last executing test programs: 7.852940841s ago: executing program 3 (id=571): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x280382, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x140) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000009c0)}, 0xff0f000020000080) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8, 0x4}, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x200}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00', 0x200}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe8000"], 0xcfa4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket$kcm(0x2, 0x1, 0x84) socket$kcm(0x2, 0x3, 0x2) r3 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x1ff, 0x200}, 0x8000, 0xcdd, 0x43a1bd76, 0x4, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r6, 0x0, 0x12, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee68886dd", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) setsockopt$sock_attach_bpf(r2, 0x84, 0x9, &(0x7f0000000380), 0x98) socket$kcm(0x2, 0x3, 0x2) 6.939439323s ago: executing program 3 (id=575): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0xa0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x400000000008, 0x8000008}, 0x107004, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x8000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r1, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0xfffffffffffffe9d, 0x10, &(0x7f0000002e00), &(0x7f0000000200), 0x8, 0xa0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r1, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) 6.663563572s ago: executing program 2 (id=578): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x40, 0x8}, 0x10a410, 0x3, 0x43a1bd76, 0x7, 0x7, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3fffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) recvmsg(0xffffffffffffffff, 0x0, 0x40000100) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff0000"], 0x0, 0x8, 0x0, 0x0, 0x41000}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x8000, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 5.658620166s ago: executing program 2 (id=581): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fd1ff7907001175f37538e486dd6317010000213a00db536873f45f08c6feaa70e2aef57b20000000000000000000000000ac1414aa"], 0xfdef) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) 5.658210486s ago: executing program 3 (id=582): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x4}, 0x104101, 0x4, 0x2000000, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000711e741941a896ff23f44299dd711216"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1000000fffffff, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}) openat$cgroup_type(r2, &(0x7f0000000100), 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, @perf_config_ext={0x3, 0x452}, 0x100301, 0x4, 0x0, 0x1, 0x6, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="3504000040000511d25a35400c0002000200002037153e370c040180060410", 0x1f}], 0x1}, 0x10049014) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020023000b05d25a806f8c6394f91a24fc6007020f", 0x17}], 0x1, 0x0, 0x0, 0x400300}, 0x0) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000380)='cpu.pressure\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fff}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0xffffffffffff0001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r5, &(0x7f0000000d00)={0x0, 0x0, 0x0}, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x541b, &(0x7f0000000240)={'ipvlan0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x29}}) socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000720000001801"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/1664], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffffe}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x702, 0xe, 0x0, &(0x7f0000000380)="e460334470b8d480eb00c1520800", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[], 0x48) r7 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8003}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x8, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/31], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20403, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x60, &(0x7f0000000000)=[{&(0x7f0000000300)="2000000011008188040f80ec59acbc0413a181000d0000000001000000000000", 0x20}], 0x1}, 0x40000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x7, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) 5.27997642s ago: executing program 1 (id=583): r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4002, @empty}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x2000481c) sendmsg$sock(r0, 0x0, 0x4081) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x400, 0x2040, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x0, 0x194a}, 0x2000, 0x0, 0x0, 0x9, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0}, 0x94) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x10) r1 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="33fe000024"], 0xfe33) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000f6ffffffb704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x8054) close(0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000091114f0000e5010095000000e646a95299657960f10000000030ffa8121f1c14ce16174c8e87f8098564abf2f153b00c71ccf5182e02cdc17edba4016f967c8bcd790765e3ade09883ee1981da4b81853fb54f9060a92b5a79a84cdca1d871daca83fb9b5a8a3bf8f2b1f6b901c012d43d805815aa9128ebec255fa40fa875fcb87ac92bca826e0a36b2"], &(0x7f0000000c40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) recvmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x12041) 4.151383888s ago: executing program 2 (id=584): r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, 0x0, 0xff0f000020000080) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8, 0x4}, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)) r1 = socket$kcm(0x2, 0x1, 0x84) socket$kcm(0x2, 0x3, 0x2) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x1ff, 0x200}, 0x8000, 0xcdd, 0x43a1bd76, 0x4, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r5, 0x0, 0x12, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee68886dd", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) setsockopt$sock_attach_bpf(r1, 0x84, 0x9, &(0x7f0000000380), 0x98) r6 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r6, 0x8916, &(0x7f0000000000)={'veth1_to_bridge\x00', @random="02000400ac14"}) 3.803219s ago: executing program 0 (id=585): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x403d87c21de2ff3f, &(0x7f0000000040)="b90103606989068c3c270040f000009e0ff008001fffffe1ffff86dd632f080686dd00017f020001be", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 3.779698381s ago: executing program 1 (id=586): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x2a609, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xffffffff, 0x7fffffff}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8b2b, &(0x7f0000000040)={'wlan1\x00', @random="0100"}) socket$kcm(0x2, 0x200000000000001, 0x106) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x310c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair(0x1, 0x1, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB='1'], 0x31) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_int(r3, 0x0, 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r4, &(0x7f0000000140), &(0x7f0000000240)=""/154}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0xfffffffffff7bbfe, 0x1, 0x3, 0x0, 0x5ff, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002b80)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x3, &(0x7f0000000480)=@framed, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={@fallback=r5, r5, 0x2f, 0x10, 0xffffffffffffffff, @void, @value=0x0}, 0x20) mkdir(0x0, 0x0) 3.554145388s ago: executing program 0 (id=587): socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33a2d912}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r3, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x1a9) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x48) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x5865}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}], 