last executing test programs: 3m5.640411719s ago: executing program 3 (id=75): perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) close(0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x26, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 3m4.811584077s ago: executing program 3 (id=80): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xbc, 0x0, 0x0, 0x38b7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}], 0x60}, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 3m3.323330113s ago: executing program 3 (id=85): perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000600000000000000850000009e0000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x4, '\x00', 0x0, r0, 0x1, 0x3, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000000c0)={'rose0\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000100)=0x1, 0x12) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r3, 0x0}, 0x20) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000340), 0x12) write$cgroup_pid(r1, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r1, 0x0, 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x4, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0xd0}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x1ffff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 2m58.480817954s ago: executing program 2 (id=93): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000680)='ns/cgroup\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x6, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000002000000000000000008082295"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd"], 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3, 0x503, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe, 0x4000}, 0x50) close(r3) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000009000000030000000900000001000000", @ANYRES32, @ANYBLOB="01000000001300"/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000003000000040000000c00"/28], 0x50) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r5) bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r1}, 0x8) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000080000000000000000000008500000022000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000d4448d49850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r6, 0x18000000000002a0, 0x4f, 0x0, &(0x7f00000002c0)="d2ff03076003008cb89e08f086dd", 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, 0x0) 2m58.142004084s ago: executing program 3 (id=95): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x9d, 0x1, 0x0, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x0, 0x8}, 0x10e04, 0x10008, 0x0, 0x8, 0x7fffffff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x1, 0xffffffffffffffff, 0xb) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x8}, 0x100e64, 0x400c78, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000240)=0x8) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0xffffffffffffffff, 0x0, 0x2}}, 0x10, 0x0}, 0x4040000) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1484, 0x1, @perf_bp={0x0, 0x8}, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x10, 0x6, 0x0, 0xffffffffffffffff, 0x3}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r6, 0x0, &(0x7f0000001700)=""/53}, 0x20) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000001c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x5, 0x9, 0xfffffff0, 0x0, 0x0, 0x0, 0x0, 0x2}) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = getpid() sendmsg$unix(r7, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@cred={{0x1c, 0x1, 0x2, {r9, 0xee00, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r8]}}], 0x38, 0x1c18345e2b4f02ff}, 0x20020014) syz_open_procfs$namespace(r9, &(0x7f0000000000)='ns/pid\x00') syz_open_procfs$namespace(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 2m57.783581845s ago: executing program 3 (id=98): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="18020000000000000000000001050000850000009b000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703"], 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x81, 0x0, 0x4, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x2}, 0x8080, 0x5, 0x0, 0x0, 0xed}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) gettid() r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000"], 0x48) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xb0000}, 0x805, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xc280, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair(0x1e, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r1}, &(0x7f0000000800), &(0x7f0000000840)=r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB='-ctu'], 0x5) r7 = openat$cgroup_type(r4, &(0x7f0000000040), 0x2, 0x0) write$cgroup_type(r7, &(0x7f0000000080), 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x11, 0x0, 0x0, &(0x7f00000009c0), 0x0, 0x4004, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2m56.553831466s ago: executing program 2 (id=100): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, 0x0, &(0x7f0000000080)='GPL\x00'}, 0x94) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x81, 0x0, 0x4, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x8080, 0x5, 0x0, 0x0, 0xed}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) gettid() r1 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xb0000}, 0x805, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x7, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xc280, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair(0x1e, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{}, &(0x7f0000000800), &(0x7f0000000840)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f00000001c0)=ANY=[@ANYBLOB='-ctu '], 0x5) r6 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_type(r6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x11, 0xe, 0x0, &(0x7f00000009c0)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x4004, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2m56.423430173s ago: executing program 3 (id=102): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x10}, 0x20, 0x1003, 0x4, 0x5, 0x0, 0x20000000, 0x1007}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000400000000dfffff", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4062, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="17000000000000090000000e0000000000000000", @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="0500000004000000ffdf6a000700000000000000", @ANYRES32, @ANYBLOB="00000000e7172e3c55639cbf40f0e2980c00120080000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0300000013de4b28040a00000000100000000000beca67bc4239c3fe2c0d5ae134275a52ddfc73dc0e2765f334dd084940c50d36a8d0d9ae40120b3967242bcc09a3da9f0b1889a00b92a93fe607e0003b1401bd1061579c9dbd58a71b3e33b118687bdad4a57cc81850e953152bdc00c6431de51e7b6cc6215020bb609bed23c3edfab3809214a9bb4fd154bc8c3e2f11be4c11f36b0305ba454cac3612f3269b2ef4bc7f78a1afbac4054438c83d63f4dc3320d18de3fa8f8a52aefd8bdb24b53df40b7f510631526a7357a91b2a228a72d1b831ad930cdd8087011c65c0524716f8", @ANYRES64=r3, @ANYRESOCT=r5, @ANYRES16=r3, @ANYBLOB='\x00'/28], 0x48) bpf$OBJ_PIN_MAP(0x9, &(0x7f0000000180)=@generic={&(0x7f00000002c0)='./file0\x00', 0x1}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_pid(r6, &(0x7f0000000100)=r0, 0x12) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003}, 0x38) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) 2m40.711999364s ago: executing program 32 (id=102): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x10}, 0x20, 0x1003, 0x4, 0x5, 0x0, 0x20000000, 0x1007}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000400000000dfffff", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4062, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="17000000000000090000000e0000000000000000", @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="0500000004000000ffdf6a000700000000000000", @ANYRES32, @ANYBLOB="00000000e7172e3c55639cbf40f0e2980c00120080000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0300000013de4b28040a00000000100000000000beca67bc4239c3fe2c0d5ae134275a52ddfc73dc0e2765f334dd084940c50d36a8d0d9ae40120b3967242bcc09a3da9f0b1889a00b92a93fe607e0003b1401bd1061579c9dbd58a71b3e33b118687bdad4a57cc81850e953152bdc00c6431de51e7b6cc6215020bb609bed23c3edfab3809214a9bb4fd154bc8c3e2f11be4c11f36b0305ba454cac3612f3269b2ef4bc7f78a1afbac4054438c83d63f4dc3320d18de3fa8f8a52aefd8bdb24b53df40b7f510631526a7357a91b2a228a72d1b831ad930cdd8087011c65c0524716f8", @ANYRES64=r3, @ANYRESOCT=r5, @ANYRES16=r3, @ANYBLOB='\x00'/28], 0x48) bpf$OBJ_PIN_MAP(0x9, &(0x7f0000000180)=@generic={&(0x7f00000002c0)='./file0\x00', 0x1}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_pid(r6, &(0x7f0000000100)=r0, 0x12) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003}, 0x38) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) 2m39.702759072s ago: executing program 2 (id=106): perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x9}, 0x8080, 0x5, 0x0, 0x0, 0xed}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000d60000000900000005"], 0x50) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) sendmsg$unix(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[], 0x18}, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, 0x0) close(r4) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002340)={0x0, 0x0, &(0x7f0000001680), &(0x7f0000002300), 0x8001, r0}, 0x38) 2m37.812004522s ago: executing program 2 (id=110): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="18020000000000000000000001050000850000009b000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703"], 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x81, 0x0, 0x4, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x2}, 0x8080, 0x5, 0x0, 0x0, 0xed}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) gettid() r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000"], 0x48) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xb0000}, 0x805, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xc280, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair(0x1e, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r1}, &(0x7f0000000800), &(0x7f0000000840)=r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB='-ctu'], 0x5) r7 = openat$cgroup_type(r4, &(0x7f0000000040), 0x2, 0x0) write$cgroup_type(r7, &(0x7f0000000080), 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x11, 0x0, 0x0, &(0x7f00000009c0), 0x0, 0x4004, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2m36.093225822s ago: executing program 2 (id=114): r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/net\x00') r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8100, 0xc8, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f1100db5b686158bbcfe8875a65969ff57b03000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) 2m35.863601635s ago: executing program 2 (id=115): r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 2m20.321921916s ago: executing program 33 (id=115): r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 3.920339463s ago: executing program 1 (id=837): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_freezer_state(r0, &(0x7f0000000100), 0x2, 0x0) write$cgroup_freezer_state(r2, &(0x7f0000000200)='FREEZING\x00', 0x9) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000006c0)={r0, 0x0, 0xfffffffffffffdcc, 0x0, &(0x7f0000000740)="3d25ab32411944deee9bbee3fb9b0a624cf49be9ba9bc9265a2676782265a12ee9a17322d38e782bd167e5ee001ebcda6ef5b21e6ce1444271a8f8a74aca37ed14a25d3538616509560b78fd571fb9f82d5b50671f0f8631629d06c1842b9eb8ce1300fa92ea89d971a233958c0c05d04ef6302467c597f69d7b8d09e8ee72953a7041c07532925b0af39dc8f7cbf83be37e4d5acf4a246f56e839d25c4ba18cd559522a451ed6957407a7d3d324258b24304a1a879f7ffb36377c63dcff46df06227bb8adacd7f1a42cbed8b8e5847c76a096a49562444f6963e72670f899c42a83d2497b64b9290f6141ba343d43e53db3d146a76222", 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)=ANY=[@ANYRES32=r0, @ANYRES32=r3, @ANYBLOB="160000001c00000000000000", @ANYRES32, @ANYBLOB="2c5cb4865829c39b2d0e4972028b9c4aea2f5ca9ef0387cb434cf0f0a82c900bc3cdcf836a65f273c417c08c22af5759cec84acebd61a89490d3c05090b485a377d8180178c976b45c57ac5fc6409fadefca911cd1", @ANYRES64=0x0], 0x20) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000cbffffff00000000000000008500000041000000850000005000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) r5 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x200000000000003, 0x106) r7 = socket$kcm(0x2, 0x922000000001, 0x106) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='pids.events\x00', 0x26e1, 0x0) r9 = socket$kcm(0x2, 0x2, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r9, 0x1, 0x2e, &(0x7f0000000640)=r8, 0x4) recvmsg$kcm(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0) recvmsg$kcm(r7, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x2100) close(r0) sendmsg$tipc(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)="174a8a1c08079feec019b8c7abf2e5046bd083e9bc", 0x15, 0x24000840}, 0x20040089) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x3406c096) 3.847341408s ago: executing program 4 (id=838): socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x6c, 0x2, 0x2, 0x8, 0x9, 0x0, 0x6, 0x0, 0xc, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x8}, 0x2000, 0xff, 0x9, 0x0, 0x4, 0x145d, 0x1, 0x0, 0x3f8, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x200000000000001, 0x106) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x8, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x46fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x15, 0x5, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x4000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0x3) socket$kcm(0xa, 0x5, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004e4783c300000"], 0x0, 0x26}, 0x20) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000001c40)) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x8, 0x4, 0x4, 0x9}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000009c0)={{r4}, &(0x7f0000000600), 0x0}, 0x20) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000100)=r3, 0x4) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x2, 0x4, 0x6, 0x1, 0x1000, 0xffffffffffffffff, 0xfffffffc}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r6, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$inet(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000c40)="02", 0x1}], 0x1}, 0x408c4) 3.845559508s ago: executing program 0 (id=840): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x4c, &(0x7f0000000000), 0x4) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x5, 0x4, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000500)=[{}], 0x1}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB='V?\x00'], 0xfe33) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0xf}, 0x90208, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002300000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b708000000bc7a007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r6}, 0xc) socket$kcm(0xa, 0x2, 0x73) r7 = socket$kcm(0xa, 0x2, 0x73) sendmsg$inet(r7, &(0x7f0000001180)={&(0x7f0000000000)={0xa, 0x0, @multicast2}, 0x10, &(0x7f0000001080)=[{&(0x7f0000000040)}, {&(0x7f0000001040)}], 0x2, &(0x7f00000010c0)=[@ip_tos_int={{0x14, 0x29, 0xb, 0xfc00}}, @ip_tos_u8={{0x11, 0x29, 0x4}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @remote}}}], 0x50}, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x339) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r8}, 0x8) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x2400, 0xfff) close(r0) 3.263934591s ago: executing program 5 (id=842): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x800000, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1, 0x4, 0xa, 0xc}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r3, r2}, 0xc) 2.997825277s ago: executing program 1 (id=843): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002d40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = gettid() sendmsg$unix(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000007c0)='>', 0x1}], 0x1, &(0x7f0000001040)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=0x0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="1c000000000000000100000402000000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="e5ffff6e18"], 0xa0}, 0x4004881) 2.695321404s ago: executing program 5 (id=845): r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030033000b63d25a80648c2594f91324fc60100c21", 0x17}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x922000000001, 0x106) setsockopt$sock_attach_bpf(r2, 0x1, 0xf, &(0x7f00000002c0), 0x4) perf_event_open(&(0x7f0000000800)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xb0}, 0x0, 0xfffffffffffffffd, 0x0, 0x4, 0x0, 0x3, 0x4, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, &(0x7f0000000180)={&(0x7f0000001340)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7}, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000040)="b8b2cc1e00c1dba49d23bb6688fb", 0xe}], 0x1}, 0x0) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000500)="c00e020023000b11d25a806f8c63040f151347000000000000c137153e37420248018000f01700d1bd00000000000010c3568c524be9cc6c14eab2538bf17a8c4490375ee88e124ad763e4cb0f814c2a44d0167a55b2fe61241535a0cf3119cbc98aba3345474375ec9f041a4501477902926ba7cba75bbb2c58cd", 0x7b}], 0x1}, 0x0) r4 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0xc001, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000002240)=ANY=[@ANYBLOB], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=r0, 0xd, 0x1, 0x1ff, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)=[0x0]}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000300)="2e00000011008188040f80ec59acbc0413a181004000000004000000000000000e000a000d00000002800200121f", 0x2e}], 0x1}, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={&(0x7f0000000380)="e1d8c5727ddcb23c55e5c00c9c72e2d6b3daeea666da6c41ddc71600326e28eb83258b8c7d185f142f3d0fc6d555683267c8a8f1e7b5e4fc53d9a06160cde2783a3e0e396eea19d8264db2ddb543ce661f04756bb4780f33911ef903ed970e6a0caeffef49c25f44507944e047663c7324407c01924f0cd6d3b9786cf9ee44491f84b94ca017b20bbfbcb7820fbfd4c2835f89af55b3fd40bc07fcbaa9837aa96b9d29b28d54436036438b8bd3885168cd4c68c3df282bb2c9420863e3cd63d44f05ef0342c5a5745266b6b4d4a125ce5c5cdba856ff369b2aaa4d", &(0x7f0000000c80)=""/143, &(0x7f0000000d40)="209b79cf89340c9fffdb4435772d96cf78df07bd9f1ed1848fb08e7c2924d643aef9b9594979cef5ead0aa7db7820cd299011ed4fea6b1aebcf3b28b4704ff7fdba5735ca665da05eb8a36eac08ec4454b2f577b451cb95bf1f396af44dd36f5f2f64a43066958ecaec55649826b0a9b3aa2e2f2f78194c8f45fb7fdd9b93866fbfd4717c557e61066a243df1765337fcc54e0054e6cf3", &(0x7f0000000e00)="06611c4b0c6d6d8ffb51693e4c34c1ca9464740d5734eda708ea45b22730538bd0c7827be19993de61a2cd079c902a8343b8e5dbdc652eaaccbb68ea33c481d47fca221c8cf4c4927bb95b3bf8a44863bbc5a789d2728b86529e24a26a972f69eacb0b591c2f7b176df7a3ba2b7e0dd5286e833cf9a05d95975006f9fa094497382296e96a585ea56c91e6535765d2e93769db74cd82b32140c299639ec54bf9a1da4b6773bf77d6a3634becf22a6c6accf34cb477d26d908ccee3ba89f7d794e39cca6d", 0x8, r0}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000000680)="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", 0x5e7}], 0x1}, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b11d25a806c8c6f94f90424fc601000407a0a000600053582c137153e37000c11802f2ff4070300", 0x33fe0}], 0x1, 0x0, 0x0, 0x35}, 0x0) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x1) syz_clone(0x10222000, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000340)="ec81178d76e1554846228ba0c5e7bf418f22e61086e1a0c647351ec305d39674dea9d0d6baa71cd6baba7c1dd1e9668c3b939a69e085b218488c1a4d4b061f12") 2.641541208s ago: executing program 1 (id=846): r0 = socket$kcm(0x2, 0x922000000001, 0x106) sendmsg$kcm(r0, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x20040000) setsockopt$sock_attach_bpf(r0, 0x1, 0x23, &(0x7f0000000000), 0xff7b) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4010) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x2e, 0x0, 0x0}, 0x94) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xff0f000020000080) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={&(0x7f0000000100)=@ieee802154={0x24, @long={0x3, 0x2, {0xaaaaaaaaaaaa0102}}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000180)="27031c0016001400020000000000000006e1f0000000894f000f1102ee1680ca82973d2bd4b8", 0x26}, {&(0x7f0000000280)="7d3ed2ea1f2f23edbb324820e73b5f4b1100201a03df64a4853ed1b39e5d175223317057", 0x24}, {&(0x7f0000000340)="551d389992c228e384254107", 0xc}], 0x3}, 0x24000008) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x20, &(0x7f0000000280)={&(0x7f0000000140)=""/102, 0x66, 0x0, &(0x7f00000001c0)=""/158, 0x9e}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x4, 0x0, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0xf, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r4}, 0x94) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="33fe0000180091c8b14a0778a8123d181d"], 0xfe33) 2.548183013s ago: executing program 0 (id=847): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000300000000000000000000f195"], 0x0}, 0x94) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0xf, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xc, &(0x7f0000000780)=ANY=[], &(0x7f0000000040)='GPL\x00', 