left promiscuous mode [ 735.988628][T10414] device wlan1 left promiscuous mode [ 736.012292][T10414] device dummy0 left promiscuous mode [ 736.031850][T10414] bridge0: port 3(team0) entered disabled state [ 736.063446][T10414] 8021q: adding VLAN 0 to HW filter on device team0 [ 736.085483][T10414] bond0: (slave team0): Enslaving as an active interface with an up link [ 736.094792][T10417] netlink: 'syz.2.1939': attribute type 21 has an invalid length. [ 736.110009][T10417] netlink: 156 bytes leftover after parsing attributes in process `syz.2.1939'. [ 736.197143][T10429] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 736.302131][T10429] device syzkaller0 entered promiscuous mode [ 736.469392][T10437] netlink: 40227 bytes leftover after parsing attributes in process `syz.0.1948'. [ 736.479464][T10434] netlink: 'syz.1.1946': attribute type 21 has an invalid length. [ 736.495453][T10434] netlink: 156 bytes leftover after parsing attributes in process `syz.1.1946'. [ 738.134588][T10452] netlink: 'syz.4.1953': attribute type 1 has an invalid length. [ 738.343343][T10459] delete_channel: no stack [ 738.485942][T10465] netlink: 'syz.4.1957': attribute type 21 has an invalid length. [ 738.515032][T10465] netlink: 156 bytes leftover after parsing attributes in process `syz.4.1957'. [ 738.580856][T10476] netlink: 'syz.1.1961': attribute type 10 has an invalid length. [ 738.596629][T10472] netlink: 'syz.2.1960': attribute type 2 has an invalid length. [ 740.489167][T10482] netlink: 'syz.2.1960': attribute type 10 has an invalid length. [ 740.504886][T10482] device team0 left promiscuous mode [ 740.511049][T10482] device team_slave_0 left promiscuous mode [ 740.519148][T10482] device team_slave_1 left promiscuous mode [ 740.525301][T10482] device dummy0 left promiscuous mode [ 740.532446][T10482] bridge0: port 4(team0) entered disabled state [ 740.543427][T10482] 8021q: adding VLAN 0 to HW filter on device team0 [ 740.553051][T10482] bond0: (slave team0): Enslaving as an active interface with an up link [ 740.630423][T10491] netlink: 16399 bytes leftover after parsing attributes in process `syz.4.1963'. [ 740.764236][T10490] FAULT_INJECTION: forcing a failure. [ 740.764236][T10490] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 740.786983][T10490] CPU: 0 PID: 10490 Comm: syz.4.1963 Not tainted syzkaller #0 [ 740.794541][T10490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 740.804649][T10490] Call Trace: [ 740.807968][T10490] [ 740.810940][T10490] dump_stack_lvl+0x188/0x24e [ 740.815682][T10490] ? show_regs_print_info+0x12/0x12 [ 740.820924][T10490] ? load_image+0x400/0x400 [ 740.825548][T10490] ? __lock_acquire+0x7d10/0x7d10 [ 740.830617][T10490] should_fail_ex+0x399/0x4d0 [ 740.835321][T10490] _copy_from_iter+0x1c0/0x1130 [ 740.840190][T10490] ? __lock_acquire+0x7d10/0x7d10 [ 740.845250][T10490] ? mark_lock+0x94/0x320 [ 740.849643][T10490] ? copyout_mc+0x110/0x110 [ 740.854170][T10490] ? __virt_addr_valid+0x188/0x540 [ 740.859304][T10490] ? __virt_addr_valid+0x188/0x540 [ 740.864589][T10490] ? __virt_addr_valid+0x465/0x540 [ 740.869725][T10490] ? __check_object_size+0x500/0xa40 [ 740.875034][T10490] skb_copy_datagram_from_iter+0xef/0x690 [ 740.880868][T10490] ? napi_get_frags+0xb7/0x140 [ 740.885825][T10490] tun_get_user+0xb81/0x3c70 [ 740.890472][T10490] ? rcu_read_unlock+0xa0/0xa0 [ 740.895276][T10490] ? tun_get+0x1c/0x2e0 [ 740.899453][T10490] ? __lock_acquire+0x7d10/0x7d10 [ 740.904566][T10490] ? tun_get+0x1c/0x2e0 [ 740.908754][T10490] tun_chr_write_iter+0x112/0x1f0 [ 740.913833][T10490] vfs_write+0x4b1/0xa30 [ 740.918209][T10490] ? file_end_write+0x250/0x250 [ 740.923105][T10490] ? __fget_files+0x43d/0x4b0 [ 740.927829][T10490] ? __fdget_pos+0x1d4/0x360 [ 740.932430][T10490] ? ksys_write+0x71/0x250 [ 740.936878][T10490] ksys_write+0x14c/0x250 [ 740.941245][T10490] ? __ia32_sys_read+0x80/0x80 [ 740.946046][T10490] ? lockdep_hardirqs_on+0x94/0x140 [ 740.951265][T10490] do_syscall_64+0x4c/0xa0 [ 740.955693][T10490] ? clear_bhb_loop+0x60/0xb0 [ 740.960384][T10490] ? clear_bhb_loop+0x60/0xb0 [ 740.965176][T10490] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 740.971082][T10490] RIP: 0033:0x7fb494d9c799 [ 740.975508][T10490] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 740.995125][T10490] RSP: 002b:00007fb495ce4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 741.003648][T10490] RAX: ffffffffffffffda RBX: 00007fb495016090 RCX: 00007fb494d9c799 [ 741.011627][T10490] RDX: 0000000000000036 RSI: 0000200000000100 RDI: 000000000000000b [ 741.019689][T10490] RBP: 00007fb495ce4090 R08: 0000000000000000 R09: 0000000000000000 [ 741.027749][T10490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 741.035748][T10490] R13: 00007fb495016128 R14: 00007fb495016090 R15: 00007ffe15129438 [ 741.043776][T10490] [ 741.462138][T10487] device syzkaller0 entered promiscuous mode [ 742.984892][T10504] netlink: 'syz.0.1965': attribute type 10 has an invalid length. [ 742.992948][T10504] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1965'. [ 743.002506][T10506] netlink: 'syz.3.1967': attribute type 1 has an invalid length. [ 743.170664][T10517] netlink: 32 bytes leftover after parsing attributes in process `syz.1.1971'. [ 743.181006][T10517] netlink: 'syz.1.1971': attribute type 46 has an invalid length. [ 743.196137][T10511] netlink: 'syz.4.1968': attribute type 10 has an invalid length. [ 743.462621][T10523] netlink: 'syz.3.1973': attribute type 21 has an invalid length. [ 743.487261][T10523] netlink: 156 bytes leftover after parsing attributes in process `syz.3.1973'. [ 743.573796][T10530] FAULT_INJECTION: forcing a failure. [ 743.573796][T10530] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 743.592760][T10530] CPU: 1 PID: 10530 Comm: syz.0.1976 Not tainted syzkaller #0 [ 743.600267][T10530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 743.610326][T10530] Call Trace: [ 743.613598][T10530] [ 743.616518][T10530] dump_stack_lvl+0x188/0x24e [ 743.621299][T10530] ? show_regs_print_info+0x12/0x12 [ 743.626585][T10530] ? load_image+0x400/0x400 [ 743.631172][T10530] ? __might_fault+0xa6/0x120 [ 743.635842][T10530] should_fail_ex+0x399/0x4d0 [ 743.640523][T10530] copyin+0x1b/0x120 [ 743.644417][T10530] _copy_from_iter+0x559/0x1130 [ 743.649275][T10530] ? copyout_mc+0x110/0x110 [ 743.653779][T10530] ? __virt_addr_valid+0x188/0x540 [ 743.658885][T10530] ? __virt_addr_valid+0x188/0x540 [ 743.663989][T10530] ? __virt_addr_valid+0x465/0x540 [ 743.669193][T10530] ? __check_object_size+0x500/0xa40 [ 743.674558][T10530] netlink_sendmsg+0x755/0xbd0 [ 743.679330][T10530] ? netlink_getsockopt+0x550/0x550 [ 743.684700][T10530] ? aa_sock_msg_perm+0x94/0x150 [ 743.689653][T10530] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 743.694953][T10530] ? security_socket_sendmsg+0x7c/0xa0 [ 743.700694][T10530] ? netlink_getsockopt+0x550/0x550 [ 743.705897][T10530] ____sys_sendmsg+0x5be/0x970 [ 743.710667][T10530] ? __sys_sendmsg_sock+0x30/0x30 [ 743.715692][T10530] ? __import_iovec+0x315/0x500 [ 743.720561][T10530] ? import_iovec+0x6f/0xa0 [ 743.725319][T10530] ___sys_sendmsg+0x2a2/0x360 [ 743.729998][T10530] ? __sys_sendmsg+0x290/0x290 [ 743.734773][T10530] ? __lock_acquire+0x7d10/0x7d10 [ 743.739878][T10530] __se_sys_sendmsg+0x1bb/0x2a0 [ 743.744729][T10530] ? __x64_sys_sendmsg+0x80/0x80 [ 743.749763][T10530] ? lockdep_hardirqs_on+0x94/0x140 [ 743.754964][T10530] do_syscall_64+0x4c/0xa0 [ 743.759382][T10530] ? clear_bhb_loop+0x60/0xb0 [ 743.764057][T10530] ? clear_bhb_loop+0x60/0xb0 [ 743.768736][T10530] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 743.774624][T10530] RIP: 0033:0x7fdd2539c799 [ 743.779030][T10530] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 743.798634][T10530] RSP: 002b:00007fdd262b7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 743.807042][T10530] RAX: ffffffffffffffda RBX: 00007fdd25615fa0 RCX: 00007fdd2539c799 [ 743.815008][T10530] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 743.822967][T10530] RBP: 00007fdd262b7090 R08: 0000000000000000 R09: 0000000000000000 [ 743.830927][T10530] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 743.838887][T10530] R13: 00007fdd25616038 R14: 00007fdd25615fa0 R15: 00007ffe80e72e38 [ 743.846868][T10530] [ 744.638563][T10553] netlink: 'syz.2.1982': attribute type 10 has an invalid length. [ 744.661897][T10553] netlink: 40 bytes leftover after parsing attributes in process `syz.2.1982'. [ 745.095559][T10547] netlink: 152 bytes leftover after parsing attributes in process `syz.4.1980'. [ 745.175052][T10560] netlink: 'syz.1.1983': attribute type 10 has an invalid length. [ 746.844024][T10588] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 746.867776][T10588] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 746.933186][T10588] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 747.061134][T10588] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 747.141059][T10588] batman_adv: batadv0: Interface deactivated: veth0_vlan [ 747.239160][T10588] batman_adv: batadv0: Removing interface: veth0_vlan [ 747.400114][ T1277] ieee802154 phy0 wpan0: encryption failed: -22 [ 747.406601][ T1277] ieee802154 phy1 wpan1: encryption failed: -22 [ 747.710149][T10599] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1993'. [ 747.822034][T10606] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 747.829545][T10606] IPv6: NLM_F_CREATE should be set when creating new route [ 747.836992][T10606] IPv6: NLM_F_CREATE should be set when creating new route [ 747.844362][T10606] IPv6: NLM_F_CREATE should be set when creating new route [ 748.066630][T10609] netlink: 152 bytes leftover after parsing attributes in process `syz.4.1997'. [ 748.147893][T10611] netlink: 'syz.3.1998': attribute type 10 has an invalid length. [ 748.215140][T10611] team0: Port device wlan1 added [ 748.272901][T10613] netlink: 'syz.2.2000': attribute type 2 has an invalid length. [ 748.293816][T10613] netlink: 'syz.2.2000': attribute type 9 has an invalid length. [ 748.318736][T10613] netlink: 'syz.2.2000': attribute type 10 has an invalid length. [ 748.359199][T10613] netlink: 'syz.2.2000': attribute type 11 has an invalid length. [ 748.399898][T10613] netlink: 16 bytes leftover after parsing attributes in process `syz.2.2000'. [ 749.486073][T10640] FAULT_INJECTION: forcing a failure. [ 749.486073][T10640] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 749.554628][T10640] CPU: 1 PID: 10640 Comm: syz.2.2008 Not tainted syzkaller #0 [ 749.562158][T10640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 749.572407][T10640] Call Trace: [ 749.575696][T10640] [ 749.578643][T10640] dump_stack_lvl+0x188/0x24e [ 749.583440][T10640] ? show_regs_print_info+0x12/0x12 [ 749.588653][T10640] ? load_image+0x400/0x400 [ 749.593179][T10640] ? __lock_acquire+0x7d10/0x7d10 [ 749.598319][T10640] should_fail_ex+0x399/0x4d0 [ 749.603013][T10640] _copy_from_user+0x2c/0x170 [ 749.607706][T10640] kstrtouint_from_user+0xda/0x170 [ 749.612847][T10640] ? kstrtol_from_user+0x190/0x190 [ 749.617992][T10640] proc_fail_nth_write+0x8b/0x200 [ 749.623034][T10640] ? proc_fail_nth_read+0x220/0x220 [ 749.628243][T10640] ? common_file_perm+0x171/0x1c0 [ 749.633370][T10640] ? proc_fail_nth_read+0x220/0x220 [ 749.638577][T10640] vfs_write+0x2e6/0xa30 [ 749.642842][T10640] ? file_end_write+0x250/0x250 [ 749.647708][T10640] ? __fget_files+0x28/0x4b0 [ 749.652316][T10640] ? __fget_files+0x28/0x4b0 [ 749.656925][T10640] ? __fget_files+0x43d/0x4b0 [ 749.661641][T10640] ? __fdget_pos+0x2ae/0x360 [ 749.666245][T10640] ? ksys_write+0x71/0x250 [ 749.670682][T10640] ksys_write+0x14c/0x250 [ 749.675141][T10640] ? __ia32_sys_read+0x80/0x80 [ 749.680045][T10640] ? lockdep_hardirqs_on+0x94/0x140 [ 749.685362][T10640] do_syscall_64+0x4c/0xa0 [ 749.689803][T10640] ? clear_bhb_loop+0x60/0xb0 [ 749.694502][T10640] ? clear_bhb_loop+0x60/0xb0 [ 749.699194][T10640] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 749.705112][T10640] RIP: 0033:0x7f382255cfce [ 749.709542][T10640] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 749.729252][T10640] RSP: 002b:00007f38207f5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 749.737768][T10640] RAX: ffffffffffffffda RBX: 00007f38207f66c0 RCX: 00007f382255cfce [ 749.745750][T10640] RDX: 0000000000000001 RSI: 00007f38207f60a0 RDI: 0000000000000006 [ 749.753737][T10640] RBP: 00007f38207f6090 R08: 0000000000000000 R09: 0000000000000000 [ 749.761735][T10640] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 749.769713][T10640] R13: 00007f3822816038 R14: 00007f3822815fa0 R15: 00007ffc71b32e08 [ 749.777706][T10640] [ 750.286444][T10647] netlink: 14 bytes leftover after parsing attributes in process `syz.4.2009'. [ 750.709421][T10652] sock: sock_set_timeout: `syz.3.2010' (pid 10652) tries to set negative timeout [ 750.835765][T10655] netlink: 152 bytes leftover after parsing attributes in process `syz.0.2011'. [ 753.546293][T10700] netlink: 'syz.0.2021': attribute type 10 has an invalid length. [ 753.617351][T10700] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2021'. [ 