0x70}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000b80)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca^\xf9\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x96\x86\xdb\xa9\xd3\x01\xb2\xc7\xf8G\x069\x90,\xda\xf6\xc5\xcd\xec\xa3B\xc3\"4\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\x7f\xec\xb2\xc5E\x00\xdd\xf2e\xa8\xf1<\xb2\xc82\xbf=o\x00`\xc1A\'\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x92\xbb\xe3Y\x97\xc2') socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x8916, &(0x7f0000000000)={r7}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000001000)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed@n\x00\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xf3\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x9c\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x8000, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 2.852333462s ago: executing program 2 (id=590): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0xa0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x400000000008, 0x8000008}, 0x107004, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x8000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r1, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0xfffffffffffffe9d, 0x10, &(0x7f0000002e00), &(0x7f0000000200), 0x8, 0xa0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r1, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) 2.799485084s ago: executing program 1 (id=591): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0xa0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x400000000008, 0x8000008}, 0x107004, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x8000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r1, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0xfffffffffffffe9d, 0x10, &(0x7f0000002e00), &(0x7f0000000200), 0x8, 0xa0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r1, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) 2.748275066s ago: executing program 0 (id=592): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x594f, 0x3}, 0x1041a1, 0xc, 0x9, 0x1, 0x0, 0x300, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00000012002f8c35093f974b21b92e0a", 0x11}], 0x1}, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="1310000016"], 0xfe33) socket$kcm(0x10, 0x2, 0x10) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x202, 0x0, 0xffffffff, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x6, 0x0, 0x0, 0x209, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0xffffffff, 0x40}, 0x8000, 0x7, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000"], 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r4}, 0xc) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x9, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/14, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000400)}, 0x48014) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000140)={0x5, 0x0}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map, r5, 0x31, 0x2020, 0x0, @void, @void, @value=r7}, 0x20) sendmsg$inet(0xffffffffffffffff, 0x0, 0x4000891) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r8, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000400)={@fallback, 0xffffffffffffffff, 0x22, 0x2b, r6}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@fallback=r1, r5, 0x1d, 0x10, 0x0, @void, @value=r5}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socket$kcm(0xa, 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r6, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66, 0x8, 0x8, &(0x7f00000007c0)}}, 0x10) r10 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000100)='./file0\x00', 0x0, 0x4018, r10}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={@ifindex=r9, r6, 0x11, 0x0, 0x0, @void, @value=r11}, 0x20) 2.747288366s ago: executing program 3 (id=593): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1c, 0x2000000000000216, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x7, 0xc, &(0x7f0000000040)=ANY=[@ANYRES8=r0, @ANYRES32=0x0, @ANYRES16=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0xffffffffffffff1d, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x1c1341, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x2, @perf_config_ext={0x40000000000000, 0x3fef8000}, 0x0, 0x701, 0x43a1bd76, 0x0, 0x5, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa66a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f375ffff86dd6317ce62070000000000000000431ccaf57b00000000000000000104"], 0xfe1b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="851000000000000018100000", @ANYRES32, @ANYBLOB="f0f605748aed0000000000000c00000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) write$cgroup_int(r3, 0x0, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000440)="2e00000012008188e6b62aa73772cc9f1ba1f848430000005e140602000000000e000a000f000000028000", 0x2b}, {&(0x7f0000000580)="7cd14b", 0x3}], 0x2}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f2, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) socket$kcm(0x11, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000c40), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) 2.230119054s ago: executing program 0 (id=594): r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4002, @empty}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x2000481c) sendmsg$sock(r0, 0x0, 0x4081) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x400, 0x2040, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x0, 0x194a}, 0x2000, 0x0, 0x0, 0x9, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0}, 0x94) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x10) r1 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="33fe000024"], 0xfe33) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000f6ffffffb704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x8054) close(0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000091114f0000e5010095000000e646a95299657960f10000000030ffa8121f1c14ce16174c8e87f8098564abf2f153b00c71ccf5182e02cdc17edba4016f967c8bcd790765e3ade09883ee1981da4b81853fb54f9060a92b5a79a84cdca1d871daca83fb9b5a8a3bf8f2b1f6b901c012d43d805815aa9128ebec255fa40fa875fcb87ac92bca826e0a36b2"], &(0x7f0000000c40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) recvmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x12041) 1.722916491s ago: executing program 1 (id=595): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x403d87c21de2ff3f, &(0x7f0000000040)="b90103606989068c3c270040f000009e0ff008001fffffe1ffff86dd632f080686dd00017f020001be", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 1.591887405s ago: executing program 2 (id=596): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x1a, &(0x7f0000000700)=ANY=[@ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000001834000004000000000000000000000084b7fffffcffffff180000000008000000000000fdffffff8500000031000000180000001100000000000000040000003b9001000400000018000000090000000000000048000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0xf9, &(0x7f0000000500)=""/249, 0x41100, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0x5, 0xff, 0x56e6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0x1, 0x1, 0x1, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x94) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000006c0)={0xffffffffffffffff, r1}) r2 = socket$kcm(0x10, 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x60}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) r4 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r6 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x7, 0x3d, 0x7, 0x0, 0x0, 0xd299, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x4}, 0x100882, 0x7ff, 0x6, 0x0, 0xb, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001500)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) r9 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="1400000017000b63d25a80648c2594f913a3c92b", 0x14}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9b, 0x1, 0x0, 0x0, 0x0, 0x40, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x43e90bacaf4f4c62, @perf_bp={0x0}, 0x104260, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3ff}, 0x0, 0xffffffbfffffffff, r6, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0xa5c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x900, &(0x7f0000000140)=[{&(0x7f0000000300)="d80000001e0081054e81f782db4cb904021d080006007c09e8fe08a10a000e800a00142603600e1208000fc00e000406a80016c008000e400400027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 1.384109982s ago: executing program 1 (id=597): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x1a, &(0x7f0000000700)=ANY=[@ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000001834000004000000000000000000000084b7fffffcffffff180000000008000000000000fdffffff8500000031000000180000001100000000000000040000003b9001000400000018000000090000000000000048000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0xf9, &(0x7f0000000500)=""/249, 