0xc, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0xe, 0x27, &(0x7f00000000c0)="c1188e19b95d02ff4284860186dd", 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x27) 2.195198653s ago: executing program 1 (id=848): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0x3}, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x6, 0xfffffffffffffff7}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x4) close(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='pids.current\x00', 0x100002, 0x0) r6 = syz_clone(0x8002200, &(0x7f0000000000)="e7c8bfd2748f2688b7c6556efb00eea512ed975abdf28800afb7d51a4a58c2c5463d8e3ec2a51e1d1ed2a25654daec66a047d9cdf35b07afc75f8d981fec25eab0ffb17e793645efc148e02bf76e69b5e8c33e4f043b3d967ee1b8e4bd0a2205139dbb37c9c616be628878d1699f843b170245a2353178854da495bc41f71ead68abe4f6aa0c4c78484de146b6f4ca0650f601c26ddfcc66131dec4d37aea16bb3bb786eef76bc7c0f3eb68cdf2904f0788267ff26f25f79f34189e1be196b7f62fbbd4b07abab3a73956ef65edb165fe5742c81f2ce66e153a1e360", 0xdc, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000200)="b75aeffe564070308c7a1b81") syz_open_procfs$namespace(r6, &(0x7f0000000240)='ns/user\x00') write$cgroup_type(r5, &(0x7f0000000180), 0x40010) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r7, &(0x7f0000000180), 0x40010) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40010) r9 = syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r11 = openat$cgroup_procs(r10, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r11, &(0x7f00000005c0)=r9, 0x12) syz_open_procfs$namespace(r9, &(0x7f0000000280)='ns/ipc\x00') write$cgroup_type(r3, &(0x7f0000000180), 0x40001) 2.194766503s ago: executing program 4 (id=849): r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r1 = socket$kcm(0x2, 0x5, 0x84) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x77, 0x0, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000080)=@ringbuf={{}, {}, {}, [@call]}, 0x0}, 0x90) setsockopt$sock_attach_bpf(r3, 0x29, 0x23, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000003c0)={@map=r2, 0xffffffffffffffff, 0x38, 0x20}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000f00)={{r2}, &(0x7f00000001c0), 0x0}, 0x20) write$cgroup_subtree(r2, &(0x7f0000001b80)={[{0x2b, 'rdma'}, {0x6, 'net'}, {0x2d, 'net_prio'}, {0x2d, 'rlimit'}, {0x2d, 'cpuacct'}]}, 0x26) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1}, 0x0) recvmsg$kcm(r5, 0x0, 0x40016102) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfd, &(0x7f0000000040)=[{&(0x7f00000000c0)="2effc30010008188040f46ecdb4cb9cca7480ef43c000000e3bd6efb440009000e000a0010000000ba8000001201", 0x2e}], 0x1}, 0x0) 2.108068789s ago: executing program 0 (id=850): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000000c0)) r0 = socket$kcm(0xf, 0x3, 0x2) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'veth1_to_bridge\x00', @random="02000400ac14"}) sendmsg$inet(r0, &(0x7f0000003780)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="020b0700fc670000e4a17c45c8d260c9", 0x33fe0}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@exit]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) 1.984110036s ago: executing program 5 (id=851): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0xa4840, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000003880), 0x8) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x94) r2 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r1}, 0x8) close(r2) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000003900)=@generic={&(0x7f00000038c0)='./file0\x00', 0x0, 0x8}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002d40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x880) r5 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r5, 0x0, 0x0) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0x9b, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000200)=ANY=[@ANYBLOB="050000000000000071115e00000000008510000002000000850000005500000095000000000000009500a50500000000593d99973ab8bd84c7ae49ffb03398929787e599d43d73bfa7fbad380654b3dbd19705b578dd896a48070306cbb723154d92a6c9ba4e724ca3d4191cb2"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x94) r8 = gettid() sendmsg$unix(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000007c0)='>', 0x1}], 0x1, &(0x7f0000001040)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r4, @ANYRES32=r3, @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="1c000000000000000100000402000000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r3, @ANYBLOB="e5ffff"], 0xa0}, 0x4004881) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000002880)=""/4096) socket$kcm(0xa, 0x922000000003, 0x11) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r9 = socket$kcm(0x10, 0x100000000002, 0x4) sendmsg$kcm(r9, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000200)="39000000140081ae00002c000500015601618575e285af0180000000171300883795c04a31ba377a1b2cc32b38d3740000ffffffffffffffff", 0x39}], 0x1, 0x0, 0x0, 0xc00e}, 0x0) socket$kcm(0xa, 0x2, 0x73) 1.945923668s ago: executing program 4 (id=852): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_freezer_state(r0, &(0x7f0000000100), 0x2, 0x0) write$cgroup_freezer_state(r2, &(0x7f0000000200)='FREEZING\x00', 0x9) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000006c0)={r0, 0x0, 0xfffffffffffffdcc, 0x0, &(0x7f0000000740)="3d25ab32411944deee9bbee3fb9b0a624cf49be9ba9bc9265a2676782265a12ee9a17322d38e782bd167e5ee001ebcda6ef5b21e6ce1444271a8f8a74aca37ed14a25d3538616509560b78fd571fb9f82d5b50671f0f8631629d06c1842b9eb8ce1300fa92ea89d971a233958c0c05d04ef6302467c597f69d7b8d09e8ee72953a7041c07532925b0af39dc8f7cbf83be37e4d5acf4a246f56e839d25c4ba18cd559522a451ed6957407a7d3d324258b24304a1a879f7ffb36377c63dcff46df06227bb8adacd7f1a42cbed8b8e5847c76a096a49562444f6963e72670f899c42a83d2497b64b9290f6141ba343d43e53db3d146a76222", 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)=ANY=[@ANYRES32=r0, @ANYRES32=r3, @ANYBLOB="160000001c00000000000000", @ANYRES32, @ANYBLOB="2c5cb4865829c39b2d0e4972028b9c4aea2f5ca9ef0387cb434cf0f0a82c900bc3cdcf836a65f273c417c08c22af5759cec84acebd61a89490d3c05090b485a377d8180178c976b45c57ac5fc6409fadefca911cd1", @ANYRES64=0x0], 0x20) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000cbffffff00000000000000008500000041000000850000005000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) r5 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x200000000000003, 0x106) r7 = socket$kcm(0x2, 0x922000000001, 0x106) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='pids.events\x00', 0x26e1, 0x0) r9 = socket$kcm(0x2, 0x2, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r9, 0x1, 0x2e, &(0x7f0000000640)=r8, 0x4) recvmsg$kcm(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0) recvmsg$kcm(r7, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x2100) close(r0) sendmsg$tipc(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)="174a8a1c08079feec019b8c7abf2e5046bd083e9bc", 0x15, 0x24000840}, 0x20040089) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x3406c096) 1.752670479s ago: executing program 0 (id=853): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1, 0x4, 0xa, 0xc}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r3, r2}, 0xc) 1.718799901s ago: executing program 5 (id=854): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002d40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = gettid() sendmsg$unix(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000007c0)='>', 0x1}], 0x1, &(0x7f0000001040)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=0x0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="1c000000000000000100000402000000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="e5ffff6e18"], 0xa0}, 0x4004881) 1.457954297s ago: executing program 5 (id=855): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x7, 0x17, &(0x7f00000007c0)=ANY=[@ANYBLOB="188000000069e864f8cca3e0b50000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf09000000000000c6090100000003e70600000006000000180100002020702500000000002020207b9af8ff00000000ae9100000000000037010000f8ffffffb702000008000000b70300000000000114000000060000005c93000000000000b5030000000000008500000076000000b7000000000000009500000000000000"], &(0x7f0000000540)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0xc, &(0x7f0000000040)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x9}, @jmp={0x5, 0x1, 0x6, 0xa, 0x3, 0x1}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f0000000680)='syzkaller\x00', 0xa, 0x1016, &(0x7f0000001880)=""/4118, 0x41100, 0x2a}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000240)}, 0x0, 0x0, 0x200, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0xec, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000280), 0x6}, 0x828, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000120000007f00000001"], 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001380)={r1, &(0x7f00000004c0)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x30, 0x0, r2, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x2}, 0x50) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r3 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r3, &(0x7f0000000040)={0x0, 0xf, &(0x7f0000000080)=[{&(0x7f00000000c0)="0207070002000000e4a17c45c8d260c90ec56959a440278950ff8cdca342f51686908ea4fe07dee035abee82755979fbd7991b71517d20096811c5a663a947eaf378bf56aaccdde0d91d2fa08aba131d91a15f81bfd1e961e534a605e9196747aaf27c0ec3994018ec333b40070beae950827d3efce8a34af6c67c60ee83b76c1132f55a7ccf7843a9a1de5284a60a57f66fa52701bccb915def033b664bc63242c782ecc7", 0x10}], 0x1}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5b, &(0x7f0000000340)='cgroup\x00\xafK\x12\xca\xe6\xc9\xa1\xa0x\x00\x12$\'\xce\x86\xabc\x1d\xbf\xbb\x19\xaf\x02,\x1e\xf7\xab\x18&\xd0\xe4\xde\x00H\xd3\xf9ad\xf4\x06\xcf:C\xc3s\xe0\xc0\x99j\xd5\xbf\x93\x9e\xfe\x9f\n\xb9\xef|yh+b\xd1;E\xe8_\xa5z:\xd2\xa2(\x9a\x8dK2\x98\x8c\x7f}\xa5u'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r5 = socket$kcm(0x25, 0x1, 0x0) recvmsg(r5, 0x0, 0x40010040) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB], 0x0, 0x5a}, 0x28) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a089, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x2018, 0x0, 0x0, 0x8, 0x1000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x8, [@enum, @typedef={0x6, 0x0, 0x0, 0x8, 0x3}, @func={0x2, 0x0, 0x0, 0xc, 0x4}, @func_proto]}, {0x0, [0x0, 0x61, 0x2e, 0x0, 0x0, 0x61]}}, 0x0, 0x50}, 0x28) 1.273139167s ago: executing program 1 (id=856): r0 = socket$kcm(0x2, 0x922000000001, 0x106) sendmsg$kcm(r0, &(0x7f0000001600)={0x0, 0x0, 0x0}, 0x20040000) setsockopt$sock_attach_bpf(r0, 0x1, 0x23, &(0x7f0000000000), 0xff7b) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4010) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x6, 0x2e, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xff0f000020000080) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, 0x0, 0x24000008) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x20, &(0x7f0000000280)={&(0x7f0000000140)=""/102, 0x66, 0x0, &(0x7f00000001c0)=""/158, 0x9e}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x4, 0x0, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0xf, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r4}, 0x94) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="33fe0000180091c8b14a0778a8123d181d"], 0xfe33) 851.767441ms ago: executing program 1 (id=857): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x3, 0xc, &(0x7f0000000140)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7}, [@call={0x85, 0x0, 0x0, 0x13}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}, {0x85, 0x0, 0x0, 0x7b}}]}, &(0x7f0000000040)='GPL\x00', 0xb, 0x0, 0x0, 0x41000}, 0x94) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x400000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x80, 0x16, 0x57, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x118298, 0x7fd, 0x0, 0x0, 0x0, 0x7, 0xffff, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x3, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @sched_cls=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000000060000005650c2639388080000000833", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000500), 0xce, r4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f00000006c0)=ANY=[@ANYRESOCT=r1, @ANYBLOB="9e4139eb497666421366dddf97d55f2b925339d8e43975c2dd4dbd93d9c05b5cd918d03975f951f72c248d4e27f31994eb954c", @ANYRES64=r0, @ANYRESHEX=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x1900000000000000, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) socket$kcm(0x10, 0x3, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1, 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x46}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x11, 0x0, 0x0, 0x0, 0xa, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x8738969e8efb476b) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x72bd1de2ad10b2b3, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000710036000000000095000300"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x9, 0x0, 0x1, 0x9, 0x0, 0x3, 0x80000, 0xf, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000001c0), 0xe}, 0x1000, 0x3, 0x0, 0x6, 0x0, 0x971, 0x9, 0x0, 0x1, 0x0, 0x5}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0xe) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8940, &(0x7f0000000080)) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030031000b12d25a80648c2594f90124fc603406034002200600053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 850.848491ms ago: executing program 0 (id=865): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1, 0x4, 0xa, 0xc}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r3, r2}, 0xc) 815.413533ms ago: executing program 4 (id=858): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000300000000000000000000f195"], 0x0}, 0x94) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0xf, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xc, &(0x7f0000000780)=ANY=[], &(0x7f0000000040)='GPL\x00', 0xc, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0xe, 0x27, &(0x7f00000000c0)="c1188e19b95d02ff4284860186dd", 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x27) 529.87175ms ago: executing program 0 (id=859): close(0xffffffffffffffff) r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[], 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x3, 0x3, 0x9, 0x1, 0xa8}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x2340, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random}) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8cfffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbb1d}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001000000"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r4}, 0x4) close(0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x3, 0x0, &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x41100}, 0x94) recvmsg$unix(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x1c0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x13) ioctl$TUNSETCARRIER(r5, 0x400454e2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r7}, &(0x7f0000000580)=0x2, &(0x7f00000005c0)=r6}, 0x20) 529.4737ms ago: executing program 4 (id=860): r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r1 = socket$kcm(0x2, 0x5, 0x84) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x77, 0x0, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000080)=@ringbuf={{}, {}, {}, [@call]}, 0x0}, 0x90) setsockopt$sock_attach_bpf(r3, 0x29, 0x23, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000003c0)={@map=r2, 0xffffffffffffffff, 0x38, 0x20}, 0x20) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000f00)={{r2}, &(0x7f00000001c0), 0x0}, 0x20) write$cgroup_subtree(r2, &(0x7f0000001b80)={[{0x2b, 'rdma'}, {0x6, 'net'}, {0x2d, 'net_prio'}, {0x2d, 'rlimit'}, {0x2d, 'cpuacct'}]}, 0x26) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1}, 0x0) recvmsg$kcm(r5, 0x0, 0x40016102) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfd, &(0x7f0000000040)=[{&(0x7f00000000c0)="2effc30010008188040f46ecdb4cb9cca7480ef43c000000e3bd6efb440009000e000a0010000000ba8000001201", 0x2e}], 0x1}, 0x0) 137.225832ms ago: executing program 5 (id=861): socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x6c, 0x2, 0x2, 0x8, 0x9, 0x0, 0x6, 0x0, 0xc, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x8}, 0x2000, 0xff, 0x9, 0x0, 0x4, 0x145d, 0x1, 0x0, 0x3f8, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x200000000000001, 0x106) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x8, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x46fa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x15, 0x5, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x4000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0x3) socket$kcm(0xa, 0x5, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004e4783c300000"], 0x0, 0x26}, 0x20) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000001c40)) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x8, 0x4, 0x4, 0x9}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000009c0)={{r4}, &(0x7f0000000600), 0x0}, 0x20) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000100)=r3, 0x4) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x2, 0x4, 0x6, 0x1, 0x1000, 0xffffffffffffffff, 0xfffffffc}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r6, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$inet(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000c40)="02", 0x1}], 0x1}, 0x408c4) 0s ago: executing program 4 (id=862): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0xa4840, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000003880), 0x8) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x94) r2 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r1}, 0x8) close(r2) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000003900)=@generic={&(0x7f00000038c0)='./file0\x00', 0x0, 0x8}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002d40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x880) r5 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r5, 0x0, 0x0) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0x9b, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000200)=ANY=[@ANYBLOB="050000000000000071115e00000000008510000002000000850000005500000095000000000000009500a50500000000593d99973ab8bd84c7ae49ffb03398929787e599d43d73bfa7fbad380654b3dbd19705b578dd896a48070306cbb723154d92a6c9ba4e724ca3d4191cb2"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x94) r8 = gettid() sendmsg$unix(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000007c0)='>', 0x1}], 0x1, &(0x7f0000001040)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r4, @ANYRES32=r3, @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="1c000000000000000100000402000000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r3, @ANYBLOB="e5ffff6e"], 0xa0}, 0x4004881) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000002880)=""/4096) socket$kcm(0xa, 0x922000000003, 0x11) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r9 = socket$kcm(0x10, 0x100000000002, 0x4) sendmsg$kcm(r9, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000200)="39000000140081ae00002c000500015601618575e285af0180000000171300883795c04a31ba377a1b2cc32b38d3740000ffffffffffffffff", 0x39}], 0x1, 0x0, 0x0, 0xc00e}, 0x0) socket$kcm(0xa, 0x2, 0x73) kernel console output (not intermixed with test programs): 0000000000008946 RDI: 000000000000000e [ 234.466703][ T7665] RBP: 00007f1a14125090 R08: 0000000000000000 R09: 0000000000000000 [ 234.474822][ T7665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 234.482844][ T7665] R13: 00007f1a13416038 R14: 00007f1a13415fa0 R15: 00007ffeb3c1d1d8 [ 234.490930][ T7665] [ 234.680456][ T7665] ERROR: Out of memory at tomoyo_realpath_from_path. [ 234.971359][ T7684] FAULT_INJECTION: forcing a failure. [ 234.971359][ T7684] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 235.007330][ T7684] CPU: 1 PID: 7684 Comm: syz.5.482 Not tainted syzkaller #0 [ 235.014816][ T7684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 235.024935][ T7684] Call Trace: [ 235.028351][ T7684] [ 235.031331][ T7684] dump_stack_lvl+0x18c/0x250 [ 235.036092][ T7684] ? show_regs_print_info+0x20/0x20 [ 235.041446][ T7684] ? load_image+0x400/0x400 [ 235.046052][ T7684] ? __might_fault+0xaa/0x120 [ 235.050805][ T7684] ? __lock_acquire+0x7d40/0x7d40 [ 235.056003][ T7684] should_fail_ex+0x39d/0x4d0 [ 235.061077][ T7684] _copy_from_user+0x2f/0xe0 [ 235.065749][ T7684] __sys_bpf+0x23e/0x890 [ 235.070065][ T7684] ? bpf_link_show_fdinfo+0x390/0x390 [ 235.075526][ T7684] ? lock_chain_count+0x20/0x20 [ 235.080441][ T7684] __x64_sys_bpf+0x7c/0x90 [ 235.084907][ T7684] do_syscall_64+0x55/0xa0 [ 235.089375][ T7684] ? clear_bhb_loop+0x40/0x90 [ 235.094100][ T7684] ? clear_bhb_loop+0x40/0x90 [ 235.098835][ T7684] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 235.104808][ T7684] RIP: 0033:0x7ff82659acb9 [ 235.109263][ T7684] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 235.128901][ T7684] RSP: 002b:00007ff8273ac028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 235.137532][ T7684] RAX: ffffffffffffffda RBX: 00007ff826815fa0 RCX: 00007ff82659acb9 [ 235.145538][ T7684] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000020 [ 235.153535][ T7684] RBP: 00007ff8273ac090 