753.709464][T10700] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 753.819521][T10711] netlink: 14 bytes leftover after parsing attributes in process `syz.2.2024'. [ 754.012412][T10713] netlink: 152 bytes leftover after parsing attributes in process `syz.3.2023'. [ 754.627165][T10719] netlink: 'syz.2.2026': attribute type 10 has an invalid length. [ 754.698788][T10719] bond0: (slave wlan1): Releasing backup interface [ 754.828611][T10719] team0: Port device wlan1 added [ 755.560857][T10735] netlink: 32 bytes leftover after parsing attributes in process `syz.2.2030'. [ 756.117002][T10747] netlink: 'syz.2.2034': attribute type 10 has an invalid length. [ 756.192825][T10745] netlink: 'syz.4.2033': attribute type 21 has an invalid length. [ 756.217829][T10745] netlink: 156 bytes leftover after parsing attributes in process `syz.4.2033'. [ 756.735700][T10766] netlink: 'syz.1.2039': attribute type 10 has an invalid length. [ 756.789693][T10766] netlink: 40 bytes leftover after parsing attributes in process `syz.1.2039'. [ 756.885350][T10766] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 758.356277][T10785] netlink: 152 bytes leftover after parsing attributes in process `syz.1.2042'. [ 758.725747][T10792] netlink: 'syz.2.2044': attribute type 20 has an invalid length. [ 760.493356][T10801] netlink: 'syz.4.2046': attribute type 39 has an invalid length. [ 760.521696][T10808] netlink: 'syz.0.2048': attribute type 21 has an invalid length. [ 760.550202][T10808] netlink: 156 bytes leftover after parsing attributes in process `syz.0.2048'. [ 760.783467][T10820] netlink: 152 bytes leftover after parsing attributes in process `syz.3.2053'. [ 760.818312][T10821] netlink: 'syz.0.2051': attribute type 10 has an invalid length. [ 760.849826][T10825] netlink: 'syz.4.2052': attribute type 3 has an invalid length. [ 760.940221][T10825] netlink: 105116 bytes leftover after parsing attributes in process `syz.4.2052'. [ 761.265494][T10838] FAULT_INJECTION: forcing a failure. [ 761.265494][T10838] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 761.281556][T10838] CPU: 1 PID: 10838 Comm: syz.2.2058 Not tainted syzkaller #0 [ 761.289069][T10838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 761.299161][T10838] Call Trace: [ 761.302471][T10838] [ 761.305418][T10838] dump_stack_lvl+0x188/0x24e [ 761.310126][T10838] ? show_regs_print_info+0x12/0x12 [ 761.315360][T10838] ? load_image+0x400/0x400 [ 761.319908][T10838] ? __lock_acquire+0x7d10/0x7d10 [ 761.324960][T10838] should_fail_ex+0x399/0x4d0 [ 761.329653][T10838] _copy_from_user+0x2c/0x170 [ 761.334528][T10838] kstrtouint_from_user+0xda/0x170 [ 761.339660][T10838] ? kstrtol_from_user+0x190/0x190 [ 761.344803][T10838] proc_fail_nth_write+0x8b/0x200 [ 761.349930][T10838] ? proc_fail_nth_read+0x220/0x220 [ 761.355144][T10838] ? common_file_perm+0x171/0x1c0 [ 761.360183][T10838] ? proc_fail_nth_read+0x220/0x220 [ 761.365429][T10838] vfs_write+0x2e6/0xa30 [ 761.369780][T10838] ? file_end_write+0x250/0x250 [ 761.374642][T10838] ? __fget_files+0x28/0x4b0 [ 761.379238][T10838] ? __fget_files+0x28/0x4b0 [ 761.383839][T10838] ? __fget_files+0x43d/0x4b0 [ 761.388540][T10838] ? __fdget_pos+0x2ae/0x360 [ 761.393144][T10838] ? ksys_write+0x71/0x250 [ 761.397571][T10838] ksys_write+0x14c/0x250 [ 761.401921][T10838] ? __ia32_sys_read+0x80/0x80 [ 761.406785][T10838] ? lockdep_hardirqs_on+0x94/0x140 [ 761.411992][T10838] do_syscall_64+0x4c/0xa0 [ 761.416416][T10838] ? clear_bhb_loop+0x60/0xb0 [ 761.421109][T10838] ? clear_bhb_loop+0x60/0xb0 [ 761.425793][T10838] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 761.431717][T10838] RIP: 0033:0x7f382255cfce [ 761.436146][T10838] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 761.455887][T10838] RSP: 002b:00007f38207f5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 761.464315][T10838] RAX: ffffffffffffffda RBX: 00007f38207f66c0 RCX: 00007f382255cfce [ 761.472295][T10838] RDX: 0000000000000001 RSI: 00007f38207f60a0 RDI: 0000000000000007 [ 761.480270][T10838] RBP: 00007f38207f6090 R08: 0000000000000000 R09: 0000000000000000 [ 761.488244][T10838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 761.496321][T10838] R13: 00007f3822816038 R14: 00007f3822815fa0 R15: 00007ffc71b32e08 [ 761.504341][T10838] [ 762.393144][T10860] netlink: 'syz.3.2067': attribute type 10 has an invalid length. [ 762.419962][T10860] bond0: (slave bond_slave_0): Releasing backup interface [ 762.494731][T10856] netlink: 152 bytes leftover after parsing attributes in process `syz.2.2065'. [ 762.748306][T10875] netlink: 152 bytes leftover after parsing attributes in process `syz.3.2080'. [ 763.481638][T10895] FAULT_INJECTION: forcing a failure. [ 763.481638][T10895] name failslab, interval 1, probability 0, space 0, times 0 [ 763.503647][T10895] CPU: 0 PID: 10895 Comm: syz.3.2073 Not tainted syzkaller #0 [ 763.511180][T10895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 763.521236][T10895] Call Trace: [ 763.524512][T10895] [ 763.527441][T10895] dump_stack_lvl+0x188/0x24e [ 763.532131][T10895] ? show_regs_print_info+0x12/0x12 [ 763.537331][T10895] ? load_image+0x400/0x400 [ 763.541835][T10895] ? _raw_spin_unlock_irqrestore+0x82/0x120 [ 763.547729][T10895] should_fail_ex+0x399/0x4d0 [ 763.552425][T10895] should_failslab+0x5/0x20 [ 763.557066][T10895] slab_pre_alloc_hook+0x59/0x310 [ 763.562106][T10895] kmem_cache_alloc_node+0x5a/0x320 [ 763.567323][T10895] ? __alloc_skb+0xfc/0x7e0 [ 763.571859][T10895] __alloc_skb+0xfc/0x7e0 [ 763.576206][T10895] __pskb_copy_fclone+0xa6/0x1010 [ 763.581238][T10895] ? rcu_is_watching+0x11/0xa0 [ 763.586003][T10895] ? trace_netif_rx_exit+0x9b/0x230 [ 763.591206][T10895] tipc_clone_to_loopback+0x108/0x4a0 [ 763.596586][T10895] tipc_node_xmit+0xd8b/0xf70 [ 763.601440][T10895] ? tipc_node_get_linkname+0x190/0x190 [ 763.607064][T10895] ? __virt_addr_valid+0x188/0x540 [ 763.612314][T10895] ? __virt_addr_valid+0x188/0x540 [ 763.617433][T10895] ? __virt_addr_valid+0x465/0x540 [ 763.622547][T10895] ? __phys_addr_symbol+0x2b/0x70 [ 763.627576][T10895] ? skb_put+0x117/0x210 [ 763.631830][T10895] ? tipc_sk_filtering+0x138/0x510 [ 763.636944][T10895] __tipc_sendstream+0xb0f/0x12f0 [ 763.641991][T10895] ? tsk_advance_rx_queue+0x390/0x390 [ 763.647454][T10895] ? wait_woken+0x1c0/0x1c0 [ 763.651963][T10895] ? _local_bh_enable+0xa0/0xa0 [ 763.656835][T10895] tipc_sendstream+0x51/0x70 [ 763.661450][T10895] ? tipc_getsockopt+0x520/0x520 [ 763.666400][T10895] ____sys_sendmsg+0x5be/0x970 [ 763.671187][T10895] ? __sys_sendmsg_sock+0x30/0x30 [ 763.676217][T10895] ? __import_iovec+0x315/0x500 [ 763.681078][T10895] ? import_iovec+0x6f/0xa0 [ 763.685579][T10895] ___sys_sendmsg+0x2a2/0x360 [ 763.690269][T10895] ? __sys_sendmsg+0x290/0x290 [ 763.695084][T10895] ? __lock_acquire+0x7d10/0x7d10 [ 763.700169][T10895] __se_sys_sendmsg+0x1bb/0x2a0 [ 763.705033][T10895] ? __x64_sys_sendmsg+0x80/0x80 [ 763.709989][T10895] ? lockdep_hardirqs_on+0x94/0x140 [ 763.715374][T10895] do_syscall_64+0x4c/0xa0 [ 763.719904][T10895] ? clear_bhb_loop+0x60/0xb0 [ 763.724590][T10895] ? clear_bhb_loop+0x60/0xb0 [ 763.729286][T10895] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 763.735192][T10895] RIP: 0033:0x7fdc6e39c799 [ 763.739606][T10895] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 763.759216][T10895] RSP: 002b:00007fdc6f1db028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 763.767628][T10895] RAX: ffffffffffffffda RBX: 00007fdc6e616180 RCX: 00007fdc6e39c799 [ 763.775596][T10895] RDX: 0000000020000810 RSI: 0000200000000900 RDI: 0000000000000005 [ 763.783562][T10895] RBP: 00007fdc6f1db090 R08: 0000000000000000 R09: 0000000000000000 [ 763.791534][T10895] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 763.799500][T10895] R13: 00007fdc6e616218 R14: 00007fdc6e616180 R15: 00007ffcd9546c88 [ 763.807495][T10895] [ 764.661298][T10911] netlink: 'syz.0.2078': attribute type 21 has an invalid length. [ 764.689646][T10911] netlink: 156 bytes leftover after parsing attributes in process `syz.0.2078'. [ 765.821315][T10936] FAULT_INJECTION: forcing a failure. [ 765.821315][T10936] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 765.896333][T10936] CPU: 1 PID: 10936 Comm: syz.1.2089 Not tainted syzkaller #0 [ 765.903976][T10936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 765.914220][T10936] Call Trace: [ 765.917515][T10936] [ 765.920533][T10936] dump_stack_lvl+0x188/0x24e [ 765.925247][T10936] ? show_regs_print_info+0x12/0x12 [ 765.930568][T10936] ? load_image+0x400/0x400 [ 765.935314][T10936] ? __lock_acquire+0x7d10/0x7d10 [ 765.940441][T10936] ? snprintf+0xe5/0x140 [ 765.944716][T10936] should_fail_ex+0x399/0x4d0 [ 765.949440][T10936] _copy_to_user+0x2c/0x130 [ 765.953973][T10936] simple_read_from_buffer+0xe3/0x150 [ 765.959463][T10936] proc_fail_nth_read+0x1a6/0x220 [ 765.964551][T10936] ? proc_fault_inject_write+0x310/0x310 [ 765.970259][T10936] ? fsnotify_perm+0x248/0x550 [ 765.975146][T10936] ? proc_fault_inject_write+0x310/0x310 [ 765.980810][T10936] vfs_read+0x2de/0xa00 [ 765.985105][T10936] ? kernel_read+0x1e0/0x1e0 [ 765.989738][T10936] ? __fget_files+0x28/0x4b0 [ 765.994369][T10936] ? __fget_files+0x28/0x4b0 [ 765.999274][T10936] ? __fget_files+0x43d/0x4b0 [ 766.003989][T10936] ? __fdget_pos+0x2ae/0x360 [ 766.008606][T10936] ? ksys_read+0x71/0x250 [ 766.012971][T10936] ksys_read+0x14c/0x250 [ 766.017248][T10936] ? vfs_write+0xa30/0xa30 [ 766.021710][T10936] ? lockdep_hardirqs_on+0x94/0x140 [ 766.026941][T10936] do_syscall_64+0x4c/0xa0 [ 766.031383][T10936] ? clear_bhb_loop+0x60/0xb0 [ 766.036085][T10936] ? clear_bhb_loop+0x60/0xb0 [ 766.040798][T10936] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 766.046720][T10936] RIP: 0033:0x7f4eb8f5cfce [ 766.051228][T10936] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 766.071314][T10936] RSP: 002b:00007f4eb9e54fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 766.079730][T10936] RAX: ffffffffffffffda RBX: 00007f4eb9e556c0 RCX: 00007f4eb8f5cfce [ 766.087702][T10936] RDX: 000000000000000f RSI: 00007f4eb9e550a0 RDI: 0000000000000007 [ 766.095755][T10936] RBP: 00007f4eb9e55090 R08: 0000000000000000 R09: 0000000000000000 [ 766.103718][T10936] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 766.111699][T10936] R13: 00007f4eb9216038 R14: 00007f4eb9215fa0 R15: 00007ffdbfc426c8 [ 766.119718][T10936] [ 766.378273][T10944] netlink: 'syz.2.2092': attribute type 21 has an invalid length. [ 766.397933][T10944] netlink: 156 bytes leftover after parsing attributes in process `syz.2.2092'. [ 766.414994][T10949] netlink: 'syz.0.2094': attribute type 10 has an invalid length. [ 766.446963][T10949] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2094'. [ 766.478274][T10949] FAULT_INJECTION: forcing a failure. [ 766.478274][T10949] name failslab, interval 1, probability 0, space 0, times 0 [ 766.519545][T10949] CPU: 1 PID: 10949 Comm: syz.0.2094 Not tainted syzkaller #0 [ 766.527057][T10949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 766.537156][T10949] Call Trace: [ 766.540452][T10949] [ 766.543409][T10949] dump_stack_lvl+0x188/0x24e [ 766.548128][T10949] ? show_regs_print_info+0x12/0x12 [ 766.553360][T10949] ? load_image+0x400/0x400 [ 766.557893][T10949] ? __might_sleep+0xd0/0xd0 [ 766.562505][T10949] ? __lock_acquire+0x7d10/0x7d10 [ 766.567567][T10949] should_fail_ex+0x399/0x4d0 [ 766.572272][T10949] should_failslab+0x5/0x20 [ 766.576792][T10949] slab_pre_alloc_hook+0x59/0x310 [ 766.581848][T10949] ? br_netlink_fini+0x30/0x30 [ 766.586643][T10949] kmem_cache_alloc_node+0x5a/0x320 [ 766.591865][T10949] ? if_nlmsg_size+0x5b0/0x880 [ 766.596749][T10949] ? __alloc_skb+0xfc/0x7e0 [ 766.601290][T10949] __alloc_skb+0xfc/0x7e0 [ 766.605756][T10949] rtmsg_ifinfo_build_skb+0x80/0x180 [ 766.611089][T10949] rtmsg_ifinfo+0x71/0x120 [ 766.615540][T10949] netdev_state_change+0xf4/0x160 [ 766.620603][T10949] ? netdev_features_change+0xd0/0xd0 [ 766.626003][T10949] ? vprintk_emit+0x59f/0x6a0 [ 766.630719][T10949] ? mutex_is_locked+0xe/0x40 [ 766.635423][T10949] ? rtnl_is_locked+0x11/0x20 [ 766.640136][T10949] do_setlink+0x36bf/0x3e60 [ 766.644683][T10949] ? _printk+0xda/0x130 [ 766.648956][T10949] ? nlmsg_parse_deprecated_strict+0x110/0x110 [ 766.655145][T10949] ? load_image+0x400/0x400 [ 766.659683][T10949] ? rcu_is_watching+0x11/0xa0 [ 766.664564][T10949] ? do_trace_netlink_extack+0x9c/0x220 [ 766.670233][T10949] ? __nla_validate_parse+0x20f9/0x2a40 [ 766.675837][T10949] ? __nla_validate+0x50/0x50 [ 766.680559][T10949] ? lock_chain_count+0x20/0x20 [ 766.685537][T10949] ? __schedule+0x119d/0x40e0 [ 766.690246][T10949] ? __nla_parse+0x3c/0x50 [ 766.694691][T10949] rtnl_setlink+0x37e/0x510 [ 766.699374][T10949] ? rtnl_dump_ifinfo+0x1480/0x1480 [ 766.704639][T10949] ? __schedule+0x11d9/0x40e0 [ 766.709422][T10949] ? rtnetlink_rcv_msg+0x226/0xfc0 [ 766.714567][T10949] ? rtnetlink_rcv_msg+0x226/0xfc0 [ 766.719714][T10949] ? rtnl_dump_ifinfo+0x1480/0x1480 [ 766.724945][T10949] rtnetlink_rcv_msg+0x87c/0xfc0 [ 766.729923][T10949] ? rtnetlink_bind+0x80/0x80 [ 766.734632][T10949] ? __local_bh_enable_ip+0x136/0x1c0 [ 766.740037][T10949] ? lockdep_hardirqs_on+0x94/0x140 [ 766.745277][T10949] ? __local_bh_enable_ip+0x136/0x1c0 [ 766.750678][T10949] ? _local_bh_enable+0xa0/0xa0 [ 766.755560][T10949] ? __dev_queue_xmit+0x26b/0x37c0 [ 766.760874][T10949] ? __dev_queue_xmit+0x26b/0x37c0 [ 766.766109][T10949] ? __dev_queue_xmit+0x1cd2/0x37c0 [ 766.771355][T10949] ? __dev_queue_xmit+0x26b/0x37c0 [ 766.776507][T10949] ? perf_trace_lock+0xf8/0x390 [ 766.781392][T10949] ? __copy_skb_header+0x3ba/0x4f0 [ 766.786557][T10949] ? trace_event_raw_event_lock+0x250/0x250 [ 766.792484][T10949] ? __skb_clone+0x480/0x790 [ 766.797116][T10949] netlink_rcv_skb+0x1fb/0x450 [ 766.801917][T10949] ? rtnetlink_bind+0x80/0x80 [ 766.806632][T10949] ? netlink_ack+0x1170/0x1170 [ 766.811440][T10949] ? netlink_deliver_tap+0x2e/0x1b0 [ 766.816689][T10949] netlink_unicast+0x74d/0x8d0 [ 766.821507][T10949] netlink_sendmsg+0x8ad/0xbd0 [ 766.826319][T10949] ? netlink_getsockopt+0x550/0x550 [ 766.831651][T10949] ? aa_sock_msg_perm+0x94/0x150 [ 766.836615][T10949] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 766.842016][T10949] ? security_socket_sendmsg+0x7c/0xa0 [ 766.847521][T10949] ? netlink_getsockopt+0x550/0x550 [ 766.852743][T10949] ____sys_sendmsg+0x5be/0x970 [ 766.857665][T10949] ? __sys_sendmsg_sock+0x30/0x30 [ 766.862714][T10949] ? __import_iovec+0x315/0x500 [ 766.867593][T10949] ? import_iovec+0x6f/0xa0 [ 766.872338][T10949] ___sys_sendmsg+0x2a2/0x360 [ 766.877059][T10949] ? __sys_sendmsg+0x290/0x290 [ 766.881895][T10949] ? __lock_acquire+0x7d10/0x7d10 [ 766.887510][T10949] __se_sys_sendmsg+0x1bb/0x2a0 [ 766.892427][T10949] ? __x64_sys_sendmsg+0x80/0x80 [ 766.897438][T10949] ? lockdep_hardirqs_on+0x94/0x140 [ 766.902671][T10949] do_syscall_64+0x4c/0xa0 [ 766.907213][T10949] ? clear_bhb_loop+0x60/0xb0 [ 766.911914][T10949] ? clear_bhb_loop+0x60/0xb0 [ 766.916673][T10949] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 766.922682][T10949] RIP: 0033:0x7fdd2539c799 [ 766.927112][T10949] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 766.946916][T10949] RSP: 002b:00007fdd262b7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 766.955450][T10949] RAX: ffffffffffffffda RBX: 00007fdd25615fa0 RCX: 00007fdd2539c799 [ 766.963542][T10949] RDX: 0000000000004014 RSI: 00002000000000c0 RDI: 0000000000000003 [ 766.971535][T10949] RBP: 00007fdd262b7090 R08: 0000000000000000 R09: 0000000000000000 [ 766.979620][T10949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 766.987793][T10949] R13: 00007fdd25616038 R14: 00007fdd25615fa0 R15: 00007ffe80e72e38 [ 766.995908][T10949] [ 767.012914][T10951] netlink: 'syz.1.2093': attribute type 10 has an invalid length. [ 767.069872][T10951] team0: Port device macvlan0 added [ 767.170616][T10960] FAULT_INJECTION: forcing a failure. [ 767.170616][T10960] name failslab, interval 1, probability 0, space 0, times 0 [ 767.208145][T10960] CPU: 0 PID: 10960 Comm: syz.0.2096 Not tainted syzkaller #0 [ 767.215657][T10960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 767.225894][T10960] Call Trace: [ 767.229175][T10960] [ 767.232126][T10960] dump_stack_lvl+0x188/0x24e [ 767.236827][T10960] ? show_regs_print_info+0x12/0x12 [ 767.242212][T10960] ? load_image+0x400/0x400 [ 767.246715][T10960] ? __might_sleep+0xd0/0xd0 [ 767.251347][T10960] ? __lock_acquire+0x7d10/0x7d10 [ 767.256386][T10960] should_fail_ex+0x399/0x4d0 [ 767.261064][T10960] should_failslab+0x5/0x20 [ 767.265731][T10960] slab_pre_alloc_hook+0x59/0x310 [ 767.270751][T10960] kmem_cache_alloc_node+0x5a/0x320 [ 767.275966][T10960] ? __alloc_skb+0xfc/0x7e0 [ 767.280466][T10960] __alloc_skb+0xfc/0x7e0 [ 767.284791][T10960] ? netlink_autobind+0xda/0x300 [ 767.289730][T10960] netlink_sendmsg+0x654/0xbd0 [ 767.294505][T10960] ? netlink_getsockopt+0x550/0x550 [ 767.299703][T10960] ? aa_sock_msg_perm+0x94/0x150 [ 767.304728][T10960] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 767.310005][T10960] ? security_socket_sendmsg+0x7c/0xa0 [ 767.315464][T10960] ? netlink_getsockopt+0x550/0x550 [ 767.320744][T10960] ____sys_sendmsg+0x5be/0x970 [ 767.325509][T10960] ? __sys_sendmsg_sock+0x30/0x30 [ 767.330561][T10960] ? __import_iovec+0x315/0x500 [ 767.335412][T10960] ? import_iovec+0x6f/0xa0 [ 767.339916][T10960] ___sys_sendmsg+0x2a2/0x360 [ 767.344596][T10960] ? __sys_sendmsg+0x290/0x290 [ 767.349454][T10960] ? ktime_get_real_ts64+0x440/0x440 [ 767.354745][T10960] __se_sys_sendmsg+0x1bb/0x2a0 [ 767.359595][T10960] ? __x64_sys_sendmsg+0x80/0x80 [ 767.364818][T10960] ? lockdep_hardirqs_on+0x94/0x140 [ 767.370095][T10960] do_syscall_64+0x4c/0xa0 [ 767.374509][T10960] ? clear_bhb_loop+0x60/0xb0 [ 767.379182][T10960] ? clear_bhb_loop+0x60/0xb0 [ 767.383854][T10960] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 767.389739][T10960] RIP: 0033:0x7fdd2539c799 [ 767.394147][T10960] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 767.413743][T10960] RSP: 002b:00007fdd262b7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 767.422159][T10960] RAX: ffffffffffffffda RBX: 00007fdd25615fa0 RCX: 00007fdd2539c799 [ 767.430274][T10960] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000007 [ 767.438342][T10960] RBP: 00007fdd262b7090 R08: 0000000000000000 R09: 0000000000000000 [ 767.446314][T10960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 767.454289][T10960] R13: 00007fdd25616038 R14: 00007fdd25615fa0 R15: 00007ffe80e72e38 [ 767.462328][T10960] [ 767.531977][T10963] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2097'. [ 767.729092][T10965] netlink: 26 bytes leftover after parsing attributes in process `syz.2.2099'. [ 768.129732][T10978] netlink: 'syz.2.2105': attribute type 21 has an invalid length. [ 768.138451][T10978] netlink: 156 bytes leftover after parsing attributes in process `syz.2.2105'. [ 768.213299][T10982] netlink: 'syz.3.2103': attribute type 10 has an invalid length. [ 768.433503][T10987] netlink: 'syz.0.2107': attribute type 10 has an invalid length. [ 768.445922][T10987] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2107'. [ 769.683731][T11021] netlink: 'syz.3.2116': attribute type 10 has an invalid length. [ 769.716271][T11021] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2116'. [ 769.793356][T11021] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 770.545214][T11025] netlink: 'syz.2.2117': attribute type 10 has an invalid length. [ 770.553726][T11025] netlink: 40 bytes leftover after parsing attributes in process `syz.2.2117'. [ 770.568678][T11025] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 770.575719][T11025] FAULT_INJECTION: forcing a failure. [ 770.575719][T11025] name failslab, interval 1, probability 0, space 0, times 0 [ 770.592459][T11025] CPU: 0 PID: 11025 Comm: syz.2.2117 Not tainted syzkaller #0 [ 770.599995][T11025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 770.610070][T11025] Call Trace: [ 770.613358][T11025] [ 770.616304][T11025] dump_stack_lvl+0x188/0x24e [ 770.620997][T11025] ? show_regs_print_info+0x12/0x12 [ 770.626208][T11025] ? load_image+0x400/0x400 [ 770.630712][T11025] ? __might_sleep+0xd0/0xd0 [ 770.635301][T11025] ? __lock_acquire+0x7d10/0x7d10 [ 770.640329][T11025] should_fail_ex+0x399/0x4d0 [ 770.645017][T11025] should_failslab+0x5/0x20 [ 770.649513][T11025] slab_pre_alloc_hook+0x59/0x310 [ 770.654624][T11025] ? fib6_info_alloc+0x2e/0xe0 [ 770.659383][T11025] __kmem_cache_alloc_node+0x4f/0x260 [ 770.664755][T11025] ? fib6_info_alloc+0x2e/0xe0 [ 770.669540][T11025] __kmalloc+0xa0/0x240 [ 770.673720][T11025] fib6_info_alloc+0x2e/0xe0 [ 770.678409][T11025] ip6_route_info_create+0x44f/0x1210 [ 770.684220][T11025] ? __kasan_kmalloc+0x8e/0xa0 [ 770.688989][T11025] ? add_addr+0x8c/0x2c0 [ 770.693490][T11025] ? l3mdev_fib_table+0x18/0x160 [ 770.698433][T11025] addrconf_f6i_alloc+0x1ec/0x430 [ 770.703461][T11025] ? ip6_route_del+0x14f0/0x14f0 [ 770.708424][T11025] ipv6_add_addr+0x461/0xfc0 [ 770.713016][T11025] ? ipv6_count_addresses+0x190/0x190 [ 770.718383][T11025] ? __mutex_unlock_slowpath+0x1b0/0x6c0 [ 770.724017][T11025] ? mutex_unlock+0x10/0x10 [ 770.728615][T11025] add_addr+0x8c/0x2c0 [ 770.732886][T11025] addrconf_init_auto_addrs+0x45b/0xaf0 [ 770.738446][T11025] ? addrconf_dad_run+0x1d0/0x1d0 [ 770.743476][T11025] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 770.749553][T11025] ? _printk+0xda/0x130 [ 770.753723][T11025] ? load_image+0x400/0x400 [ 770.758227][T11025] ? __local_bh_enable_ip+0x136/0x1c0 [ 770.763600][T11025] ? addrconf_link_ready+0x116/0x170 [ 770.768885][T11025] addrconf_notify+0xaca/0xf40 [ 770.773649][T11025] raw_notifier_call_chain+0xcb/0x160 [ 770.779021][T11025] netdev_state_change+0xe0/0x160 [ 770.784045][T11025] ? netdev_features_change+0xd0/0xd0 [ 770.789428][T11025] ? vprintk_emit+0x59f/0x6a0 [ 770.794125][T11025] ? mutex_is_locked+0xe/0x40 [ 770.798801][T11025] do_setlink+0x36bf/0x3e60 [ 770.803313][T11025] ? _printk+0xda/0x130 [ 770.807464][T11025] ? nlmsg_parse_deprecated_strict+0x110/0x110 [ 770.813618][T11025] ? load_image+0x400/0x400 [ 770.818124][T11025] ? rcu_is_watching+0x11/0xa0 [ 770.822888][T11025] ? do_trace_netlink_extack+0x9c/0x220 [ 770.828434][T11025] ? __nla_validate_parse+0x20f9/0x2a40 [ 770.833990][T11025] ? __nla_validate+0x50/0x50 [ 770.838757][T11025] ? kernel_text_address+0x9c/0xd0 [ 770.843871][T11025] ? __nla_parse+0x3c/0x50 [ 770.848288][T11025] rtnl_setlink+0x37e/0x510 [ 770.852968][T11025] ? rtnl_dump_ifinfo+0x1480/0x1480 [ 770.858218][T11025] ? rtnetlink_rcv_msg+0x226/0xfc0 [ 770.863328][T11025] ? rtnetlink_rcv_msg+0x226/0xfc0 [ 770.868452][T11025] ? rtnl_dump_ifinfo+0x1480/0x1480 [ 770.873651][T11025] rtnetlink_rcv_msg+0x87c/0xfc0 [ 770.878601][T11025] ? rtnetlink_bind+0x80/0x80 [ 770.883363][T11025] ? __local_bh_enable_ip+0x136/0x1c0 [ 770.888738][T11025] ? lockdep_hardirqs_on+0x94/0x140 [ 770.893934][T11025] ? __local_bh_enable_ip+0x136/0x1c0 [ 770.899312][T11025] ? _local_bh_enable+0xa0/0xa0 [ 770.904186][T11025] ? __dev_queue_xmit+0x26b/0x37c0 [ 770.909307][T11025] ? __dev_queue_xmit+0x26b/0x37c0 [ 770.914434][T11025] ? __dev_queue_xmit+0x1cd2/0x37c0 [ 770.919724][T11025] ? __dev_queue_xmit+0x26b/0x37c0 [ 770.924844][T11025] ? ref_tracker_free+0x68c/0x840 [ 770.930044][T11025] ? __copy_skb_header+0x3ba/0x4f0 [ 770.935154][T11025] ? refcount_inc+0x70/0x70 [ 770.939655][T11025] ? memcpy+0x3c/0x60 [ 770.943805][T11025] ? __copy_skb_header+0x3ba/0x4f0 [ 770.948918][T11025] ? __skb_clone+0x480/0x790 [ 770.953511][T11025] netlink_rcv_skb+0x1fb/0x450 [ 770.958277][T11025] ? rtnetlink_bind+0x80/0x80 [ 770.962956][T11025] ? netlink_ack+0x1170/0x1170 [ 770.967735][T11025] ? netlink_deliver_tap+0x2e/0x1b0 [ 770.972936][T11025] netlink_unicast+0x74d/0x8d0 [ 770.977709][T11025] netlink_sendmsg+0x8ad/0xbd0 [ 770.982480][T11025] ? netlink_getsockopt+0x550/0x550 [ 770.987685][T11025] ? aa_sock_msg_perm+0x94/0x150 [ 770.992623][T11025] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 770.997902][T11025] ? security_socket_sendmsg+0x7c/0xa0 [ 771.003359][T11025] ? netlink_getsockopt+0x550/0x550 [ 771.008566][T11025] ____sys_sendmsg+0x5be/0x970 [ 771.013334][T11025] ? __sys_sendmsg_sock+0x30/0x30 [ 771.018356][T11025] ? __import_iovec+0x315/0x500 [ 771.023242][T11025] ? import_iovec+0x6f/0xa0 [ 771.027745][T11025] ___sys_sendmsg+0x2a2/0x360 [ 771.032425][T11025] ? __sys_sendmsg+0x290/0x290 [ 771.037206][T11025] ? __lock_acquire+0x7d10/0x7d10 [ 771.042339][T11025] __se_sys_sendmsg+0x1bb/0x2a0 [ 771.047202][T11025] ? __x64_sys_sendmsg+0x80/0x80 [ 771.052148][T11025] ? lockdep_hardirqs_on+0x94/0x140 [ 771.057343][T11025] do_syscall_64+0x4c/0xa0 [ 771.061755][T11025] ? clear_bhb_loop+0x60/0xb0 [ 771.066438][T11025] ? clear_bhb_loop+0x60/0xb0 [ 771.071114][T11025] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 771.077001][T11025] RIP: 0033:0x7f382259c799 [ 771.081422][T11025] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 771.101024][T11025] RSP: 002b:00007f38207f6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 771.109431][T11025] RAX: ffffffffffffffda RBX: 00007f3822815fa0 RCX: 00007f382259c799 [ 771.117421][T11025] RDX: 0000000000020010 RSI: 0000200000000000 RDI: 0000000000000003 [ 771.125481][T11025] RBP: 00007f38207f6090 R08: 0000000000000000 R09: 0000000000000000 [ 771.133714][T11025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 771.141680][T11025] R13: 00007f3822816038 R14: 00007f3822815fa0 R15: 00007ffc71b32e08 [ 771.149666][T11025] [ 771.170944][T11025] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 771.381356][T11039] netlink: 'syz.4.2120': attribute type 10 has an invalid length. [ 771.425417][T11039] bond0: (slave bond_slave_0): Releasing backup interface [ 772.669829][T11053] netlink: 4595 bytes leftover after parsing attributes in process `syz.3.2125'. [ 772.724857][T11056] netlink: 'syz.4.2127': attribute type 21 has an invalid length. [ 772.737735][T11056] netlink: 'syz.4.2127': attribute type 1 has an invalid length. [ 772.746258][T11053] netlink: 4595 bytes leftover after parsing