0x41100, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0x5, 0xff, 0x56e6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0x1, 0x1, 0x1, 0xffffffffffffffff], 0x0, 0x10, 0x9}, 0x94) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000006c0)={0xffffffffffffffff, r1}) r2 = socket$kcm(0x10, 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x60}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) r4 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r6 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x7, 0x3d, 0x7, 0x0, 0x0, 0xd299, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x4}, 0x100882, 0x7ff, 0x6, 0x0, 0xb, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001500)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) r9 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="1400000017000b63d25a80648c2594f913a3c92b", 0x14}], 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9b, 0x1, 0x0, 0x0, 0x0, 0x40, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x43e90bacaf4f4c62, @perf_bp={0x0}, 0x104260, 0x0, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3ff}, 0x0, 0xffffffbfffffffff, r6, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0xa5c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x900, &(0x7f0000000140)=[{&(0x7f0000000300)="d80000001e0081054e81f782db4cb904021d080006007c09e8fe08a10a000e800a00142603600e1208000fc00e000406a80016c008000e400400027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 1.383833192s ago: executing program 3 (id=598): r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, 0x0, 0xff0f000020000080) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8, 0x4}, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)) r1 = socket$kcm(0x2, 0x1, 0x84) socket$kcm(0x2, 0x3, 0x2) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x1ff, 0x200}, 0x8000, 0xcdd, 0x43a1bd76, 0x4, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r5, 0x0, 0x12, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee68886dd", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) setsockopt$sock_attach_bpf(r1, 0x84, 0x9, &(0x7f0000000380), 0x98) r6 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r6, 0x8916, &(0x7f0000000000)={'veth1_to_bridge\x00', @random="02000400ac14"}) 1.383392253s ago: executing program 0 (id=599): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x40, 0x8}, 0x10a410, 0x3, 0x43a1bd76, 0x7, 0x7, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3fffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) recvmsg(0xffffffffffffffff, 0x0, 0x40000100) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff0000"], 0x0, 0x8, 0x0, 0x0, 0x41000}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x8000, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 163.098864ms ago: executing program 0 (id=600): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000100)=ANY=[@ANYBLOB="18020000050000000000000000000000180600000000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000001000000850000000600000085000000d000000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe123, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0xd, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x66137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) 0s ago: executing program 2 (id=601): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x8000) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.59' (ED25519) to the list of known hosts. [ 72.742291][ T5756] cgroup: Unknown subsys name 'net' [ 72.874985][ T5756] cgroup: Unknown subsys name 'rlimit' Setting up swapspace version 1, size = 127995904 bytes [ 74.597622][ T5756] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 76.595114][ T5773] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 76.607430][ T5781] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 76.629070][ T5781] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 76.640316][ T5775] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 76.648107][ T5781] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 76.649014][ T5775] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 76.664836][ T5775] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 76.672208][ T5781] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 76.672962][ T5775] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 76.680423][ T5773] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 76.695199][ T5782] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 76.702554][ T5781] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 76.711165][ T5782] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 76.719188][ T5773] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 76.726648][ T5782] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 76.734150][ T5781] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 76.742495][ T5782] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 76.750078][ T5781] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 76.751308][ T5783] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 76.758131][ T5782] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 76.773019][ T5782] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 76.782898][ T5782] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 76.791130][ T5782] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 76.803842][ T5782] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 77.234485][ T5768] chnl_net:caif_netlink_parms(): no params data found [ 77.290517][ T5767] chnl_net:caif_netlink_parms(): no params data found [ 77.353451][ T5771] chnl_net:caif_netlink_parms(): no params data found [ 77.411405][ T5769] chnl_net:caif_netlink_parms(): no params data found [ 77.488649][ T5768] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.496380][ T5768] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.503912][ T5768] bridge_slave_0: entered allmulticast mode [ 77.510797][ T5768] bridge_slave_0: entered promiscuous mode [ 77.552889][ T5768] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.563059][ T5768] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.570239][ T5768] bridge_slave_1: entered allmulticast mode [ 77.577006][ T5768] bridge_slave_1: entered promiscuous mode [ 77.652121][ T5768] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 77.663944][ T5771] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.671300][ T5771] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.678614][ T5771] bridge_slave_0: entered allmulticast mode [ 77.685412][ T5771] bridge_slave_0: entered promiscuous mode [ 77.703282][ T5767] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.710603][ T5767] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.717855][ T5767] bridge_slave_0: entered allmulticast mode [ 77.724605][ T5767] bridge_slave_0: entered promiscuous mode [ 77.736136][ T5768] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.755092][ T5771] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.764885][ T5771] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.772320][ T5771] bridge_slave_1: entered allmulticast mode [ 77.780078][ T5771] bridge_slave_1: entered promiscuous mode [ 77.793994][ T5767] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.801234][ T5767] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.808521][ T5767] bridge_slave_1: entered allmulticast mode [ 77.815317][ T5767] bridge_slave_1: entered promiscuous mode [ 77.841324][ T5769] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.851302][ T5769] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.858677][ T5769] bridge_slave_0: entered allmulticast mode [ 77.865446][ T5769] bridge_slave_0: entered promiscuous mode [ 77.874531][ T5769] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.881707][ T5769] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.889307][ T5769] bridge_slave_1: entered allmulticast mode [ 77.896074][ T5769] bridge_slave_1: entered promiscuous mode [ 77.914774][ T5768] team0: Port device team_slave_0 added [ 77.944189][ T5768] team0: Port device team_slave_1 added [ 77.964058][ T5771] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 77.976019][ T5771] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.005836][ T5767] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.028640][ T5769] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.042459][ T5769] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.063839][ T5768] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 78.070869][ T5768] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 78.097402][ T5768] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 