R08: 0000000000000000 R09: 0000000000000000 [ 235.161549][ T7684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 235.169548][ T7684] R13: 00007ff826816038 R14: 00007ff826815fa0 R15: 00007ffe4ab23a58 [ 235.177565][ T7684] [ 235.551277][ T7693] FAULT_INJECTION: forcing a failure. [ 235.551277][ T7693] name failslab, interval 1, probability 0, space 0, times 0 [ 235.577456][ T7693] CPU: 1 PID: 7693 Comm: syz.1.487 Not tainted syzkaller #0 [ 235.584856][ T7693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 235.595133][ T7693] Call Trace: [ 235.598446][ T7693] [ 235.601413][ T7693] dump_stack_lvl+0x18c/0x250 [ 235.606311][ T7693] ? show_regs_print_info+0x20/0x20 [ 235.611548][ T7693] ? load_image+0x400/0x400 [ 235.616090][ T7693] ? __asan_memset+0x22/0x40 [ 235.620733][ T7693] should_fail_ex+0x39d/0x4d0 [ 235.625537][ T7693] should_failslab+0x9/0x20 [ 235.630079][ T7693] slab_pre_alloc_hook+0x59/0x310 [ 235.635139][ T7693] ? __debug_object_init+0xec/0x450 [ 235.640375][ T7693] kmem_cache_alloc+0x5a/0x2d0 [ 235.645355][ T7693] ? slab_build_skb+0x2b/0x3f0 [ 235.650164][ T7693] slab_build_skb+0x2b/0x3f0 [ 235.654796][ T7693] bpf_prog_test_run_skb+0x3c8/0x12b0 [ 235.660238][ T7693] ? lockdep_hardirqs_on+0x98/0x150 [ 235.665490][ T7693] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 235.671683][ T7693] ? cpu_online+0x60/0x60 [ 235.676057][ T7693] bpf_prog_test_run+0x321/0x390 [ 235.681123][ T7693] __sys_bpf+0x49d/0x890 [ 235.685409][ T7693] ? bpf_link_show_fdinfo+0x390/0x390 [ 235.690911][ T7693] ? lock_chain_count+0x20/0x20 [ 235.696132][ T7693] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 235.702146][ T7693] __x64_sys_bpf+0x7c/0x90 [ 235.706613][ T7693] do_syscall_64+0x55/0xa0 [ 235.711079][ T7693] ? clear_bhb_loop+0x40/0x90 [ 235.715854][ T7693] ? clear_bhb_loop+0x40/0x90 [ 235.720599][ T7693] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 235.726535][ T7693] RIP: 0033:0x7f1a1319acb9 [ 235.731029][ T7693] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 235.750678][ T7693] RSP: 002b:00007f1a14125028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 235.759134][ T7693] RAX: ffffffffffffffda RBX: 00007f1a13415fa0 RCX: 00007f1a1319acb9 [ 235.767129][ T7693] RDX: 0000000000000050 RSI: 0000200000000080 RDI: 000000000000000a [ 235.775119][ T7693] RBP: 00007f1a14125090 R08: 0000000000000000 R09: 0000000000000000 [ 235.783110][ T7693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 235.791099][ T7693] R13: 00007f1a13416038 R14: 00007f1a13415fa0 R15: 00007ffeb3c1d1d8 [ 235.799109][ T7693] [ 235.814491][ T7698] FAULT_INJECTION: forcing a failure. [ 235.814491][ T7698] name failslab, interval 1, probability 0, space 0, times 0 [ 235.827829][ T7698] CPU: 1 PID: 7698 Comm: syz.4.489 Not tainted syzkaller #0 [ 235.835176][ T7698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 235.845355][ T7698] Call Trace: [ 235.848672][ T7698] [ 235.851643][ T7698] dump_stack_lvl+0x18c/0x250 [ 235.856369][ T7698] ? lock_chain_count+0x20/0x20 [ 235.861252][ T7698] ? show_regs_print_info+0x20/0x20 [ 235.866495][ T7698] ? load_image+0x400/0x400 [ 235.871043][ T7698] should_fail_ex+0x39d/0x4d0 [ 235.875758][ T7698] should_failslab+0x9/0x20 [ 235.880307][ T7698] slab_pre_alloc_hook+0x59/0x310 [ 235.885397][ T7698] kmem_cache_alloc+0x5a/0x2d0 [ 235.890246][ T7698] ? __inet_hash_connect+0x836/0x1870 [ 235.895679][ T7698] __inet_hash_connect+0x836/0x1870 [ 235.900961][ T7698] ? inet6_hash_connect+0xe0/0xe0 [ 235.906065][ T7698] ? inet_bhash2_reset_saddr+0x80/0x80 [ 235.911566][ T7698] ? sk_setup_caps+0x7dc/0xa10 [ 235.916386][ T7698] ? inet6_hash_connect+0x7b/0xe0 [ 235.921458][ T7698] tcp_v6_connect+0xf5f/0x18d0 [ 235.926267][ T7698] ? tcp_v6_pre_connect+0xf0/0xf0 [ 235.931334][ T7698] ? __se_sys_sendmsg+0x1c2/0x2b0 [ 235.936404][ T7698] ? do_syscall_64+0x55/0xa0 [ 235.941029][ T7698] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 235.947148][ T7698] __inet_stream_connect+0x254/0xdc0 [ 235.952512][ T7698] ? inet_dgram_connect+0x360/0x360 [ 235.957803][ T7698] tcp_sendmsg_fastopen+0x3a7/0x5d0 [ 235.963074][ T7698] tcp_sendmsg_locked+0x4610/0x4ba0 [ 235.968506][ T7698] ? verify_lock_unused+0x140/0x140 [ 235.973839][ T7698] ? verify_lock_unused+0x140/0x140 [ 235.979096][ T7698] ? __might_sleep+0xe0/0xe0 [ 235.983742][ T7698] ? mark_lock+0x94/0x320 [ 235.988114][ T7698] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 235.994127][ T7698] ? lock_chain_count+0x20/0x20 [ 235.999019][ T7698] ? tcp_set_state+0x680/0x680 [ 236.003832][ T7698] tcp_sendmsg+0x2f/0x50 [ 236.008110][ T7698] ? inet6_compat_ioctl+0x3c0/0x3c0 [ 236.013361][ T7698] ____sys_sendmsg+0x5ba/0x960 [ 236.018163][ T7698] ? __lock_acquire+0x7d40/0x7d40 [ 236.023219][ T7698] ? __asan_memset+0x22/0x40 [ 236.027842][ T7698] ? __sys_sendmsg_sock+0x30/0x30 [ 236.032909][ T7698] ? __import_iovec+0x3fa/0x850 [ 236.037807][ T7698] ? import_iovec+0x73/0xa0 [ 236.042356][ T7698] ___sys_sendmsg+0x2a6/0x360 [ 236.047090][ T7698] ? get_pid_task+0x20/0x1e0 [ 236.051720][ T7698] ? __sys_sendmsg+0x2a0/0x2a0 [ 236.056723][ T7698] ? __lock_acquire+0x7d40/0x7d40 [ 236.061904][ T7698] __se_sys_sendmsg+0x1c2/0x2b0 [ 236.066805][ T7698] ? __x64_sys_sendmsg+0x80/0x80 [ 236.071819][ T7698] ? lockdep_hardirqs_on+0x98/0x150 [ 236.077076][ T7698] do_syscall_64+0x55/0xa0 [ 236.081534][ T7698] ? clear_bhb_loop+0x40/0x90 [ 236.086251][ T7698] ? clear_bhb_loop+0x40/0x90 [ 236.090980][ T7698] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 236.096926][ T7698] RIP: 0033:0x7f0aae19acb9 [ 236.101388][ T7698] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 236.121024][ T7698] RSP: 002b:00007f0aaef9f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 236.129466][ T7698] RAX: ffffffffffffffda RBX: 00007f0aae415fa0 RCX: 00007f0aae19acb9 [ 236.137468][ T7698] RDX: 000000002600c055 RSI: 00002000000000c0 RDI: 0000000000000003 [ 236.145477][ T7698] RBP: 00007f0aaef9f090 R08: 0000000000000000 R09: 0000000000000000 [ 236.153522][ T7698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 236.161536][ T7698] R13: 00007f0aae416038 R14: 00007f0aae415fa0 R15: 00007ffdf6f42d78 [ 236.169642][ T7698] [ 236.381951][ T7695] netlink: 'syz.5.488': attribute type 3 has an invalid length. [ 236.437757][ T7708] FAULT_INJECTION: forcing a failure. [ 236.437757][ T7708] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 236.451780][ T7695] netlink: 132 bytes leftover after parsing attributes in process `syz.5.488'. [ 236.480211][ T7708] CPU: 0 PID: 7708 Comm: syz.4.492 Not tainted syzkaller #0 [ 236.487688][ T7708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 236.497809][ T7708] Call Trace: [ 236.501141][ T7708] [ 236.504113][ T7708] dump_stack_lvl+0x18c/0x250 [ 236.508857][ T7708] ? show_regs_print_info+0x20/0x20 [ 236.514211][ T7708] ? load_image+0x400/0x400 [ 236.518767][ T7708] ? __lock_acquire+0x7d40/0x7d40 [ 236.523860][ T7708] should_fail_ex+0x39d/0x4d0 [ 236.528690][ T7708] _copy_from_user+0x2f/0xe0 [ 236.533341][ T7708] __copy_msghdr+0x3bb/0x580 [ 236.537999][ T7708] ___sys_sendmsg+0x214/0x360 [ 236.542742][ T7708] ? get_pid_task+0x20/0x1e0 [ 236.547394][ T7708] ? __sys_sendmsg+0x2a0/0x2a0 [ 236.552243][ T7708] ? __lock_acquire+0x7d40/0x7d40 [ 236.557352][ T7708] __se_sys_sendmsg+0x1c2/0x2b0 [ 236.562266][ T7708] ? __x64_sys_sendmsg+0x80/0x80 [ 236.567282][ T7708] ? lockdep_hardirqs_on+0x98/0x150 [ 236.572539][ T7708] do_syscall_64+0x55/0xa0 [ 236.577010][ T7708] ? clear_bhb_loop+0x40/0x90 [ 236.581742][ T7708] ? clear_bhb_loop+0x40/0x90 [ 236.586478][ T7708] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 236.592437][ T7708] RIP: 0033:0x7f0aae19acb9 [ 236.596892][ T7708] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 236.616616][ T7708] RSP: 002b:00007f0aaef9f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 236.625153][ T7708] RAX: ffffffffffffffda RBX: 00007f0aae415fa0 RCX: 00007f0aae19acb9 [ 236.633325][ T7708] RDX: 0000000000000c54 RSI: 0000200000000380 RDI: 0000000000000003 [ 236.641321][ T7708] RBP: 00007f0aaef9f090 R08: 0000000000000000 R09: 0000000000000000 [ 236.649335][ T7708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 236.657358][ T7708] R13: 00007f0aae416038 R14: 00007f0aae415fa0 R15: 00007ffdf6f42d78 [ 236.665386][ T7708] [ 236.881812][ T7716] netlink: 188 bytes leftover after parsing attributes in process `syz.1.496'. [ 236.964783][ T7723] netlink: 'syz.0.498': attribute type 10 has an invalid length. [ 236.973377][ T7723] netlink: 65015 bytes leftover after parsing attributes in process `syz.0.498'. [ 237.023131][ T7726] netlink: 'syz.0.498': attribute type 10 has an invalid length. [ 237.068089][ T7726] netlink: 65015 bytes leftover after parsing attributes in process `syz.0.498'. [ 237.157011][ T7730] netlink: 'syz.4.499': attribute type 3 has an invalid length. [ 237.168581][ T7730] netlink: 132 bytes leftover after parsing attributes in process `syz.4.499'. [ 237.365435][ T7734] netlink: 'syz.0.501': attribute type 21 has an invalid length. [ 237.408204][ T7734] netlink: 128 bytes leftover after parsing attributes in process `syz.0.501'. [ 237.458277][ T7734] netlink: 'syz.0.501': attribute type 4 has an invalid length. [ 237.503093][ T7734] netlink: 'syz.0.501': attribute type 5 has an invalid length. [ 237.538832][ T7734] netlink: 3 bytes leftover after parsing attributes in process `syz.0.501'. [ 237.790721][ T7749] raw_sendmsg: syz.4.505 forgot to set AF_INET. Fix it! [ 237.873055][ T7749] netlink: 'syz.4.505': attribute type 3 has an invalid length. [ 237.901161][ T7749] netlink: 132 bytes leftover after parsing attributes in process `syz.4.505'. [ 238.370120][ T7762] FAULT_INJECTION: forcing a failure. [ 238.370120][ T7762] name failslab, interval 1, probability 0, space 0, times 0 [ 238.517322][ T7762] CPU: 1 PID: 7762 Comm: syz.4.509 Not tainted syzkaller #0 [ 238.524737][ T7762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 238.534884][ T7762] Call Trace: [ 238.538225][ T7762] [ 238.541228][ T7762] dump_stack_lvl+0x18c/0x250 [ 238.545981][ T7762] ? show_regs_print_info+0x20/0x20 [ 238.551256][ T7762] ? load_image+0x400/0x400 [ 238.555845][ T7762] should_fail_ex+0x39d/0x4d0 [ 238.560647][ T7762] should_failslab+0x9/0x20 [ 238.565209][ T7762] slab_pre_alloc_hook+0x59/0x310 [ 238.570728][ T7762] ? apparmor_sk_alloc_security+0x77/0x100 [ 238.576596][ T7762] __kmem_cache_alloc_node+0x53/0x250 [ 238.582035][ T7762] ? apparmor_sk_alloc_security+0x77/0x100 [ 238.588080][ T7762] kmalloc_trace+0x2a/0xe0 [ 238.592647][ T7762] apparmor_sk_alloc_security+0x77/0x100 [ 238.598351][ T7762] security_sk_alloc+0x6e/0xa0 [ 238.603172][ T7762] sk_prot_alloc+0x101/0x210 [ 238.607866][ T7762] ? sk_alloc+0x24/0x360 [ 238.612481][ T7762] sk_alloc+0x3a/0x360 [ 238.616610][ T7762] pptp_create+0x32/0x2f0 [ 238.621004][ T7762] pppox_create+0x12b/0x1a0 [ 238.625561][ T7762] __sock_create+0x4a6/0x940 [ 238.630221][ T7762] __sys_socketpair+0x1c1/0x550 [ 238.635142][ T7762] __x64_sys_socketpair+0x9b/0xb0 [ 238.640223][ T7762] do_syscall_64+0x55/0xa0 [ 238.644733][ T7762] ? clear_bhb_loop+0x40/0x90 [ 238.649463][ T7762] ? clear_bhb_loop+0x40/0x90 [ 238.654192][ T7762] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 238.660135][ T7762] RIP: 0033:0x7f0aae19acb9 [ 238.664594][ T7762] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 238.684338][ T7762] RSP: 002b:00007f0aaef9f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 238.692818][ T7762] RAX: ffffffffffffffda RBX: 00007f0aae415fa0 RCX: 00007f0aae19acb9 [ 238.700850][ T7762] RDX: 0000000000000002 RSI: 0000000000000003 RDI: 0000000000000018 [ 238.708877][ T7762] RBP: 00007f0aaef9f090 R08: 0000000000000000 R09: 0000000000000000 [ 238.716890][ T7762] R10: 0000200000000140 R11: 0000000000000246 R12: 0000000000000001 [ 238.725001][ T7762] R13: 00007f0aae416038 R14: 00007f0aae415fa0 R15: 00007ffdf6f42d78 [ 238.733053][ T7762] [ 239.181662][ T7771] FAULT_INJECTION: forcing a failure. [ 239.181662][ T7771] name failslab, interval 1, probability 0, space 0, times 0 [ 239.204056][ T7771] CPU: 0 PID: 7771 Comm: syz.5.512 Not tainted syzkaller #0 [ 239.211431][ T7771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 239.221536][ T7771] Call Trace: [ 239.224864][ T7771] [ 239.227839][ T7771] dump_stack_lvl+0x18c/0x250 [ 239.232584][ T7771] ? show_regs_print_info+0x20/0x20 [ 239.238120][ T7771] ? load_image+0x400/0x400 [ 239.242717][ T7771] ? __might_sleep+0xe0/0xe0 [ 239.247396][ T7771] ? __lock_acquire+0x7d40/0x7d40 [ 239.252494][ T7771] should_fail_ex+0x39d/0x4d0 [ 239.257247][ T7771] should_failslab+0x9/0x20 [ 239.261813][ T7771] slab_pre_alloc_hook+0x59/0x310 [ 239.266895][ T7771] ? alloc_fd+0x58f/0x630 [ 239.271272][ T7771] kmem_cache_alloc_node+0x60/0x320 [ 239.276535][ T7771] ? perf_event_alloc+0x15a/0x21b0 [ 239.281722][ T7771] perf_event_alloc+0x15a/0x21b0 [ 239.286723][ T7771] ? _raw_spin_unlock+0x28/0x40 [ 239.291635][ T7771] ? alloc_fd+0x58f/0x630 [ 239.296028][ T7771] __se_sys_perf_event_open+0x61f/0x1c50 [ 239.301801][ T7771] ? irqentry_enter+0x37/0x50 [ 239.306538][ T7771] ? __x64_sys_perf_event_open+0xc0/0xc0 [ 239.312309][ T7771] ? __x64_sys_perf_event_open+0x20/0xc0 [ 239.317981][ T7771] do_syscall_64+0x55/0xa0 [ 239.322434][ T7771] ? clear_bhb_loop+0x40/0x90 [ 239.327142][ T7771] ? clear_bhb_loop+0x40/0x90 [ 239.331848][ T7771] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 239.337770][ T7771] RIP: 0033:0x7ff82659acb9 [ 239.342220][ T7771] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 239.361868][ T7771] RSP: 002b:00007ff8273ac028 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 239.370327][ T7771] RAX: ffffffffffffffda RBX: 00007ff826815fa0 RCX: 00007ff82659acb9 [ 239.378329][ T7771] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000200000000e40 [ 239.386328][ T7771] RBP: 00007ff8273ac090 R08: 0000000000000002 R09: 0000000000000000 [ 239.394324][ T7771] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 239.402328][ T7771] R13: 00007ff826816038 R14: 00007ff826815fa0 R15: 00007ffe4ab23a58 [ 239.410349][ T7771] [ 239.972740][ T7785] netlink: 'syz.1.518': attribute type 29 has an invalid length. [ 239.982525][ T7785] netlink: 'syz.1.518': attribute type 29 has an invalid length. [ 240.003976][ T7785] netlink: 'syz.1.518': attribute type 29 has an invalid length. [ 240.029706][ T5777] Bluetooth: hci1: Malformed Event: 0x2f [ 240.475570][ T7793] netlink: 15999 bytes leftover after parsing attributes in process `syz.0.521'. [ 240.608769][ T7797] FAULT_INJECTION: forcing a failure. [ 240.608769][ T7797] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 240.622350][ T7797] CPU: 0 PID: 7797 Comm: syz.5.523 Not tainted syzkaller #0 [ 240.629706][ T7797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 240.639822][ T7797] Call Trace: [ 240.643146][ T7797] [ 240.646129][ T7797] dump_stack_lvl+0x18c/0x250 [ 240.651108][ T7797] ? show_regs_print_info+0x20/0x20 [ 240.656370][ T7797] ? load_image+0x400/0x400 [ 240.660953][ T7797] should_fail_ex+0x39d/0x4d0 [ 240.665702][ T7797] copyout+0x1a/0x90 [ 240.669668][ T7797] _copy_to_iter+0x432/0x1120 [ 240.674417][ T7797] ? iov_iter_init+0x1e0/0x1e0 [ 240.679237][ T7797] ? __virt_addr_valid+0x18c/0x540 [ 240.684587][ T7797] ? __virt_addr_valid+0x469/0x540 [ 240.689753][ T7797] ? __phys_addr_symbol+0x2f/0x70 [ 240.694816][ T7797] __skb_datagram_iter+0xdb/0x780 [ 240.699915][ T7797] ? skb_copy_datagram_iter+0x200/0x200 [ 240.705499][ T7797] skb_copy_datagram_iter+0xb1/0x200 [ 240.710819][ T7797] netlink_recvmsg+0x2d4/0xe60 [ 240.715627][ T7797] ? netlink_sendmsg+0xbf0/0xbf0 [ 240.720610][ T7797] ? aa_af_perm+0x330/0x330 [ 240.725152][ T7797] ? bpf_lsm_socket_recvmsg+0x9/0x10 [ 240.730499][ T7797] ? security_socket_recvmsg+0x89/0xb0 [ 240.736001][ T7797] ? netlink_sendmsg+0xbf0/0xbf0 [ 240.740978][ T7797] ____sys_recvmsg+0x2ce/0x5e0 [ 240.745773][ T7797] ? __sys_recvmsg_sock+0x50/0x50 [ 240.750830][ T7797] ? import_iovec+0x73/0xa0 [ 240.755382][ T7797] ___sys_recvmsg+0x216/0x590 [ 240.760092][ T7797] ? __sys_recvmsg+0x2a0/0x2a0 [ 240.764894][ T7797] ? ksys_write+0x1c4/0x260 [ 240.769447][ T7797] ? __fget_files+0x43d/0x4b0 [ 240.774162][ T7797] __x64_sys_recvmsg+0x20c/0x2e0 [ 240.779133][ T7797] ? ___sys_recvmsg+0x590/0x590 [ 240.784018][ T7797] ? lockdep_hardirqs_on+0x98/0x150 [ 240.789245][ T7797] do_syscall_64+0x55/0xa0 [ 240.793692][ T7797] ? clear_bhb_loop+0x40/0x90 [ 240.798394][ T7797] ? clear_bhb_loop+0x40/0x90 [ 240.803092][ T7797] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 240.809005][ T7797] RIP: 0033:0x7ff82659acb9 [ 240.813535][ T7797] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 240.833184][ T7797] RSP: 002b:00007ff8273ac028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 240.841633][ T7797] RAX: ffffffffffffffda RBX: 00007ff826815fa0 RCX: 00007ff82659acb9 [ 240.849638][ T7797] RDX: 0000000040012100 RSI: 0000200000000180 RDI: 0000000000000003 [ 240.857654][ T7797] RBP: 00007ff8273ac090 R08: 0000000000000000 R09: 0000000000000000 [ 240.865656][ T7797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 240.873663][ T7797] R13: 00007ff826816038 R14: 00007ff826815fa0 R15: 00007ffe4ab23a58 [ 240.881684][ T7797] [ 240.887321][ T7798] FAULT_INJECTION: forcing a failure. [ 240.887321][ T7798] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 240.908272][ T7798] CPU: 0 PID: 7798 Comm: syz.1.522 Not tainted syzkaller #0 [ 240.915638][ T7798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 240.925747][ T7798] Call Trace: [ 240.929085][ T7798] [ 240.932065][ T7798] dump_stack_lvl+0x18c/0x250 [ 240.936830][ T7798] ? show_regs_print_info+0x20/0x20 [ 240.942097][ T7798] ? load_image+0x400/0x400 [ 240.946668][ T7798] ? __lock_acquire+0x7d40/0x7d40 [ 240.951758][ T7798] ? snprintf+0xe9/0x140 [ 240.956067][ T7798] should_fail_ex+0x39d/0x4d0 [ 240.960803][ T7798] _copy_to_user+0x2f/0xa0 [ 240.965285][ T7798] simple_read_from_buffer+0xe7/0x150 [ 240.970723][ T7798] proc_fail_nth_read+0x1e8/0x260 [ 240.975809][ T7798] ? proc_fault_inject_write+0x360/0x360 [ 240.981504][ T7798] ? fsnotify_perm+0x271/0x5e0 [ 240.986348][ T7798] ? proc_fault_inject_write+0x360/0x360 [ 240.992039][ T7798] vfs_read+0x28b/0x970 [ 240.996261][ T7798] ? kernel_read+0x1e0/0x1e0 [ 241.000902][ T7798] ? __fget_files+0x28/0x4b0 [ 241.005587][ T7798] ? __fget_files+0x28/0x4b0 [ 241.010326][ T7798] ? __fget_files+0x43d/0x4b0 [ 241.015096][ T7798] ? __fdget_pos+0x2a3/0x330 [ 241.019826][ T7798] ? ksys_read+0x75/0x260 [ 241.024483][ T7798] ksys_read+0x150/0x260 [ 241.028785][ T7798] ? vfs_write+0x990/0x990 [ 241.033513][ T7798] ? lockdep_hardirqs_on+0x98/0x150 [ 241.038784][ T7798] do_syscall_64+0x55/0xa0 [ 241.043271][ T7798] ? clear_bhb_loop+0x40/0x90 [ 241.048106][ T7798] ? clear_bhb_loop+0x40/0x90 [ 241.052965][ T7798] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 241.058926][ T7798] RIP: 0033:0x7f1a1315b58e [ 241.063410][ T7798] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 241.083101][ T7798] RSP: 002b:00007f1a14103fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 241.091672][ T7798] RAX: ffffffffffffffda RBX: 00007f1a141046c0 RCX: 00007f1a1315b58e [ 241.099724][ T7798] RDX: 000000000000000f RSI: 00007f1a141040a0 RDI: 0000000000000007 [ 241.107755][ T7798] RBP: 00007f1a14104090 R08: 0000000000000000 R09: 0000000000000000 [ 241.115779][ T7798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 241.123810][ T7798] R13: 00007f1a13416128 R14: 00007f1a13416090 R15: 00007ffeb3c1d1d8 [ 241.131862][ T7798] [ 241.325587][ T7800] netlink: 167492 bytes leftover after parsing attributes in process `syz.5.524'. [ 242.457646][ T7809] validate_nla: 6 callbacks suppressed [ 242.457671][ T7809] netlink: 'syz.4.528': attribute type 29 has an invalid length. [ 242.473542][ T7809] netlink: 'syz.4.528': attribute type 29 has an invalid length. [ 242.495674][ T7809] netlink: 'syz.4.528': attribute type 29 has an invalid length. [ 242.726473][ T7817] netlink: 'syz.0.529': attribute type 29 has an invalid length. [ 242.768120][ T7817] netlink: 'syz.0.529': attribute type 29 has an invalid length. [ 242.791527][ T7819] FAULT_INJECTION: forcing a failure. [ 242.791527][ T7819] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 242.830461][ T7819] CPU: 1 PID: 7819 Comm: syz.0.529 Not tainted syzkaller #0 [ 242.837850][ T7819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 242.848012][ T7819] Call Trace: [ 242.851448][ T7819] [ 242.854428][ T7819] dump_stack_lvl+0x18c/0x250 [ 242.859180][ T7819] ? show_regs_print_info+0x20/0x20 [ 242.864440][ T7819] ? load_image+0x400/0x400 [ 242.869140][ T7819] should_fail_ex+0x39d/0x4d0 [ 242.873884][ T7819] copyout+0x1a/0x90 [ 242.877930][ T7819] _copy_to_iter+0x432/0x1120 [ 242.882808][ T7819] ? iov_iter_init+0x1e0/0x1e0 [ 242.887638][ T7819] ? __virt_addr_valid+0x18c/0x540 [ 242.892812][ T7819] ? __virt_addr_valid+0x469/0x540 [ 242.897985][ T7819] ? __phys_addr_symbol+0x2f/0x70 [ 242.903079][ T7819] __skb_datagram_iter+0xdb/0x780 [ 242.908161][ T7819] ? skb_copy_datagram_iter+0x200/0x200 [ 242.913793][ T7819] skb_copy_datagram_iter+0xb1/0x200 [ 242.919144][ T7819] netlink_recvmsg+0x2d4/0xe60 [ 242.923974][ T7819] ? netlink_sendmsg+0xbf0/0xbf0 [ 242.928990][ T7819] ? aa_af_perm+0x330/0x330 [ 242.933561][ T7819] ? bpf_lsm_socket_recvmsg+0x9/0x10 [ 242.938900][ T7819] ? security_socket_recvmsg+0x89/0xb0 [ 242.944449][ T7819] ? netlink_sendmsg+0xbf0/0xbf0 [ 242.949448][ T7819] ____sys_recvmsg+0x2ce/0x5e0 [ 242.954282][ T7819] ? __sys_recvmsg_sock+0x50/0x50 [ 242.959369][ T7819] ? import_iovec+0x73/0xa0 [ 242.963940][ T7819] ___sys_recvmsg+0x216/0x590 [ 242.968804][ T7819] ? __sys_recvmsg+0x2a0/0x2a0 [ 242.973620][ T7819] ? ksys_write+0x1c4/0x260 [ 242.978211][ T7819] ? __fget_files+0x43d/0x4b0 [ 242.983071][ T7819] __x64_sys_recvmsg+0x20c/0x2e0 [ 242.988086][ T7819] ? ___sys_recvmsg+0x590/0x590 [ 242.993006][ T7819] ? lockdep_hardirqs_on+0x98/0x150 [ 242.998465][ T7819] do_syscall_64+0x55/0xa0 [ 243.002944][ T7819] ? clear_bhb_loop+0x40/0x90 [ 243.007678][ T7819] ? clear_bhb_loop+0x40/0x90 [ 243.012454][ T7819] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 243.018469][ T7819] RIP: 0033:0x7fbb5bb9acb9 [ 243.022943][ T7819] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 243.042615][ T7819] RSP: 002b:00007fbb5ca22028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 243.051137][ T7819] RAX: ffffffffffffffda RBX: 00007fbb5be16090 RCX: 00007fbb5bb9acb9 [ 243.059168][ T7819] RDX: 0000000040012100 RSI: 0000200000000180 RDI: 0000000000000003 [ 243.067846][ T7819] RBP: 00007fbb5ca22090 R08: 0000000000000000 R09: 0000000000000000 [ 243.075881][ T7819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 243.084022][ T7819] R13: 00007fbb5be16128 R14: 00007fbb5be16090 R15: 00007ffc9c302208 [ 243.092065][ T7819] [ 243.098607][ T7819] netlink: 'syz.0.529': attribute type 29 has an invalid length. [ 243.519480][ T7835] netlink: 'syz.0.535': attribute type 29 has an invalid length. [ 243.744207][ T7837] netlink: 126588 bytes leftover after parsing attributes in process `syz.0.535'. [ 246.496363][ T7835] netlink: 'syz.0.535': attribute type 29 has an invalid length. [ 246.921834][ T7857] netlink: 'syz.4.539': attribute type 3 has an invalid length. [ 246.930365][ T7857] netlink: 201372 bytes leftover after parsing attributes in process `syz.4.539'. [ 247.750675][ T7864] mac80211_hwsim hwsim8 wlan0: entered promiscuous mode [ 247.765746][ T7864] mac80211_hwsim hwsim8 wlan0: entered allmulticast mode [ 247.775124][ T7863] netlink: 'syz.4.542': attribute type 5 has an invalid length. [ 247.801278][ T7866] IPv6: NLM_F_CREATE should be specified when creating new route [ 248.037379][ T7872] syzkaller0: entered promiscuous mode [ 248.050945][ T7872] syzkaller0: entered allmulticast mode [ 249.146698][ T7895] syzkaller0: entered promiscuous mode [ 249.153465][ T7895] syzkaller0: entered allmulticast mode [ 249.313467][ T7897] netlink: 'syz.0.550': attribute type 3 has an invalid length. [ 249.323130][ T7897] netlink: 'syz.0.550': attribute type 1 has an invalid length. [ 249.334026][ T7897] netlink: 193404 bytes leftover after parsing attributes in process `syz.0.550'. [ 249.435891][ T7901] FAULT_INJECTION: forcing a failure. [ 249.435891][ T7901] name failslab, interval 1, probability 0, space 0, times 0 [ 249.456531][ T7901] CPU: 1 PID: 7901 Comm: syz.1.551 Not tainted syzkaller #0 [ 249.464022][ T7901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 249.474151][ T7901] Call Trace: [ 249.477489][ T7901] [ 249.480476][ T7901] dump_stack_lvl+0x18c/0x250 [ 249.485225][ T7901] ? show_regs_print_info+0x20/0x20 [ 249.490606][ T7901] ? load_image+0x400/0x400 [ 249.495173][ T7901] ? __might_sleep+0xe0/0xe0 [ 249.499814][ T7901] ? __lock_acquire+0x7d40/0x7d40 [ 249.504868][ T7901] should_fail_ex+0x39d/0x4d0 [ 249.509581][ T7901] should_failslab+0x9/0x20 [ 249.514142][ T7901] slab_pre_alloc_hook+0x59/0x310 [ 249.519200][ T7901] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 249.524950][ T7901] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 249.530700][ T7901] __kmem_cache_alloc_node+0x53/0x250 [ 249.536137][ T7901] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 249.541913][ T7901] __kmalloc+0xa4/0x230 [ 249.546149][ T7901] tomoyo_realpath_from_path+0xe3/0x5d0 [ 249.551801][ T7901] tomoyo_path_number_perm+0x248/0x620 [ 249.557313][ T7901] ? tomoyo_path_number_perm+0x217/0x620 [ 249.562975][ T7901] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 249.568460][ T7901] ? ksys_write+0x1c4/0x260 [ 249.573030][ T7901] ? __fget_files+0x28/0x4b0 [ 249.577662][ T7901] ? __fget_files+0x28/0x4b0 [ 249.582286][ T7901] security_file_ioctl+0x70/0xa0 [ 249.587248][ T7901] __se_sys_ioctl+0x48/0x170 [ 249.591857][ T7901] do_syscall_64+0x55/0xa0 [ 249.596291][ T7901] ? clear_bhb_loop+0x40/0x90 [ 249.600981][ T7901] ? clear_bhb_loop+0x40/0x90 [ 249.605780][ T7901] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 249.611820][ T7901] RIP: 0033:0x7f1a1319acb9 [ 249.616270][ T7901] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 249.636016][ T7901] RSP: 002b:00007f1a14125028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 249.644460][ T7901] RAX: ffffffffffffffda RBX: 00007f1a13415fa0 RCX: 00007f1a1319acb9 [ 249.652453][ T7901] RDX: 0000200000000000 RSI: 0000000000008916 RDI: 0000000000000005 [ 249.660444][ T7901] RBP: 00007f1a14125090 R08: 0000000000000000 R09: 0000000000000000 [ 249.668425][ T7901] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 249.676423][ T7901] R13: 00007f1a13416038 R14: 00007f1a13415fa0 R15: 00007ffeb3c1d1d8 [ 249.684444][ T7901] [ 249.699394][ T7901] ERROR: Out of memory at tomoyo_realpath_from_path. [ 249.960197][ T7910] netlink: 64859 bytes leftover after parsing attributes in process `syz.5.554'. [ 250.141419][ T7916] netlink: 'syz.0.556': attribute type 25 has an invalid length. [ 250.155861][ T7916] netlink: 'syz.0.556': attribute type 1 has an invalid length. [ 250.163940][ T7916] FAULT_INJECTION: forcing a failure. [ 250.163940][ T7916] name failslab, interval 1, probability 0, space 0, times 0 [ 250.209027][ T7916] CPU: 1 PID: 7916 Comm: syz.0.556 Not tainted syzkaller #0 [ 250.216402][ T7916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 250.226509][ T7916] Call Trace: [ 250.229850][ T7916] [ 250.232833][ T7916] dump_stack_lvl+0x18c/0x250 [ 250.237586][ T7916] ? show_regs_print_info+0x20/0x20 [ 250.242936][ T7916] ? load_image+0x400/0x400 [ 250.247500][ T7916] ? verify_lock_unused+0x140/0x140 [ 250.252773][ T7916] should_fail_ex+0x39d/0x4d0 [ 250.257516][ T7916] should_failslab+0x9/0x20 [ 250.262085][ T7916] slab_pre_alloc_hook+0x59/0x310 [ 250.267173][ T7916] kmem_cache_alloc+0x5a/0x2d0 [ 250.272000][ T7916] ? skb_clone+0x1eb/0x370 [ 250.276466][ T7916] skb_clone+0x1eb/0x370 [ 250.280770][ T7916] __netlink_deliver_tap+0x41c/0x830 [ 250.286202][ T7916] ? netlink_deliver_tap+0x2e/0x1b0 [ 250.291464][ T7916] netlink_deliver_tap+0x19c/0x1b0 [ 250.296730][ T7916] netlink_sendskb+0x68/0x130 [ 250.301482][ T7916] netlink_ack+0xce1/0x1180 [ 250.306043][ T7916] ? __dev_queue_xmit+0x26b/0x36b0 [ 250.311239][ T7916] ? netlink_dump+0xe50/0xe50 [ 250.315999][ T7916] ? ref_tracker_free+0x690/0x840 [ 250.321090][ T7916] netlink_rcv_skb+0x2c5/0x4d0 [ 250.325918][ T7916] ? rtnetlink_bind+0x80/0x80 [ 250.330649][ T7916] ? netlink_ack+0x1180/0x1180 [ 250.335489][ T7916] ? __lock_acquire+0x7d40/0x7d40 [ 250.340708][ T7916] ? netlink_deliver_tap+0x2e/0x1b0 [ 250.345987][ T7916] netlink_unicast+0x751/0x8d0 [ 250.350824][ T7916] netlink_sendmsg+0x8d0/0xbf0 [ 250.355680][ T7916] ? netlink_getsockopt+0x590/0x590 [ 250.360945][ T7916] ? aa_sock_msg_perm+0x94/0x150 [ 250.365961][ T7916] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 250.371309][ T7916] ? security_socket_sendmsg+0x80/0xa0 [ 250.376825][ T7916] ? netlink_getsockopt+0x590/0x590 [ 250.382093][ T7916] ____sys_sendmsg+0x5ba/0x960 [ 250.386928][ T7916] ? __asan_memset+0x22/0x40 [ 250.391588][ T7916] ? __sys_sendmsg_sock+0x30/0x30 [ 250.396669][ T7916] ? __import_iovec+0x5f2/0x850 [ 250.401683][ T7916] ? import_iovec+0x73/0xa0 [ 250.406258][ T7916] ___sys_sendmsg+0x2a6/0x360 [ 250.411166][ T7916] ? get_pid_task+0x20/0x1e0 [ 250.415822][ T7916] ? __sys_sendmsg+0x2a0/0x2a0 [ 250.420674][ T7916] ? __lock_acquire+0x7d40/0x7d40 [ 250.425782][ T7916] __se_sys_sendmsg+0x1c2/0x2b0 [ 250.430692][ T7916] ? __x64_sys_sendmsg+0x80/0x80 [ 250.435719][ T7916] ? lockdep_hardirqs_on+0x98/0x150 [ 250.440979][ T7916] do_syscall_64+0x55/0xa0 [ 250.445450][ T7916] ? clear_bhb_loop+0x40/0x90 [ 250.450181][ T7916] ? clear_bhb_loop+0x40/0x90 [ 250.454998][ T7916] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 250.460934][ T7916] RIP: 0033:0x7fbb5bb9acb9 [ 250.465391][ T7916] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 250.485143][ T7916] RSP: 002b:00007fbb5ca43028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 250.493617][ T7916] RAX: ffffffffffffffda RBX: 00007fbb5be15fa0 RCX: 00007fbb5bb9acb9 [ 250.501646][ T7916] RDX: 0000000004004004 RSI: 0000200000000040 RDI: 0000000000000003 [ 250.509662][ T7916] RBP: 00007fbb5ca43090 R08: 0000000000000000 R09: 0000000000000000 [ 250.517692][ T7916] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 250.525729][ T7916] R13: 00007fbb5be16038 R14: 00007fbb5be15fa0 R15: 00007ffc9c302208 [ 250.533770][ T7916] [ 254.833538][ T7996] FAULT_INJECTION: forcing a failure. [ 254.833538][ T7996] name failslab, interval 1, probability 0, space 0, times 0 [ 255.008048][ T7996] CPU: 0 PID: 7996 Comm: syz.1.565 Not tainted syzkaller #0 [ 255.015461][ T7996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 255.025698][ T7996] Call Trace: [ 255.029037][ T7996] [ 255.032117][ T7996] dump_stack_lvl+0x18c/0x250 [ 255.036884][ T7996] ? trace_event_raw_event_lock+0x250/0x250 [ 255.042882][ T7996] ? show_regs_print_info+0x20/0x20 [ 255.048359][ T7996] ? load_image+0x400/0x400 [ 255.052967][ T7996] should_fail_ex+0x39d/0x4d0 [ 255.057783][ T7996] should_failslab+0x9/0x20 [ 255.062367][ T7996] slab_pre_alloc_hook+0x59/0x310 [ 255.067473][ T7996] ? proc_self_get_link+0xe5/0x180 [ 255.072669][ T7996] __kmem_cache_alloc_node+0x53/0x250 [ 255.078135][ T7996] ? proc_self_get_link+0xe5/0x180 [ 255.083320][ T7996] kmalloc_trace+0x2a/0xe0 [ 255.087822][ T7996] proc_self_get_link+0xe5/0x180 [ 255.092844][ T7996] ? proc_setup_self+0x2d0/0x2d0 [ 255.097854][ T7996] pick_link+0x6a8/0xdd0 [ 255.102222][ T7996] step_into+0xc4d/0xf20 [ 255.106665][ T7996] ? __d_lookup_rcu+0x43e/0x4c0 [ 255.111597][ T7996] ? set_root+0x3a0/0x3a0 [ 255.116015][ T7996] ? lookup_fast+0x15b/0x4d0 [ 255.120697][ T7996] ? security_inode_permission+0xb0/0xf0 [ 255.126420][ T7996] link_path_walk+0x6e2/0xe30 [ 255.131204][ T7996] ? handle_lookup_down+0x130/0x130 [ 255.136514][ T7996] path_openat+0x293/0x3230 [ 255.141150][ T7996] ? do_filp_open+0x430/0x430 [ 255.145888][ T7996] ? perf_trace_lock+0x304/0x3b0 [ 255.150912][ T7996] ? trace_event_raw_event_lock+0x250/0x250 [ 255.156902][ T7996] do_filp_open+0x1f5/0x430 [ 255.161483][ T7996] ? alloc_fd+0x58f/0x630 [ 255.165891][ T7996] ? vfs_tmpfile+0x490/0x490 [ 255.170683][ T7996] ? _raw_spin_unlock+0x28/0x40 [ 255.175597][ T7996] ? alloc_fd+0x58f/0x630 [ 255.180024][ T7996] do_sys_openat2+0x134/0x1d0 [ 255.184770][ T7996] ? do_sys_open+0xe0/0xe0 [ 255.189249][ T7996] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 255.195299][ T7996] ? lock_chain_count+0x20/0x20 [ 255.200221][ T7996] __x64_sys_openat+0x139/0x160 [ 255.205239][ T7996] do_syscall_64+0x55/0xa0 [ 255.209717][ T7996] ? clear_bhb_loop+0x40/0x90 [ 255.214453][ T7996] ? clear_bhb_loop+0x40/0x90 [ 255.219225][ T7996] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 255.225180][ T7996] RIP: 0033:0x7f1a1315b58e [ 255.229653][ T7996] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 255.249320][ T7996] RSP: 002b:00007f1a14124ec8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 255.257775][ T7996] RAX: ffffffffffffffda RBX: 00007f1a141256c0 RCX: 00007f1a1315b58e [ 255.265781][ T7996] RDX: 0000000000000002 RSI: 00007f1a14124f90 RDI: ffffffffffffff9c [ 255.273786][ T7996] RBP: 00007f1a14125090 R08: 0000000000000000 R09: 0000000000000000 [ 255.281815][ T7996] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 255.289861][ T7996] R13: 00007f1a13416038 R14: 00007f1a13415fa0 R15: 00007ffeb3c1d1d8 [ 255.297913][ T7996] [ 255.324046][ T8009] netlink: 'syz.4.570': attribute type 19 has an invalid length. [ 255.557516][ T8013] FAULT_INJECTION: forcing a failure. [ 255.557516][ T8013] name failslab, interval 1, probability 0, space 0, times 0 [ 255.617487][ T8013] CPU: 1 PID: 8013 Comm: syz.4.571 Not tainted syzkaller #0 [ 255.624870][ T8013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 255.634982][ T8013] Call Trace: [ 255.638312][ T8013] [ 255.641287][ T8013] dump_stack_lvl+0x18c/0x250 [ 255.646027][ T8013] ? show_regs_print_info+0x20/0x20 [ 255.651369][ T8013] ? load_image+0x400/0x400 [ 255.655929][ T8013] ? __might_sleep+0xe0/0xe0 [ 255.660576][ T8013] ? __lock_acquire+0x7d40/0x7d40 [ 255.665645][ T8013] ? mark_lock+0x94/0x320 [ 255.670047][ T8013] should_fail_ex+0x39d/0x4d0 [ 255.674872][ T8013] should_failslab+0x9/0x20 [ 255.679433][ T8013] slab_pre_alloc_hook+0x59/0x310 [ 255.684508][ T8013] ? __get_vm_area_node+0x125/0x370 [ 255.689762][ T8013] __kmem_cache_alloc_node+0x53/0x250 [ 255.695193][ T8013] ? __get_vm_area_node+0x125/0x370 [ 255.700438][ T8013] kmalloc_node_trace+0x26/0xe0 [ 255.705332][ T8013] __get_vm_area_node+0x125/0x370 [ 255.710397][ T8013] __vmalloc_node_range+0x36e/0x1330 [ 255.715731][ T8013] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 255.721321][ T8013] ? mark_lock+0x94/0x320 [ 255.725691][ T8013] ? __lock_acquire+0x1347/0x7d40 [ 255.730754][ T8013] ? verify_lock_unused+0x140/0x140 [ 255.735995][ T8013] ? free_vm_area+0x50/0x50 [ 255.740537][ T8013] ? end_current_label_crit_section+0x170/0x170 [ 255.746820][ T8013] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 255.752399][ T8013] __vmalloc+0x7a/0x90 [ 255.756505][ T8013] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 255.762086][ T8013] bpf_prog_alloc_no_stats+0x47/0x440 [ 255.767486][ T8013] ? bpf_prog_alloc+0x2b/0x1a0 [ 255.772280][ T8013] bpf_prog_alloc+0x3d/0x1a0 [ 255.776915][ T8013] bpf_prog_load+0x6eb/0x1670 [ 255.781635][ T8013] ? map_freeze+0x420/0x420 [ 255.786191][ T8013] ? __might_fault+0xaa/0x120 [ 255.790982][ T8013] ? __lock_acquire+0x7d40/0x7d40 [ 255.796043][ T8013] ? file_end_write+0x159/0x250 [ 255.800929][ T8013] ? __might_fault+0xaa/0x120 [ 255.805729][ T8013] ? __might_fault+0xc6/0x120 [ 255.810442][ T8013] ? __might_fault+0xaa/0x120 [ 255.815144][ T8013] ? bpf_lsm_bpf+0x9/0x10 [ 255.819514][ T8013] ? security_bpf+0x7e/0xa0 [ 255.824050][ T8013] __sys_bpf+0x5ba/0x890 [ 255.828331][ T8013] ? bpf_link_show_fdinfo+0x390/0x390 [ 255.833760][ T8013] ? lock_chain_count+0x20/0x20 [ 255.838667][ T8013] __x64_sys_bpf+0x7c/0x90 [ 255.843115][ T8013] do_syscall_64+0x55/0xa0 [ 255.847565][ T8013] ? clear_bhb_loop+0x40/0x90 [ 255.852273][ T8013] ? clear_bhb_loop+0x40/0x90 [ 255.856987][ T8013] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 255.862911][ T8013] RIP: 0033:0x7f0aae19acb9 [ 255.867359][ T8013] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 255.886992][ T8013] RSP: 002b:00007f0aaef9f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 255.895523][ T8013] RAX: ffffffffffffffda RBX: 00007f0aae415fa0 RCX: 00007f0aae19acb9 [ 255.903526][ T8013] RDX: 0000000000000094 RSI: 0000200000000440 RDI: 0000000000000005 [ 255.911523][ T8013] RBP: 00007f0aaef9f090 R08: 0000000000000000 R09: 0000000000000000 [ 255.919520][ T8013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 255.927519][ T8013] R13: 00007f0aae416038 R14: 00007f0aae415fa0 R15: 00007ffdf6f42d78 [ 255.935540][ T8013] [ 255.958280][ T8013] warn_alloc: 1 callbacks suppressed [ 255.958300][ T8013] syz.4.571: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz4,mems_allowed=0-1 [ 256.015696][ T8013] CPU: 0 PID: 8013 Comm: syz.4.571 Not tainted syzkaller #0 [ 256.023092][ T8013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 256.033207][ T8013] Call Trace: [ 256.036530][ T8013] [ 256.039504][ T8013] dump_stack_lvl+0x18c/0x250 [ 256.044327][ T8013] ? show_regs_print_info+0x20/0x20 [ 256.049594][ T8013] ? load_image+0x400/0x400 [ 256.054226][ T8013] ? cpuset_print_current_mems_allowed+0x1f/0x360 [ 256.060715][ T8013] ? cpuset_print_current_mems_allowed+0x2e7/0x360 [ 256.067374][ T8013] warn_alloc+0x246/0x340 [ 256.071759][ T8013] ? __get_vm_area_node+0x125/0x370 [ 256.077005][ T8013] ? zone_watermark_ok_safe+0x230/0x230 [ 256.082616][ T8013] ? rcu_is_watching+0x15/0xb0 [ 256.087450][ T8013] ? __get_vm_area_node+0x356/0x370 [ 256.092782][ T8013] __vmalloc_node_range+0x393/0x1330 [ 256.098109][ T8013] ? mark_lock+0x94/0x320 [ 256.102475][ T8013] ? __lock_acquire+0x1347/0x7d40 [ 256.107533][ T8013] ? verify_lock_unused+0x140/0x140 [ 256.112777][ T8013] ? free_vm_area+0x50/0x50 [ 256.117335][ T8013] ? end_current_label_crit_section+0x170/0x170 [ 256.123672][ T8013] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 256.129378][ T8013] __vmalloc+0x7a/0x90 [ 256.133497][ T8013] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 256.139113][ T8013] bpf_prog_alloc_no_stats+0x47/0x440 [ 256.144535][ T8013] ? bpf_prog_alloc+0x2b/0x1a0 [ 256.149424][ T8013] bpf_prog_alloc+0x3d/0x1a0 [ 256.154091][ T8013] bpf_prog_load+0x6eb/0x1670 [ 256.158913][ T8013] ? map_freeze+0x420/0x420 [ 256.163559][ T8013] ? __might_fault+0xaa/0x120 [ 256.168275][ T8013] ? __lock_acquire+0x7d40/0x7d40 [ 256.173336][ T8013] ? file_end_write+0x159/0x250 [ 256.178220][ T8013] ? __might_fault+0xaa/0x120 [ 256.182924][ T8013] ? __might_fault+0xc6/0x120 [ 256.187617][ T8013] ? __might_fault+0xaa/0x120 [ 256.192325][ T8013] ? bpf_lsm_bpf+0x9/0x10 [ 256.196681][ T8013] ? security_bpf+0x7e/0xa0 [ 256.201212][ T8013] __sys_bpf+0x5ba/0x890 [ 256.205483][ T8013] ? bpf_link_show_fdinfo+0x390/0x390 [ 256.210892][ T8013] ? lock_chain_count+0x20/0x20 [ 256.215781][ T8013] __x64_sys_bpf+0x7c/0x90 [ 256.220229][ T8013] do_syscall_64+0x55/0xa0 [ 256.224675][ T8013] ? clear_bhb_loop+0x40/0x90 [ 256.229412][ T8013] ? clear_bhb_loop+0x40/0x90 [ 256.234227][ T8013] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 256.240262][ T8013] RIP: 0033:0x7f0aae19acb9 [ 256.244738][ T8013] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 256.264502][ T8013] RSP: 002b:00007f0aaef9f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 256.272957][ T8013] RAX: ffffffffffffffda RBX: 00007f0aae415fa0 RCX: 00007f0aae19acb9 [ 256.280958][ T8013] RDX: 0000000000000094 RSI: 0000200000000440 RDI: 0000000000000005 [ 256.289039][ T8013] RBP: 00007f0aaef9f090 R08: 0000000000000000 R09: 0000000000000000 [ 256.297036][ T8013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 256.305043][ T8013] R13: 00007f0aae416038 R14: 00007f0aae415fa0 R15: 00007ffdf6f42d78 [ 256.313061][ T8013] [ 256.419957][ T1280] ieee802154 phy0 wpan0: encryption failed: -22 [ 256.422920][ T8013] Mem-Info: [ 256.426628][ T1280] ieee802154 phy1 wpan1: encryption failed: -22 [ 256.446905][ T8013] active_anon:23519 inactive_anon:0 isolated_anon:0 [ 256.446905][ T8013] active_file:17047 inactive_file:39986 isolated_file:0 [ 256.446905][ T8013] unevictable:768 dirty:171 writeback:0 [ 256.446905][ T8013] slab_reclaimable:10577 slab_unreclaimable:97339 [ 256.446905][ T8013] mapped:38782 shmem:19018 pagetables:688 [ 256.446905][ T8013] sec_pagetables:0 bounce:0 [ 256.446905][ T8013] kernel_misc_reclaimable:0 [ 256.446905][ T8013] free:1310539 free_pcp:11887 free_cma:0 [ 256.556165][ T8013] Node 0 active_anon:95576kB inactive_anon:0kB active_file:68188kB inactive_file:159740kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:155328kB dirty:680kB writeback:0kB shmem:76036kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:12092kB pagetables:2752kB sec_pagetables:0kB all_unreclaimable? no [ 256.622350][ T8013] Node 1 active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:204kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:1536kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:16kB pagetables:0kB sec_pagetables:0kB all_unreclaimable? no [ 256.672312][ T8013] Node 0 DMA free:15360kB boost:0kB min:204kB low:252kB high:300kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 256.697415][ T8026] netlink: 'syz.5.577': attribute type 1 has an invalid length. [ 256.711447][ T8013] lowmem_reserve[]: 0 2521 2522 2522 2522 [ 256.718185][ T8026] netlink: 'syz.5.577': attribute type 3 has an invalid length. [ 256.725892][ T8026] netlink: 132 bytes leftover after parsing attributes in process `syz.5.577'. [ 256.737039][ T8013] Node 0 DMA32 free:1334484kB boost:0kB min:34644kB low:43304kB high:51964kB reserved_highatomic:0KB active_anon:97232kB inactive_anon:0kB active_file:68188kB inactive_file:158916kB unevictable:1536kB writepending:684kB present:3129332kB managed:2586972kB mlocked:0kB bounce:0kB free_pcp:25840kB local_pcp:8696kB free_cma:0kB [ 256.775558][ T8013] lowmem_reserve[]: 0 0 0 0 0 [ 256.783536][ T8013] Node 0 Normal free:0kB boost:0kB min:8kB low:8kB high:8kB reserved_highatomic:0KB active_anon:36kB inactive_anon:0kB active_file:0kB inactive_file:824kB unevictable:0kB writepending:0kB present:1048576kB managed:872kB mlocked:0kB bounce:0kB free_pcp:12kB local_pcp:0kB free_cma:0kB [ 256.818138][ T8013] lowmem_reserve[]: 0 0 0 0 0 [ 256.823144][ T8013] Node 1 Normal free:3889036kB boost:0kB min:55244kB low:69052kB high:82860kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:204kB