attributes in process `syz.3.2125'. [ 772.783306][T11058] netlink: 4595 bytes leftover after parsing attributes in process `syz.3.2125'. [ 772.959405][T11066] netlink: 'syz.2.2131': attribute type 21 has an invalid length. [ 773.015722][T11066] netlink: 'syz.2.2131': attribute type 1 has an invalid length. [ 773.429241][T11083] netlink: 'syz.1.2136': attribute type 1 has an invalid length. [ 773.524896][T11084] netlink: 'syz.4.2137': attribute type 10 has an invalid length. [ 773.545013][T11084] netlink: 40 bytes leftover after parsing attributes in process `syz.4.2137'. [ 773.573106][T11084] device ipvlan1 entered promiscuous mode [ 773.593931][T11084] bridge0: port 4(ipvlan1) entered blocking state [ 773.615194][T11084] bridge0: port 4(ipvlan1) entered disabled state [ 773.693001][T11084] A link change request failed with some changes committed already. Interface ipvlan1 may have been left with an inconsistent configuration, please check. [ 773.739552][T11086] netlink: 'syz.1.2138': attribute type 10 has an invalid length. [ 773.777061][T11086] netlink: 40 bytes leftover after parsing attributes in process `syz.1.2138'. [ 773.834328][T11086] bridge0: port 3(ipvlan1) entered blocking state [ 773.877587][T11086] bridge0: port 3(ipvlan1) entered disabled state [ 773.947312][T11086] A link change request failed with some changes committed already. Interface ipvlan1 may have been left with an inconsistent configuration, please check. [ 775.645561][T11093] netlink: 65027 bytes leftover after parsing attributes in process `syz.4.2140'. [ 775.665410][T11101] netlink: 'syz.2.2143': attribute type 21 has an invalid length. [ 775.681449][T11101] netlink: 'syz.2.2143': attribute type 1 has an invalid length. [ 775.886346][T11109] netlink: 'syz.4.2145': attribute type 21 has an invalid length. [ 775.922333][T11109] netlink: 'syz.4.2145': attribute type 1 has an invalid length. [ 776.054773][T11115] netlink: 16186 bytes leftover after parsing attributes in process `syz.0.2148'. [ 776.288639][T11127] netlink: 'syz.4.2152': attribute type 10 has an invalid length. [ 776.306783][T11127] netlink: 40 bytes leftover after parsing attributes in process `syz.4.2152'. [ 776.338644][T11125] netlink: 'syz.0.2151': attribute type 10 has an invalid length. [ 776.363862][T11125] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2151'. [ 776.418953][T11125] bridge0: port 5(ipvlan1) entered blocking state [ 776.446629][T11125] bridge0: port 5(ipvlan1) entered disabled state [ 776.503986][T11125] A link change request failed with some changes committed already. Interface ipvlan1 may have been left with an inconsistent configuration, please check. [ 776.802794][T11141] netlink: 'syz.0.2156': attribute type 29 has an invalid length. [ 776.842139][T11141] netlink: 'syz.0.2156': attribute type 29 has an invalid length. [ 776.875796][T11144] netlink: 'syz.0.2156': attribute type 29 has an invalid length. [ 777.248424][T11152] device syzkaller0 entered promiscuous mode [ 780.966940][T11168] netlink: 'syz.3.2167': attribute type 10 has an invalid length. [ 780.974821][T11168] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2167'. [ 780.984257][T11168] device ipvlan1 entered promiscuous mode [ 780.992651][T11168] bridge0: port 1(ipvlan1) entered blocking state [ 780.999485][T11168] bridge0: port 1(ipvlan1) entered disabled state [ 781.008142][T11168] A link change request failed with some changes committed already. Interface ipvlan1 may have been left with an inconsistent configuration, please check. [ 781.034636][T11177] netlink: 'syz.0.2169': attribute type 10 has an invalid length. [ 781.047677][T11177] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2169'. [ 781.093266][T11177] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 781.275862][T11190] netlink: 'syz.3.2172': attribute type 10 has an invalid length. [ 781.644573][T11201] netlink: 'syz.2.2186': attribute type 10 has an invalid length. [ 782.067171][T11216] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 782.098852][T11216] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 782.196650][T11216] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 782.262284][T11216] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 782.474835][T11216] batman_adv: batadv0: Interface deactivated: veth0_vlan [ 782.526689][T11216] batman_adv: batadv0: Removing interface: veth0_vlan [ 782.757952][T11216] bond0: (slave batadv0): Releasing backup interface [ 782.880619][T11222] netlink: 'syz.4.2181': attribute type 21 has an invalid length. [ 782.928552][T11222] netlink: 'syz.4.2181': attribute type 6 has an invalid length. [ 782.936353][T11222] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2181'. [ 782.979568][T11231] netlink: 'syz.2.2184': attribute type 10 has an invalid length. [ 782.991567][T11231] netlink: 40 bytes leftover after parsing attributes in process `syz.2.2184'. [ 783.664136][T11268] netlink: 'syz.3.2194': attribute type 10 has an invalid length. [ 785.032938][T11276] netlink: 9286 bytes leftover after parsing attributes in process `syz.0.2197'. [ 785.134753][T11279] netlink: 'syz.3.2200': attribute type 10 has an invalid length. [ 785.169957][T11279] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2200'. [ 785.222234][T11279] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 785.276502][T11285] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 785.297222][T11285] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 785.309103][T11285] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 785.345241][T11285] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 785.361383][T11285] batman_adv: batadv0: Interface deactivated: veth0_vlan [ 785.369650][T11285] batman_adv: batadv0: Removing interface: veth0_vlan [ 785.592047][T11293] netlink: 'syz.2.2201': attribute type 21 has an invalid length. [ 785.661560][T11293] netlink: 132 bytes leftover after parsing attributes in process `syz.2.2201'. [ 786.366323][T11337] validate_nla: 1 callbacks suppressed [ 786.366337][T11337] netlink: 'syz.4.2214': attribute type 10 has an invalid length. [ 786.418325][T11337] netlink: 40 bytes leftover after parsing attributes in process `syz.4.2214'. [ 786.432216][T11338] netlink: 'syz.3.2217': attribute type 21 has an invalid length. [ 786.452972][T11338] netlink: 'syz.3.2217': attribute type 1 has an invalid length. [ 786.465170][T11337] netlink: 'syz.4.2214': attribute type 10 has an invalid length. [ 786.476997][T11337] netlink: 40 bytes leftover after parsing attributes in process `syz.4.2214'. [ 786.502781][T11330] netlink: 'syz.4.2214': attribute type 10 has an invalid length. [ 786.523107][T11330] netlink: 40 bytes leftover after parsing attributes in process `syz.4.2214'. [ 786.603506][T11333] netlink: 'syz.4.2214': attribute type 10 has an invalid length. [ 786.626899][T11333] netlink: 40 bytes leftover after parsing attributes in process `syz.4.2214'. [ 786.648222][T11347] netlink: 'syz.1.2218': attribute type 10 has an invalid length. [ 786.664359][T11347] netlink: 40 bytes leftover after parsing attributes in process `syz.1.2218'. [ 786.692294][T11347] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 787.371480][T11364] netlink: 'syz.1.2222': attribute type 21 has an invalid length. [ 787.403400][T11364] netlink: 'syz.1.2222': attribute type 6 has an invalid length. [ 787.427185][T11364] netlink: 132 bytes leftover after parsing attributes in process `syz.1.2222'. [ 787.761051][T11372] netlink: 'syz.3.2226': attribute type 21 has an invalid length. [ 787.870125][T11372] netlink: 128 bytes leftover after parsing attributes in process `syz.3.2226'. [ 788.532628][T11396] netlink: 40 bytes leftover after parsing attributes in process `syz.4.2232'. [ 788.567859][T11396] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 788.775249][T11411] device wlan1 entered promiscuous mode [ 789.029183][T11418] FAULT_INJECTION: forcing a failure. [ 789.029183][T11418] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 789.047187][T11418] CPU: 0 PID: 11418 Comm: syz.2.2239 Not tainted syzkaller #0 [ 789.054697][T11418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 789.064855][T11418] Call Trace: [ 789.068166][T11418] [ 789.071107][T11418] dump_stack_lvl+0x188/0x24e [ 789.075815][T11418] ? show_regs_print_info+0x12/0x12 [ 789.081030][T11418] ? load_image+0x400/0x400 [ 789.085605][T11418] ? __lock_acquire+0x7d10/0x7d10 [ 789.090657][T11418] ? __rcu_read_unlock+0x78/0xd0 [ 789.095625][T11418] should_fail_ex+0x399/0x4d0 [ 789.100324][T11418] _copy_to_user+0x2c/0x130 [ 789.104846][T11418] bpf_test_finish+0x4a2/0x600 [ 789.109633][T11418] ? convert___skb_to_skb+0x580/0x580 [ 789.115025][T11418] ? convert_skb_to___skb+0x420/0x420 [ 789.120425][T11418] ? bpf_test_init+0x119/0x140 [ 789.125218][T11418] bpf_prog_test_run_xdp+0x80a/0xf10 [ 789.130723][T11418] ? dev_put+0x80/0x80 [ 789.134826][T11418] ? dev_put+0x80/0x80 [ 789.138906][T11418] bpf_prog_test_run+0x31e/0x390 [ 789.143868][T11418] __sys_bpf+0x62b/0x780 [ 789.148153][T11418] ? bpf_link_show_fdinfo+0x380/0x380 [ 789.153671][T11418] ? lock_chain_count+0x20/0x20 [ 789.158563][T11418] __x64_sys_bpf+0x78/0x90 [ 789.163005][T11418] do_syscall_64+0x4c/0xa0 [ 789.167523][T11418] ? clear_bhb_loop+0x60/0xb0 [ 789.172217][T11418] ? clear_bhb_loop+0x60/0xb0 [ 789.176912][T11418] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 789.182818][T11418] RIP: 0033:0x7f382259c799 [ 789.187243][T11418] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 789.206857][T11418] RSP: 002b:00007f38207f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 789.215291][T11418] RAX: ffffffffffffffda RBX: 00007f3822815fa0 RCX: 00007f382259c799 [ 789.223301][T11418] RDX: 0000000000000050 RSI: 0000200000000440 RDI: 000000000000000a [ 789.231337][T11418] RBP: 00007f38207f6090 R08: 0000000000000000 R09: 0000000000000000 [ 789.239317][T11418] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 789.247297][T11418] R13: 00007f3822816038 R14: 00007f3822815fa0 R15: 00007ffc71b32e08 [ 789.255296][T11418] [ 789.271345][T11419] netlink: 156 bytes leftover after parsing attributes in process `syz.3.2237'. [ 789.831414][T11443] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2248'. [ 791.095871][T11489] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 791.386222][T11502] validate_nla: 12 callbacks suppressed [ 791.386238][T11502] netlink: 'syz.1.2268': attribute type 21 has an invalid length. [ 791.426981][T11502] __nla_validate_parse: 7 callbacks suppressed [ 791.426997][T11502] netlink: 156 bytes leftover after parsing attributes in process `syz.1.2268'. [ 791.462244][T11501] netlink: 'syz.4.2269': attribute type 21 has an invalid length. [ 791.473431][T11501] netlink: 'syz.4.2269': attribute type 6 has an invalid length. [ 791.499803][T11501] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2269'. [ 791.562913][T11503] netlink: 'syz.2.2270': attribute type 1 has an invalid length. [ 791.623972][T11507] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2269'. [ 791.669790][T11501] netlink: 180 bytes leftover after parsing attributes in process `syz.4.2269'. [ 791.688543][T11511] netlink: 'syz.3.2272': attribute type 11 has an invalid length. [ 791.695306][T11501] netlink: 'syz.4.2269': attribute type 8 has an invalid length. [ 791.724161][T11501] netlink: 128124 bytes leftover after parsing attributes in process `syz.4.2269'. [ 791.783999][ T4327] Bluetooth: hci1: ISO packet for unknown connection handle 34 [ 791.877875][T11517] netlink: 'syz.1.2273': attribute type 28 has an invalid length. [ 791.927018][T11517] netlink: 'syz.1.2273': attribute type 29 has an invalid length. [ 791.976784][T11517] netlink: 132 bytes leftover after parsing attributes in process `syz.1.2273'. [ 792.332669][T11541] netlink: 'syz.0.2279': attribute type 21 has an invalid length. [ 792.377018][T11541] netlink: 128 bytes leftover after parsing attributes in process `syz.0.2279'. [ 792.418808][T11541] netlink: 'syz.0.2279': attribute type 4 has an invalid length. [ 792.655983][T11551] netlink: 'syz.1.2284': attribute type 1 has an invalid length. [ 793.033450][T11557] netlink: 132 bytes leftover after parsing attributes in process `syz.1.2286'. [ 793.078267][T11557] netlink: 180 bytes leftover after parsing attributes in process `syz.1.2286'. [ 796.151544][T11586] netlink: 156 bytes leftover after parsing attributes in process `syz.3.2297'. [ 796.393212][T11597] validate_nla: 3 callbacks suppressed [ 796.393230][T11597] netlink: 'syz.2.2300': attribute type 2 has an invalid length. [ 796.423644][T11597] netlink: 'syz.2.2300': attribute type 8 has an invalid length. [ 796.455481][T11597] netlink: 132 bytes leftover after parsing attributes in process `syz.2.2300'. [ 796.492367][T11604] netlink: 180 bytes leftover after parsing attributes in process `syz.2.2300'. [ 796.637777][T11608] netlink: 14 bytes leftover after parsing attributes in process `syz.3.2304'. [ 796.700903][T11608] device hsr_slave_1 left promiscuous mode [ 797.119104][T11614] netlink: 