78.112095][ T5767] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.143600][ T5768] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 78.150854][ T5768] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 78.177244][ T5768] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 78.199651][ T5771] team0: Port device team_slave_0 added [ 78.244114][ T5767] team0: Port device team_slave_0 added [ 78.251619][ T5771] team0: Port device team_slave_1 added [ 78.272077][ T5769] team0: Port device team_slave_0 added [ 78.282409][ T5767] team0: Port device team_slave_1 added [ 78.301242][ T5771] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 78.308436][ T5771] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 78.334628][ T5771] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 78.348389][ T5769] team0: Port device team_slave_1 added [ 78.372943][ T5771] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 78.380152][ T5771] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 78.406405][ T5771] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 78.449685][ T5769] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 78.456670][ T5769] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 78.483164][ T5769] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 78.519316][ T5768] hsr_slave_0: entered promiscuous mode [ 78.525582][ T5768] hsr_slave_1: entered promiscuous mode [ 78.546411][ T5769] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 78.553530][ T5769] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 78.579722][ T5769] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 78.598162][ T5767] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 78.605139][ T5767] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 78.632222][ T5767] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 78.681833][ T5767] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 78.691239][ T5767] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 78.720224][ T5767] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 78.735652][ T5771] hsr_slave_0: entered promiscuous mode [ 78.742152][ T5771] hsr_slave_1: entered promiscuous mode [ 78.748912][ T5771] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 78.756807][ T5771] Cannot create hsr debugfs directory [ 78.819198][ T5769] hsr_slave_0: entered promiscuous mode [ 78.826205][ T5769] hsr_slave_1: entered promiscuous mode [ 78.833369][ T5769] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 78.838631][ T5780] Bluetooth: hci1: command tx timeout [ 78.841354][ T5778] Bluetooth: hci0: command tx timeout [ 78.846560][ T5782] Bluetooth: hci2: command tx timeout [ 78.858613][ T5769] Cannot create hsr debugfs directory [ 78.918855][ T5782] Bluetooth: hci3: command tx timeout [ 78.946721][ T5767] hsr_slave_0: entered promiscuous mode [ 78.955155][ T5767] hsr_slave_1: entered promiscuous mode [ 78.962119][ T5767] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 78.970093][ T5767] Cannot create hsr debugfs directory [ 79.282315][ T5768] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 79.304515][ T5768] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 79.322366][ T5768] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 79.333256][ T5768] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 79.399924][ T5771] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 79.411953][ T5771] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 79.422926][ T5771] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 79.433814][ T5771] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 79.580285][ T5767] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 79.604644][ T5767] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 79.616313][ T5767] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 79.640321][ T5768] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.649447][ T5767] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 79.710911][ T5768] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.742643][ T5769] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 79.757753][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.765137][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.774736][ T5769] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 79.798827][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.806000][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.825652][ T5769] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 79.846891][ T5771] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.862016][ T5769] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 79.907345][ T5771] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.955004][ T11] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.962144][ T11] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.984747][ T142] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.992109][ T142] bridge0: port 2(bridge_slave_1) entered forwarding state [ 80.106545][ T5767] 8021q: adding VLAN 0 to HW filter on device bond0 [ 80.172796][ T5767] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.211435][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.218853][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 80.253419][ T5769] 8021q: adding VLAN 0 to HW filter on device bond0 [ 80.280731][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.288065][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 80.366373][ T5769] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.420870][ T4720] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.428091][ T4720] bridge0: port 1(bridge_slave_0) entered forwarding state [ 80.463506][ T142] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.470786][ T142] bridge0: port 2(bridge_slave_1) entered forwarding state [ 80.622860][ T5768] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 80.731574][ T5771] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 80.787108][ T5768] veth0_vlan: entered promiscuous mode [ 80.822268][ T5768] veth1_vlan: entered promiscuous mode [ 80.884030][ T5771] veth0_vlan: entered promiscuous mode [ 80.919596][ T5782] Bluetooth: hci2: command tx timeout [ 80.928172][ T5782] Bluetooth: hci0: command tx timeout [ 80.929276][ T5778] Bluetooth: hci1: command tx timeout [ 80.951662][ T5771] veth1_vlan: entered promiscuous mode [ 80.963404][ T5768] veth0_macvtap: entered promiscuous mode [ 80.995175][ T5768] veth1_macvtap: entered promiscuous mode [ 81.002997][ T5778] Bluetooth: hci3: command tx timeout [ 81.050855][ T5767] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 81.076005][ T5768] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 81.106493][ T5768] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 81.123649][ T5768] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.133189][ T5768] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.143005][ T5768] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.151815][ T5768] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.199066][ T5771] veth0_macvtap: entered promiscuous mode [ 81.223413][ T5771] veth1_macvtap: entered promiscuous mode [ 81.265946][ T5771] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 81.277239][ T5771] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.290277][ T5771] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 81.333118][ T5771] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 81.347408][ T5771] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.360060][ T5771] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 81.391176][ T5769] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 81.404652][ T5771] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.414535][ T5771] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.423960][ T5771] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.432832][ T5771] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.460485][ T5767] veth0_vlan: entered promiscuous mode [ 81.484677][ T4720] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 81.499716][ T5767] veth1_vlan: entered promiscuous mode [ 81.520011][ T4720] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 81.620420][ T5767] veth0_macvtap: entered promiscuous mode [ 81.635360][ T11] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 81.647188][ T11] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 81.665579][ T5767] veth1_macvtap: entered promiscuous mode [ 81.724725][ T5769] veth0_vlan: entered promiscuous mode [ 81.744639][ T11] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 