unevictable:1536kB writepending:4kB present:4194304kB managed:4117312kB mlocked:0kB bounce:0kB free_pcp:22112kB local_pcp:12992kB free_cma:0kB [ 256.855336][ T8013] lowmem_reserve[]: 0 0 0 0 0 [ 256.861335][ T8013] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 256.874915][ T8013] Node 0 DMA32: 3*4kB (ME) 54*8kB (UME) 2*16kB (UE) 2*32kB (UE) 7*64kB (U) 6*128kB (UME) 2*256kB (U) 1*512kB (E) 4*1024kB (UM) 2*2048kB (ME) 323*4096kB (UM) = 1333980kB [ 256.908037][ T8013] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 256.968025][ T8013] Node 1 Normal: 247*4kB (UME) 54*8kB (UME) 40*16kB (UME) 96*32kB (UME) 20*64kB (UME) 9*128kB (UME) 2*256kB (UM) 2*512kB (UE) 1*1024kB (U) 2*2048kB (UE) 946*4096kB (M) = 3889036kB [ 257.035430][ T8013] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 257.078092][ T8013] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 257.109944][ T8013] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 257.158147][ T8013] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 257.184976][ T8013] 78009 total pagecache pages [ 257.189881][ T8013] 0 pages in swap cache [ 257.194087][ T8013] Free swap = 124996kB [ 257.198573][ T8013] Total swap = 124996kB [ 257.202787][ T8013] 2097051 pages RAM [ 257.206649][ T8013] 0 pages HighMem/MovableOnly [ 257.238335][ T8013] 416922 pages reserved [ 257.242608][ T8013] 0 pages cma reserved [ 257.395108][ T8035] FAULT_INJECTION: forcing a failure. [ 257.395108][ T8035] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 257.427592][ T8035] CPU: 1 PID: 8035 Comm: syz.5.581 Not tainted syzkaller #0 [ 257.434990][ T8035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 257.445213][ T8035] Call Trace: [ 257.448565][ T8035] [ 257.451544][ T8035] dump_stack_lvl+0x18c/0x250 [ 257.456295][ T8035] ? show_regs_print_info+0x20/0x20 [ 257.461562][ T8035] ? load_image+0x400/0x400 [ 257.466131][ T8035] ? __might_fault+0xaa/0x120 [ 257.470860][ T8035] ? __lock_acquire+0x7d40/0x7d40 [ 257.475942][ T8035] should_fail_ex+0x39d/0x4d0 [ 257.480688][ T8035] _copy_from_user+0x2f/0xe0 [ 257.485361][ T8035] ___sys_recvmsg+0x176/0x590 [ 257.490102][ T8035] ? __sys_recvmsg+0x2a0/0x2a0 [ 257.494924][ T8035] ? trace_call_bpf+0xc3/0x6c0 [ 257.499764][ T8035] ? trace_call_bpf+0x5e9/0x6c0 [ 257.504690][ T8035] ? __fget_files+0x43d/0x4b0 [ 257.509445][ T8035] __x64_sys_recvmsg+0x20c/0x2e0 [ 257.514434][ T8035] ? perf_trace_preemptirq_template+0x269/0x330 [ 257.520733][ T8035] ? ___sys_recvmsg+0x590/0x590 [ 257.525664][ T8035] ? lockdep_hardirqs_on+0x98/0x150 [ 257.530911][ T8035] do_syscall_64+0x55/0xa0 [ 257.535381][ T8035] ? clear_bhb_loop+0x40/0x90 [ 257.540109][ T8035] ? clear_bhb_loop+0x40/0x90 [ 257.544872][ T8035] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 257.550907][ T8035] RIP: 0033:0x7ff82659acb9 [ 257.555370][ T8035] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 257.575053][ T8035] RSP: 002b:00007ff8273ac028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 257.583644][ T8035] RAX: ffffffffffffffda RBX: 00007ff826815fa0 RCX: 00007ff82659acb9 [ 257.591660][ T8035] RDX: 0000000000000100 RSI: 0000200000000000 RDI: 0000000000000006 [ 257.599674][ T8035] RBP: 00007ff8273ac090 R08: 0000000000000000 R09: 0000000000000000 [ 257.607701][ T8035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 257.615725][ T8035] R13: 00007ff826816038 R14: 00007ff826815fa0 R15: 00007ffe4ab23a58 [ 257.623765][ T8035] [ 257.787138][ T8031] netlink: 'syz.0.579': attribute type 33 has an invalid length. [ 257.796148][ T8042] netlink: 'syz.4.582': attribute type 33 has an invalid length. [ 257.805050][ T8031] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.579'. [ 257.818525][ T8042] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.582'. [ 257.855643][ T8048] netlink: 'syz.5.581': attribute type 33 has an invalid length. [ 257.888057][ T8048] netlink: 199836 bytes leftover after parsing attributes in process `syz.5.581'. [ 258.107840][ T8043] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 258.116372][ T8043] IPv6: NLM_F_CREATE should be set when creating new route [ 258.124947][ T8043] IPv6: NLM_F_CREATE should be set when creating new route [ 258.132658][ T8043] IPv6: NLM_F_CREATE should be set when creating new route [ 258.257259][ T8054] netlink: 212940 bytes leftover after parsing attributes in process `syz.4.584'. [ 258.329841][ T8056] FAULT_INJECTION: forcing a failure. [ 258.329841][ T8056] name failslab, interval 1, probability 0, space 0, times 0 [ 258.399801][ T8056] CPU: 0 PID: 8056 Comm: syz.5.585 Not tainted syzkaller #0 [ 258.407182][ T8056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 258.417291][ T8056] Call Trace: [ 258.420621][ T8056] [ 258.423607][ T8056] dump_stack_lvl+0x18c/0x250 [ 258.428354][ T8056] ? show_regs_print_info+0x20/0x20 [ 258.433622][ T8056] ? load_image+0x400/0x400 [ 258.438265][ T8056] ? __might_sleep+0xe0/0xe0 [ 258.442912][ T8056] ? __lock_acquire+0x7d40/0x7d40 [ 258.447995][ T8056] should_fail_ex+0x39d/0x4d0 [ 258.452742][ T8056] should_failslab+0x9/0x20 [ 258.457307][ T8056] slab_pre_alloc_hook+0x59/0x310 [ 258.462480][ T8056] ? __get_vm_area_node+0x125/0x370 [ 258.467762][ T8056] __kmem_cache_alloc_node+0x53/0x250 [ 258.473204][ T8056] ? __get_vm_area_node+0x125/0x370 [ 258.478514][ T8056] kmalloc_node_trace+0x26/0xe0 [ 258.483466][ T8056] __get_vm_area_node+0x125/0x370 [ 258.488651][ T8056] __vmalloc_node_range+0x36e/0x1330 [ 258.494066][ T8056] ? netlink_sendmsg+0x602/0xbf0 [ 258.499138][ T8056] ? netlink_insert+0x109f/0x13a0 [ 258.504217][ T8056] ? netlink_data_ready+0x10/0x10 [ 258.509291][ T8056] ? free_vm_area+0x50/0x50 [ 258.513835][ T8056] ? netlink_sendmsg+0x602/0xbf0 [ 258.518803][ T8056] vmalloc+0x79/0x90 [ 258.522745][ T8056] ? netlink_sendmsg+0x602/0xbf0 [ 258.527805][ T8056] netlink_sendmsg+0x602/0xbf0 [ 258.532605][ T8056] ? netlink_getsockopt+0x590/0x590 [ 258.537835][ T8056] ? aa_sock_msg_perm+0x94/0x150 [ 258.542804][ T8056] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 258.548124][ T8056] ? security_socket_sendmsg+0x80/0xa0 [ 258.553734][ T8056] ? netlink_getsockopt+0x590/0x590 [ 258.558973][ T8056] ____sys_sendmsg+0x5ba/0x960 [ 258.563798][ T8056] ? __asan_memset+0x22/0x40 [ 258.568507][ T8056] ? __sys_sendmsg_sock+0x30/0x30 [ 258.573570][ T8056] ? __import_iovec+0x5f2/0x850 [ 258.578808][ T8056] ? import_iovec+0x73/0xa0 [ 258.583349][ T8056] ___sys_sendmsg+0x2a6/0x360 [ 258.588087][ T8056] ? get_pid_task+0x20/0x1e0 [ 258.592726][ T8056] ? __sys_sendmsg+0x2a0/0x2a0 [ 258.597551][ T8056] ? __lock_acquire+0x7d40/0x7d40 [ 258.602796][ T8056] __se_sys_sendmsg+0x1c2/0x2b0 [ 258.607772][ T8056] ? __x64_sys_sendmsg+0x80/0x80 [ 258.612845][ T8056] ? lockdep_hardirqs_on+0x98/0x150 [ 258.618088][ T8056] do_syscall_64+0x55/0xa0 [ 258.622542][ T8056] ? clear_bhb_loop+0x40/0x90 [ 258.627249][ T8056] ? clear_bhb_loop+0x40/0x90 [ 258.631952][ T8056] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 258.637876][ T8056] RIP: 0033:0x7ff82659acb9 [ 258.642322][ T8056] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 258.661964][ T8056] RSP: 002b:00007ff8273ac028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 258.670410][ T8056] RAX: ffffffffffffffda RBX: 00007ff826815fa0 RCX: 00007ff82659acb9 [ 258.678408][ T8056] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 258.686408][ T8056] RBP: 00007ff8273ac090 R08: 0000000000000000 R09: 0000000000000000 [ 258.694413][ T8056] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 258.702417][ T8056] R13: 00007ff826816038 R14: 00007ff826815fa0 R15: 00007ffe4ab23a58 [ 258.710431][ T8056] [ 258.746131][ T8059] FAULT_INJECTION: forcing a failure. [ 258.746131][ T8059] name failslab, interval 1, probability 0, space 0, times 0 [ 258.768494][ T8059] CPU: 0 PID: 8059 Comm: syz.4.587 Not tainted syzkaller #0 [ 258.775872][ T8059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 258.785981][ T8059] Call Trace: [ 258.789301][ T8059] [ 258.792293][ T8059] dump_stack_lvl+0x18c/0x250 [ 258.797041][ T8059] ? show_regs_print_info+0x20/0x20 [ 258.802300][ T8059] ? load_image+0x400/0x400 [ 258.806874][ T8059] ? __might_sleep+0xe0/0xe0 [ 258.811526][ T8059] ? __lock_acquire+0x7d40/0x7d40 [ 258.816619][ T8059] should_fail_ex+0x39d/0x4d0 [ 258.821488][ T8059] should_failslab+0x9/0x20 [ 258.826057][ T8059] slab_pre_alloc_hook+0x59/0x310 [ 258.831162][ T8059] ? tomoyo_encode+0x28b/0x540 [ 258.835966][ T8059] ? tomoyo_encode+0x28b/0x540 [ 258.840854][ T8059] __kmem_cache_alloc_node+0x53/0x250 [ 258.846289][ T8059] ? tomoyo_encode+0x28b/0x540 [ 258.851098][ T8059] __kmalloc+0xa4/0x230 [ 258.855317][ T8059] tomoyo_encode+0x28b/0x540 [ 258.860000][ T8059] tomoyo_realpath_from_path+0x592/0x5d0 [ 258.865784][ T8059] tomoyo_path_number_perm+0x248/0x620 [ 258.871298][ T8059] ? tomoyo_path_number_perm+0x217/0x620 [ 258.876993][ T8059] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 258.882550][ T8059] ? __fget_files+0x28/0x4b0 [ 258.887193][ T8059] ? __fget_files+0x28/0x4b0 [ 258.891893][ T8059] security_file_ioctl+0x70/0xa0 [ 258.896901][ T8059] __se_sys_ioctl+0x48/0x170 [ 258.901558][ T8059] do_syscall_64+0x55/0xa0 [ 258.906017][ T8059] ? clear_bhb_loop+0x40/0x90 [ 258.910917][ T8059] ? clear_bhb_loop+0x40/0x90 [ 258.915738][ T8059] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 258.921686][ T8059] RIP: 0033:0x7f0aae19acb9 [ 258.926148][ T8059] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 258.945816][ T8059] RSP: 002b:00007f0aaef9f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 258.954289][ T8059] RAX: ffffffffffffffda RBX: 00007f0aae415fa0 RCX: 00007f0aae19acb9 [ 258.962317][ T8059] RDX: 0000000000000005 RSI: 0000000000002403 RDI: 0000000000000003 [ 258.970343][ T8059] RBP: 00007f0aaef9f090 R08: 0000000000000000 R09: 0000000000000000 [ 258.978361][ T8059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 258.986378][ T8059] R13: 00007f0aae416038 R14: 00007f0aae415fa0 R15: 00007ffdf6f42d78 [ 258.994455][ T8059] [ 259.049575][ T8059] ERROR: Out of memory at tomoyo_realpath_from_path. [ 259.247220][ T8063] netlink: 'syz.0.589': attribute type 12 has an invalid length. [ 259.267107][ T8063] netlink: 120 bytes leftover after parsing attributes in process `syz.0.589'. [ 259.758613][ T8079] netlink: 'syz.5.594': attribute type 21 has an invalid length. [ 259.820032][ T8079] netlink: 'syz.5.594': attribute type 2 has an invalid length. [ 259.898487][ T8081] netlink: 57923 bytes leftover after parsing attributes in process `syz.5.594'. [ 259.958182][ T8079] netlink: 9062 bytes leftover after parsing attributes in process `syz.5.594'. [ 260.232652][ T8086] netlink: 65047 bytes leftover after parsing attributes in process `syz.0.595'. [ 260.284783][ T8089] netlink: 144308 bytes leftover after parsing attributes in process `syz.5.596'. [ 260.680466][ T8094] FAULT_INJECTION: forcing a failure. [ 260.680466][ T8094] name failslab, interval 1, probability 0, space 0, times 0 [ 260.715146][ T8094] CPU: 0 PID: 8094 Comm: syz.0.598 Not tainted syzkaller #0 [ 260.722570][ T8094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 260.732811][ T8094] Call Trace: [ 260.736188][ T8094] [ 260.739200][ T8094] dump_stack_lvl+0x18c/0x250 [ 260.743989][ T8094] ? show_regs_print_info+0x20/0x20 [ 260.749287][ T8094] ? load_image+0x400/0x400 [ 260.753895][ T8094] ? __might_sleep+0xe0/0xe0 [ 260.758586][ T8094] ? __lock_acquire+0x7d40/0x7d40 [ 260.763731][ T8094] should_fail_ex+0x39d/0x4d0 [ 260.768627][ T8094] should_failslab+0x9/0x20 [ 260.773232][ T8094] slab_pre_alloc_hook+0x59/0x310 [ 260.778369][ T8094] ? __lock_acquire+0x7d40/0x7d40 [ 260.783526][ T8094] kmem_cache_alloc_node+0x60/0x320 [ 260.788836][ T8094] ? __alloc_skb+0x103/0x2c0 [ 260.793545][ T8094] __alloc_skb+0x103/0x2c0 [ 260.798083][ T8094] netlink_sendmsg+0x66a/0xbf0 [ 260.802943][ T8094] ? perf_trace_lock+0x304/0x3b0 [ 260.808007][ T8094] ? netlink_getsockopt+0x590/0x590 [ 260.813318][ T8094] ? aa_sock_msg_perm+0x94/0x150 [ 260.818391][ T8094] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 260.823766][ T8094] ? security_socket_sendmsg+0x80/0xa0 [ 260.829314][ T8094] ? netlink_getsockopt+0x590/0x590 [ 260.834626][ T8094] ____sys_sendmsg+0x5ba/0x960 [ 260.839517][ T8094] ? __asan_memset+0x22/0x40 [ 260.844205][ T8094] ? __sys_sendmsg_sock+0x30/0x30 [ 260.849496][ T8094] ? __import_iovec+0x5f2/0x850 [ 260.854529][ T8094] ? import_iovec+0x73/0xa0 [ 260.859247][ T8094] ___sys_sendmsg+0x2a6/0x360 [ 260.864231][ T8094] ? __sys_sendmsg+0x2a0/0x2a0 [ 260.869264][ T8094] ? __lock_acquire+0x7d40/0x7d40 [ 260.874842][ T8094] __se_sys_sendmsg+0x1c2/0x2b0 [ 260.879813][ T8094] ? __x64_sys_sendmsg+0x80/0x80 [ 260.884907][ T8094] ? lockdep_hardirqs_on+0x98/0x150 [ 260.890775][ T8094] do_syscall_64+0x55/0xa0 [ 260.895282][ T8094] ? clear_bhb_loop+0x40/0x90 [ 260.900122][ T8094] ? clear_bhb_loop+0x40/0x90 [ 260.904928][ T8094] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 260.910991][ T8094] RIP: 0033:0x7fbb5bb9acb9 [ 260.915584][ T8094] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 260.935291][ T8094] RSP: 002b:00007fbb5ca43028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 260.943833][ T8094] RAX: ffffffffffffffda RBX: 00007fbb5be15fa0 RCX: 00007fbb5bb9acb9 [ 260.951899][ T8094] RDX: 000000002000a890 RSI: 0000200000000080 RDI: 0000000000000003 [ 260.960053][ T8094] RBP: 00007fbb5ca43090 R08: 0000000000000000 R09: 0000000000000000 [ 260.968111][ T8094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 260.976253][ T8094] R13: 00007fbb5be16038 R14: 00007fbb5be15fa0 R15: 00007ffc9c302208 [ 260.984388][ T8094] [ 261.021458][ T8095] FAULT_INJECTION: forcing a failure. [ 261.021458][ T8095] name failslab, interval 1, probability 0, space 0, times 0 [ 261.152311][ T8095] CPU: 0 PID: 8095 Comm: syz.1.597 Not tainted syzkaller #0 [ 261.159804][ T8095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 261.170020][ T8095] Call Trace: [ 261.173357][ T8095] [ 261.176332][ T8095] dump_stack_lvl+0x18c/0x250 [ 261.181268][ T8095] ? show_regs_print_info+0x20/0x20 [ 261.186619][ T8095] ? load_image+0x400/0x400 [ 261.191188][ T8095] ? __might_sleep+0xe0/0xe0 [ 261.195851][ T8095] ? __lock_acquire+0x7d40/0x7d40 [ 261.200948][ T8095] should_fail_ex+0x39d/0x4d0 [ 261.205689][ T8095] should_failslab+0x9/0x20 [ 261.210253][ T8095] slab_pre_alloc_hook+0x59/0x310 [ 261.215343][ T8095] ? __get_vm_area_node+0x125/0x370 [ 261.220607][ T8095] __kmem_cache_alloc_node+0x53/0x250 [ 261.226065][ T8095] ? __get_vm_area_node+0x125/0x370 [ 261.231424][ T8095] kmalloc_node_trace+0x26/0xe0 [ 261.236340][ T8095] __get_vm_area_node+0x125/0x370 [ 261.241434][ T8095] __vmalloc_node_range+0x36e/0x1330 [ 261.246779][ T8095] ? netlink_sendmsg+0x602/0xbf0 [ 261.251774][ T8095] ? netlink_insert+0x109f/0x13a0 [ 261.256876][ T8095] ? netlink_data_ready+0x10/0x10 [ 261.261940][ T8095] ? free_vm_area+0x50/0x50 [ 261.266485][ T8095] ? netlink_sendmsg+0x602/0xbf0 [ 261.271466][ T8095] vmalloc+0x79/0x90 [ 261.275397][ T8095] ? netlink_sendmsg+0x602/0xbf0 [ 261.280459][ T8095] netlink_sendmsg+0x602/0xbf0 [ 261.285269][ T8095] ? netlink_getsockopt+0x590/0x590 [ 261.290531][ T8095] ? aa_sock_msg_perm+0x94/0x150 [ 261.295501][ T8095] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 261.300844][ T8095] ? security_socket_sendmsg+0x80/0xa0 [ 261.306389][ T8095] sock_write_iter+0x2df/0x420 [ 261.311230][ T8095] ? sock_read_iter+0x3e0/0x3e0 [ 261.316216][ T8095] ? common_file_perm+0x198/0x1f0 [ 261.321404][ T8095] vfs_write+0x46c/0x990 [ 261.325798][ T8095] ? file_end_write+0x250/0x250 [ 261.330690][ T8095] ? __fget_files+0x43d/0x4b0 [ 261.335414][ T8095] ? __fdget_pos+0x1d8/0x330 [ 261.340298][ T8095] ? ksys_write+0x75/0x260 [ 261.344748][ T8095] ksys_write+0x150/0x260 [ 261.349119][ T8095] ? __ia32_sys_read+0x90/0x90 [ 261.353919][ T8095] ? lockdep_hardirqs_on+0x98/0x150 [ 261.359181][ T8095] do_syscall_64+0x55/0xa0 [ 261.363636][ T8095] ? clear_bhb_loop+0x40/0x90 [ 261.368344][ T8095] ? clear_bhb_loop+0x40/0x90 [ 261.373057][ T8095] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 261.378972][ T8095] RIP: 0033:0x7f1a1319acb9 [ 261.383423][ T8095] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 261.403320][ T8095] RSP: 002b:00007f1a14125028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 261.411765][ T8095] RAX: ffffffffffffffda RBX: 00007f1a13415fa0 RCX: 00007f1a1319acb9 [ 261.419760][ T8095] RDX: 000000000000fe33 RSI: 0000200000000000 RDI: 0000000000000005 [ 261.427753][ T8095] RBP: 00007f1a14125090 R08: 0000000000000000 R09: 0000000000000000 [ 261.435758][ T8095] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 261.443749][ T8095] R13: 00007f1a13416038 R14: 00007f1a13415fa0 R15: 00007ffeb3c1d1d8 [ 261.451777][ T8095] [ 262.591763][ T8122] FAULT_INJECTION: forcing a failure. [ 262.591763][ T8122] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 262.634976][ T8122] CPU: 0 PID: 8122 Comm: syz.0.605 Not tainted syzkaller #0 [ 262.642375][ T8122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 262.652495][ T8122] Call Trace: [ 262.655821][ T8122] [ 262.658890][ T8122] dump_stack_lvl+0x18c/0x250 [ 262.663727][ T8122] ? show_regs_print_info+0x20/0x20 [ 262.669087][ T8122] ? load_image+0x400/0x400 [ 262.673748][ T8122] ? __might_fault+0xaa/0x120 [ 262.678521][ T8122] ? __lock_acquire+0x7d40/0x7d40 [ 262.683617][ T8122] should_fail_ex+0x39d/0x4d0 [ 262.688377][ T8122] _copy_from_user+0x2f/0xe0 [ 262.693027][ T8122] mptcp_setsockopt+0x15e0/0x3390 [ 262.698131][ T8122] ? aa_sk_perm+0x83c/0x970 [ 262.702695][ T8122] ? __fget_files+0x28/0x4b0 [ 262.707342][ T8122] ? pm_nl_exit_net+0x230/0x230 [ 262.712255][ T8122] ? aa_af_perm+0x330/0x330 [ 262.716827][ T8122] ? __fget_files+0x28/0x4b0 [ 262.721495][ T8122] ? __fget_files+0x28/0x4b0 [ 262.726141][ T8122] ? sock_common_setsockopt+0x36/0xc0 [ 262.731655][ T8122] ? sock_common_recvmsg+0x190/0x190 [ 262.737003][ T8122] do_sock_setsockopt+0x175/0x1a0 [ 262.742088][ T8122] __x64_sys_setsockopt+0x182/0x200 [ 262.747334][ T8122] do_syscall_64+0x55/0xa0 [ 262.751785][ T8122] ? clear_bhb_loop+0x40/0x90 [ 262.756489][ T8122] ? clear_bhb_loop+0x40/0x90 [ 262.761191][ T8122] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 262.767111][ T8122] RIP: 0033:0x7fbb5bb9acb9 [ 262.771559][ T8122] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 262.791205][ T8122] RSP: 002b:00007fbb5ca22028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 262.799651][ T8122] RAX: ffffffffffffffda RBX: 00007fbb5be16090 RCX: 00007fbb5bb9acb9 [ 262.807644][ T8122] RDX: 0000000000000031 RSI: 0000000000000001 RDI: 0000000000000003 [ 262.815653][ T8122] RBP: 00007fbb5ca22090 R08: 0000000000000004 R09: 0000000000000000 [ 262.823646][ T8122] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 262.831638][ T8122] R13: 00007fbb5be16128 R14: 00007fbb5be16090 R15: 00007ffc9c302208 [ 262.839740][ T8122] [ 263.097513][ T8124] netlink: 'syz.1.606': attribute type 2 has an invalid length. [ 263.133950][ T8128] FAULT_INJECTION: forcing a failure. [ 263.133950][ T8128] name failslab, interval 1, probability 0, space 0, times 0 [ 263.166481][ T8127] netlink: 'syz.0.607': attribute type 10 has an invalid length. [ 263.176549][ T8124] netlink: 'syz.1.606': attribute type 3 has an invalid length. [ 263.193212][ T8128] CPU: 0 PID: 8128 Comm: syz.5.608 Not tainted syzkaller #0 [ 263.200588][ T8128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 263.210707][ T8128] Call Trace: [ 263.214040][ T8128] [ 263.217032][ T8128] dump_stack_lvl+0x18c/0x250 [ 263.221797][ T8128] ? show_regs_print_info+0x20/0x20 [ 263.227069][ T8128] ? load_image+0x400/0x400 [ 263.231649][ T8128] ? __might_sleep+0xe0/0xe0 [ 263.236699][ T8128] ? __lock_acquire+0x7d40/0x7d40 [ 263.241826][ T8128] should_fail_ex+0x39d/0x4d0 [ 263.246600][ T8128] should_failslab+0x9/0x20 [ 263.251183][ T8128] slab_pre_alloc_hook+0x59/0x310 [ 263.256458][ T8128] ? __lock_acquire+0x7d40/0x7d40 [ 263.261563][ T8128] kmem_cache_alloc_node+0x60/0x320 [ 263.266837][ T8128] ? __alloc_skb+0x103/0x2c0 [ 263.271505][ T8128] __alloc_skb+0x103/0x2c0 [ 263.275983][ T8128] netlink_sendmsg+0x66a/0xbf0 [ 263.280799][ T8128] ? perf_trace_lock+0x304/0x3b0 [ 263.285893][ T8128] ? netlink_getsockopt+0x590/0x590 [ 263.291149][ T8128] ? aa_sock_msg_perm+0x94/0x150 [ 263.296152][ T8128] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 263.301489][ T8128] ? security_socket_sendmsg+0x80/0xa0 [ 263.307006][ T8128] ? netlink_getsockopt+0x590/0x590 [ 263.312253][ T8128] ____sys_sendmsg+0x5ba/0x960 [ 263.317083][ T8128] ? __asan_memset+0x22/0x40 [ 263.321720][ T8128] ? __sys_sendmsg_sock+0x30/0x30 [ 263.326815][ T8128] ? __import_iovec+0x5f2/0x850 [ 263.331758][ T8128] ? import_iovec+0x73/0xa0 [ 263.336316][ T8128] ___sys_sendmsg+0x2a6/0x360 [ 263.341077][ T8128] ? __sys_sendmsg+0x2a0/0x2a0 [ 263.345925][ T8128] ? __lock_acquire+0x7d40/0x7d40 [ 263.351029][ T8128] __se_sys_sendmsg+0x1c2/0x2b0 [ 263.355933][ T8128] ? __x64_sys_sendmsg+0x80/0x80 [ 263.360944][ T8128] ? lockdep_hardirqs_on+0x98/0x150 [ 263.366188][ T8128] do_syscall_64+0x55/0xa0 [ 263.370654][ T8128] ? clear_bhb_loop+0x40/0x90 [ 263.375458][ T8128] ? clear_bhb_loop+0x40/0x90 [ 263.380175][ T8128] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 263.386107][ T8128] RIP: 0033:0x7ff82659acb9 [ 263.390563][ T8128] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 263.410301][ T8128] RSP: 002b:00007ff8273ac028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 263.418768][ T8128] RAX: ffffffffffffffda RBX: 00007ff826815fa0 RCX: 00007ff82659acb9 [ 263.427298][ T8128] RDX: 0000000000000000 RSI: 0000200000000600 RDI: 0000000000000008 [ 263.435306][ T8128] RBP: 00007ff8273ac090 R08: 0000000000000000 R09: 0000000000000000 [ 263.443310][ T8128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 263.451323][ T8128] R13: 00007ff826816038 R14: 00007ff826815fa0 R15: 00007ffe4ab23a58 [ 263.459363][ T8128] [ 263.469066][ T8124] netlink: 132 bytes leftover after parsing attributes in process `syz.1.606'. [ 263.493561][ T8130] netlink: 'syz.5.608': attribute type 11 has an invalid length. [ 263.502349][ T8130] netlink: 184116 bytes leftover after parsing attributes in process `syz.5.608'. [ 263.545274][ T8131] netlink: 'syz.0.607': attribute type 11 has an invalid length. [ 263.575535][ T8127] veth1_macvtap: left promiscuous mode [ 263.609294][ T8131] netlink: 184116 bytes leftover after parsing attributes in process `syz.0.607'. [ 263.799752][ T5777] Bluetooth: hci0: ISO packet for unknown connection handle 2622 [ 264.594406][ T8136] syzkaller0: entered promiscuous mode [ 264.613210][ T8136] syzkaller0: entered allmulticast mode [ 264.639076][ T8150] netlink: 'syz.0.613': attribute type 12 has an invalid length. [ 264.650400][ T8151] netlink: 'syz.1.611': attribute type 11 has an invalid length. [ 264.672732][ T8150] netlink: 120 bytes leftover after parsing attributes in process `syz.0.613'. [ 264.680233][ T8151] netlink: 184116 bytes leftover after parsing attributes in process `syz.1.611'. [ 264.728328][ T8148] netlink: 'syz.1.611': attribute type 10 has an invalid length. [ 265.087907][ T8157] FAULT_INJECTION: forcing a failure. [ 265.087907][ T8157] name failslab, interval 1, probability 0, space 0, times 0 [ 265.115500][ T8157] CPU: 1 PID: 8157 Comm: syz.5.615 Not tainted syzkaller #0 [ 265.122870][ T8157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 265.132985][ T8157] Call Trace: [ 265.136308][ T8157] [ 265.139281][ T8157] dump_stack_lvl+0x18c/0x250 [ 265.144024][ T8157] ? show_regs_print_info+0x20/0x20 [ 265.149274][ T8157] ? load_image+0x400/0x400 [ 265.153833][ T8157] ? __might_sleep+0xe0/0xe0 [ 265.158471][ T8157] ? __lock_acquire+0x7d40/0x7d40 [ 265.163635][ T8157] should_fail_ex+0x39d/0x4d0 [ 265.168371][ T8157] should_failslab+0x9/0x20 [ 265.172928][ T8157] slab_pre_alloc_hook+0x59/0x310 [ 265.178006][ T8157] ? __lock_acquire+0x7d40/0x7d40 [ 265.183061][ T8157] kmem_cache_alloc_node+0x60/0x320 [ 265.188378][ T8157] ? __alloc_skb+0x103/0x2c0 [ 265.193011][ T8157] __alloc_skb+0x103/0x2c0 [ 265.197468][ T8157] netlink_sendmsg+0x66a/0xbf0 [ 265.202273][ T8157] ? netlink_getsockopt+0x590/0x590 [ 265.207503][ T8157] ? aa_sock_msg_perm+0x94/0x150 [ 265.212468][ T8157] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 265.217778][ T8157] ? security_socket_sendmsg+0x80/0xa0 [ 265.223265][ T8157] ? netlink_getsockopt+0x590/0x590 [ 265.228503][ T8157] ____sys_sendmsg+0x5ba/0x960 [ 265.233307][ T8157] ? __asan_memset+0x22/0x40 [ 265.237953][ T8157] ? __sys_sendmsg_sock+0x30/0x30 [ 265.243023][ T8157] ? __import_iovec+0x5f2/0x850 [ 265.247915][ T8157] ? import_iovec+0x73/0xa0 [ 265.252462][ T8157] ___sys_sendmsg+0x2a6/0x360 [ 265.257180][ T8157] ? get_pid_task+0x20/0x1e0 [ 265.261806][ T8157] ? __sys_sendmsg+0x2a0/0x2a0 [ 265.266632][ T8157] ? __lock_acquire+0x7d40/0x7d40 [ 265.271727][ T8157] __se_sys_sendmsg+0x1c2/0x2b0 [ 265.276648][ T8157] ? __x64_sys_sendmsg+0x80/0x80 [ 265.281649][ T8157] ? lockdep_hardirqs_on+0x98/0x150 [ 265.286887][ T8157] do_syscall_64+0x55/0xa0 [ 265.291343][ T8157] ? clear_bhb_loop+0x40/0x90 [ 265.296052][ T8157] ? clear_bhb_loop+0x40/0x90 [ 265.300761][ T8157] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 265.306687][ T8157] RIP: 0033:0x7ff82659acb9 [ 265.311128][ T8157] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 265.330857][ T8157] RSP: 002b:00007ff8273ac028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 265.339306][ T8157] RAX: ffffffffffffffda RBX: 00007ff826815fa0 RCX: 00007ff82659acb9 [ 265.347312][ T8157] RDX: 000000002000a890 RSI: 0000200000000080 RDI: 0000000000000003 [ 265.355332][ T8157] RBP: 00007ff8273ac090 R08: 0000000000000000 R09: 0000000000000000 [ 265.363339][ T8157] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 265.371352][ T8157] R13: 00007ff826816038 R14: 00007ff826815fa0 R15: 00007ffe4ab23a58 [ 265.379386][ T8157] [ 268.335287][ T8163] netlink: 'syz.5.617': attribute type 10 has an invalid length. [ 268.359715][ T8163] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 268.399359][ T8163] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 268.423890][ T8171] netlink: 'syz.1.618': attribute type 12 has an invalid length. [ 268.454973][ T8171] netlink: 120 bytes leftover after parsing attributes in process `syz.1.618'. [ 268.518394][ T8173] netlink: 'syz.0.619': attribute type 10 has an invalid length. [ 268.750375][ T8173] team0: Port device wlan1 added [ 270.016451][ T8198] netlink: 65047 bytes leftover after parsing attributes in process `syz.1.628'. [ 270.536378][ T8204] FAULT_INJECTION: forcing a failure. [ 270.536378][ T8204] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 270.586267][ T8204] CPU: 1 PID: 8204 Comm: syz.0.630 Not tainted syzkaller #0 [ 270.593692][ T8204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 270.603840][ T8204] Call Trace: [ 270.607190][ T8204] [ 270.610194][ T8204] dump_stack_lvl+0x18c/0x250 [ 270.614977][ T8204] ? show_regs_print_info+0x20/0x20 [ 270.620270][ T8204] ? load_image+0x400/0x400 [ 270.624890][ T8204] ? __lock_acquire+0x7d40/0x7d40 [ 270.630026][ T8204] should_fail_ex+0x39d/0x4d0 [ 270.634821][ T8204] prepare_alloc_pages+0x1e2/0x5f0 [ 270.640066][ T8204] __alloc_pages+0x134/0x460 [ 270.644769][ T8204] ? zone_statistics+0x170/0x170 [ 270.649824][ T8204] ? mt_find+0x169/0x650 [ 270.654172][ T8204] ? handle_mm_fault+0xe7/0x4c00 [ 270.659381][ T8204] __folio_alloc+0x10/0x20 [ 270.663864][ T8204] vma_alloc_folio+0x47a/0x8f0 [ 270.668726][ T8204] handle_mm_fault+0x1b3b/0x4c00 [ 270.673746][ T8204] ? handle_mm_fault+0xe7/0x4c00 [ 270.678807][ T8204] ? numa_migrate_prep+0x350/0x350 [ 270.684055][ T8204] ? lock_mm_and_find_vma+0x9c/0x2f0 [ 270.689441][ T8204] do_user_addr_fault+0x730/0x12c0 [ 270.694690][ T8204] exc_page_fault+0x64/0x100 [ 270.699366][ T8204] asm_exc_page_fault+0x26/0x30 [ 270.704292][ T8204] RIP: 0010:rep_movs_alternative+0x33/0x90 [ 270.710180][ T8204] Code: 40 83 f9 08 73 21 85 c9 74 0f 8a 06 88 07 48 ff c7 48 ff c6 48 ff c9 75 f1 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 8b 06 <48> 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 df 83 f9 08 73 e8 eb [ 270.730321][ T8204] RSP: 0018:ffffc9000c9f7a10 EFLAGS: 00050212 [ 270.736484][ T8204] RAX: 00441f0ffa1e0ff3 RBX: 0000000000000031 RCX: 0000000000000031 [ 270.744562][ T8204] RDX: 0000000000000000 RSI: ffffffffa00083b4 RDI: 0000200000002e00 [ 270.752639][ T8204] RBP: ffffc9000c9f7d70 R08: ffffffffa00083e4 R09: 1ffffffff400107c [ 270.760716][ T8204] R10: dffffc0000000000 R11: fffffbfff400107d R12: 0000200000002e31 [ 270.768780][ T8204] R13: 0000000000000031 R14: 0000200000002e00 R15: ffffffffa00083b4 [ 270.776845][ T8204] ? 0xffffffffa00083b4 [ 270.781121][ T8204] ? bpf_prog_89f733ace28d1b04+0x30/0x31 [ 270.786947][ T8204] ? 0xffffffffa00083b4 [ 270.791207][ T8204] _copy_to_user+0x85/0xa0 [ 270.795720][ T8204] ? 0xffffffffa00083b4 [ 270.799960][ T8204] bpf_obj_get_info_by_fd+0x1baf/0x3080 [ 270.805653][ T8204] ? bpf_map_get_fd_by_id+0x310/0x310 [ 270.811121][ T8204] ? perf_trace_lock+0x304/0x3b0 [ 270.816183][ T8204] ? trace_event_raw_event_lock+0x250/0x250 [ 270.822273][ T8204] ? file_end_write+0x159/0x250 [ 270.827404][ T8204] ? __might_fault+0xaa/0x120 [ 270.832165][ T8204] ? __might_fault+0xc6/0x120 [ 270.836926][ T8204] ? __might_fault+0xaa/0x120 [ 270.841687][ T8204] ? bpf_lsm_bpf+0x9/0x10 [ 270.846122][ T8204] ? security_bpf+0x7e/0xa0 [ 270.850762][ T8204] __sys_bpf+0x7eb/0x890 [ 270.855137][ T8204] ? bpf_link_show_fdinfo+0x390/0x390 [ 270.860694][ T8204] ? lock_chain_count+0x20/0x20 [ 270.865693][ T8204] __x64_sys_bpf+0x7c/0x90 [ 270.870220][ T8204] do_syscall_64+0x55/0xa0 [ 270.874741][ T8204] ? clear_bhb_loop+0x40/0x90 [ 270.879516][ T8204] ? clear_bhb_loop+0x40/0x90 [ 270.884327][ T8204] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 270.890398][ T8204] RIP: 0033:0x7fbb5bb9acb9 [ 270.894905][ T8204] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 270.914779][ T8204] RSP: 002b:00007fbb5ca43028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 270.923318][ T8204] RAX: ffffffffffffffda RBX: 00007fbb5be15fa0 RCX: 00007fbb5bb9acb9 [ 270.931382][ T8204] RDX: 0000000000000010 RSI: 0000200000000340 RDI: 000000000000000f [ 270.939459][ T8204] RBP: 00007fbb5ca43090 R08: 0000000000000000 R09: 0000000000000000 [ 270.947533][ T8204] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 270.955615][ T8204] R13: 00007fbb5be16038 R14: 00007fbb5be15fa0 R15: 00007ffc9c302208 [ 270.963740][ T8204] [ 271.167094][ T8208] netlink: 'syz.5.631': attribute type 10 has an invalid length. [ 271.197621][ T8208] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 271.238216][ T8208] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 271.288267][ T8208] bond0: (slave batadv_slave_0): Enslaving as an active interface with an up link [ 271.676695][ T8227] netlink: 'syz.5.637': attribute type 10 has an invalid length. [ 271.937503][ T8230] netlink: 132 bytes leftover after parsing attributes in process `syz.0.638'. [ 272.360374][ T8239] FAULT_INJECTION: forcing a failure. [ 272.360374][ T8239] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 272.416455][ T8239] CPU: 1 PID: 8239 Comm: syz.0.641 Not tainted syzkaller #0 [ 272.423845][ T8239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 272.433964][ T8239] Call Trace: [ 272.437298][ T8239] [ 272.440288][ T8239] dump_stack_lvl+0x18c/0x250 [ 272.445044][ T8239] ? show_regs_print_info+0x20/0x20 [ 272.450319][ T8239] ? load_image+0x400/0x400 [ 272.454983][ T8239] ? __might_fault+0xaa/0x120 [ 272.459721][ T8239] ? __lock_acquire+0x7d40/0x7d40 [ 272.465006][ T8239] should_fail_ex+0x39d/0x4d0 [ 272.469762][ T8239] _copy_from_iter+0x1d9/0x12e0 [ 272.474683][ T8239] ? slab_post_alloc_hook+0x8a/0x4b0 [ 272.480025][ T8239] ? __virt_addr_valid+0x18c/0x540 [ 272.485209][ T8239] ? __lock_acquire+0x7d40/0x7d40 [ 272.490289][ T8239] ? rcu_is_watching+0x15/0xb0 [ 272.495124][ T8239] ? copyout_mc+0x70/0x70 [ 272.499517][ T8239] ? __virt_addr_valid+0x18c/0x540 [ 272.504705][ T8239] ? __virt_addr_valid+0x18c/0x540 [ 272.509886][ T8239] ? __virt_addr_valid+0x469/0x540 [ 272.515069][ T8239] ? __check_object_size+0x506/0xa20 [ 272.520434][ T8239] netlink_sendmsg+0x76b/0xbf0 [ 272.525283][ T8239] ? netlink_getsockopt+0x590/0x590 [ 272.530560][ T8239] ? aa_sock_msg_perm+0x94/0x150 [ 272.535560][ T8239] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 272.540909][ T8239] ? security_socket_sendmsg+0x80/0xa0 [ 272.546423][ T8239] ? netlink_getsockopt+0x590/0x590 [ 272.551690][ T8239] ____sys_sendmsg+0x5ba/0x960 [ 272.556543][ T8239] ? __asan_memset+0x22/0x40 [ 272.561217][ T8239] ? __sys_sendmsg_sock+0x30/0x30 [ 272.566308][ T8239] ? __import_iovec+0x5f2/0x850 [ 272.571242][ T8239] ? import_iovec+0x73/0xa0 [ 272.575985][ T8239] ___sys_sendmsg+0x2a6/0x360 [ 272.580715][ T8239] ? get_pid_task+0x20/0x1e0 [ 272.585481][ T8239] ? __sys_sendmsg+0x2a0/0x2a0 [ 272.590346][ T8239] ? __lock_acquire+0x7d40/0x7d40 [ 272.595458][ T8239] __se_sys_sendmsg+0x1c2/0x2b0 [ 272.600378][ T8239] ? __x64_sys_sendmsg+0x80/0x80 [ 272.602188][ T8241] netlink: 9286 bytes leftover after parsing attributes in process `syz.5.642'. [ 272.605413][ T8239] ? lockdep_hardirqs_on+0x98/0x150 [ 272.619686][ T8239] do_syscall_64+0x55/0xa0 [ 272.624176][ T8239] ? clear_bhb_loop+0x40/0x90 [ 272.629685][ T8239] ? clear_bhb_loop+0x40/0x90 [ 272.634391][ T8239] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 272.640357][ T8239] RIP: 0033:0x7fbb5bb9acb9 [ 272.644827][ T8239] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 272.664580][ T8239] RSP: 002b:00007fbb5ca43028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 272.673050][ T8239] RAX: ffffffffffffffda RBX: 00007fbb5be15fa0 RCX: 00007fbb5bb9acb9 [ 272.681072][ T8239] RDX: 0000000020004800 RSI: 0000200000000080 RDI: 0000000000000003 [ 272.689084][ T8239] RBP: 00007fbb5ca43090 R08: 0000000000000000 R09: 0000000000000000 [ 272.697280][ T8239] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 272.705297][ T8239] R13: 00007fbb5be16038 R14: 00007fbb5be15fa0 R15: 00007ffc9c302208 [ 272.713338][ T8239] [ 272.826363][ T8246] netlink: 'syz.5.643': attribute type 3 has an invalid length. [ 272.858093][ T8246] netlink: 130984 bytes leftover after parsing attributes in process `syz.5.643'. [ 273.021997][ T8247] delete_channel: no stack [ 273.342238][ T8261] netlink: 126588 bytes leftover after parsing attributes in process `syz.5.650'. [ 273.852358][ T5773] Bluetooth: hci4: command 0x0406 tx timeout [ 273.925798][ T8275] netlink: 60 bytes leftover after parsing attributes in process `syz.4.655'. [ 274.069769][ T8279] FAULT_INJECTION: forcing a failure. [ 274.069769][ T8279] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 274.127639][ T8279] CPU: 0 PID: 8279 Comm: syz.1.656 Not tainted syzkaller #0 [ 274.135141][ T8279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 274.145261][ T8279] Call Trace: [ 274.148589][ T8279] [ 274.151564][ T8279] dump_stack_lvl+0x18c/0x250 [ 274.156498][ T8279] ? show_regs_print_info+0x20/0x20 [ 274.161779][ T8279] ? load_image+0x400/0x400 [ 274.166352][ T8279] ? __might_fault+0xaa/0x120 [ 274.171086][ T8279] ? __lock_acquire+0x7d40/0x7d40 [ 274.176176][ T8279] should_fail_ex+0x39d/0x4d0 [ 274.181006][ T8279] _copy_from_user+0x2f/0xe0 [ 274.185656][ T8279] get_user_ifreq+0x6b/0x180 [ 274.190318][ T8279] sock_ioctl+0x6f1/0x7e0 [ 274.194704][ T8279] ? sock_poll+0x3e0/0x3e0 [ 274.199190][ T8279] ? bpf_lsm_file_ioctl+0x9/0x10 [ 274.204177][ T8279] ? security_file_ioctl+0x80/0xa0 [ 274.209350][ T8279] ? sock_poll+0x3e0/0x3e0 [ 274.213884][ T8279] __se_sys_ioctl+0xfd/0x170 [ 274.218544][ T8279] do_syscall_64+0x55/0xa0 [ 274.223117][ T8279] ? clear_bhb_loop+0x40/0x90 [ 274.227849][ T8279] ? clear_bhb_loop+0x40/0x90 [ 274.232678][ T8279] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 274.238756][ T8279] RIP: 0033:0x7f1a1319acb9 [ 274.243236][ T8279] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 274.263082][ T8279] RSP: 002b:00007f1a14125028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 274.271659][ T8279] RAX: ffffffffffffffda RBX: 00007f1a13415fa0 RCX: 00007f1a1319acb9 [ 274.279771][ T8279] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000005 [ 274.287801][ T8279] RBP: 00007f1a14125090 R08: 0000000000000000 R09: 0000000000000000 [ 274.295837][ T8279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 274.303877][ T8279] R13: 00007f1a13416038 R14: 00007f1a13415fa0 R15: 00007ffeb3c1d1d8 [ 274.311942][ T8279] [ 274.697223][ T8288] FAULT_INJECTION: forcing a failure. [ 274.697223][ T8288] name failslab, interval 1, probability 0, space 0, times 0 [ 274.731804][ T8288] CPU: 1 PID: 8288 Comm: syz.0.660 Not tainted syzkaller #0 [ 274.739210][ T8288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 274.749334][ T8288] Call Trace: [ 274.752661][ T8288] [ 274.755639][ T8288] dump_stack_lvl+0x18c/0x250 [ 274.760385][ T8288] ? show_regs_print_info+0x20/0x20 [ 274.765647][ T8288] ? load_image+0x400/0x400 [ 274.770218][ T8288] ? __might_sleep+0xe0/0xe0 [ 274.774867][ T8288] ? __lock_acquire+0x7d40/0x7d40 [ 274.779957][ T8288] should_fail_ex+0x39d/0x4d0 [ 274.784708][ T8288] should_failslab+0x9/0x20 [ 274.789277][ T8288] slab_pre_alloc_hook+0x59/0x310 [ 274.794405][ T8288] kmem_cache_alloc_node+0x60/0x320 [ 274.799667][ T8288] ? perf_event_alloc+0x15a/0x21b0 [ 274.804844][ T8288] perf_event_alloc+0x15a/0x21b0 [ 274.809861][ T8288] ? find_lively_task_by_vpid+0x19/0x290 [ 274.815563][ T8288] ? find_lively_task_by_vpid+0x19/0x290 [ 274.821354][ T8288] __se_sys_perf_event_open+0x740/0x1c50 [ 274.827059][ T8288] ? perf_trace_run_bpf_submit+0xf4/0x1c0 [ 274.832833][ T8288] ? __x64_sys_perf_event_open+0xc0/0xc0 [ 274.838700][ T8288] ? lock_chain_count+0x20/0x20 [ 274.843683][ T8288] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 274.849706][ T8288] ? lockdep_hardirqs_on+0x98/0x150 [ 274.854932][ T8288] ? __x64_sys_perf_event_open+0x20/0xc0 [ 274.860603][ T8288] do_syscall_64+0x55/0xa0 [ 274.865143][ T8288] ? clear_bhb_loop+0x40/0x90 [ 274.869860][ T8288] ? clear_bhb_loop+0x40/0x90 [ 274.874578][ T8288] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 274.880516][ T8288] RIP: 0033:0x7fbb5bb9acb9 [ 274.884964][ T8288] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 274.904615][ T8288] RSP: 002b:00007fbb5ca43028 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 274.913079][ T8288] RAX: ffffffffffffffda RBX: 00007fbb5be15fa0 RCX: 00007fbb5bb9acb9 [ 274.921084][ T8288] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000200000000180 [ 274.929092][ T8288] RBP: 00007fbb5ca43090 R08: 0000000000000009 R09: 0000000000000000 [ 274.937185][ T8288] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 274.945283][ T8288] R13: 00007fbb5be16038 R14: 00007fbb5be15fa0 R15: 00007ffc9c302208 [ 274.953396][ T8288] [ 276.540389][ T8307] FAULT_INJECTION: forcing a failure. [ 276.540389][ T8307] name failslab, interval 1, probability 0, space 0, times 0 [ 276.577009][ T8307] CPU: 0 PID: 8307 Comm: syz.1.666 Not tainted syzkaller #0 [ 276.584398][ T8307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 276.594515][ T8307] Call Trace: [ 276.597895][ T8307] [ 276.600884][ T8307] dump_stack_lvl+0x18c/0x250 [ 276.605655][ T8307] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 276.611890][ T8307] ? show_regs_print_info+0x20/0x20 [ 276.617183][ T8307] ? load_image+0x400/0x400 [ 276.621863][ T8307] should_fail_ex+0x39d/0x4d0 [ 276.626632][ T8307] should_failslab+0x9/0x20 [ 276.631205][ T8307] slab_pre_alloc_hook+0x59/0x310 [ 276.636313][ T8307] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 276.642130][ T8307] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 276.648013][ T8307] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 276.653803][ T8307] __kmem_cache_alloc_node+0x53/0x250 [ 276.659263][ T8307] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 276.665049][ T8307] __kmalloc+0xa4/0x230 [ 276.669309][ T8307] tomoyo_realpath_from_path+0xe3/0x5d0 [ 276.674940][ T8307] tomoyo_path_number_perm+0x248/0x620 [ 276.680467][ T8307] ? tomoyo_path_number_perm+0x217/0x620 [ 276.686204][ T8307] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 276.691739][ T8307] ? perf_trace_run_bpf_submit+0xf4/0x1c0 [ 276.697637][ T8307] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 276.703697][ T8307] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 276.709936][ T8307] security_file_ioctl+0x70/0xa0 [ 276.714950][ T8307] __se_sys_ioctl+0x48/0x170 [ 276.719618][ T8307] do_syscall_64+0x55/0xa0 [ 276.724097][ T8307] ? clear_bhb_loop+0x40/0x90 [ 276.728837][ T8307] ? clear_bhb_loop+0x40/0x90 [ 276.733576][ T8307] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 276.739526][ T8307] RIP: 0033:0x7f1a1319acb9 [ 276.743992][ T8307] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 276.763669][ T8307] RSP: 002b:00007f1a14125028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 276.772160][ T8307] RAX: ffffffffffffffda RBX: 00007f1a13415fa0 RCX: 00007f1a1319acb9 [ 276.780208][ T8307] RDX: 0000200000000000 RSI: 0000000000008916 RDI: 0000000000000005 [ 276.788235][ T8307] RBP: 00007f1a14125090 R08: 0000000000000000 R09: 0000000000000000 [ 276.796354][ T8307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 276.804386][ T8307] R13: 00007f1a13416038 R14: 00007f1a13415fa0 R15: 00007ffeb3c1d1d8 [ 276.812429][ T8307] [ 276.830138][ T8311] FAULT_INJECTION: forcing a failure. [ 276.830138][ T8311] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 276.890005][ T8311] CPU: 1 PID: 8311 Comm: syz.5.667 Not tainted syzkaller #0 [ 276.897410][ T8311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 276.907519][ T8311] Call Trace: [ 276.910848][ T8311] [ 276.913823][ T8311] dump_stack_lvl+0x18c/0x250 [ 276.918564][ T8311] ? show_regs_print_info+0x20/0x20 [ 276.923824][ T8311] ? load_image+0x400/0x400 [ 276.928386][ T8311] ? __lock_acquire+0x7d40/0x7d40 [ 276.933462][ T8311] ? snprintf+0xe9/0x140 [ 276.937853][ T8311] should_fail_ex+0x39d/0x4d0 [ 276.942660][ T8311] _copy_to_user+0x2f/0xa0 [ 276.947165][ T8311] simple_read_from_buffer+0xe7/0x150 [ 276.952614][ T8311] proc_fail_nth_read+0x1e8/0x260 [ 276.957801][ T8311] ? proc_fault_inject_write+0x360/0x360 [ 276.963508][ T8311] ? fsnotify_perm+0x271/0x5e0 [ 276.968329][ T8311] ? proc_fault_inject_write+0x360/0x360 [ 276.974023][ T8311] vfs_read+0x28b/0x970 [ 276.978247][ T8311] ? kernel_read+0x1e0/0x1e0 [ 276.982906][ T8311] ? __fget_files+0x28/0x4b0 [ 276.987554][ T8311] ? __fget_files+0x28/0x4b0 [ 276.992213][ T8311] ? __fget_files+0x43d/0x4b0 [ 276.996988][ T8311] ? __fdget_pos+0x2a3/0x330 [ 277.001701][ T8311] ? ksys_read+0x75/0x260 [ 277.006096][ T8311] ksys_read+0x150/0x260 [ 277.010430][ T8311] ? vfs_write+0x990/0x990 [ 277.015014][ T8311] ? lockdep_hardirqs_on+0x98/0x150 [ 277.020274][ T8311] do_syscall_64+0x55/0xa0 [ 277.024749][ T8311] ? clear_bhb_loop+0x40/0x90 [ 277.029602][ T8311] ? clear_bhb_loop+0x40/0x90 [ 277.034350][ T8311] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 277.040379][ T8311] RIP: 0033:0x7ff82655b58e [ 277.044859][ T8311] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 277.058840][ T8307] ERROR: Out of memory at tomoyo_realpath_from_path. [ 277.064603][ T8311] RSP: 002b:00007ff8273abfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 277.064667][ T8311] RAX: ffffffffffffffda RBX: 00007ff8273ac6c0 RCX: 00007ff82655b58e [ 277.064684][ T8311] RDX: 000000000000000f RSI: 00007ff8273ac0a0 RDI: 0000000000000003 [ 277.064698][ T8311] RBP: 00007ff8273ac090 R08: 0000000000000000 R09: 0000000000000000 [ 277.064711][ T8311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 277.064723][ T8311] R13: 00007ff826816038 R14: 00007ff826815fa0 R15: 00007ffe4ab23a58 [ 277.064760][ T8311] [ 278.585114][ T8356] FAULT_INJECTION: forcing a failure. [ 278.585114][ T8356] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 278.616350][ T8356] CPU: 1 PID: 8356 Comm: syz.1.679 Not tainted syzkaller #0 [ 278.623745][ T8356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 278.633882][ T8356] Call Trace: [ 278.637211][ T8356] [ 278.640197][ T8356] dump_stack_lvl+0x18c/0x250 [ 278.644944][ T8356] ? show_regs_print_info+0x20/0x20 [ 278.650220][ T8356] ? load_image+0x400/0x400 [ 278.654823][ T8356] should_fail_ex+0x39d/0x4d0 [ 278.659573][ T8356] _copy_from_user+0x2f/0xe0 [ 278.664237][ T8356] perf_copy_attr+0x16a/0x840 [ 278.668981][ T8356] __se_sys_perf_event_open+0x11b/0x1c50 [ 278.674682][ T8356] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 278.680799][ T8356] ? __x64_sys_perf_event_open+0xc0/0xc0 [ 278.686537][ T8356] ? lock_chain_count+0x20/0x20 [ 278.691461][ T8356] ? lockdep_hardirqs_on+0x98/0x150 [ 278.696717][ T8356] ? __x64_sys_perf_event_open+0x20/0xc0 [ 278.702428][ T8356] do_syscall_64+0x55/0xa0 [ 278.706916][ T8356] ? clear_bhb_loop+0x40/0x90 [ 278.711652][ T8356] ? clear_bhb_loop+0x40/0x90 [ 278.716382][ T8356] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 278.722328][ T8356] RIP: 0033:0x7f1a1319acb9 [ 278.726788][ T8356] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 278.746458][ T8356] RSP: 002b:00007f1a14125028 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 278.754919][ T8356] RAX: ffffffffffffffda RBX: 00007f1a13415fa0 RCX: 00007f1a1319acb9 [ 278.762941][ T8356] RDX: ffdfffffffffffff RSI: 0000000000000000 RDI: 00002000000004c0 [ 278.770949][ T8356] RBP: 00007f1a14125090 R08: 0000000000000000 R09: 0000000000000000 [ 278.779040][ T8356] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 278.787038][ T8356] R13: 00007f1a13416038 R14: 00007f1a13415fa0 R15: 00007ffeb3c1d1d8 [ 278.795047][ T8356] [ 279.316474][ T8377] FAULT_INJECTION: forcing a failure. [ 279.316474][ T8377] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 279.369184][ T8377] CPU: 0 PID: 8377 Comm: syz.0.684 Not tainted syzkaller #0 [ 279.376577][ T8377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 279.387039][ T8377] Call Trace: [ 279.390373][ T8377] [ 279.393353][ T8377] dump_stack_lvl+0x18c/0x250 [ 279.398094][ T8377] ? show_regs_print_info+0x20/0x20 [ 279.403426][ T8377] ? load_image+0x400/0x400 [ 279.408000][ T8377] ? __lock_acquire+0x7d40/0x7d40 [ 279.413084][ T8377] ? snprintf+0xe9/0x140 [ 279.417395][ T8377] should_fail_ex+0x39d/0x4d0 [ 279.422218][ T8377] _copy_to_user+0x2f/0xa0 [ 279.426684][ T8377] simple_read_from_buffer+0xe7/0x150 [ 279.432127][ T8377] proc_fail_nth_read+0x1e8/0x260 [ 279.437304][ T8377] ? proc_fault_inject_write+0x360/0x360 [ 279.443003][ T8377] ? fsnotify_perm+0x271/0x5e0 [ 279.447834][ T8377] ? proc_fault_inject_write+0x360/0x360 [ 279.453590][ T8377] vfs_read+0x28b/0x970 [ 279.457819][ T8377] ? kernel_read+0x1e0/0x1e0 [ 279.462465][ T8377] ? __fget_files+0x28/0x4b0 [ 279.467107][ T8377] ? __fget_files+0x28/0x4b0 [ 279.471758][ T8377] ? __fget_files+0x43d/0x4b0 [ 279.476501][ T8377] ? __fdget_pos+0x2a3/0x330 [ 279.481138][ T8377] ? ksys_read+0x75/0x260 [ 279.485584][ T8377] ksys_read+0x150/0x260 [ 279.489952][ T8377] ? vfs_write+0x990/0x990 [ 279.494499][ T8377] ? lockdep_hardirqs_on+0x98/0x150 [ 279.499825][ T8377] do_syscall_64+0x55/0xa0 [ 279.504294][ T8377] ? clear_bhb_loop+0x40/0x90 [ 279.509025][ T8377] ? clear_bhb_loop+0x40/0x90 [ 279.513757][ T8377] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 279.519701][ T8377] RIP: 0033:0x7fbb5bb5b58e [ 279.524167][ T8377] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 279.543970][ T8377] RSP: 002b:00007fbb5ca21fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 279.552426][ T8377] RAX: ffffffffffffffda RBX: 00007fbb5ca226c0 RCX: 00007fbb5bb5b58e [ 279.560431][ T8377] RDX: 000000000000000f RSI: 00007fbb5ca220a0 RDI: 0000000000000003 [ 279.568526][ T8377] RBP: 00007fbb5ca22090 R08: 0000000000000000 R09: 0000000000000000 [ 279.576529][ T8377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 279.584607][ T8377] R13: 00007fbb5be16128 R14: 00007fbb5be16090 R15: 00007ffc9c302208 [ 279.592729][ T8377] [ 279.826287][ T8381] FAULT_INJECTION: forcing a failure. [ 279.826287][ T8381] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 279.877900][ T8381] CPU: 0 PID: 8381 Comm: syz.1.687 Not tainted syzkaller #0 [ 279.885351][ T8381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 279.895442][ T8381] Call Trace: [ 279.898753][ T8381] [ 279.901712][ T8381] dump_stack_lvl+0x18c/0x250 [ 279.906430][ T8381] ? show_regs_print_info+0x20/0x20 [ 279.911663][ T8381] ? load_image+0x400/0x400 [ 279.916199][ T8381] ? __lock_acquire+0x7d40/0x7d40 [ 279.921256][ T8381] ? snprintf+0xe9/0x140 [ 279.925538][ T8381] should_fail_ex+0x39d/0x4d0 [ 279.930256][ T8381] _copy_to_user+0x2f/0xa0 [ 279.934712][ T8381] simple_read_from_buffer+0xe7/0x150 [ 279.940132][ T8381] proc_fail_nth_read+0x1e8/0x260 [ 279.945197][ T8381] ? proc_fault_inject_write+0x360/0x360 [ 279.950864][ T8381] ? fsnotify_perm+0x271/0x5e0 [ 279.955697][ T8381] ? proc_fault_inject_write+0x360/0x360 [ 279.961469][ T8381] vfs_read+0x28b/0x970 [ 279.965676][ T8381] ? kernel_read+0x1e0/0x1e0 [ 279.970312][ T8381] ? __fget_files+0x28/0x4b0 [ 279.974950][ T8381] ? __fget_files+0x28/0x4b0 [ 279.979579][ T8381] ? __fget_files+0x43d/0x4b0 [ 279.984309][ T8381] ? __fdget_pos+0x2a3/0x330 [ 279.988950][ T8381] ? ksys_read+0x75/0x260 [ 279.993322][ T8381] ksys_read+0x150/0x260 [ 279.997652][ T8381] ? vfs_write+0x990/0x990 [ 280.002124][ T8381] ? lockdep_hardirqs_on+0x98/0x150 [ 280.007396][ T8381] do_syscall_64+0x55/0xa0 [ 280.012036][ T8381] ? clear_bhb_loop+0x40/0x90 [ 280.016741][ T8381] ? clear_bhb_loop+0x40/0x90 [ 280.021446][ T8381] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 280.027365][ T8381] RIP: 0033:0x7f1a1315b58e [ 280.031819][ T8381] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 280.051480][ T8381] RSP: 002b:00007f1a14124fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 280.060368][ T8381] RAX: ffffffffffffffda RBX: 00007f1a141256c0 RCX: 00007f1a1315b58e [ 280.068371][ T8381] RDX: 000000000000000f RSI: 00007f1a141250a0 RDI: 0000000000000003 [ 280.076369][ T8381] RBP: 00007f1a14125090 R08: 0000000000000000 R09: 0000000000000000 [ 280.084373][ T8381] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 280.092555][ T8381] R13: 00007f1a13416038 R14: 00007f1a13415fa0 R15: 00007ffeb3c1d1d8 [ 280.100575][ T8381] [ 280.380350][ T8384] mac80211_hwsim hwsim10 wlan0: entered promiscuous mode [ 280.420014][ T8384] mac80211_hwsim hwsim10 wlan0: entered allmulticast mode [ 280.792398][ T8397] FAULT_INJECTION: forcing a failure. [ 280.792398][ T8397] name failslab, interval 1, probability 0, space 0, times 0 [ 280.921142][ T8397] CPU: 0 PID: 8397 Comm: syz.1.693 Not tainted syzkaller #0 [ 280.928540][ T8397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 280.938662][ T8397] Call Trace: [ 280.942007][ T8397] [ 280.944985][ T8397] dump_stack_lvl+0x18c/0x250 [ 280.949729][ T8397] ? show_regs_print_info+0x20/0x20 [ 280.954991][ T8397] ? load_image+0x400/0x400 [ 280.959550][ T8397] ? __might_sleep+0xe0/0xe0 [ 280.964204][ T8397] ? __lock_acquire+0x7d40/0x7d40 [ 280.969289][ T8397] should_fail_ex+0x39d/0x4d0 [ 280.974052][ T8397] should_failslab+0x9/0x20 [ 280.978616][ T8397] slab_pre_alloc_hook+0x59/0x310 [ 280.983714][ T8397] ? sctp_association_new+0x89/0x25c0 [ 280.989225][ T8397] __kmem_cache_alloc_node+0x53/0x250 [ 280.994660][ T8397] ? sctp_association_new+0x89/0x25c0 [ 281.000094][ T8397] kmalloc_trace+0x2a/0xe0 [ 281.004570][ T8397] sctp_association_new+0x89/0x25c0 [ 281.009823][ T8397] ? sctp_do_bind+0x6bd/0x990 [ 281.014603][ T8397] sctp_connect_new_asoc+0x2de/0x6a0 [ 281.019947][ T8397] ? __sctp_connect+0xd80/0xd80 [ 281.024874][ T8397] ? mark_lock+0x94/0x320 [ 281.029344][ T8397] ? sctp_endpoint_lookup_assoc+0xd1/0x260 [ 281.035214][ T8397] __sctp_connect+0x5b7/0xd80 [ 281.040138][ T8397] ? sctp_send_asconf+0x170/0x170 [ 281.045206][ T8397] ? __local_bh_enable_ip+0x13a/0x1c0 [ 281.050614][ T8397] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 281.056199][ T8397] ? security_sctp_bind_connect+0x89/0xb0 [ 281.062005][ T8397] sctp_setsockopt_connectx+0x104/0x1a0 [ 281.067596][ T8397] sctp_setsockopt+0x6d8/0x11e0 [ 281.072481][ T8397] ? sock_common_recvmsg+0x190/0x190 [ 281.077842][ T8397] do_sock_setsockopt+0x175/0x1a0 [ 281.082933][ T8397] ? __fdget+0x180/0x210 [ 281.087234][ T8397] __x64_sys_setsockopt+0x182/0x200 [ 281.092493][ T8397] do_syscall_64+0x55/0xa0 [ 281.096951][ T8397] ? clear_bhb_loop+0x40/0x90 [ 281.101661][ T8397] ? clear_bhb_loop+0x40/0x90 [ 281.106373][ T8397] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 281.112300][ T8397] RIP: 0033:0x7f1a1319acb9 [ 281.116750][ T8397] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 281.136944][ T8397] RSP: 002b:00007f1a14125028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 281.145406][ T8397] RAX: ffffffffffffffda RBX: 00007f1a13415fa0 RCX: 00007f1a1319acb9 [ 281.153414][ T8397] RDX: 000000000000006e RSI: 0000000000000084 RDI: 0000000000000003 [ 281.161416][ T8397] RBP: 00007f1a14125090 R08: 0000000000000010 R09: 0000000000000000 [ 281.169428][ T8397] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 281.177425][ T8397] R13: 00007f1a13416038 R14: 00007f1a13415fa0 R15: 00007ffeb3c1d1d8 [ 281.185889][ T8397] [ 281.729154][ T8406] netlink: 'syz.1.696': attribute type 39 has an invalid length. [ 281.863758][ T8410] bridge_slave_1: left allmulticast mode [ 281.881218][ T8410] bridge_slave_1: left promiscuous mode [ 281.901214][ T8410] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.147112][ T8416] FAULT_INJECTION: forcing a failure. [ 282.147112][ T8416] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 282.167739][ T8410] bridge_slave_0: left allmulticast mode [ 282.228212][ T8416] CPU: 1 PID: 8416 Comm: syz.0.700 Not tainted syzkaller #0 [ 282.235790][ T8416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 282.246184][ T8416] Call Trace: [ 282.249507][ T8416] [ 282.252479][ T8416] dump_stack_lvl+0x18c/0x250 [ 282.257247][ T8416] ? show_regs_print_info+0x20/0x20 [ 282.262508][ T8416] ? load_image+0x400/0x400 [ 282.267075][ T8416] ? __might_fault+0xaa/0x120 [ 282.271826][ T8416] ? __lock_acquire+0x7d40/0x7d40 [ 282.277025][ T8416] should_fail_ex+0x39d/0x4d0 [ 282.281791][ T8416] _copy_from_user+0x2f/0xe0 [ 282.286446][ T8416] ___sys_sendmsg+0x1c7/0x360 [ 282.291204][ T8416] ? __sys_sendmsg+0x2a0/0x2a0 [ 282.296057][ T8416] ? trace_call_bpf+0xc3/0x6c0 [ 282.300955][ T8416] __se_sys_sendmsg+0x1c2/0x2b0 [ 282.305894][ T8416] ? __x64_sys_sendmsg+0x80/0x80 [ 282.310920][ T8416] ? lockdep_hardirqs_on+0x98/0x150 [ 282.316277][ T8416] do_syscall_64+0x55/0xa0 [ 282.320764][ T8416] ? clear_bhb_loop+0x40/0x90 [ 282.325502][ T8416] ? clear_bhb_loop+0x40/0x90 [ 282.330239][ T8416] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 282.336264][ T8416] RIP: 0033:0x7fbb5bb9acb9 [ 282.340836][ T8416] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 282.360597][ T8416] RSP: 002b:00007fbb5ca43028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 282.369086][ T8416] RAX: ffffffffffffffda RBX: 00007fbb5be15fa0 RCX: 00007fbb5bb9acb9 [ 282.377117][ T8416] RDX: 00000000200088d0 RSI: 0000200000000080 RDI: 0000000000000003 [ 282.385146][ T8416] RBP: 00007fbb5ca43090 R08: 0000000000000000 R09: 0000000000000000 [ 282.393176][ T8416] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 282.401206][ T8416] R13: 00007fbb5be16038 R14: 00007fbb5be15fa0 R15: 00007ffc9c302208 [ 282.409253][ T8416] [ 282.420531][ T8410] bridge_slave_0: left promiscuous mode [ 282.456346][ T8410] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.113347][ T8411] netlink: 12 bytes leftover after parsing attributes in process `syz.4.697'. [ 283.434064][ T8435] netlink: 4083 bytes leftover after parsing attributes in process `syz.4.706'. [ 283.484511][ T8435] netlink: 4083 bytes leftover after parsing attributes in process `syz.4.706'. [ 283.494632][ T8432] netlink: 4083 bytes leftover after parsing attributes in process `syz.4.706'. [ 283.508735][ T8436] netlink: 4083 bytes leftover after parsing attributes in process `syz.4.706'. [ 283.671519][ T8442] FAULT_INJECTION: forcing a failure. [ 283.671519][ T8442] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 283.707367][ T8442] CPU: 0 PID: 8442 Comm: syz.0.709 Not tainted syzkaller #0 [ 283.714797][ T8442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 283.724933][ T8442] Call Trace: [ 283.728277][ T8442] [ 283.731273][ T8442] dump_stack_lvl+0x18c/0x250 [ 283.736038][ T8442] ? show_regs_print_info+0x20/0x20 [ 283.741317][ T8442] ? load_image+0x400/0x400 [ 283.745903][ T8442] ? __might_fault+0xaa/0x120 [ 283.750654][ T8442] ? __lock_acquire+0x7d40/0x7d40 [ 283.755853][ T8442] should_fail_ex+0x39d/0x4d0 [ 283.760612][ T8442] _copy_from_user+0x2f/0xe0 [ 283.765288][ T8442] ___sys_sendmsg+0x1c7/0x360 [ 283.770120][ T8442] ? get_pid_task+0x20/0x1e0 [ 283.774873][ T8442] ? __sys_sendmsg+0x2a0/0x2a0 [ 283.779751][ T8442] ? __lock_acquire+0x7d40/0x7d40 [ 283.784916][ T8442] __se_sys_sendmsg+0x1c2/0x2b0 [ 283.789850][ T8442] ? __x64_sys_sendmsg+0x80/0x80 [ 283.794879][ T8442] ? lockdep_hardirqs_on+0x98/0x150 [ 283.800163][ T8442] do_syscall_64+0x55/0xa0 [ 283.804767][ T8442] ? clear_bhb_loop+0x40/0x90 [ 283.809510][ T8442] ? clear_bhb_loop+0x40/0x90 [ 283.814262][ T8442] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 283.820229][ T8442] RIP: 0033:0x7fbb5bb9acb9 [ 283.824715][ T8442] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 283.844478][ T8442] RSP: 002b:00007fbb5ca43028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 283.852955][ T8442] RAX: ffffffffffffffda RBX: 00007fbb5be15fa0 RCX: 00007fbb5bb9acb9 [ 283.860984][ T8442] RDX: 0000000000008080 RSI: 0000200000000040 RDI: 0000000000000005 [ 283.869101][ T8442] RBP: 00007fbb5ca43090 R08: 0000000000000000 R09: 0000000000000000 [ 283.877226][ T8442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 283.885347][ T8442] R13: 00007fbb5be16038 R14: 00007fbb5be15fa0 R15: 00007ffc9c302208 [ 283.893403][ T8442] [ 284.009925][ T8446] FAULT_INJECTION: forcing a failure. [ 284.009925][ T8446] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 284.033363][ T8446] CPU: 0 PID: 8446 Comm: syz.4.712 Not tainted syzkaller #0 [ 284.040758][ T8446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 284.050961][ T8446] Call Trace: [ 284.054413][ T8446] [ 284.057480][ T8446] dump_stack_lvl+0x18c/0x250 [ 284.062233][ T8446] ? show_regs_print_info+0x20/0x20 [ 284.067525][ T8446] ? load_image+0x400/0x400 [ 284.072093][ T8446] ? __might_fault+0xaa/0x120 [ 284.076826][ T8446] ? __lock_acquire+0x7d40/0x7d40 [ 284.081928][ T8446] should_fail_ex+0x39d/0x4d0 [ 284.086693][ T8446] _copy_from_user+0x2f/0xe0 [ 284.091356][ T8446] get_user_ifreq+0x6b/0x180 [ 284.096017][ T8446] sock_ioctl+0x6f1/0x7e0 [ 284.100425][ T8446] ? sock_poll+0x3e0/0x3e0 [ 284.105104][ T8446] ? bpf_lsm_file_ioctl+0x9/0x10 [ 284.110103][ T8446] ? security_file_ioctl+0x80/0xa0 [ 284.115379][ T8446] ? sock_poll+0x3e0/0x3e0 [ 284.119983][ T8446] __se_sys_ioctl+0xfd/0x170 [ 284.124648][ T8446] do_syscall_64+0x55/0xa0 [ 284.129146][ T8446] ? clear_bhb_loop+0x40/0x90 [ 284.133876][ T8446] ? clear_bhb_loop+0x40/0x90 [ 284.138701][ T8446] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 284.144753][ T8446] RIP: 0033:0x7f0aae19acb9 [ 284.149229][ T8446] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 284.168897][ T8446] RSP: 002b:00007f0aaef9f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 284.177375][ T8446] RAX: ffffffffffffffda RBX: 00007f0aae415fa0 RCX: 00007f0aae19acb9 [ 284.185539][ T8446] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000004 [ 284.193565][ T8446] RBP: 00007f0aaef9f090 R08: 0000000000000000 R09: 0000000000000000 [ 284.201604][ T8446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 284.209630][ T8446] R13: 00007f0aae416038 R14: 00007f0aae415fa0 R15: 00007ffdf6f42d78 [ 284.217726][ T8446] [ 284.864490][ T8469] netlink: 168 bytes leftover after parsing attributes in process `syz.1.719'. [ 284.917464][ T8469] netlink: 'syz.1.719': attribute type 29 has an invalid length. [ 284.970330][ T8469] netlink: 'syz.1.719': attribute type 29 has an invalid length. [ 284.989834][ T8470] netlink: 'syz.1.719': attribute type 29 has an invalid length. [ 285.016523][ T8469] netlink: 'syz.1.719': attribute type 29 has an invalid length. [ 285.087224][ T8469] netlink: 'syz.1.719': attribute type 29 has an invalid length. [ 285.477201][ T8466] netlink: 'syz.5.717': attribute type 10 has an invalid length. [ 286.044771][ T8489] netlink: 'syz.5.724': attribute type 11 has an invalid length. [ 286.088373][ T8489] netlink: 140 bytes leftover after parsing attributes in process `syz.5.724'. [ 286.370849][ T8499] netlink: 209852 bytes leftover after parsing attributes in process `syz.4.729'. [ 286.388556][ T8499] openvswitch: netlink: Tunnel attr 0 has unexpected len 1 expected 8 [ 289.514207][ T8510] netlink: 'syz.0.732': attribute type 10 has an invalid length. [ 289.703505][ T8510] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 289.739924][ T8510] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 290.314854][ T8533] netlink: 'syz.4.741': attribute type 10 has an invalid length. [ 290.351458][ T8533] netlink: 40 bytes leftover after parsing attributes in process `syz.4.741'. [ 290.503536][ T8533] A link change request failed with some changes committed already. Interface ipvlan1 may have been left with an inconsistent configuration, please check. [ 290.547488][ T8539] netlink: 14 bytes leftover after parsing attributes in process `syz.0.739'. [ 290.635208][ T8533] syz.4.741 (8533) used greatest stack depth: 17864 bytes left [ 291.872731][ T8551] netlink: 202920 bytes leftover after parsing attributes in process `syz.4.747'. [ 291.934017][ T8551] netlink: 'syz.4.747': attribute type 21 has an invalid length. [ 292.033333][ T8553] netlink: 'syz.1.748': attribute type 21 has an invalid length. [ 292.058172][ T8553] netlink: 132 bytes leftover after parsing attributes in process `syz.1.748'. [ 292.094686][ T8553] netlink: 28 bytes leftover after parsing attributes in process `syz.1.748'. [ 292.148223][ T8557] netlink: 'syz.5.750': attribute type 10 has an invalid length. [ 292.184176][ T8557] netlink: 40 bytes leftover after parsing attributes in process `syz.5.750'. [ 292.209020][ T8557] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 292.406442][ T8563] FAULT_INJECTION: forcing a failure. [ 292.406442][ T8563] name failslab, interval 1, probability 0, space 0, times 0 [ 292.435002][ T8563] CPU: 0 PID: 8563 Comm: syz.5.752 Not tainted syzkaller #0 [ 292.442482][ T8563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 292.452607][ T8563] Call Trace: [ 292.456023][ T8563] [ 292.458996][ T8563] dump_stack_lvl+0x18c/0x250 [ 292.463841][ T8563] ? show_regs_print_info+0x20/0x20 [ 292.469121][ T8563] ? load_image+0x400/0x400 [ 292.473696][ T8563] ? __might_sleep+0xe0/0xe0 [ 292.478434][ T8563] ? __lock_acquire+0x7d40/0x7d40 [ 292.483523][ T8563] ? prepend_path+0x4b/0x960 [ 292.488168][ T8563] should_fail_ex+0x39d/0x4d0 [ 292.492923][ T8563] should_failslab+0x9/0x20 [ 292.497483][ T8563] slab_pre_alloc_hook+0x59/0x310 [ 292.502571][ T8563] ? __asan_memcpy+0x40/0x70 [ 292.507227][ T8563] ? tomoyo_encode+0x28b/0x540 [ 292.512081][ T8563] ? tomoyo_encode+0x28b/0x540 [ 292.516912][ T8563] __kmem_cache_alloc_node+0x53/0x250 [ 292.522348][ T8563] ? prepend_path+0x4b/0x960 [ 292.526982][ T8563] ? tomoyo_encode+0x28b/0x540 [ 292.531918][ T8563] __kmalloc+0xa4/0x230 [ 292.536140][ T8563] tomoyo_encode+0x28b/0x540 [ 292.540865][ T8563] tomoyo_realpath_from_path+0x592/0x5d0 [ 292.546664][ T8563] tomoyo_path_number_perm+0x248/0x620 [ 292.552208][ T8563] ? tomoyo_path_number_perm+0x217/0x620 [ 292.557881][ T8563] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 292.563379][ T8563] ? ksys_write+0x1c4/0x260 [ 292.567951][ T8563] ? __fget_files+0x28/0x4b0 [ 292.572579][ T8563] ? __fget_files+0x28/0x4b0 [ 292.577210][ T8563] security_file_ioctl+0x70/0xa0 [ 292.582194][ T8563] __se_sys_ioctl+0x48/0x170 [ 292.586833][ T8563] do_syscall_64+0x55/0xa0 [ 292.591286][ T8563] ? clear_bhb_loop+0x40/0x90 [ 292.596000][ T8563] ? clear_bhb_loop+0x40/0x90 [ 292.600715][ T8563] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 292.606641][ T8563] RIP: 0033:0x7ff82659acb9 [ 292.611102][ T8563] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 292.630825][ T8563] RSP: 002b:00007ff8273ac028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 292.639320][ T8563] RAX: ffffffffffffffda RBX: 00007ff826815fa0 RCX: 00007ff82659acb9 [ 292.647329][ T8563] RDX: 0000000000000000 RSI: 00000000400454dc RDI: 0000000000000003 [ 292.655332][ T8563] RBP: 00007ff8273ac090 R08: 0000000000000000 R09: 0000000000000000 [ 292.663341][ T8563] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 292.671338][ T8563] R13: 00007ff826816038 R14: 00007ff826815fa0 R15: 00007ffe4ab23a58 [ 292.679368][ T8563] [ 292.704585][ T8563] ERROR: Out of memory at tomoyo_realpath_from_path. [ 292.971274][ T8576] FAULT_INJECTION: forcing a failure. [ 292.971274][ T8576] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 292.992410][ T8576] CPU: 1 PID: 8576 Comm: syz.5.756 Not tainted syzkaller #0 [ 292.999800][ T8576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 293.010186][ T8576] Call Trace: [ 293.013620][ T8576] [ 293.016684][ T8576] dump_stack_lvl+0x18c/0x250 [ 293.021429][ T8576] ? show_regs_print_info+0x20/0x20 [ 293.026849][ T8576] ? load_image+0x400/0x400 [ 293.031409][ T8576] ? __might_fault+0xaa/0x120 [ 293.036136][ T8576] ? __lock_acquire+0x7d40/0x7d40 [ 293.041225][ T8576] should_fail_ex+0x39d/0x4d0 [ 293.046579][ T8576] _copy_to_user+0x2f/0xa0 [ 293.051063][ T8576] btf_new_fd+0x5c0/0x9f0 [ 293.055473][ T8576] ? bpf_btf_show_fdinfo+0x80/0x80 [ 293.060653][ T8576] ? capable+0x88/0xe0 [ 293.064786][ T8576] __sys_bpf+0x670/0x890 [ 293.069094][ T8576] ? bpf_link_show_fdinfo+0x390/0x390 [ 293.074537][ T8576] ? lock_chain_count+0x20/0x20 [ 293.079444][ T8576] __x64_sys_bpf+0x7c/0x90 [ 293.083940][ T8576] do_syscall_64+0x55/0xa0 [ 293.088391][ T8576] ? clear_bhb_loop+0x40/0x90 [ 293.093101][ T8576] ? clear_bhb_loop+0x40/0x90 [ 293.098115][ T8576] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 293.104215][ T8576] RIP: 0033:0x7ff82659acb9 [ 293.108656][ T8576] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 293.128295][ T8576] RSP: 002b:00007ff8273ac028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 293.137095][ T8576] RAX: ffffffffffffffda RBX: 00007ff826815fa0 RCX: 00007ff82659acb9 [ 293.145096][ T8576] RDX: 0000000000000028 RSI: 00002000000003c0 RDI: 0000000000000012 [ 293.153098][ T8576] RBP: 00007ff8273ac090 R08: 0000000000000000 R09: 0000000000000000 [ 293.161129][ T8576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 293.169217][ T8576] R13: 00007ff826816038 R14: 00007ff826815fa0 R15: 00007ffe4ab23a58 [ 293.177243][ T8576] [ 293.625884][ T8600] netlink: 'syz.5.764': attribute type 2 has an invalid length. [ 293.634098][ T8600] netlink: 164 bytes leftover after parsing attributes in process `syz.5.764'. [ 293.780213][ T8598] netlink: 'syz.1.763': attribute type 10 has an invalid length. [ 293.807144][ T8598] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 293.845816][ T8598] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 293.862306][ T8605] FAULT_INJECTION: forcing a failure. [ 293.862306][ T8605] name failslab, interval 1, probability 0, space 0, times 0 [ 293.908145][ T8605] CPU: 0 PID: 8605 Comm: syz.4.766 Not tainted syzkaller #0 [ 293.915528][ T8605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 293.925644][ T8605] Call Trace: [ 293.928975][ T8605] [ 293.931949][ T8605] dump_stack_lvl+0x18c/0x250 [ 293.936869][ T8605] ? show_regs_print_info+0x20/0x20 [ 293.942126][ T8605] ? load_image+0x400/0x400 [ 293.946696][ T8605] ? __might_sleep+0xe0/0xe0 [ 293.951355][ T8605] ? __lock_acquire+0x7d40/0x7d40 [ 293.956440][ T8605] should_fail_ex+0x39d/0x4d0 [ 293.961187][ T8605] should_failslab+0x9/0x20 [ 293.965762][ T8605] slab_pre_alloc_hook+0x59/0x310 [ 293.970940][ T8605] ? __lock_acquire+0x7d40/0x7d40 [ 293.976041][ T8605] kmem_cache_alloc_node+0x60/0x320 [ 293.981316][ T8605] ? __alloc_skb+0x103/0x2c0 [ 293.985987][ T8605] __alloc_skb+0x103/0x2c0 [ 293.990475][ T8605] netlink_sendmsg+0x66a/0xbf0 [ 293.995318][ T8605] ? netlink_getsockopt+0x590/0x590 [ 294.000588][ T8605] ? aa_sock_msg_perm+0x94/0x150 [ 294.005597][ T8605] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 294.010946][ T8605] ? security_socket_sendmsg+0x80/0xa0 [ 294.016456][ T8605] ? netlink_getsockopt+0x590/0x590 [ 294.021896][ T8605] ____sys_sendmsg+0x5ba/0x960 [ 294.026732][ T8605] ? __asan_memset+0x22/0x40 [ 294.031411][ T8605] ? __sys_sendmsg_sock+0x30/0x30 [ 294.036508][ T8605] ? __import_iovec+0x3fa/0x850 [ 294.041440][ T8605] ? import_iovec+0x73/0xa0 [ 294.046007][ T8605] ___sys_sendmsg+0x2a6/0x360 [ 294.050764][ T8605] ? __sys_sendmsg+0x2a0/0x2a0 [ 294.055618][ T8605] ? trace_call_bpf+0xc3/0x6c0 [ 294.060476][ T8605] __se_sys_sendmsg+0x1c2/0x2b0 [ 294.065408][ T8605] ? __x64_sys_sendmsg+0x80/0x80 [ 294.070688][ T8605] ? lockdep_hardirqs_on+0x98/0x150 [ 294.076035][ T8605] do_syscall_64+0x55/0xa0 [ 294.080562][ T8605] ? clear_bhb_loop+0x40/0x90 [ 294.085296][ T8605] ? clear_bhb_loop+0x40/0x90 [ 294.090032][ T8605] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 294.095976][ T8605] RIP: 0033:0x7f0aae19acb9 [ 294.100444][ T8605] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 294.120138][ T8605] RSP: 002b:00007f0aaef9f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 294.128704][ T8605] RAX: ffffffffffffffda RBX: 00007f0aae415fa0 RCX: 00007f0aae19acb9 [ 294.136757][ T8605] RDX: 0000000000000800 RSI: 0000200000000080 RDI: 0000000000000003 [ 294.144797][ T8605] RBP: 00007f0aaef9f090 R08: 0000000000000000 R09: 0000000000000000 [ 294.152826][ T8605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 294.160853][ T8605] R13: 00007f0aae416038 R14: 00007f0aae415fa0 R15: 00007ffdf6f42d78 [ 294.168902][ T8605] [ 294.321857][ T5773] Bluetooth: hci1: command 0x0406 tx timeout [ 294.650655][ T8620] netlink: 'syz.4.771': attribute type 2 has an invalid length. [ 294.665978][ T8620] netlink: 164 bytes leftover after parsing attributes in process `syz.4.771'. [ 295.652113][ T5777] Bluetooth: hci0: unexpected subevent 0x0c length: 150 > 5 [ 295.762377][ T8650] netlink: 'syz.4.783': attribute type 1 has an invalid length. [ 295.776895][ T8650] netlink: 112860 bytes leftover after parsing attributes in process `syz.4.783'. [ 295.787150][ T8650] netlink: 'syz.4.783': attribute type 1 has an invalid length. [ 295.891021][ T8656] netlink: 65047 bytes leftover after parsing attributes in process `syz.5.786'. [ 296.724009][ T8675] FAULT_INJECTION: forcing a failure. [ 296.724009][ T8675] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 296.745250][ T8675] CPU: 0 PID: 8675 Comm: syz.1.792 Not tainted syzkaller #0 [ 296.752792][ T8675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 296.762909][ T8675] Call Trace: [ 296.766229][ T8675] [ 296.769214][ T8675] dump_stack_lvl+0x18c/0x250 [ 296.773944][ T8675] ? show_regs_print_info+0x20/0x20 [ 296.779191][ T8675] ? load_image+0x400/0x400 [ 296.783733][ T8675] ? __lock_acquire+0x7d40/0x7d40 [ 296.788804][ T8675] should_fail_ex+0x39d/0x4d0 [ 296.793536][ T8675] _copy_from_user+0x2f/0xe0 [ 296.798252][ T8675] __copy_msghdr+0x3bb/0x580 [ 296.802887][ T8675] ___sys_sendmsg+0x214/0x360 [ 296.807682][ T8675] ? __sys_sendmsg+0x2a0/0x2a0 [ 296.812496][ T8675] ? trace_call_bpf+0xc3/0x6c0 [ 296.817316][ T8675] __se_sys_sendmsg+0x1c2/0x2b0 [ 296.822200][ T8675] ? __x64_sys_sendmsg+0x80/0x80 [ 296.827196][ T8675] ? lockdep_hardirqs_on+0x98/0x150 [ 296.832452][ T8675] do_syscall_64+0x55/0xa0 [ 296.836907][ T8675] ? clear_bhb_loop+0x40/0x90 [ 296.841614][ T8675] ? clear_bhb_loop+0x40/0x90 [ 296.846325][ T8675] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 296.852248][ T8675] RIP: 0033:0x7f1a1319acb9 [ 296.856686][ T8675] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 296.876331][ T8675] RSP: 002b:00007f1a14125028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 296.884789][ T8675] RAX: ffffffffffffffda RBX: 00007f1a13415fa0 RCX: 00007f1a1319acb9 [ 296.892792][ T8675] RDX: 0000000020008000 RSI: 0000200000000080 RDI: 0000000000000003 [ 296.900795][ T8675] RBP: 00007f1a14125090 R08: 0000000000000000 R09: 0000000000000000 [ 296.908792][ T8675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 296.916802][ T8675] R13: 00007f1a13416038 R14: 00007f1a13415fa0 R15: 00007ffeb3c1d1d8 [ 296.924811][ T8675] [ 297.509443][ T8688] netlink: 60 bytes leftover after parsing attributes in process `syz.4.799'. [ 297.565027][ T8688] netlink: 60 bytes leftover after parsing attributes in process `syz.4.799'. [ 297.809298][ T8688] netlink: 'syz.4.799': attribute type 10 has an invalid length. [ 297.817275][ T8688] netlink: 40 bytes leftover after parsing attributes in process `syz.4.799'. [ 297.985165][ T8688] batman_adv: batadv0: Adding interface: virt_wifi0 [ 298.126192][ T8688] batman_adv: batadv0: The MTU of interface virt_wifi0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 298.288962][ T8688] batman_adv: batadv0: Interface activated: virt_wifi0 [ 299.875373][ T8725] netlink: 'syz.4.812': attribute type 10 has an invalid length. [ 299.963922][ T8725] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 300.046147][ T8725] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 300.195250][ T8733] bridge_slave_1: left allmulticast mode [ 300.221653][ T8733] bridge_slave_1: left promiscuous mode [ 300.380056][ T8733] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.396648][ T8733] bridge_slave_0: left allmulticast mode [ 301.405621][ T8733] bridge_slave_0: left promiscuous mode [ 301.414732][ T8733] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.532248][ T8734] netlink: 12 bytes leftover after parsing attributes in process `syz.0.815'. [ 305.493205][ T8812] netlink: 'syz.5.845': attribute type 10 has an invalid length. [ 305.571676][ T8815] netlink: 'syz.5.845': attribute type 11 has an invalid length. [ 305.600849][ T8815] netlink: 184116 bytes leftover after parsing attributes in process `syz.5.845'. [ 307.784068][ T8851] netlink: 'syz.1.857': attribute type 3 has an invalid length. [ 307.849021][ T8851] netlink: 'syz.1.857': attribute type 1 has an invalid length. [ 307.904631][ T8851] netlink: 193404 bytes leftover after parsing attributes in process `syz.1.857'. [ 308.239280][ T29] INFO: task syz.2.115:6287 blocked for more than 143 seconds. [ 308.259395][ T29] Not tainted syzkaller #0 [ 308.264417][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 308.309525][ T29] task:syz.2.115 state:D stack:23656 pid:6287 ppid:5769 flags:0x00004006 [ 308.350589][ T29] Call Trace: [ 308.371957][ T29] [ 308.387470][ T29] __schedule+0x1553/0x45a0 [ 308.406113][ T29] ? rcu_is_watching+0x15/0xb0 [ 308.428225][ T29] ? asan.module_dtor+0x20/0x20 [ 308.438031][ T29] ? trace_contention_end+0x39/0xe0 [ 308.446797][ T29] ? perf_event_ctx_lock_nested+0x490/0x490 [ 308.472747][ T29] ? task_work_cancel+0xa5/0x220 [ 308.491306][ T29] ? task_work_cancel_func+0x210/0x210 [ 308.513345][ T29] schedule+0xbd/0x170 [ 308.525547][ T29] ? _free_event+0xfe/0xf30 [ 308.536105][ T29] _free_event+0x174/0xf30 [ 308.656571][ T29] perf_event_release_kernel+0x842/0x8d0 [ 308.685764][ T29] ? __might_sleep+0xe0/0xe0 [ 308.697704][ T8874] syzkaller0: entered promiscuous mode [ 308.704479][ T29] ? calc_timer_values+0x400/0x400 [ 308.710285][ T8874] syzkaller0: entered allmulticast mode [ 308.722601][ T29] ? perf_mmap+0x15c0/0x15c0 [ 308.745566][ T29] perf_release+0x3b/0x40 [ 308.788050][ T29] __fput+0x234/0x970 [ 308.792158][ T29] task_work_run+0x1d4/0x260 [ 308.799317][ T29] ? task_work_cancel+0x220/0x220 [ 308.804441][ T29] get_signal+0x1235/0x13f0 [ 308.828287][ T29] ? create_io_thread+0x190/0x190 [ 308.897229][ T29] arch_do_signal_or_restart+0xc2/0x800 [ 308.913234][ T29] ? __x64_sys_clone+0x1b7/0x230 [ 308.927957][ T29] ? get_sigframe_size+0x20/0x20 [ 308.933129][ T29] ? exit_to_user_mode_loop+0x3b/0x110 [ 308.938741][ T29] exit_to_user_mode_loop+0x70/0x110 [ 308.947975][ T29] exit_to_user_mode_prepare+0xee/0x180 [ 308.953693][ T29] syscall_exit_to_user_mode+0x1a/0x50 [ 308.972767][ T29] do_syscall_64+0x61/0xa0 [ 308.977460][ T29] ? clear_bhb_loop+0x40/0x90 [ 308.990624][ T29] ? clear_bhb_loop+0x40/0x90 [ 309.005623][ T29] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 309.018341][ T29] RIP: 0033:0x7f976099acb9 [ 309.028095][ T29] RSP: 002b:00007f9761833fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 309.047234][ T29] RAX: fffffffffffffffc RBX: 00007f9760c15fa0 RCX: 00007f976099acb9 [ 309.066019][ T29] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000630c1000 [ 309.084415][ T29] RBP: 00007f9760a08bf7 R08: 0000000000000000 R09: 0000000000000000 [ 309.257982][ T29] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 309.278263][ T29] R13: 00007f9760c16038 R14: 00007f9760c15fa0 R15: 00007ffeee02a778 [ 309.286510][ T29] [ 309.308360][ T29] [ 309.308360][ T29] Showing all locks held in the system: [ 309.323433][ T29] 1 lock held by khungtaskd/29: [ 309.329329][ T29] #0: ffffffff8d131fe0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x55/0x290 [ 309.358330][ T29] 3 locks held by kworker/u4:4/59: [ 309.364518][ T29] #0: ffff8880b8e3c018 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2a/0x140 [ 309.381389][ T29] #1: ffffffff8d131fe0 (rcu_read_lock){....}-{1:2}, at: perf_iterate_sb+0x28/0x6a0 [ 309.391026][ T29] #2: ffff8880b8e29598 (&base->lock){-.-.}-{2:2}, at: lock_timer_base+0x123/0x270 [ 309.400968][ T29] 2 locks held by getty/5530: [ 309.405695][ T29] #0: ffff88802d39d0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 [ 309.415940][ T29] #1: ffffc9000326e2f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x433/0x1390 [ 309.426499][ T29] 4 locks held by syz.0.839/8780: [ 309.433101][ T29] 2 locks held by syz.1.848/8826: [ 309.445902][ T29] 2 locks held by syz.1.857/8850: [ 309.451296][ T29] #0: ffffffff8d187f68 (event_mutex){+.+.}-{3:3}, at: perf_trace_destroy+0x2e/0x140 [ 309.467516][ T29] #1: ffffffff8d1379b8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x3da/0x880 [ 309.482386][ T29] 2 locks held by syz.0.859/8867: [ 309.487498][ T29] #0: ffffffff8e3bfe08 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x41/0x1c0 [ 309.501177][ T29] #1: ffffffff8d1379b8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x306/0x880 [ 309.512533][ T29] 2 locks held by syz.0.859/8868: [ 309.517609][ T29] #0: ffffffff97314c30 (&pmus_srcu){.+.+}-{0:0}, at: perf_event_alloc+0xc06/0x21b0 [ 309.548179][ T29] #1: ffffffff8d187f68 (event_mutex){+.+.}-{3:3}, at: perf_trace_init+0x50/0x2d0 [ 309.569510][ T29] 1 lock held by syz.5.861/8869: [ 309.574531][ T29] #0: ffffffff8d187f68 (event_mutex){+.+.}-{3:3}, at: perf_trace_destroy+0x2e/0x140 [ 309.605966][ T29] 2 locks held by syz.5.861/8870: [ 309.611560][ T29] #0: ffffffff97314c30 (&pmus_srcu){.+.+}-{0:0}, at: perf_event_alloc+0xc06/0x21b0 [ 309.631406][ T29] #1: ffffffff8d187f68 (event_mutex){+.+.}-{3:3}, at: perf_trace_init+0x50/0x2d0 [ 309.651099][ T29] 2 locks held by syz.5.861/8880: [ 309.656209][ T29] #0: ffffffff97314c30 (&pmus_srcu){.+.+}-{0:0}, at: perf_event_alloc+0xc06/0x21b0 [ 309.686657][ T29] #1: ffffffff8d187f68 (event_mutex){+.+.}-{3:3}, at: perf_trace_init+0x50/0x2d0 [ 309.706363][ T29] 1 lock held by dhcpcd/8882: [ 309.711596][ T29] #0: ffff88804f03dc20 (&sb->s_type->i_mutex_key#11){+.+.}-{3:3}, at: sock_close+0x9b/0x230 [ 309.738145][ T29] 4 locks held by dhcpcd/8884: [ 309.751327][ T29] [ 309.770660][ T29] ============================================= [ 309.770660][ T29] [ 309.817954][ T29] NMI backtrace for cpu 0 [ 309.822357][ T29] CPU: 0 PID: 29 Comm: khungtaskd Not tainted syzkaller #0 [ 309.829595][ T29] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 309.839694][ T29] Call Trace: [ 309.843019][ T29] [ 309.846000][ T29] dump_stack_lvl+0x18c/0x250 [ 309.850744][ T29] ? nmi_cpu_backtrace+0x1b6/0x3e0 [ 309.855917][ T29] ? show_regs_print_info+0x20/0x20 [ 309.861172][ T29] ? load_image+0x400/0x400 [ 309.865743][ T29] nmi_cpu_backtrace+0x3a6/0x3e0 [ 309.870831][ T29] ? nmi_trigger_cpumask_backtrace+0x2f0/0x2f0 [ 309.877043][ T29] ? _printk+0xde/0x130 [ 309.881286][ T29] ? load_image+0x400/0x400 [ 309.885843][ T29] ? load_image+0x400/0x400 [ 309.890415][ T29] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 309.896569][ T29] nmi_trigger_cpumask_backtrace+0x17a/0x2f0 [ 309.902615][ T29] watchdog+0xf3d/0xf80 [ 309.906833][ T29] ? watchdog+0x1e1/0xf80 [ 309.911247][ T29] kthread+0x2fa/0x390 [ 309.915463][ T29] ? hungtask_pm_notify+0x90/0x90 [ 309.920547][ T29] ? kthread_blkcg+0xd0/0xd0 [ 309.925189][ T29] ret_from_fork+0x48/0x80 [ 309.929661][ T29] ? kthread_blkcg+0xd0/0xd0 [ 309.934298][ T29] ret_from_fork_asm+0x11/0x20 [ 309.939114][ T29] [ 309.943266][ T29] Sending NMI from CPU 0 to CPUs 1: [ 309.948739][ C1] NMI backtrace for cpu 1 [ 309.948750][ C1] CPU: 1 PID: 35 Comm: kworker/u4:2 Not tainted syzkaller #0 [ 309.948767][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 309.948778][ C1] Workqueue: events_unbound nsim_dev_trap_report_work [ 309.948805][ C1] RIP: 0010:__sanitizer_cov_trace_cmp8+0x10/0x80 [ 309.948830][ C1] Code: 11 10 48 89 74 11 18 48 89 44 11 20 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 48 8b 04 24 65 48 8b 0d 80 a0 7c 7e <65> 8b 15 81 a0 7c 7e 81 e2 00 01 ff 00 74 11 81 fa 00 01 00 00 75 [ 309.948845][ C1] RSP: 0018:ffffc90000abf550 EFLAGS: 00000283 [ 309.948858][ C1] RAX: ffffffff813b3ad8 RBX: ffffffff8ea2bbd4 RCX: ffff888018e83c00 [ 309.948871][ C1] RDX: dffffc0000000000 RSI: ffffffff81df0e7d RDI: ffffffff81df0e38 [ 309.948884][ C1] RBP: ffffffff8ea2bbc8 R08: ffffc90000abf6f0 R09: 0000000000000000 [ 309.948895][ C1] R10: 0000000000000004 R11: 0000000000000000 R12: ffffffff8ea2bbcc [ 309.948906][ C1] R13: ffffffff81df0e38 R14: ffffffff81df0e7d R15: ffffffff8ea2bbd0 [ 309.948919][ C1] FS: 0000000000000000(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000 [ 309.948932][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 309.948944][ C1] CR2: 00005603244ce168 CR3: 000000002ec78000 CR4: 00000000003506e0 [ 309.948958][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 309.948968][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 309.948978][ C1] Call Trace: [ 309.948983][ C1] [ 309.948988][ C1] unwind_next_frame+0x4b8/0x2970 [ 309.949010][ C1] ? kasan_set_track+0x4d/0x70 [ 309.949031][ C1] ? kasan_set_track+0x4e/0x70 [ 309.949050][ C1] ? kasan_set_track+0x4e/0x70 [ 309.949067][ C1] ? stack_trace_save+0x100/0x100 [ 309.949088][ C1] arch_stack_walk+0x144/0x190 [ 309.949111][ C1] ? kasan_set_track+0x4e/0x70 [ 309.949131][ C1] stack_trace_save+0xaa/0x100 [ 309.949152][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 309.949173][ C1] ? stack_trace_save+0xaa/0x100 [ 309.949193][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 309.949216][ C1] kasan_set_track+0x4e/0x70 [ 309.949233][ C1] ? kasan_set_track+0x4e/0x70 [ 309.949285][ C1] __kasan_slab_alloc+0x6c/0x80 [ 309.949306][ C1] slab_post_alloc_hook+0x6e/0x4b0 [ 309.949336][ C1] kmem_cache_alloc_node+0x14c/0x320 [ 309.949360][ C1] ? slab_free_freelist_hook+0x130/0x1a0 [ 309.949376][ C1] ? __alloc_skb+0x103/0x2c0 [ 309.949405][ C1] __alloc_skb+0x103/0x2c0 [ 309.949432][ C1] nsim_dev_trap_report_work+0x293/0xb00 [ 309.949461][ C1] ? process_scheduled_works+0x96f/0x15d0 [ 309.949484][ C1] process_scheduled_works+0xa5d/0x15d0 [ 309.949524][ C1] ? assign_work+0x430/0x430 [ 309.949549][ C1] ? assign_work+0x3d0/0x430 [ 309.949573][ C1] worker_thread+0xa55/0xfc0 [ 309.949612][ C1] kthread+0x2fa/0x390 [ 309.949627][ C1] ? pr_cont_work+0x560/0x560 [ 309.949648][ C1] ? kthread_blkcg+0xd0/0xd0 [ 309.949664][ C1] ret_from_fork+0x48/0x80 [ 309.949684][ C1] ? kthread_blkcg+0xd0/0xd0 [ 309.949701][ C1] ret_from_fork_asm+0x11/0x20 [ 309.949734][ C1] [ 310.127013][ T29] Kernel panic - not syncing: hung_task: blocked tasks [ 310.127065][ T29] CPU: 0 PID: 29 Comm: khungtaskd Not tainted syzkaller #0 [ 310.127118][ T29] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 310.127149][ T29] Call Trace: [ 310.127170][ T29] [ 310.127191][ T29] dump_stack_lvl+0x18c/0x250 [ 310.127292][ T29] ? show_regs_print_info+0x20/0x20 [ 310.127375][ T29] ? load_image+0x400/0x400 [ 310.127507][ T29] panic+0x2dc/0x730 [ 310.127562][ T29] ? schedule_preempt_disabled+0x20/0x20 [ 310.127647][ T29] ? bpf_jit_dump+0xd0/0xd0 [ 310.127701][ T29] ? __irq_work_queue_local+0x13a/0x3b0 [ 310.127770][ T29] ? nmi_trigger_cpumask_backtrace+0x2a4/0x2f0 [ 310.127832][ T29] watchdog+0xf7c/0xf80 [ 310.127915][ T29] ? watchdog+0x1e1/0xf80 [ 310.128006][ T29] kthread+0x2fa/0x390 [ 310.128068][ T29] ? hungtask_pm_notify+0x90/0x90 [ 310.128133][ T29] ? kthread_blkcg+0xd0/0xd0 [ 310.128185][ T29] ret_from_fork+0x48/0x80 [ 310.128254][ T29] ? kthread_blkcg+0xd0/0xd0 [ 310.128308][ T29] ret_from_fork_asm+0x11/0x20 [ 310.128417][ T29] [ 310.130204][ T29] Kernel Offset: disabled [ 310.373554][ T29] Rebooting in 86400 seconds..