'syz.2.2303': attribute type 21 has an invalid length. [ 797.130088][T11614] netlink: 128 bytes leftover after parsing attributes in process `syz.2.2303'. [ 797.151013][T11614] netlink: 'syz.2.2303': attribute type 4 has an invalid length. [ 797.174791][T11618] netlink: 144 bytes leftover after parsing attributes in process `syz.0.2307'. [ 797.367261][ T4327] Bluetooth: hci2: ISO packet for unknown connection handle 34 [ 797.520480][T11638] netlink: 'syz.3.2314': attribute type 1 has an invalid length. [ 797.585151][T11640] netlink: 'syz.1.2315': attribute type 10 has an invalid length. [ 797.604117][T11640] netlink: 40 bytes leftover after parsing attributes in process `syz.1.2315'. [ 797.644942][T11640] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 797.817176][T11647] netlink: 'syz.3.2318': attribute type 10 has an invalid length. [ 797.825487][T11647] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2318'. [ 797.860590][T11647] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 798.023005][T11657] netlink: 'syz.2.2322': attribute type 10 has an invalid length. [ 798.063674][T11657] team0: Port device veth1_macvtap added [ 798.531714][T11676] netlink: 'syz.1.2329': attribute type 1 has an invalid length. [ 798.561396][T11677] netlink: 'syz.2.2328': attribute type 10 has an invalid length. [ 799.237719][T11671] delete_channel: no stack [ 799.257583][T11671] delete_channel: no stack [ 801.551627][T11689] netlink: 'syz.0.2333': attribute type 10 has an invalid length. [ 801.569856][T11689] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2333'. [ 801.592063][T11689] device veth0_vlan left promiscuous mode [ 801.648877][T11689] device veth0_vlan entered promiscuous mode [ 801.677994][T11689] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 801.755812][T11449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 801.784761][T11449] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 801.802205][T11449] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 801.824787][T11690] netlink: 'syz.1.2335': attribute type 21 has an invalid length. [ 801.837395][T11690] netlink: 156 bytes leftover after parsing attributes in process `syz.1.2335'. [ 801.849741][T11700] netlink: 'syz.2.2336': attribute type 10 has an invalid length. [ 801.865562][T11700] netlink: 40 bytes leftover after parsing attributes in process `syz.2.2336'. [ 801.898819][T11700] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 802.117230][T11720] netlink: 'syz.0.2342': attribute type 10 has an invalid length. [ 803.497651][T11764] netlink: 'syz.3.2353': attribute type 10 has an invalid length. [ 803.542389][T11766] delete_channel: no stack [ 803.554931][T11766] delete_channel: no stack [ 803.649263][T11770] netlink: 26 bytes leftover after parsing attributes in process `syz.0.2359'. [ 803.879005][T11776] netlink: 'syz.1.2360': attribute type 1 has an invalid length. [ 803.921790][T11780] netlink: 'syz.4.2357': attribute type 10 has an invalid length. [ 803.956895][T11780] netlink: 40 bytes leftover after parsing attributes in process `syz.4.2357'. [ 803.978766][T11780] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 804.448252][T11798] device wlan1 entered promiscuous mode [ 804.521659][T11801] netlink: 14 bytes leftover after parsing attributes in process `syz.2.2367'. [ 804.561653][T11801] device hsr_slave_0 left promiscuous mode [ 804.618146][T11801] device hsr_slave_1 left promiscuous mode [ 804.800078][T11810] device veth1_macvtap left promiscuous mode [ 804.813005][T11811] device veth1_macvtap entered promiscuous mode [ 804.836209][T11811] device macsec0 entered promiscuous mode [ 804.876343][T11815] netlink: 26 bytes leftover after parsing attributes in process `syz.3.2372'. [ 805.063606][T11820] netlink: 'syz.2.2375': attribute type 10 has an invalid length. [ 805.131139][T11825] FAULT_INJECTION: forcing a failure. [ 805.131139][T11825] name failslab, interval 1, probability 0, space 0, times 0 [ 805.227006][T11825] CPU: 1 PID: 11825 Comm: syz.1.2376 Not tainted syzkaller #0 [ 805.234717][T11825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 805.244792][T11825] Call Trace: [ 805.248088][T11825] [ 805.251035][T11825] dump_stack_lvl+0x188/0x24e [ 805.255748][T11825] ? show_regs_print_info+0x12/0x12 [ 805.261151][T11825] ? load_image+0x400/0x400 [ 805.265681][T11825] ? __might_sleep+0xd0/0xd0 [ 805.270289][T11825] ? __lock_acquire+0x7d10/0x7d10 [ 805.275345][T11825] should_fail_ex+0x399/0x4d0 [ 805.280047][T11825] should_failslab+0x5/0x20 [ 805.284569][T11825] slab_pre_alloc_hook+0x59/0x310 [ 805.289624][T11825] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 805.295387][T11825] __kmem_cache_alloc_node+0x4f/0x260 [ 805.300800][T11825] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 805.306560][T11825] __kmalloc+0xa0/0x240 [ 805.310769][T11825] tomoyo_realpath_from_path+0xdf/0x5d0 [ 805.316381][T11825] ? tomoyo_path_number_perm+0x205/0x650 [ 805.322056][T11825] tomoyo_path_number_perm+0x22f/0x650 [ 805.327564][T11825] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 805.333062][T11825] ? ksys_write+0x1c0/0x250 [ 805.337609][T11825] ? common_file_perm+0x171/0x1c0 [ 805.342736][T11825] ? __fget_files+0x28/0x4b0 [ 805.347452][T11825] ? __fget_files+0x28/0x4b0 [ 805.352116][T11825] security_file_ioctl+0x6c/0xa0 [ 805.357124][T11825] __se_sys_ioctl+0x48/0x170 [ 805.361735][T11825] do_syscall_64+0x4c/0xa0 [ 805.366178][T11825] ? clear_bhb_loop+0x60/0xb0 [ 805.370891][T11825] ? clear_bhb_loop+0x60/0xb0 [ 805.375606][T11825] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 805.381630][T11825] RIP: 0033:0x7f4eb8f9c799 [ 805.386253][T11825] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 805.405981][T11825] RSP: 002b:00007f4eb9e55028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 805.414435][T11825] RAX: ffffffffffffffda RBX: 00007f4eb9215fa0 RCX: 00007f4eb8f9c799 [ 805.422447][T11825] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 805.430448][T11825] RBP: 00007f4eb9e55090 R08: 0000000000000000 R09: 0000000000000000 [ 805.438447][T11825] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 805.446463][T11825] R13: 00007f4eb9216038 R14: 00007f4eb9215fa0 R15: 00007ffdbfc426c8 [ 805.454506][T11825] [ 805.527327][T11825] ERROR: Out of memory at tomoyo_realpath_from_path. [ 805.920805][T11852] netlink: 'syz.2.2386': attribute type 1 has an invalid length. [ 806.052493][T11857] netlink: 68 bytes leftover after parsing attributes in process `syz.1.2387'. [ 806.097335][T11859] FAULT_INJECTION: forcing a failure. [ 806.097335][T11859] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 806.135706][T11859] CPU: 0 PID: 11859 Comm: syz.3.2388 Not tainted syzkaller #0 [ 806.143405][T11859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 806.153484][T11859] Call Trace: [ 806.156869][T11859] [ 806.159830][T11859] dump_stack_lvl+0x188/0x24e [ 806.164540][T11859] ? show_regs_print_info+0x12/0x12 [ 806.169785][T11859] ? load_image+0x400/0x400 [ 806.174330][T11859] ? __lock_acquire+0x7d10/0x7d10 [ 806.179385][T11859] ? slab_post_alloc_hook+0x4b/0x480 [ 806.184704][T11859] should_fail_ex+0x399/0x4d0 [ 806.189416][T11859] prepare_alloc_pages+0x1e2/0x5f0 [ 806.194652][T11859] __alloc_pages+0x130/0x4f0 [ 806.199273][T11859] ? kasan_populate_vmalloc_pte+0xa4/0xf0 [ 806.205022][T11859] ? zone_statistics+0x170/0x170 [ 806.209995][T11859] ? __rwlock_init+0x140/0x140 [ 806.214786][T11859] ? do_raw_spin_unlock+0x11d/0x230 [ 806.220018][T11859] __get_free_pages+0x8/0x30 [ 806.224660][T11859] kasan_populate_vmalloc_pte+0x31/0xf0 [ 806.230233][T11859] ? __apply_to_page_range+0x977/0xd10 [ 806.235733][T11859] __apply_to_page_range+0x989/0xd10 [ 806.241137][T11859] ? kasan_populate_vmalloc+0x70/0x70 [ 806.246533][T11859] alloc_vmap_area+0x178f/0x18c0 [ 806.251506][T11859] ? vm_map_ram+0xab0/0xab0 [ 806.256282][T11859] ? rcu_is_watching+0x11/0xa0 [ 806.261057][T11859] __get_vm_area_node+0x158/0x330 [ 806.266267][T11859] __vmalloc_node_range+0x357/0x13b0 [ 806.271577][T11859] ? sock_map_alloc+0x1ce/0x2e0 [ 806.276444][T11859] ? memset+0x1e/0x40 [ 806.280434][T11859] ? lockdep_init_map_type+0x98/0x8d0 [ 806.285815][T11859] ? free_vm_area+0x50/0x50 [ 806.290402][T11859] ? __kmem_cache_alloc_node+0x140/0x260 [ 806.296216][T11859] ? rcu_is_watching+0x11/0xa0 [ 806.300983][T11859] bpf_map_area_alloc+0xd4/0xe0 [ 806.305836][T11859] ? sock_map_alloc+0x1ce/0x2e0 [ 806.310688][T11859] sock_map_alloc+0x1ce/0x2e0 [ 806.315367][T11859] map_create+0x534/0x1000 [ 806.319793][T11859] ? bpf_lsm_bpf+0x5/0x10 [ 806.324128][T11859] __sys_bpf+0x38b/0x780 [ 806.328371][T11859] ? bpf_link_show_fdinfo+0x380/0x380 [ 806.333841][T11859] ? lock_chain_count+0x20/0x20 [ 806.338698][T11859] __x64_sys_bpf+0x78/0x90 [ 806.343119][T11859] do_syscall_64+0x4c/0xa0 [ 806.347574][T11859] ? clear_bhb_loop+0x60/0xb0 [ 806.352251][T11859] ? clear_bhb_loop+0x60/0xb0 [ 806.356921][T11859] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 806.362989][T11859] RIP: 0033:0x7fdc6e39c799 [ 806.367399][T11859] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 806.387180][T11859] RSP: 002b:00007fdc6f21d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 806.395592][T11859] RAX: ffffffffffffffda RBX: 00007fdc6e615fa0 RCX: 00007fdc6e39c799 [ 806.403617][T11859] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0600000000000000 [ 806.412114][T11859] RBP: 00007fdc6f21d090 R08: 0000000000000000 R09: 0000000000000000 [ 806.420089][T11859] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 806.428055][T11859] R13: 00007fdc6e616038 R14: 00007fdc6e615fa0 R15: 00007ffcd9546c88 [ 806.436036][T11859] [ 806.443010][T11864] netlink: 65039 bytes leftover after parsing attributes in process `syz.2.2389'. [ 806.601316][T11866] netlink: 'syz.0.2390': attribute type 10 has an invalid length. [ 806.614918][T11866] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2390'. [ 806.648264][T11866] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 806.829614][T11878] netlink: 'syz.4.2392': attribute type 10 has an invalid length. [ 806.856956][T11878] netlink: 40 bytes leftover after parsing attributes in process `syz.4.2392'. [ 806.909629][T11878] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 807.240425][T11890] device pim6reg1 entered promiscuous mode [ 807.308446][T11890] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2396'. [ 807.777242][T11895] netlink: 'syz.2.2397': attribute type 10 has an invalid length. [ 807.828834][T11897] netlink: 'syz.4.2398': attribute type 21 has an invalid length. [ 807.837774][T11897] netlink: 156 bytes leftover after parsing attributes in process `syz.4.2398'. [ 808.073748][T11912] netlink: 'syz.4.2401': attribute type 10 has an invalid length. [ 808.204092][T11916] netlink: 'syz.1.2404': attribute type 29 has an invalid length. [ 808.248665][T11916] netlink: 'syz.1.2404': attribute type 29 has an invalid length. [ 808.455804][T11925] FAULT_INJECTION: forcing a failure. [ 808.455804][T11925] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 808.479674][T11925] CPU: 1 PID: 11925 Comm: syz.1.2406 Not tainted syzkaller #0 [ 808.487185][T11925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 808.497257][T11925] Call Trace: [ 808.500533][T11925] [ 808.503477][T11925] dump_stack_lvl+0x188/0x24e [ 808.508185][T11925] ? show_regs_print_info+0x12/0x12 [ 808.513418][T11925] ? load_image+0x400/0x400 [ 808.517949][T11925] ? __lock_acquire+0x7d10/0x7d10 [ 808.523084][T11925] ? tomoyo_path_number_perm+0x205/0x650 [ 808.528832][T11925] ? tomoyo_path_number_perm+0x5a4/0x650 [ 808.534492][T11925] should_fail_ex+0x399/0x4d0 [ 808.539189][T11925] _copy_from_user+0x2c/0x170 [ 808.543869][T11925] wext_handle_ioctl+0xc4/0x1d0 [ 808.548724][T11925] ? call_commit_handler+0xf0/0xf0 [ 808.553844][T11925] sock_ioctl+0x143/0x710 [ 808.558167][T11925] ? sock_poll+0x410/0x410 [ 808.562584][T11925] ? bpf_lsm_file_ioctl+0x5/0x10 [ 808.567517][T11925] ? security_file_ioctl+0x7c/0xa0 [ 808.572626][T11925] ? sock_poll+0x410/0x410 [ 808.577033][T11925] __se_sys_ioctl+0xfa/0x170 [ 808.581628][T11925] do_syscall_64+0x4c/0xa0 [ 808.586059][T11925] ? clear_bhb_loop+0x60/0xb0 [ 808.590749][T11925] ? clear_bhb_loop+0x60/0xb0 [ 808.595435][T11925] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 808.601334][T11925] RIP: 0033:0x7f4eb8f9c799 [ 808.605749][T11925] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 808.625348][T11925] RSP: 002b:00007f4eb9e55028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 808.633764][T11925] RAX: ffffffffffffffda RBX: 00007f4eb9215fa0 RCX: 00007f4eb8f9c799 [ 808.641762][T11925] RDX: 0000200000000000 RSI: 0000000000008b34 RDI: 0000000000000005 [ 808.649740][T11925] RBP: 00007f4eb9e55090 R08: 0000000000000000 R09: 0000000000000000 [ 808.657704][T11925] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 808.665664][T11925] R13: 00007f4eb9216038 R14: 00007f4eb9215fa0 R15: 00007ffdbfc426c8 [ 808.673643][T11925] [ 808.688326][ T1277] ieee802154 phy0 wpan0: encryption failed: -22 [ 808.694669][ T1277] ieee802154 phy1 wpan1: encryption failed: -22 [ 808.839176][T11929] netlink: 'syz.1.2408': attribute type 1 has an invalid length. [ 809.337733][T11945] netlink: 'syz.1.2412': attribute type 21 has an invalid length. [ 809.404805][T11945] netlink: 156 bytes leftover after parsing attributes in process `syz.1.2412'. [ 809.648671][T11951] netlink: 'syz.0.2415': attribute type 10 has an invalid length. [ 810.198528][T11972] netlink: 40 bytes leftover after parsing attributes in process `syz.2.2420'. [ 810.222874][T11972] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 810.391973][T11981] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2423'. [ 810.429863][T11981] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 810.591652][T11982] device pim6reg1 entered promiscuous mode [ 810.974786][T11989] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2425'. [ 811.214761][T11992] netlink: 105116 bytes leftover after parsing attributes in process `syz.2.2426'. [ 811.486425][T11996] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2426'. [ 811.510902][T11996] tc_dump_action: action bad kind [ 811.842504][T12016] validate_nla: 6 callbacks suppressed [ 811.842543][T12016] netlink: 'syz.1.2434': attribute type 10 has an invalid length. [ 812.216187][T12027] netlink: 'syz.0.2436': attribute type 1 has an invalid length. [ 812.465407][T12032] netlink: 'syz.2.2437': attribute type 21 has an invalid length. [ 812.476957][T12032] netlink: 156 bytes leftover after parsing attributes in process `syz.2.2437'. [ 812.535672][T12031] netlink: 'syz.4.2438': attribute type 10 has an invalid length. [ 812.564107][T12031] netlink: 40 bytes leftover after parsing attributes in process `syz.4.2438'. [ 812.596725][T12031] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 812.618321][T12037] netlink: 63503 bytes leftover after parsing attributes in process `syz.0.2439'. [ 813.273803][T12054] FAULT_INJECTION: forcing a failure. [ 813.273803][T12054] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 813.338938][T12054] CPU: 1 PID: 12054 Comm: syz.1.2446 Not tainted syzkaller #0 [ 813.346469][T12054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 813.356545][T12054] Call Trace: [ 813.359840][T12054] [ 813.362792][T12054] dump_stack_lvl+0x188/0x24e [ 813.367489][T12054] ? show_regs_print_info+0x12/0x12 [ 813.372735][T12054] ? load_image+0x400/0x400 [ 813.377259][T12054] ? __lock_acquire+0x7d10/0x7d10 [ 813.382387][T12054] ? tomoyo_path_number_perm+0x205/0x650 [ 813.388037][T12054] ? tomoyo_path_number_perm+0x5a4/0x650 [ 813.393704][T12054] should_fail_ex+0x399/0x4d0 [ 813.398404][T12054] _copy_from_user+0x2c/0x170 [ 813.403099][T12054] wext_handle_ioctl+0xc4/0x1d0 [ 813.407977][T12054] ? call_commit_handler+0xf0/0xf0 [ 813.413129][T12054] sock_ioctl+0x143/0x710 [ 813.417467][T12054] ? sock_poll+0x410/0x410 [ 813.421900][T12054] ? bpf_lsm_file_ioctl+0x5/0x10 [ 813.426846][T12054] ? security_file_ioctl+0x7c/0xa0 [ 813.431972][T12054] ? sock_poll+0x410/0x410 [ 813.436389][T12054] __se_sys_ioctl+0xfa/0x170 [ 813.440991][T12054] do_syscall_64+0x4c/0xa0 [ 813.445417][T12054] ? clear_bhb_loop+0x60/0xb0 [ 813.450110][T12054] ? clear_bhb_loop+0x60/0xb0 [ 813.454796][T12054] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 813.460693][T12054] RIP: 0033:0x7f4eb8f9c799 [ 813.465118][T12054] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 813.484737][T12054] RSP: 002b:00007f4eb9e55028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 813.493157][T12054] RAX: ffffffffffffffda RBX: 00007f4eb9215fa0 RCX: 00007f4eb8f9c799 [ 813.501131][T12054] RDX: 00002000000000c0 RSI: 0000000000008b04 RDI: 0000000000000004 [ 813.509109][T12054] RBP: 00007f4eb9e55090 R08: 0000000000000000 R09: 0000000000000000 [ 813.517088][T12054] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 813.525078][T12054] R13: 00007f4eb9216038 R14: 00007f4eb9215fa0 R15: 00007ffdbfc426c8 [ 813.533076][T12054] [ 814.029296][T12071] netlink: 'syz.0.2452': attribute type 21 has an invalid length. [ 814.108529][T12071] netlink: 156 bytes leftover after parsing attributes in process `syz.0.2452'. [ 816.385672][T12127] netlink: 'syz.2.2470': attribute type 21 has an invalid length. [ 816.394670][T12127] netlink: 156 bytes leftover after parsing attributes in process `syz.2.2470'. [ 816.495137][T12133] netlink: 'syz.3.2474': attribute type 10 has an invalid length. [ 816.519071][T12140] netlink: 826 bytes leftover after parsing attributes in process `syz.1.2475'. [ 817.432756][T12149] netlink: 'syz.0.2478': attribute type 21 has an invalid length. [ 817.457418][T12149] netlink: 156 bytes leftover after parsing attributes in process `syz.0.2478'. [ 818.558183][T12185] netlink: 'syz.0.2491': attribute type 10 has an invalid length. [ 818.577649][T12185] netlink: 55 bytes leftover after parsing attributes in process `syz.0.2491'. [ 819.320915][T12185] device macvlan0 left promiscuous mode [ 819.356537][T12185] team0: Port device macvlan0 removed [ 819.487999][T12191] netlink: 'syz.2.2492': attribute type 10 has an invalid length. [ 819.836139][T12217] device pim6reg1 entered promiscuous mode [ 820.361759][T12226] netlink: 176 bytes leftover after parsing attributes in process `syz.0.2501'. [ 820.400270][T12234] FAULT_INJECTION: forcing a failure. [ 820.400270][T12234] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 820.440426][T12234] CPU: 1 PID: 12234 Comm: syz.3.2505 Not tainted syzkaller #0 [ 820.447950][T12234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 820.458211][T12234] Call Trace: [ 820.461498][T12234] [ 820.464427][T12234] dump_stack_lvl+0x188/0x24e [ 820.469151][T12234] ? show_regs_print_info+0x12/0x12 [ 820.474397][T12234] ? load_image+0x400/0x400 [ 820.478924][T12234] ? __lock_acquire+0x7d10/0x7d10 [ 820.483957][T12234] ? snprintf+0xe5/0x140 [ 820.488215][T12234] should_fail_ex+0x399/0x4d0 [ 820.492912][T12234] _copy_to_user+0x2c/0x130 [ 820.497521][T12234] simple_read_from_buffer+0xe3/0x150 [ 820.502996][T12234] proc_fail_nth_read+0x1a6/0x220 [ 820.508029][T12234] ? proc_fault_inject_write+0x310/0x310 [ 820.513697][T12234] ? fsnotify_perm+0x248/0x550 [ 820.518496][T12234] ? proc_fault_inject_write+0x310/0x310 [ 820.524141][T12234] vfs_read+0x2de/0xa00 [ 820.528323][T12234] ? kernel_read+0x1e0/0x1e0 [ 820.533102][T12234] ? __fget_files+0x28/0x4b0 [ 820.537701][T12234] ? __fget_files+0x28/0x4b0 [ 820.542387][T12234] ? __fget_files+0x43d/0x4b0 [ 820.547172][T12234] ? __fdget_pos+0x2ae/0x360 [ 820.551778][T12234] ? ksys_read+0x71/0x250 [ 820.556218][T12234] ksys_read+0x14c/0x250 [ 820.560485][T12234] ? vfs_write+0xa30/0xa30 [ 820.564916][T12234] ? lockdep_hardirqs_on+0x94/0x140 [ 820.570122][T12234] do_syscall_64+0x4c/0xa0 [ 820.574543][T12234] ? clear_bhb_loop+0x60/0xb0 [ 820.579250][T12234] ? clear_bhb_loop+0x60/0xb0 [ 820.583954][T12234] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 820.589860][T12234] RIP: 0033:0x7fdc6e35cfce [ 820.594456][T12234] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 820.614161][T12234] RSP: 002b:00007fdc6f21cfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 820.622588][T12234] RAX: ffffffffffffffda RBX: 00007fdc6f21d6c0 RCX: 00007fdc6e35cfce [ 820.630567][T12234] RDX: 000000000000000f RSI: 00007fdc6f21d0a0 RDI: 0000000000000007 [ 820.638540][T12234] RBP: 00007fdc6f21d090 R08: 0000000000000000 R09: 0000000000000000 [ 820.646519][T12234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 820.654489][T12234] R13: 00007fdc6e616038 R14: 00007fdc6e615fa0 R15: 00007ffcd9546c88 [ 820.662493][T12234] [ 820.898597][T12246] netlink: 'syz.4.2507': attribute type 10 has an invalid length. [ 821.537803][T12255] netlink: 'syz.3.2509': attribute type 21 has an invalid length. [ 821.545678][T12255] netlink: 156 bytes leftover after parsing attributes in process `syz.3.2509'. [ 822.701947][T12283] netlink: 'syz.3.2517': attribute type 1 has an invalid length. [ 822.729963][T12285] netlink: 'syz.0.2518': attribute type 10 has an invalid length. [ 822.763173][T12285] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2518'. [ 822.806161][T12285] netlink: 'syz.0.2518': attribute type 10 has an invalid length. [ 822.829376][T12285] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2518'. [ 822.850369][T12280] netlink: 'syz.0.2518': attribute type 10 has an invalid length. [ 822.873071][T12280] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2518'. [ 823.144106][T12291] device erspan0 left promiscuous mode [ 823.154599][T12291] bridge0: port 3(erspan0) entered disabled state [ 823.235577][T12291] device bridge_slave_1 left promiscuous mode [ 823.279071][T12291] bridge0: port 2(bridge_slave_1) entered disabled state [ 823.434138][T12291] device bridge_slave_0 left promiscuous mode [ 823.466503][T12291] bridge0: port 1(bridge_slave_0) entered disabled state [ 823.852415][T12307] netlink: 'syz.0.2525': attribute type 10 has an invalid length. [ 823.973333][T12319] device pim6reg1 entered promiscuous mode [ 824.694103][T12340] netlink: 'syz.3.2532': attribute type 1 has an invalid length. [ 824.764079][T12343] netlink: 'syz.2.2531': attribute type 7 has an invalid length. [ 825.504476][T12360] netlink: 'syz.4.2540': attribute type 10 has an invalid length. [ 825.695736][T12366] FAULT_INJECTION: forcing a failure. [ 825.695736][T12366] name failslab, interval 1, probability 0, space 0, times 0 [ 825.770826][T12366] CPU: 0 PID: 12366 Comm: syz.3.2541 Not tainted syzkaller #0 [ 825.778369][T12366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 825.788550][T12366] Call Trace: [ 825.791865][T12366] [ 825.794821][T12366] dump_stack_lvl+0x188/0x24e [ 825.799563][T12366] ? show_regs_print_info+0x12/0x12 [ 825.804809][T12366] ? load_image+0x400/0x400 [ 825.809373][T12366] ? __might_sleep+0xd0/0xd0 [ 825.814015][T12366] ? __lock_acquire+0x7d10/0x7d10 [ 825.819126][T12366] should_fail_ex+0x399/0x4d0 [ 825.823859][T12366] should_failslab+0x5/0x20 [ 825.828398][T12366] slab_pre_alloc_hook+0x59/0x310 [ 825.833474][T12366] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 825.839246][T12366] __kmem_cache_alloc_node+0x4f/0x260 [ 825.844665][T12366] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 825.850414][T12366] __kmalloc+0xa0/0x240 [ 825.854598][T12366] tomoyo_realpath_from_path+0xdf/0x5d0 [ 825.860441][T12366] ? tomoyo_path_number_perm+0x205/0x650 [ 825.866092][T12366] tomoyo_path_number_perm+0x22f/0x650 [ 825.871674][T12366] ? trace_event_raw_event_lock_acquire+0x2c0/0x2c0 [ 825.878278][T12366] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 825.883760][T12366] ? seqcount_lockdep_reader_access+0x177/0x1d0 [ 825.890090][T12366] ? __fget_files+0x28/0x4b0 [ 825.894758][T12366] ? __fget_files+0x28/0x4b0 [ 825.899437][T12366] security_file_ioctl+0x6c/0xa0 [ 825.904494][T12366] __se_sys_ioctl+0x48/0x170 [ 825.909110][T12366] do_syscall_64+0x4c/0xa0 [ 825.913554][T12366] ? clear_bhb_loop+0x60/0xb0 [ 825.918262][T12366] ? clear_bhb_loop+0x60/0xb0 [ 825.922964][T12366] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 825.929395][T12366] RIP: 0033:0x7fdc6e39c799 [ 825.933828][T12366] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 825.953447][T12366] RSP: 002b:00007fdc6f1fc028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 825.961874][T12366] RAX: ffffffffffffffda RBX: 00007fdc6e616090 RCX: 00007fdc6e39c799 [ 825.969864][T12366] RDX: 0000200000000040 RSI: 0000000000008918 RDI: 000000000000000d [ 825.977858][T12366] RBP: 00007fdc6f1fc090 R08: 0000000000000000 R09: 0000000000000000 [ 825.985847][T12366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 825.993917][T12366] R13: 00007fdc6e616128 R14: 00007fdc6e616090 R15: 00007ffcd9546c88 [ 826.002195][T12366] [ 826.367462][T12366] ERROR: Out of memory at tomoyo_realpath_from_path. [ 827.106371][T12395] sctp: [Deprecated]: syz.0.2548 (pid 12395) Use of struct sctp_assoc_value in delayed_ack socket option. [ 827.106371][T12395] Use struct sctp_sack_info instead [ 827.181215][T12398] netlink: 'syz.4.2549': attribute type 1 has an invalid length. [ 827.480022][T12411] netlink: 13 bytes leftover after parsing attributes in process `syz.4.2554'. [ 827.768106][T12417] device pim6reg1 entered promiscuous mode [ 827.949746][T12422] netlink: 'syz.3.2557': attribute type 10 has an invalid length. [ 828.323393][T12431] netlink: 160 bytes leftover after parsing attributes in process `syz.2.2561'. [ 828.333378][T12431] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 828.349668][T12432] device erspan0 left promiscuous mode [ 828.358865][T12432] bridge0: port 4(erspan0) entered disabled state [ 828.394265][T12432] bridge0: port 3(team0) entered disabled state [ 828.410068][T12432] device bridge_slave_1 left promiscuous mode [ 828.418134][T12432] bridge0: port 2(bridge_slave_1) entered disabled state [ 828.431044][T12432] device bridge_slave_0 left promiscuous mode [ 828.438276][T12432] bridge0: port 1(bridge_slave_0) entered disabled state [ 828.687974][T12444] sctp: [Deprecated]: syz.3.2564 (pid 12444) Use of struct sctp_assoc_value in delayed_ack socket option. [ 