81.774805][ T11] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 81.810933][ T5767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 81.837640][ T5767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.854619][ T5767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 81.866242][ T5767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.878934][ T5767] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 81.909565][ T5767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 81.917555][ C1] hrtimer: interrupt took 53703 ns [ 81.931014][ T5767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.962683][ T5767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 81.987637][ T5767] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 82.019934][ T5767] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 82.069452][ T5767] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.093082][ T5767] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.127935][ T5767] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.136799][ T5767] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.214431][ T3497] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 82.224315][ T3497] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 82.276142][ T5769] veth1_vlan: entered promiscuous mode [ 82.586764][ T5769] veth0_macvtap: entered promiscuous mode [ 82.647043][ T5769] veth1_macvtap: entered promiscuous mode [ 82.797875][ T11] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 82.911519][ T11] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 82.951078][ T5769] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 82.997753][ T5769] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 83.014580][ T5778] Bluetooth: hci0: command tx timeout [ 83.014667][ T5782] Bluetooth: hci2: command tx timeout [ 83.021165][ T5780] Bluetooth: hci1: command tx timeout [ 83.039449][ T5851] Zero length message leads to an empty skb [ 83.060321][ T5769] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 83.077941][ T5780] Bluetooth: hci3: command tx timeout [ 83.096469][ T5769] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 83.106791][ T5769] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 83.144726][ T5769] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 83.185310][ T5769] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 83.269981][ T5851] ÿÿÿÿÿÿ: renamed from vlan1 (while UP) [ 83.291433][ T5769] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 83.307654][ T5769] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 83.327169][ T5769] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 83.347061][ T5769] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 83.367019][ T5769] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 83.378447][ T5769] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 83.391102][ T5769] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 83.442998][ T5769] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.458021][ T5769] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.465887][ T60] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 83.466921][ T5769] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.485448][ T5769] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.528167][ T60] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 83.676301][ T3497] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 83.698326][ T5856] Driver unsupported XDP return value 0 on prog (id 8) dev N/A, expect packet loss! [ 83.718817][ T3497] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 83.892144][ T142] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 83.926764][ T142] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 85.078529][ T5780] Bluetooth: hci1: command tx timeout [ 85.084163][ T5778] Bluetooth: hci0: command tx timeout [ 85.097681][ T5778] Bluetooth: hci2: command tx timeout [ 85.162547][ T5780] Bluetooth: hci3: command tx timeout [ 87.175377][ T788] cfg80211: failed to load regulatory.db [ 91.759594][ T5905] netlink: 209852 bytes leftover after parsing attributes in process `syz.0.22'. [ 91.801173][ T5906] netlink: 209844 bytes leftover after parsing attributes in process `syz.0.22'. [ 91.824341][ T5905] openvswitch: netlink: Flow key attribute not present in set flow. [ 92.829649][ T5919] syzkaller0: entered promiscuous mode [ 92.838382][ T5919] syzkaller0: entered allmulticast mode [ 94.424945][ T5930] syzkaller0: entered promiscuous mode [ 94.587878][ T5930] syzkaller0: entered allmulticast mode [ 98.529335][ T5935] netlink: 65039 bytes leftover after parsing attributes in process `syz.2.31'. [ 98.790868][ T5946] netlink: 209852 bytes leftover after parsing attributes in process `syz.3.34'. [ 98.877672][ T5946] openvswitch: netlink: Flow key attribute not present in set flow. [ 98.979015][ T5946] netlink: 209844 bytes leftover after parsing attributes in process `syz.3.34'. [ 100.865630][ T5972] syzkaller0: entered promiscuous mode [ 100.887402][ T5972] syzkaller0: entered allmulticast mode [ 102.401735][ T5993] netlink: 209852 bytes leftover after parsing attributes in process `syz.1.48'. [ 102.435651][ T5993] openvswitch: netlink: Flow key attribute not present in set flow. [ 102.606172][ T5993] netlink: 209844 bytes leftover after parsing attributes in process `syz.1.48'. [ 103.307262][ T6010] syzkaller0: entered promiscuous mode [ 103.345146][ T6010] syzkaller0: entered allmulticast mode [ 104.684846][ T6022] syzkaller0: entered promiscuous mode [ 104.711397][ T6022] syzkaller0: entered allmulticast mode [ 105.476043][ T6036] syzkaller0: entered promiscuous mode [ 105.497644][ T6036] syzkaller0: entered allmulticast mode [ 105.515255][ T6038] netlink: 209852 bytes leftover after parsing attributes in process `syz.2.62'. [ 105.545983][ T6038] openvswitch: netlink: Flow key attribute not present in set flow. [ 105.636978][ T6038] netlink: 209844 bytes leftover after parsing attributes in process `syz.2.62'. [ 109.254788][ T6072] warning: `syz.2.80' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211 [ 117.403922][ T6097] syzkaller0: entered promiscuous mode [ 117.421534][ T6097] syzkaller0: entered allmulticast mode [ 118.761853][ T6120] syzkaller0: entered promiscuous mode [ 118.787588][ T6120] syzkaller0: entered allmulticast mode [ 119.621065][ T6134] syzkaller0: entered promiscuous mode [ 119.661872][ T6134] syzkaller0: entered allmulticast mode [ 123.140203][ T6162] syzkaller0: entered promiscuous mode [ 123.146058][ T6162] syzkaller0: entered allmulticast mode [ 123.762567][ T6171] syzkaller0: entered promiscuous mode [ 123.799625][ T6171] syzkaller0: entered allmulticast mode [ 126.471532][ T6211] syzkaller0: entered promiscuous mode [ 126.502507][ T6211] syzkaller0: entered allmulticast mode [ 126.534525][ T6214] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 128.955310][ T6242] netlink: 'syz.2.139': attribute type 13 has an invalid length. [ 129.088004][ T6242] netlink: 152 bytes leftover after parsing attributes in process `syz.2.139'. [ 129.223367][ T6242] syz_tun: refused to change device tx_queue_len [ 129.257934][ T6242] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. [ 129.343516][ T6248] netlink: 'syz.2.139': attribute type 21 has an invalid length. [ 129.385220][ T6248] netlink: 164 bytes leftover after parsing attributes in process `syz.2.139'. [ 129.742106][ T6251] syzkaller0: entered promiscuous mode [ 129.768265][ T6251] syzkaller0: entered allmulticast mode [ 133.097017][ T1289] ieee802154 phy0 wpan0: encryption failed: -22 [ 133.103837][ T1289] ieee802154 phy1 wpan1: encryption failed: -22 [ 135.470529][ T6299] syzkaller0: entered promiscuous mode [ 135.476086][ T6299] syzkaller0: entered allmulticast mode [ 138.135230][ T6330] netlink: 65039 bytes leftover after parsing attributes in process `syz.2.166'. [ 138.817652][ T6338] syzkaller0: entered promiscuous mode [ 138.823195][ T6338] syzkaller0: entered allmulticast mode [ 141.864638][ T6373] syzkaller0: entered promiscuous mode [ 141.889766][ T6373] syzkaller0: entered allmulticast mode [ 149.644728][ T6415] syzkaller0: entered promiscuous mode [ 149.658165][ T6415] syzkaller0: entered allmulticast mode [ 153.712080][ T6446] netlink: 'syz.0.203': attribute type 9 has an invalid length. [ 153.737637][ T6446] netlink: 209836 bytes leftover after parsing attributes in process `syz.0.203'. [ 154.227278][ T6458] netlink: 'syz.0.203': attribute type 9 has an invalid length. [ 154.277960][ T6458] netlink: 209836 bytes leftover after parsing attributes in process `syz.0.203'. [ 163.309126][ T6562] netlink: 10 bytes leftover after parsing attributes in process `syz.2.235'. [ 169.323893][ T6631] netlink: 'syz.2.255': attribute type 9 has an invalid length. [ 169.371499][ T6633] ip6_vti0: mtu greater than device maximum [ 169.383619][ T6631] netlink: 209836 bytes leftover after parsing attributes in process `syz.2.255'. [ 169.500757][ T6633] netlink: 'syz.2.255': attribute type 9 has an invalid length. [ 169.513505][ T6633] netlink: 209836 bytes leftover after parsing attributes in process `syz.2.255'. [ 169.677854][ T6639] netlink: 60 bytes leftover after parsing attributes in process `syz.1.256'. [ 169.708980][ T6639] netlink: 60 bytes leftover after parsing attributes in process `syz.1.256'. [ 169.729220][ T6639] netlink: 60 bytes leftover after parsing attributes in process `syz.1.256'. [ 171.292675][ T6668] netlink: 'syz.0.264': attribute type 21 has an invalid length. [ 171.318652][ T6668] netlink: 176 bytes leftover after parsing attributes in process `syz.0.264'. [ 180.710906][ T6800] FAULT_INJECTION: forcing a failure. [ 180.710906][ T6800] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 180.746358][ T6800] CPU: 0 PID: 6800 Comm: syz.1.313 Not tainted syzkaller #0 [ 180.753725][ T6800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 180.763805][ T6800] Call Trace: [ 180.767107][ T6800] [ 180.770062][ T6800] dump_stack_lvl+0x18c/0x250 [ 180.774897][ T6800] ? show_regs_print_info+0x20/0x20 [ 180.780130][ T6800] ? load_image+0x400/0x400 [ 180.784665][ T6800] ? __lock_acquire+0x7d40/0x7d40 [ 180.789721][ T6800] ? snprintf+0xe9/0x140 [ 180.794018][ T6800] should_fail_ex+0x39d/0x4d0 [ 180.798752][ T6800] _copy_to_user+0x2f/0xa0 [ 180.803209][ T6800] simple_read_from_buffer+0xe7/0x150 [ 180.808632][ T6800] proc_fail_nth_read+0x1e8/0x260 [ 180.813707][ T6800] ? proc_fault_inject_write+0x360/0x360 [ 180.819399][ T6800] ? fsnotify_perm+0x271/0x5e0 [ 180.824286][ T6800] ? proc_fault_inject_write+0x360/0x360 [ 180.829950][ T6800] vfs_read+0x28b/0x970 [ 180.834145][ T6800] ? kernel_read+0x1e0/0x1e0 [ 180.838765][ T6800] ? __fget_files+0x28/0x4b0 [ 180.843407][ T6800] ? __fget_files+0x28/0x4b0 [ 180.848031][ T6800] ? __fget_files+0x43d/0x4b0 [ 180.852759][ T6800] ? __fdget_pos+0x2a3/0x330 [ 180.857479][ T6800] ? ksys_read+0x75/0x260 [ 180.862029][ T6800] ksys_read+0x150/0x260 [ 180.866312][ T6800] ? vfs_write+0x990/0x990 [ 180.870768][ T6800] ? lockdep_hardirqs_on+0x98/0x150 [ 180.876013][ T6800] do_syscall_64+0x55/0xa0 [ 180.880472][ T6800] ? clear_bhb_loop+0x40/0x90 [ 180.885178][ T6800] ? clear_bhb_loop+0x40/0x90 [ 180.889890][ T6800] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 180.895895][ T6800] RIP: 0033:0x7f8b7d15cfce [ 180.900343][ T6800] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 180.920156][ T6800] RSP: 002b:00007f8b7e088fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 180.928862][ T6800] RAX: ffffffffffffffda RBX: 00007f8b7e0896c0 RCX: 00007f8b7d15cfce [ 180.936958][ T6800] RDX: 000000000000000f RSI: 00007f8b7e0890a0 RDI: 0000000000000005 [ 180.944952][ T6800] RBP: 00007f8b7e089090 R08: 0000000000000000 R09: 0000000000000000 [ 180.953121][ T6800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 180.961126][ T6800] R13: 00007f8b7d416038 R14: 00007f8b7d415fa0 R15: 00007ffd3961ba08 [ 180.969230][ T6800] [ 181.127890][ T6802] FAULT_INJECTION: forcing a failure. [ 181.127890][ T6802] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 181.194250][ T6802] CPU: 0 PID: 6802 Comm: syz.0.314 Not tainted syzkaller #0 [ 181.201711][ T6802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 181.211997][ T6802] Call Trace: [ 181.215497][ T6802] [ 181.218550][ T6802] dump_stack_lvl+0x18c/0x250 [ 181.223577][ T6802] ? show_regs_print_info+0x20/0x20 [ 181.228930][ T6802] ? load_image+0x400/0x400 [ 181.233632][ T6802] ? __might_fault+0xaa/0x120 [ 181.238506][ T6802] should_fail_ex+0x39d/0x4d0 [ 181.243464][ T6802] copyin+0x1a/0x90 [ 181.247431][ T6802] _copy_from_iter+0x54f/0x12e0 [ 181.252422][ T6802] ? __virt_addr_valid+0x18c/0x540 [ 181.257793][ T6802] ? copyout_mc+0x70/0x70 [ 181.262274][ T6802] ? __virt_addr_valid+0x18c/0x540 [ 181.267535][ T6802] ? __virt_addr_valid+0x18c/0x540 [ 181.272793][ T6802] ? __virt_addr_valid+0x469/0x540 [ 181.278083][ T6802] ? __check_object_size+0x506/0xa20 [ 181.283575][ T6802] rawv6_send_hdrinc+0x7a4/0x1640 [ 181.288919][ T6802] ? txopt_get+0x3f0/0x3f0 [ 181.293475][ T6802] ? txopt_get+0x344/0x3f0 [ 181.298074][ T6802] ? fl6_sock_lookup+0xc0/0xc0 [ 181.303107][ T6802] rawv6_sendmsg+0x12cc/0x1770 [ 181.308217][ T6802] ? compat_rawv6_ioctl+0x70/0x70 [ 181.313508][ T6802] ? aa_sk_perm+0x83c/0x970 [ 181.318364][ T6802] ? tomoyo_socket_sendmsg_permission+0x216/0x2f0 [ 181.325032][ T6802] ? inet_sendmsg+0x7c/0x2f0 [ 181.329758][ T6802] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 181.335201][ T6802] ? security_socket_sendmsg+0x80/0xa0 [ 181.340802][ T6802] ? inet_send_prepare+0x260/0x260 [ 181.346089][ T6802] ____sys_sendmsg+0x5ba/0x960 [ 181.351009][ T6802] ? __lock_acquire+0x7d40/0x7d40 [ 181.356241][ T6802] ? __asan_memset+0x22/0x40 [ 181.360987][ T6802] ? __sys_sendmsg_sock+0x30/0x30 [ 181.366243][ T6802] ? __import_iovec+0x3fa/0x850 [ 181.371356][ T6802] ? import_iovec+0x73/0xa0 [ 181.376058][ T6802] ___sys_sendmsg+0x2a6/0x360 [ 181.380971][ T6802] ? __sys_sendmsg+0x2a0/0x2a0 [ 181.386096][ T6802] ? __lock_acquire+0x7d40/0x7d40 [ 181.391662][ T6802] __se_sys_sendmsg+0x1c2/0x2b0 [ 181.396697][ T6802] ? __x64_sys_sendmsg+0x80/0x80 [ 181.402033][ T6802] ? lockdep_hardirqs_on+0x98/0x150 [ 181.407425][ T6802] do_syscall_64+0x55/0xa0 [ 181.412073][ T6802] ? clear_bhb_loop+0x40/0x90 [ 181.416969][ T6802] ? clear_bhb_loop+0x40/0x90 [ 181.421871][ T6802] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 181.427877][ T6802] RIP: 0033:0x7fd32459c799 [ 181.432388][ T6802] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 181.452254][ T6802] RSP: 002b:00007fd3254bc028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 181.460770][ T6802] RAX: ffffffffffffffda RBX: 00007fd324815fa0 RCX: 00007fd32459c799 [ 181.468903][ T6802] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000005 [ 181.476947][ T6802] RBP: 00007fd3254bc090 R08: 0000000000000000 R09: 0000000000000000 [ 181.485094][ T6802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 181.493144][ T6802] R13: 00007fd324816038 R14: 00007fd324815fa0 R15: 00007ffe70e7deb8 [ 181.501337][ T6802] [ 181.562357][ T6808] syz.2.316 uses obsolete (PF_INET,SOCK_PACKET) [ 186.411871][ T6865] FAULT_INJECTION: forcing a failure. [ 186.411871][ T6865] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 186.475260][ T6865] CPU: 0 PID: 6865 Comm: syz.0.339 Not tainted syzkaller #0 [ 186.482630][ T6865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 186.492799][ T6865] Call Trace: [ 186.496103][ T6865] [ 186.499080][ T6865] dump_stack_lvl+0x18c/0x250 [ 186.503822][ T6865] ? show_regs_print_info+0x20/0x20 [ 186.509151][ T6865] ? load_image+0x400/0x400 [ 186.513688][ T6865] ? __might_fault+0xaa/0x120 [ 186.518404][ T6865] ? __lock_acquire+0x7d40/0x7d40 [ 186.523459][ T6865] should_fail_ex+0x39d/0x4d0 [ 186.528262][ T6865] _copy_from_user+0x2f/0xe0 [ 186.532884][ T6865] ___sys_sendmsg+0x1c7/0x360 [ 186.537674][ T6865] ? get_pid_task+0x20/0x1e0 [ 186.542303][ T6865] ? __sys_sendmsg+0x2a0/0x2a0 [ 186.547117][ T6865] ? __lock_acquire+0x7d40/0x7d40 [ 186.552258][ T6865] __se_sys_sendmsg+0x1c2/0x2b0 [ 186.557157][ T6865] ? __x64_sys_sendmsg+0x80/0x80 [ 186.562154][ T6865] ? lockdep_hardirqs_on+0x98/0x150 [ 186.567388][ T6865] do_syscall_64+0x55/0xa0 [ 186.572005][ T6865] ? clear_bhb_loop+0x40/0x90 [ 186.576707][ T6865] ? clear_bhb_loop+0x40/0x90 [ 186.581502][ T6865] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 186.587423][ T6865] RIP: 0033:0x7fd32459c799 [ 186.592044][ T6865] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 186.611683][ T6865] RSP: 002b:00007fd3254bc028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 186.620136][ T6865] RAX: ffffffffffffffda RBX: 00007fd324815fa0 RCX: 00007fd32459c799 [ 186.628149][ T6865] RDX: 0000000000040040 RSI: 0000200000000000 RDI: 0000000000000003 [ 186.636252][ T6865] RBP: 00007fd3254bc090 R08: 0000000000000000 R09: 0000000000000000 [ 186.644245][ T6865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 186.652324][ T6865] R13: 00007fd324816038 R14: 00007fd324815fa0 R15: 00007ffe70e7deb8 [ 186.660342][ T6865] [ 189.925849][ T6895] FAULT_INJECTION: forcing a failure. [ 189.925849][ T6895] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 