828.687974][T12444] Use struct sctp_sack_info instead [ 828.718616][T12444] netlink: 'syz.3.2564': attribute type 10 has an invalid length. [ 828.727581][T12444] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2564'. [ 828.760750][T12444] bridge0: port 1(ipvlan1) entered blocking state [ 828.770431][T12444] bridge0: port 1(ipvlan1) entered disabled state [ 828.829654][T12444] A link change request failed with some changes committed already. Interface ipvlan1 may have been left with an inconsistent configuration, please check. [ 829.469697][T12465] netlink: 126632 bytes leftover after parsing attributes in process `syz.1.2574'. [ 830.480733][T12489] device bridge_slave_1 left promiscuous mode [ 830.501875][T12489] bridge0: port 2(bridge_slave_1) entered disabled state [ 830.555024][T12489] device bridge_slave_0 left promiscuous mode [ 830.594567][T12489] bridge0: port 1(bridge_slave_0) entered disabled state [ 832.009818][T12481] delete_channel: no stack [ 832.197448][T12522] delete_channel: no stack [ 832.406776][T12536] netlink: 'syz.2.2598': attribute type 1 has an invalid length. [ 832.639356][T12543] netlink: 830 bytes leftover after parsing attributes in process `syz.1.2601'. [ 832.722106][T12543] device bond_slave_1 entered promiscuous mode [ 832.728890][T12543] device team_slave_1 entered promiscuous mode [ 832.736579][T12543] device dummy0 entered promiscuous mode [ 832.860003][T12549] netlink: 'syz.4.2603': attribute type 10 has an invalid length. [ 832.948947][T12548] device pim6reg1 entered promiscuous mode [ 833.943031][T12572] delete_channel: no stack [ 834.109110][T12581] netlink: 'syz.1.2612': attribute type 1 has an invalid length. [ 834.219425][T12589] netlink: 'syz.4.2614': attribute type 10 has an invalid length. [ 834.258168][T12589] netlink: 40 bytes leftover after parsing attributes in process `syz.4.2614'. [ 834.279310][T12589] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 834.358928][T12591] netlink: 830 bytes leftover after parsing attributes in process `syz.0.2616'. [ 834.411071][T12596] netlink: 'syz.3.2618': attribute type 10 has an invalid length. [ 834.987784][T12609] netlink: 'syz.0.2619': attribute type 10 has an invalid length. [ 835.000526][T12609] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2619'. [ 835.798000][T12619] delete_channel: no stack [ 835.859440][T12627] netlink: 'syz.0.2625': attribute type 3 has an invalid length. [ 835.873925][T12627] netlink: 132 bytes leftover after parsing attributes in process `syz.0.2625'. [ 836.238909][T12645] netlink: 830 bytes leftover after parsing attributes in process `syz.2.2630'. [ 836.309021][T12645] device bond_slave_1 entered promiscuous mode [ 836.315909][T12645] device team_slave_0 entered promiscuous mode [ 836.322473][T12645] device team_slave_1 entered promiscuous mode [ 836.328787][T12645] device dummy0 entered promiscuous mode [ 836.334823][T12645] device veth1_macvtap entered promiscuous mode [ 836.760327][T12652] netlink: 'syz.2.2634': attribute type 10 has an invalid length. [ 836.844357][T12658] netlink: 'syz.4.2635': attribute type 10 has an invalid length. [ 836.860230][T12658] netlink: 40 bytes leftover after parsing attributes in process `syz.4.2635'. [ 836.905756][T12658] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 836.986195][T12656] device pim6reg1 entered promiscuous mode [ 838.023679][T12690] netlink: 'syz.3.2643': attribute type 10 has an invalid length. [ 838.113270][T12690] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2643'. [ 838.139819][T12690] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 838.229029][T12697] netlink: 830 bytes leftover after parsing attributes in process `syz.1.2644'. [ 838.699299][T12700] netlink: 'syz.3.2646': attribute type 10 has an invalid length. [ 838.708085][T12700] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2646'. [ 838.736456][T12700] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 838.944507][T12709] netlink: 'syz.2.2650': attribute type 10 has an invalid length. [ 840.496557][T12738] FAULT_INJECTION: forcing a failure. [ 840.496557][T12738] name failslab, interval 1, probability 0, space 0, times 0 [ 840.516441][T12736] device pim6reg1 entered promiscuous mode [ 840.523505][T12738] CPU: 0 PID: 12738 Comm: syz.4.2658 Not tainted syzkaller #0 [ 840.531266][T12738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 840.541341][T12738] Call Trace: [ 840.544639][T12738] [ 840.547573][T12738] dump_stack_lvl+0x188/0x24e [ 840.552255][T12738] ? show_regs_print_info+0x12/0x12 [ 840.557460][T12738] ? load_image+0x400/0x400 [ 840.561965][T12738] ? __might_sleep+0xd0/0xd0 [ 840.566548][T12738] ? __lock_acquire+0x7d10/0x7d10 [ 840.571579][T12738] should_fail_ex+0x399/0x4d0 [ 840.576257][T12738] should_failslab+0x5/0x20 [ 840.580754][T12738] slab_pre_alloc_hook+0x59/0x310 [ 840.585819][T12738] ? apparmor_sk_alloc_security+0x74/0x100 [ 840.591658][T12738] __kmem_cache_alloc_node+0x4f/0x260 [ 840.597032][T12738] ? apparmor_sk_alloc_security+0x74/0x100 [ 840.602836][T12738] kmalloc_trace+0x26/0xe0 [ 840.607255][T12738] apparmor_sk_alloc_security+0x74/0x100 [ 840.612887][T12738] security_sk_alloc+0x6a/0xa0 [ 840.617645][T12738] sk_prot_alloc+0x101/0x210 [ 840.622234][T12738] ? sk_alloc+0x20/0x340 [ 840.626471][T12738] sk_alloc+0x36/0x340 [ 840.630534][T12738] ? bpf_ctx_init+0x163/0x1a0 [ 840.635293][T12738] ? bpf_prog_test_run_skb+0x26f/0x12a0 [ 840.640847][T12738] bpf_prog_test_run_skb+0x35e/0x12a0 [ 840.646311][T12738] ? __fget_files+0x28/0x4b0 [ 840.650925][T12738] ? __fget_files+0x43d/0x4b0 [ 840.655606][T12738] ? cpu_online+0xa0/0xa0 [ 840.659929][T12738] bpf_prog_test_run+0x31e/0x390 [ 840.664956][T12738] __sys_bpf+0x62b/0x780 [ 840.669200][T12738] ? bpf_link_show_fdinfo+0x380/0x380 [ 840.674839][T12738] ? lock_chain_count+0x20/0x20 [ 840.679687][T12738] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 840.685667][T12738] __x64_sys_bpf+0x78/0x90 [ 840.690085][T12738] do_syscall_64+0x4c/0xa0 [ 840.694503][T12738] ? clear_bhb_loop+0x60/0xb0 [ 840.699171][T12738] ? clear_bhb_loop+0x60/0xb0 [ 840.703844][T12738] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 840.709732][T12738] RIP: 0033:0x7fb494d9c799 [ 840.714137][T12738] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 840.733744][T12738] RSP: 002b:00007fb495d05028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 840.742152][T12738] RAX: ffffffffffffffda RBX: 00007fb495015fa0 RCX: 00007fb494d9c799 [ 840.750117][T12738] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 840.758089][T12738] RBP: 00007fb495d05090 R08: 0000000000000000 R09: 0000000000000000 [ 840.766049][T12738] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 840.774015][T12738] R13: 00007fb495016038 R14: 00007fb495015fa0 R15: 00007ffe15129438 [ 840.782015][T12738] [ 840.901802][T12746] netlink: 'syz.1.2659': attribute type 3 has an invalid length. [ 840.959686][T12746] netlink: 132 bytes leftover after parsing attributes in process `syz.1.2659'. [ 841.043788][T12744] netlink: 'syz.3.2661': attribute type 10 has an invalid length. [ 841.066013][T12744] team0: Device syz_tun is up. Set it down before adding it as a team port [ 841.126754][T12741] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2656'. [ 842.057782][T12775] netlink: 'syz.3.2670': attribute type 10 has an invalid length. [ 842.831314][T12802] netlink: 'syz.3.2678': attribute type 1 has an invalid length. [ 843.885870][T12823] netlink: 'syz.2.2683': attribute type 10 has an invalid length. [ 843.926988][T12823] netlink: 40 bytes leftover after parsing attributes in process `syz.2.2683'. [ 843.958781][T12823] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 844.077396][T12820] delete_channel: no stack [ 844.130850][T12830] netlink: 'syz.3.2687': attribute type 10 has an invalid length. [ 844.229938][T12832] netlink: 14 bytes leftover after parsing attributes in process `syz.4.2688'. [ 844.382677][T12832] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 844.453510][T12832] bond0 (unregistering): Released all slaves [ 844.525765][T12834] netlink: 'syz.4.2688': attribute type 6 has an invalid length. [ 844.600803][T12834] netlink: 164 bytes leftover after parsing attributes in process `syz.4.2688'. [ 844.705488][T12840] netlink: 'syz.2.2690': attribute type 1 has an invalid length. [ 844.965285][T12848] netlink: 122896 bytes leftover after parsing attributes in process `syz.0.2691'. [ 845.343441][T12863] device pim6reg1 entered promiscuous mode [ 845.605418][T12870] netlink: 'syz.4.2700': attribute type 10 has an invalid length. [ 845.617435][T12870] netlink: 40 bytes leftover after parsing attributes in process `syz.4.2700'. [ 845.627054][T12866] delete_channel: no stack [ 845.657685][T12870] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 845.705562][T12878] netlink: 'syz.3.2703': attribute type 1 has an invalid length. [ 845.973260][T12886] netlink: 'syz.2.2705': attribute type 13 has an invalid length. [ 845.982832][T12886] netlink: 152 bytes leftover after parsing attributes in process `syz.2.2705'. [ 845.995638][T12886] syz_tun: refused to change device tx_queue_len [ 846.003089][T12886] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. [ 846.029019][T12889] netlink: 'syz.3.2706': attribute type 10 has an invalid length. [ 846.174279][T12894] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 846.181871][T12894] IPv6: NLM_F_CREATE should be set when creating new route [ 846.189570][T12894] IPv6: NLM_F_CREATE should be set when creating new route [ 846.197157][T12894] IPv6: NLM_F_CREATE should be set when creating new route [ 846.549254][T12903] sctp: [Deprecated]: syz.4.2710 (pid 12903) Use of int in max_burst socket option deprecated. [ 846.549254][T12903] Use struct sctp_assoc_value instead [ 846.908641][T12911] delete_channel: no stack [ 846.968448][T12914] device pim6reg1 entered promiscuous mode [ 847.220253][T12917] netlink: 'syz.4.2716': attribute type 1 has an invalid length. [ 847.237579][T12919] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2714'. [ 847.306231][T12930] device pim6reg1 entered promiscuous mode [ 848.337070][T12939] netlink: 122896 bytes leftover after parsing attributes in process `syz.1.2724'. [ 848.381733][T12939] debugfs: Directory '!!!' with parent 'ieee80211' already present! [ 848.463285][T12945] netlink: 'syz.4.2726': attribute type 10 has an invalid length. [ 848.680038][T12957] device pim6reg1 entered promiscuous mode [ 849.064977][T12966] netlink: 'syz.1.2733': attribute type 1 has an invalid length. [ 849.074615][T12961] delete_channel: no stack [ 849.097586][T12971] delete_channel: no stack [ 849.782618][T12990] netlink: 'syz.4.2741': attribute type 10 has an invalid length. [ 849.880445][T12997] netlink: 830 bytes leftover after parsing attributes in process `syz.1.2743'. [ 850.066329][T13001] netlink: 122896 bytes leftover after parsing attributes in process `syz.3.2742'. [ 850.212759][T13001] debugfs: Directory '!!!' with parent 'ieee80211' already present! [ 850.397301][T13011] netlink: 144 bytes leftover after parsing attributes in process `syz.2.2746'. [ 850.422303][T13008] netlink: 16186 bytes leftover after parsing attributes in process `syz.0.2745'. [ 850.476517][T13011] device team_slave_0 left promiscuous mode [ 850.570320][T13011] team0: Port device team_slave_0 removed [ 850.585443][T13011] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 850.683469][T13017] netlink: 'syz.0.2747': attribute type 10 has an invalid length. [ 850.750918][T13019] netlink: 'syz.0.2747': attribute type 10 has an invalid length. [ 850.767374][T13019] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2747'. [ 850.799354][T13019] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 850.831160][T13024] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2744'. [ 850.841256][T13022] netlink: 'syz.3.2748': attribute type 1 has an invalid length. [ 850.857447][T13014] device pim6reg1 entered promiscuous mode [ 851.451366][T13049] ================================================================== [ 851.459576][T13049] BUG: KASAN: slab-out-of-bounds in __bpf_get_stackid+0x6c9/0x920 [ 851.467404][T13049] Write of size 72 at addr ffff888028bd3610 by task syz.3.2756/13049 [ 851.475478][T13049] [ 851.477808][T13049] CPU: 0 PID: 13049 Comm: syz.3.2756 Not tainted syzkaller #0 [ 851.485278][T13049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 851.486529][T13052] netlink: 830 bytes leftover after parsing attributes in process `syz.0.2758'. [ 851.495399][T13049] Call Trace: [ 851.495414][T13049] [ 851.495422][T13049] dump_stack_lvl+0x188/0x24e [ 851.495452][T13049] ? __lock_acquire+0x7d10/0x7d10 [ 851.520503][T13049] ? show_regs_print_info+0x12/0x12 [ 851.525741][T13049] ? load_image+0x400/0x400 [ 851.530282][T13049] ? __virt_addr_valid+0x465/0x540 [ 851.535444][T13049] ? __bpf_get_stackid+0x6c9/0x920 [ 851.540571][T13049] print_report+0xa8/0x210 [ 851.545034][T13049] kasan_report+0x10b/0x140 [ 851.549564][T13049] ? __bpf_get_stackid+0x6c9/0x920 [ 