189.972276][ T6895] CPU: 0 PID: 6895 Comm: syz.0.348 Not tainted syzkaller #0 [ 189.979651][ T6895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 189.989840][ T6895] Call Trace: [ 189.993162][ T6895] [ 189.996124][ T6895] dump_stack_lvl+0x18c/0x250 [ 190.000862][ T6895] ? show_regs_print_info+0x20/0x20 [ 190.006113][ T6895] ? load_image+0x400/0x400 [ 190.010685][ T6895] ? __might_fault+0xaa/0x120 [ 190.015591][ T6895] should_fail_ex+0x39d/0x4d0 [ 190.020330][ T6895] copyin+0x1a/0x90 [ 190.024257][ T6895] _copy_from_iter+0x54f/0x12e0 [ 190.029154][ T6895] ? copyin+0x70/0x90 [ 190.033218][ T6895] ? copyout_mc+0x70/0x70 [ 190.037683][ T6895] ? copyout_mc+0x70/0x70 [ 190.042061][ T6895] ? __virt_addr_valid+0x18c/0x540 [ 190.047224][ T6895] ? __virt_addr_valid+0x469/0x540 [ 190.052387][ T6895] ? page_copy_sane+0x4e/0x270 [ 190.057211][ T6895] copy_page_from_iter+0x7b/0x100 [ 190.062307][ T6895] skb_copy_datagram_from_iter+0x2e4/0x6e0 [ 190.068182][ T6895] packet_sendmsg+0x3566/0x4d70 [ 190.073113][ T6895] ? verify_lock_unused+0x140/0x140 [ 190.078361][ T6895] ? mark_lock+0x94/0x320 [ 190.082733][ T6895] ? __lock_acquire+0x1273/0x7d40 [ 190.087838][ T6895] ? verify_lock_unused+0x140/0x140 [ 190.093086][ T6895] ? aa_sk_perm+0x83c/0x970 [ 190.097655][ T6895] ? packet_getsockopt+0xad0/0xad0 [ 190.102866][ T6895] ? aa_sock_msg_perm+0x94/0x150 [ 190.107848][ T6895] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 190.113188][ T6895] ? security_socket_sendmsg+0x80/0xa0 [ 190.118687][ T6895] ? packet_getsockopt+0xad0/0xad0 [ 190.123856][ T6895] ____sys_sendmsg+0x5ba/0x960 [ 190.128661][ T6895] ? __lock_acquire+0x7d40/0x7d40 [ 190.133732][ T6895] ? __asan_memset+0x22/0x40 [ 190.138456][ T6895] ? __sys_sendmsg_sock+0x30/0x30 [ 190.143522][ T6895] ? __import_iovec+0x3fa/0x850 [ 190.148428][ T6895] ? import_iovec+0x73/0xa0 [ 190.152987][ T6895] ___sys_sendmsg+0x2a6/0x360 [ 190.157780][ T6895] ? get_pid_task+0x20/0x1e0 [ 190.162400][ T6895] ? __sys_sendmsg+0x2a0/0x2a0 [ 190.167205][ T6895] ? __lock_acquire+0x7d40/0x7d40 [ 190.172278][ T6895] __se_sys_sendmsg+0x1c2/0x2b0 [ 190.177151][ T6895] ? __x64_sys_sendmsg+0x80/0x80 [ 190.182119][ T6895] ? lockdep_hardirqs_on+0x98/0x150 [ 190.187363][ T6895] do_syscall_64+0x55/0xa0 [ 190.191803][ T6895] ? clear_bhb_loop+0x40/0x90 [ 190.196487][ T6895] ? clear_bhb_loop+0x40/0x90 [ 190.201175][ T6895] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 190.207081][ T6895] RIP: 0033:0x7fd32459c799 [ 190.211515][ T6895] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 190.231495][ T6895] RSP: 002b:00007fd3254bc028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 190.239925][ T6895] RAX: ffffffffffffffda RBX: 00007fd324815fa0 RCX: 00007fd32459c799 [ 190.247909][ T6895] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000003 [ 190.255887][ T6895] RBP: 00007fd3254bc090 R08: 0000000000000000 R09: 0000000000000000 [ 190.263866][ T6895] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 190.271853][ T6895] R13: 00007fd324816038 R14: 00007fd324815fa0 R15: 00007ffe70e7deb8 [ 190.279937][ T6895] [ 194.534380][ T1289] ieee802154 phy0 wpan0: encryption failed: -22 [ 194.540956][ T1289] ieee802154 phy1 wpan1: encryption failed: -22 [ 195.222424][ T6983] FAULT_INJECTION: forcing a failure. [ 195.222424][ T6983] name failslab, interval 1, probability 0, space 0, times 0 [ 195.236905][ T6983] CPU: 0 PID: 6983 Comm: syz.0.378 Not tainted syzkaller #0 [ 195.244240][ T6983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 195.254335][ T6983] Call Trace: [ 195.257645][ T6983] [ 195.260604][ T6983] dump_stack_lvl+0x18c/0x250 [ 195.265332][ T6983] ? show_regs_print_info+0x20/0x20 [ 195.270663][ T6983] ? load_image+0x400/0x400 [ 195.275211][ T6983] ? __might_sleep+0xe0/0xe0 [ 195.280024][ T6983] ? __lock_acquire+0x7d40/0x7d40 [ 195.285090][ T6983] should_fail_ex+0x39d/0x4d0 [ 195.289817][ T6983] should_failslab+0x9/0x20 [ 195.294368][ T6983] slab_pre_alloc_hook+0x59/0x310 [ 195.299439][ T6983] ? process_preds+0x47b/0x4b60 [ 195.304325][ T6983] ? process_preds+0x47b/0x4b60 [ 195.309221][ T6983] __kmem_cache_alloc_node+0x53/0x250 [ 195.314742][ T6983] ? process_preds+0x47b/0x4b60 [ 195.319675][ T6983] __kmalloc+0xa4/0x230 [ 195.323887][ T6983] process_preds+0x47b/0x4b60 [ 195.328619][ T6983] ? kasan_set_track+0x4e/0x70 [ 195.333423][ T6983] ? __kasan_kmalloc+0x8f/0xa0 [ 195.338404][ T6983] ? ftrace_profile_set_filter+0x10e/0x200 [ 195.344247][ T6983] ? perf_ioctl+0xa9a/0x24a0 [ 195.348920][ T6983] ? create_filter_start+0x1e0/0x1e0 [ 195.354305][ T6983] ftrace_profile_set_filter+0x156/0x200 [ 195.360002][ T6983] perf_ioctl+0xa9a/0x24a0 [ 195.364480][ T6983] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 195.370022][ T6983] ? perf_poll+0x1b0/0x1b0 [ 195.374536][ T6983] ? __fget_files+0x28/0x4b0 [ 195.379167][ T6983] ? __fget_files+0x28/0x4b0 [ 195.383818][ T6983] ? bpf_lsm_file_ioctl+0x9/0x10 [ 195.390289][ T6983] ? security_file_ioctl+0x80/0xa0 [ 195.395465][ T6983] ? perf_poll+0x1b0/0x1b0 [ 195.399944][ T6983] __se_sys_ioctl+0xfd/0x170 [ 195.404587][ T6983] do_syscall_64+0x55/0xa0 [ 195.409065][ T6983] ? clear_bhb_loop+0x40/0x90 [ 195.413803][ T6983] ? clear_bhb_loop+0x40/0x90 [ 195.418616][ T6983] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 195.424641][ T6983] RIP: 0033:0x7fd32459c799 [ 195.429100][ T6983] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 195.448845][ T6983] RSP: 002b:00007fd3254bc028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 195.457397][ T6983] RAX: ffffffffffffffda RBX: 00007fd324815fa0 RCX: 00007fd32459c799 [ 195.465412][ T6983] RDX: 0000200000000000 RSI: 0000000040082406 RDI: 0000000000000003 [ 195.473421][ T6983] RBP: 00007fd3254bc090 R08: 0000000000000000 R09: 0000000000000000 [ 195.481505][ T6983] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 195.489763][ T6983] R13: 00007fd324816038 R14: 00007fd324815fa0 R15: 00007ffe70e7deb8 [ 195.497788][ T6983] [ 198.619593][ T7041] netdevsim netdevsim1 ªªªªªª: renamed from netdevsim0 (while UP) [ 200.559496][ T7081] FAULT_INJECTION: forcing a failure. [ 200.559496][ T7081] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 200.667737][ T7081] CPU: 0 PID: 7081 Comm: syz.1.413 Not tainted syzkaller #0 [ 200.675116][ T7081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 200.685203][ T7081] Call Trace: [ 200.688501][ T7081] [ 200.691444][ T7081] dump_stack_lvl+0x18c/0x250 [ 200.696145][ T7081] ? show_regs_print_info+0x20/0x20 [ 200.701363][ T7081] ? load_image+0x400/0x400 [ 200.705881][ T7081] ? __might_fault+0xaa/0x120 [ 200.710572][ T7081] ? __lock_acquire+0x7d40/0x7d40 [ 200.715606][ T7081] ? unix_ioctl+0x261/0x670 [ 200.720145][ T7081] should_fail_ex+0x39d/0x4d0 [ 200.724842][ T7081] _copy_from_user+0x2f/0xe0 [ 200.729449][ T7081] sock_do_ioctl+0x190/0x310 [ 200.734080][ T7081] ? sock_show_fdinfo+0xb0/0xb0 [ 200.738979][ T7081] sock_ioctl+0x5ba/0x7e0 [ 200.743336][ T7081] ? sock_poll+0x3e0/0x3e0 [ 200.747783][ T7081] ? bpf_lsm_file_ioctl+0x9/0x10 [ 200.752735][ T7081] ? security_file_ioctl+0x80/0xa0 [ 200.757867][ T7081] ? sock_poll+0x3e0/0x3e0 [ 200.762298][ T7081] __se_sys_ioctl+0xfd/0x170 [ 200.766905][ T7081] do_syscall_64+0x55/0xa0 [ 200.771339][ T7081] ? clear_bhb_loop+0x40/0x90 [ 200.776030][ T7081] ? clear_bhb_loop+0x40/0x90 [ 200.780742][ T7081] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 200.786646][ T7081] RIP: 0033:0x7f8b7d19c799 [ 200.791073][ T7081] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 200.810780][ T7081] RSP: 002b:00007f8b7e089028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 200.819202][ T7081] RAX: ffffffffffffffda RBX: 00007f8b7d415fa0 RCX: 00007f8b7d19c799 [ 200.827181][ T7081] RDX: 0000200000000000 RSI: 0000000000008949 RDI: 0000000000000004 [ 200.835170][ T7081] RBP: 00007f8b7e089090 R08: 0000000000000000 R09: 0000000000000000 [ 200.843154][ T7081] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 200.851219][ T7081] R13: 00007f8b7d416038 R14: 00007f8b7d415fa0 R15: 00007ffd3961ba08 [ 200.859213][ T7081] [ 201.749339][ T51] Bluetooth: hci2: command 0x0406 tx timeout [ 201.749400][ T5781] Bluetooth: hci0: command 0x0406 tx timeout [ 201.756410][ T51] Bluetooth: hci1: command 0x0406 tx timeout [ 201.761885][ T5781] Bluetooth: hci3: command 0x0406 tx timeout [ 202.199577][ T7103] netlink: 'syz.2.420': attribute type 1 has an invalid length. [ 202.280829][ T7103] netlink: 161700 bytes leftover after parsing attributes in process `syz.2.420'. [ 204.618974][ T7125] syzkaller0: entered promiscuous mode [ 204.624507][ T7125] syzkaller0: entered allmulticast