851.554691][T13049] kasan_check_range+0x235/0x290 [ 851.559648][T13049] ? __bpf_get_stackid+0x6c9/0x920 [ 851.564775][T13049] memcpy+0x3c/0x60 [ 851.568604][T13049] __bpf_get_stackid+0x6c9/0x920 [ 851.573560][T13049] bpf_get_stackid_pe+0x33f/0x400 [ 851.578618][T13049] bpf_prog_a448e89f4c9ad9d1+0x28/0x42 [ 851.584102][T13049] bpf_overflow_handler+0x522/0x7c0 [ 851.589413][T13049] ? bpf_overflow_handler+0xd9/0x7c0 [ 851.594713][T13049] ? perf_swevent_overflow+0x230/0x230 [ 851.600189][T13049] ? __perf_event_account_interrupt+0x187/0x280 [ 851.606449][T13049] __perf_event_overflow+0x448/0x610 [ 851.611765][T13049] perf_swevent_event+0x315/0x570 [ 851.616814][T13049] ? perf_tp_event+0xc30/0xc30 [ 851.621619][T13049] ___perf_sw_event+0x49e/0x6e0 [ 851.626497][T13049] ? ___perf_sw_event+0x180/0x6e0 [ 851.631613][T13049] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 851.638234][T13049] ? __lock_acquire+0x13cf/0x7d10 [ 851.643287][T13049] ? mark_lock+0x94/0x320 [ 851.647645][T13049] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 851.653650][T13049] ? lock_chain_count+0x20/0x20 [ 851.658525][T13049] __perf_sw_event+0x135/0x260 [ 851.663311][T13049] do_user_addr_fault+0xaea/0xb10 [ 851.668368][T13049] ? trace_hardirqs_off_finish+0x86/0x180 [ 851.674136][T13049] exc_page_fault+0x60/0x100 [ 851.678752][T13049] ? __might_fault+0xa6/0x120 [ 851.683546][T13049] asm_exc_page_fault+0x22/0x30 [ 851.688412][T13049] RIP: 0010:copy_user_enhanced_fast_string+0xa/0x40 [ 851.695053][T13049] Code: ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 8d 0c ca 89 ca eb 20 0f 01 cb 83 fa 40 72 38 89 d1 a4 31 c0 0f 01 ca c3 89 ca eb 0a 90 90 90 90 90 90 90 90 90 90 [ 851.714681][T13049] RSP: 0018:ffffc9001c55f998 EFLAGS: 00050206 [ 851.720770][T13049] RAX: ffffffff840f2201 RBX: ffff88801a2a7000 RCX: 00000000000001c0 [ 851.728836][T13049] RDX: 0000000000001000 RSI: 000020000005d000 RDI: ffff88801a2a7e40 [ 851.736937][T13049] RBP: ffffc9001c55fad8 R08: ffff88801a2a7fff R09: 1ffff11003454fff [ 851.745004][T13049] R10: dffffc0000000000 R11: ffffed1003455000 R12: 1ffff920038abfb7 [ 851.753683][T13049] R13: 000020000005c1c0 R14: 0000000000001000 R15: 00007fffffffe000 [ 851.761765][T13049] ? _copy_from_iter+0x1a1/0x1130 [ 851.766815][T13049] _copy_from_iter+0x2a9/0x1130 [ 851.771683][T13049] ? copyout_mc+0x110/0x110 [ 851.776201][T13049] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 851.782198][T13049] ? lock_chain_count+0x20/0x20 [ 851.787063][T13049] ? _raw_spin_lock_irq+0xb7/0xf0 [ 851.792145][T13049] ? _raw_spin_lock_irqsave+0x100/0x100 [ 851.797702][T13049] ? page_copy_sane+0x4e/0x390 [ 851.802474][T13049] copy_page_from_iter+0x77/0x100 [ 851.807504][T13049] pipe_write+0x87f/0x1b20 [ 851.811953][T13049] ? pipe_write+0xe11/0x1b20 [ 851.816674][T13049] ? pipe_read+0x1260/0x1260 [ 851.821284][T13049] ? wake_bit_function+0x200/0x200 [ 851.826414][T13049] ? common_file_perm+0x171/0x1c0 [ 851.831451][T13049] vfs_write+0x4b1/0xa30 [ 851.835798][T13049] ? file_end_write+0x250/0x250 [ 851.840697][T13049] ? __fget_files+0x43d/0x4b0 [ 851.845407][T13049] ? __fdget_pos+0x1d4/0x360 [ 851.850033][T13049] ? ksys_write+0x71/0x250 [ 851.854491][T13049] ksys_write+0x14c/0x250 [ 851.858848][T13049] ? __ia32_sys_read+0x80/0x80 [ 851.863675][T13049] ? lockdep_hardirqs_on+0x94/0x140 [ 851.868906][T13049] do_syscall_64+0x4c/0xa0 [ 851.873345][T13049] ? clear_bhb_loop+0x60/0xb0 [ 851.878047][T13049] ? clear_bhb_loop+0x60/0xb0 [ 851.882838][T13049] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 851.888748][T13049] RIP: 0033:0x7fdc6e39c799 [ 851.893259][T13049] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 851.912962][T13049] RSP: 002b:00007fdc6f21d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 851.921401][T13049] RAX: ffffffffffffffda RBX: 00007fdc6e615fa0 RCX: 00007fdc6e39c799 [ 851.929385][T13049] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 851.937361][T13049] RBP: 00007fdc6e432c99 R08: 0000000000000000 R09: 0000000000000000 [ 851.945335][T13049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 851.953319][T13049] R13: 00007fdc6e616038 R14: 00007fdc6e615fa0 R15: 00007ffcd9546c88 [ 851.961307][T13049] [ 851.964343][T13049] [ 851.966677][T13049] Allocated by task 13049: [ 851.971097][T13049] kasan_set_track+0x4b/0x70 [ 851.975702][T13049] __kasan_kmalloc+0x8e/0xa0 [ 851.980301][T13049] __kmalloc_node+0xb0/0x240 [ 851.984992][T13049] bpf_map_area_alloc+0x47/0xe0 [ 851.989849][T13049] prealloc_elems_and_freelist+0x86/0x1c0 [ 851.995573][T13049] stack_map_alloc+0x390/0x520 [ 852.000350][T13049] map_create+0x534/0x1000 [ 852.004788][T13049] __sys_bpf+0x38b/0x780 [ 852.009056][T13049] __x64_sys_bpf+0x78/0x90 [ 852.013482][T13049] do_syscall_64+0x4c/0xa0 [ 852.017998][T13049] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 852.023907][T13049] [ 852.026232][T13049] The buggy address belongs to the object at ffff888028bd3600 [ 852.026232][T13049] which belongs to the cache kmalloc-cg-64 of size 64 [ 852.040554][T13049] The buggy address is located 16 bytes inside of [ 852.040554][T13049] 64-byte region [ffff888028bd3600, ffff888028bd3640) [ 852.053667][T13049] [ 852.055995][T13049] The buggy address belongs to the physical page: [ 852.062504][T13049] page:ffffea0000a2f4c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888028bd3380 pfn:0x28bd3 [ 852.073962][T13049] memcg:ffff88802ea24e01 [ 852.078211][T13049] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) [ 852.085880][T13049] raw: 00fff00000000200 ffffea0000903dc0 dead000000000003 ffff888017442780 [ 852.094498][T13049] raw: ffff888028bd3380 000000008020001e 00000001ffffffff ffff88802ea24e01 [ 852.103083][T13049] page dumped because: kasan: bad access detected [ 852.109505][T13049] page_owner tracks the page as allocated [ 852.115218][T13049] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 4308, tgid 4308 (syz-executor), ts 785925399777, free_ts 785916677550 [ 852.133635][T13049] post_alloc_hook+0x173/0x1a0 [ 852.138428][T13049] get_page_from_freelist+0x1a1e/0x1ab0 [ 852.143990][T13049] __alloc_pages+0x1ec/0x4f0 [ 852.148594][T13049] alloc_slab_page+0x5d/0x160 [ 852.153281][T13049] new_slab+0x87/0x2c0 [ 852.157353][T13049] ___slab_alloc+0xbc6/0x1240 [ 852.162033][T13049] __kmem_cache_alloc_node+0x1a0/0x260 [ 852.167494][T13049] kmalloc_trace+0x26/0xe0 [ 852.171923][T13049] alloc_fdtable+0xca/0x2c0 [ 852.176434][T13049] dup_fd+0x782/0xa50 [ 852.180427][T13049] copy_files+0x72/0xe0 [ 852.184590][T13049] copy_process+0x1835/0x4030 [ 852.189268][T13049] kernel_clone+0x24b/0x900 [ 852.193774][T13049] __x64_sys_clone+0x1a7/0x220 [ 852.198541][T13049] do_syscall_64+0x4c/0xa0 [ 852.202967][T13049] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 852.208866][T13049] page last free stack trace: [ 852.213535][T13049] free_unref_page_prepare+0x8b4/0x9a0 [ 852.219009][T13049] free_unref_page+0x2e/0x3f0 [ 852.223699][T13049] __vunmap+0x856/0xa00 [ 852.227947][T13049] free_work+0x56/0x80 [ 852.232032][T13049] process_one_work+0x8a2/0x1160 [ 852.236979][T13049] worker_thread+0xaa2/0x1270 [ 852.241668][T13049] kthread+0x29d/0x330 [ 852.245754][T13049] ret_from_fork+0x1f/0x30 [ 852.250183][T13049] [ 852.252591][T13049] Memory state around the buggy address: [ 852.258220][T13049] ffff888028bd3500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 852.266370][T13049] ffff888028bd3580: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 852.274432][T13049] >ffff888028bd3600: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 852.282496][T13049] ^ [ 852.287864][T13049] ffff888028bd3680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 852.296116][T13049] ffff888028bd3700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 852.304187][T13049] ================================================================== [ 852.312262][T13049] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 852.319455][T13049] CPU: 0 PID: 13049 Comm: syz.3.2756 Not tainted syzkaller #0 [ 852.326915][T13049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 852.336975][T13049] Call Trace: [ 852.340267][T13049] [ 852.343199][T13049] dump_stack_lvl+0x188/0x24e [ 852.347898][T13049] ? memcpy+0x3c/0x60 [ 852.351890][T13049] ? show_regs_print_info+0x12/0x12 [ 852.357105][T13049] ? load_image+0x400/0x400 [ 852.361711][T13049] panic+0x2e5/0x730 [ 852.365611][T13049] ? bpf_jit_dump+0xd0/0xd0 [ 852.370123][T13049] ? _raw_spin_unlock_irqrestore+0xc1/0x120 [ 852.376123][T13049] ? _raw_spin_unlock+0x40/0x40 [ 852.380978][T13049] ? print_memory_metadata+0x314/0x400 [ 852.386450][T13049] check_panic_on_warn+0x80/0xa0 [ 852.391397][T13049] ? __bpf_get_stackid+0x6c9/0x920 [ 852.396516][T13049] end_report+0x66/0x110 [ 852.400775][T13049] kasan_report+0x118/0x140 [ 852.405302][T13049] ? __bpf_get_stackid+0x6c9/0x920 [ 852.410682][T13049] kasan_check_range+0x235/0x290 [ 852.415662][T13049] ? __bpf_get_stackid+0x6c9/0x920 [ 852.420784][T13049] memcpy+0x3c/0x60 [ 852.424600][T13049] __bpf_get_stackid+0x6c9/0x920 [ 852.429639][T13049] bpf_get_stackid_pe+0x33f/0x400 [ 852.434853][T13049] bpf_prog_a448e89f4c9ad9d1+0x28/0x42 [ 852.440316][T13049] bpf_overflow_handler+0x522/0x7c0 [ 852.445527][T13049] ? bpf_overflow_handler+0xd9/0x7c0 [ 852.450924][T13049] ? perf_swevent_overflow+0x230/0x230 [ 852.456400][T13049] ? __perf_event_account_interrupt+0x187/0x280 [ 852.462656][T13049] __perf_event_overflow+0x448/0x610 [ 852.467956][T13049] perf_swevent_event+0x315/0x570 [ 852.473000][T13049] ? perf_tp_event+0xc30/0xc30 [ 852.477801][T13049] ___perf_sw_event+0x49e/0x6e0 [ 852.482754][T13049] ? ___perf_sw_event+0x180/0x6e0 [ 852.487793][T13049] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 852.494351][T13049] ? __lock_acquire+0x13cf/0x7d10 [ 852.499488][T13049] ? mark_lock+0x94/0x320 [ 852.503845][T13049] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 852.509839][T13049] ? lock_chain_count+0x20/0x20 [ 852.514704][T13049] __perf_sw_event+0x135/0x260 [ 852.519507][T13049] do_user_addr_fault+0xaea/0xb10 [ 852.524558][T13049] ? trace_hardirqs_off_finish+0x86/0x180 [ 852.530399][T13049] exc_page_fault+0x60/0x100 [ 852.534994][T13049] ? __might_fault+0xa6/0x120 [ 852.539802][T13049] asm_exc_page_fault+0x22/0x30 [ 852.544751][T13049] RIP: 0010:copy_user_enhanced_fast_string+0xa/0x40 [ 852.551357][T13049] Code: ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 8d 0c ca 89 ca eb 20 0f 01 cb 83 fa 40 72 38 89 d1 a4 31 c0 0f 01 ca c3 89 ca eb 0a 90 90 90 90 90 90 90 90 90 90 [ 852.571055][T13049] RSP: 0018:ffffc9001c55f998 EFLAGS: 00050206 [ 852.577218][T13049] RAX: ffffffff840f2201 RBX: ffff88801a2a7000 RCX: 00000000000001c0 [ 852.585369][T13049] RDX: 0000000000001000 RSI: 000020000005d000 RDI: ffff88801a2a7e40 [ 852.593356][T13049] RBP: ffffc9001c55fad8 R08: ffff88801a2a7fff R09: 1ffff11003454fff [ 852.601370][T13049] R10: dffffc0000000000 R11: ffffed1003455000 R12: 1ffff920038abfb7 [ 852.609606][T13049] R13: 000020000005c1c0 R14: 0000000000001000 R15: 00007fffffffe000 [ 852.617678][T13049] ? _copy_from_iter+0x1a1/0x1130 [ 852.622814][T13049] _copy_from_iter+0x2a9/0x1130 [ 852.627819][T13049] ? copyout_mc+0x110/0x110 [ 852.632417][T13049] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 852.638427][T13049] ? lock_chain_count+0x20/0x20 [ 852.643294][T13049] ? _raw_spin_lock_irq+0xb7/0xf0 [ 852.648355][T13049] ? _raw_spin_lock_irqsave+0x100/0x100 [ 852.653918][T13049] ? page_copy_sane+0x4e/0x390 [ 852.658704][T13049] copy_page_from_iter+0x77/0x100 [ 852.663753][T13049] pipe_write+0x87f/0x1b20 [ 852.668198][T13049] ? pipe_write+0xe11/0x1b20 [ 852.672810][T13049] ? pipe_read+0x1260/0x1260 [ 852.677413][T13049] ? wake_bit_function+0x200/0x200 [ 852.682536][T13049] ? common_file_perm+0x171/0x1c0 [ 852.687572][T13049] vfs_write+0x4b1/0xa30 [ 852.691831][T13049] ? file_end_write+0x250/0x250 [ 852.696696][T13049] ? __fget_files+0x43d/0x4b0 [ 852.701387][T13049] ? __fdget_pos+0x1d4/0x360 [ 852.705993][T13049] ? ksys_write+0x71/0x250 [ 852.710445][T13049] ksys_write+0x14c/0x250 [ 852.714812][T13049] ? __ia32_sys_read+0x80/0x80 [ 852.719599][T13049] ? lockdep_hardirqs_on+0x94/0x140 [ 852.724808][T13049] do_syscall_64+0x4c/0xa0 [ 852.729237][T13049] ? clear_bhb_loop+0x60/0xb0 [ 852.733922][T13049] ? clear_bhb_loop+0x60/0xb0 [ 852.738616][T13049] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 852.744524][T13049] RIP: 0033:0x7fdc6e39c799 [ 852.748946][T13049] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 852.768559][T13049] RSP: 002b:00007fdc6f21d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 852.776986][T13049] RAX: ffffffffffffffda RBX: 00007fdc6e615fa0 RCX: 00007fdc6e39c799 [ 852.784962][T13049] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 852.792938][T13049] RBP: 00007fdc6e432c99 R08: 0000000000000000 R09: 0000000000000000 [ 852.800915][T13049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 852.810123][T13049] R13: 00007fdc6e616038 R14: 00007fdc6e615fa0 R15: 00007ffcd9546c88 [ 852.818138][T13049] [ 852.821621][T13049] Kernel Offset: disabled [ 852.826620][T13049] Rebooting in 86400 seconds..