mode [ 215.025977][ T7231] syzkaller0: entered promiscuous mode [ 215.041777][ T7231] syzkaller0: entered allmulticast mode [ 215.240015][ T7240] netlink: 1 bytes leftover after parsing attributes in process `syz.1.461'. [ 217.192481][ T7260] netlink: 'syz.3.465': attribute type 10 has an invalid length. [ 218.384416][ T7260] bond0: (slave bond_slave_0): Releasing backup interface [ 218.417738][ T7260] syz.3.465 (7260) used greatest stack depth: 19176 bytes left [ 218.801694][ T7284] syzkaller0: entered promiscuous mode [ 218.818921][ T7284] syzkaller0: entered allmulticast mode [ 222.042090][ T7317] netlink: 'syz.1.480': attribute type 10 has an invalid length. [ 222.150357][ T7317] bond0: (slave bond_slave_0): Releasing backup interface [ 223.660597][ T7353] FAULT_INJECTION: forcing a failure. [ 223.660597][ T7353] name failslab, interval 1, probability 0, space 0, times 0 [ 223.673331][ T7353] CPU: 1 PID: 7353 Comm: syz.2.497 Not tainted syzkaller #0 [ 223.680663][ T7353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 223.690756][ T7353] Call Trace: [ 223.694073][ T7353] [ 223.697146][ T7353] dump_stack_lvl+0x18c/0x250 [ 223.701963][ T7353] ? show_regs_print_info+0x20/0x20 [ 223.707400][ T7353] ? load_image+0x400/0x400 [ 223.711962][ T7353] ? netdev_core_pick_tx+0x340/0x340 [ 223.717324][ T7353] should_fail_ex+0x39d/0x4d0 [ 223.722241][ T7353] should_failslab+0x9/0x20 [ 223.726796][ T7353] slab_pre_alloc_hook+0x59/0x310 [ 223.731976][ T7353] kmem_cache_alloc+0x5a/0x2d0 [ 223.736791][ T7353] ? skb_clone+0x1eb/0x370 [ 223.741249][ T7353] skb_clone+0x1eb/0x370 [ 223.745536][ T7353] bpf_clone_redirect+0x167/0x4a0 [ 223.750626][ T7353] bpf_prog_6893982b85ceadf7+0x5e/0x63 [ 223.756130][ T7353] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 223.762171][ T7353] ? lock_chain_count+0x20/0x20 [ 223.767223][ T7353] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 223.773311][ T7353] ? lockdep_softirqs_on+0x580/0x580 [ 223.778613][ T7353] ? lock_chain_count+0x20/0x20 [ 223.783471][ T7353] ? seqcount_lockdep_reader_access+0x191/0x1d0 [ 223.789727][ T7353] ? __local_bh_disable_ip+0x108/0x1a0 [ 223.795200][ T7353] ? __cant_sleep+0x220/0x220 [ 223.799887][ T7353] ? __local_bh_enable_ip+0x13a/0x1c0 [ 223.805285][ T7353] ? _local_bh_enable+0xa0/0xa0 [ 223.810162][ T7353] ? bpf_test_timer_continue+0x135/0x380 [ 223.815824][ T7353] ? bpf_test_run+0x174/0x870 [ 223.820539][ T7353] bpf_test_run+0x2df/0x870 [ 223.825073][ T7353] ? bpf_test_run+0x174/0x870 [ 223.829771][ T7353] ? convert___skb_to_skb+0x590/0x590 [ 223.835183][ T7353] ? eth_get_headlen+0x210/0x210 [ 223.840143][ T7353] ? slab_build_skb+0x25f/0x3f0 [ 223.845014][ T7353] ? convert___skb_to_skb+0x3d/0x590 [ 223.850320][ T7353] bpf_prog_test_run_skb+0xad2/0x12b0 [ 223.855718][ T7353] ? cpu_online+0x60/0x60 [ 223.860156][ T7353] bpf_prog_test_run+0x321/0x390 [ 223.865220][ T7353] __sys_bpf+0x49d/0x890 [ 223.869509][ T7353] ? bpf_link_show_fdinfo+0x390/0x390 [ 223.874926][ T7353] ? lock_chain_count+0x20/0x20 [ 223.879813][ T7353] __x64_sys_bpf+0x7c/0x90 [ 223.884242][ T7353] do_syscall_64+0x55/0xa0 [ 223.888852][ T7353] ? clear_bhb_loop+0x40/0x90 [ 223.893629][ T7353] ? clear_bhb_loop+0x40/0x90 [ 223.898325][ T7353] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 223.904238][ T7353] RIP: 0033:0x7f74ac79c799 [ 223.908666][ T7353] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 223.928468][ T7353] RSP: 002b:00007f74ad5e1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 223.936985][ T7353] RAX: ffffffffffffffda RBX: 00007f74aca15fa0 RCX: 00007f74ac79c799 [ 223.944972][ T7353] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 223.952955][ T7353] RBP: 00007f74ad5e1090 R08: 0000000000000000 R09: 0000000000000000 [ 223.961029][ T7353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 223.969025][ T7353] R13: 00007f74aca16038 R14: 00007f74aca15fa0 R15: 00007ffd7ec5b8c8 [ 223.977033][ T7353] [ 225.636538][ T7394] netlink: 'syz.0.508': attribute type 39 has an invalid length. [ 226.373769][ T7401] netlink: 60931 bytes leftover after parsing attributes in process `syz.2.509'. [ 231.348151][ T7439] syz.2.519[7439] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.348299][ T7439] syz.2.519[7439] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.939079][ T7558] netlink: 132 bytes leftover after parsing attributes in process `syz.3.555'. [ 243.133524][ T7575] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 243.144425][ T7575] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 243.156066][ T7575] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 243.165284][ T7575] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 247.806319][ T7645] bridge_slave_1: left allmulticast mode [ 248.011704][ T7645] bridge_slave_1: left promiscuous mode [ 248.268489][ T7645] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.682130][ T7645] bridge_slave_0: left allmulticast mode [ 248.716695][ T7645] bridge_slave_0: left promiscuous mode [ 248.742999][ T7645] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.499276][ T7663] lo: entered allmulticast mode [ 249.677825][ T7666] lo: entered promiscuous mode [ 249.691340][ T7666] lo: left allmulticast mode [ 249.972824][ T7679] netlink: 'syz.0.592': attribute type 10 has an invalid length. [ 250.022382][ T7679] netlink: 3819 bytes leftover after parsing attributes in process `syz.0.592'. [ 250.163676][ T7677] netlink: 'syz.3.593': attribute type 10 has an invalid length. [ 252.627311][ T7712] ================================================================== [ 252.635442][ T7712] BUG: KASAN: slab-out-of-bounds in __bpf_get_stackid+0x6bf/0x900 [ 252.643288][ T7712] Write of size 72 at addr ffff8880605cf890 by task syz.0.600/7712 [ 252.651290][ T7712] [ 252.653634][ T7712] CPU: 1 PID: 7712 Comm: syz.0.600 Not tainted syzkaller #0 [ 252.660943][ T7712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 252.671026][ T7712] Call Trace: [ 252.674338][ T7712] [ 252.677285][ T7712] dump_stack_lvl+0x18c/0x250 [ 252.681998][ T7712] ? __lock_acquire+0x7d40/0x7d40 [ 252.687261][ T7712] ? show_regs_print_info+0x20/0x20 [ 252.692492][ T7712] ? load_image+0x400/0x400 [ 252.697038][ T7712] ? _raw_spin_lock_irqsave+0xc0/0x100 [ 252.702532][ T7712] ? __virt_addr_valid+0x18c/0x540 [ 252.707668][ T7712] ? __virt_addr_valid+0x469/0x540 [ 252.712807][ T7712] print_report+0xa8/0x210 [ 252.717256][ T7712] ? __bpf_get_stackid+0x6bf/0x900 [ 252.722401][ T7712] kasan_report+0x117/0x150 [ 252.726931][ T7712] ? __bpf_get_stackid+0x6bf/0x900 [ 252.732074][ T7712] kasan_check_range+0x241/0x290 [ 252.737033][ T7712] ? __bpf_get_stackid+0x6bf/0x900 [ 252.742168][ T7712] __asan_memcpy+0x40/0x70 [ 252.746615][ T7712] __bpf_get_stackid+0x6bf/0x900 [ 252.751582][ T7712] bpf_get_stackid_pe+0x343/0x410 [ 252.756639][ T7712] bpf_prog_a448e89f4c9ad9d1+0x30/0x4a [ 252.762119][ T7712] bpf_overflow_handler+0x1fc/0x510 [ 252.767344][ T7712] ? bpf_overflow_handler+0xde/0x510 [ 252.772658][ T7712] ? tp_perf_event_destroy+0x20/0x20 [ 252.777965][ T7712] ? perf_trace_preemptirq_template+0x144/0x330 [ 252.784245][ T7712] ? __perf_event_account_interrupt+0x187/0x280 [ 252.790521][ T7712] __perf_event_overflow+0x447/0x630 [ 252.796093][ T7712] perf_swevent_event+0x319/0x570 [ 252.801176][ T7712] ? perf_tp_event+0x1520/0x1520 [ 252.806147][ T7712] ___perf_sw_event+0x4a7/0x730 [ 252.811121][ T7712] ? ___perf_sw_event+0x199/0x730 [ 252.816176][ T7712] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 252.822627][ T7712] ? __lock_acquire+0x1347/0x7d40 [ 252.827680][ T7712] ? rep_movs_alternative+0x4a/0x90 [ 252.832910][ T7712] ? verify_lock_unused+0x140/0x140 [ 252.838136][ T7712] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 252.844145][ T7712] ? lock_chain_count+0x20/0x20 [ 252.849019][ T7712] __perf_sw_event+0x139/0x270 [ 252.853812][ T7712] do_user_addr_fault+0x123e/0x12c0 [ 252.859124][ T7712] ? rcu_is_watching+0x15/0xb0 [ 252.863913][ T7712] exc_page_fault+0x64/0x100 [ 252.868544][ T7712] asm_exc_page_fault+0x26/0x30 [ 252.873414][ T7712] RIP: 0010:rep_movs_alternative+0x4a/0x90 [ 252.879257][ T7712] Code: 75 f1 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 df 83 f9 08 73 e8 eb c9 a4 c3 48 8b 06 48 89 07 48 8d 47 08 48 83 e0 f8 48 29 f8 48 01 [ 252.898972][ T7712] RSP: 0018:ffffc9000376fb90 EFLAGS: 00050206 [ 252.905150][ T7712] RAX: ffffffff842a1401 RBX: 0000000000000340 RCX: 0000000000000200 [ 252.913146][ T7712] RDX: 0000000000000001 RSI: 0000200000002000 RDI: ffff888030096140 [ 252.921144][ T7712] RBP: ffffc9000376fd38 R08: ffff88803009633f R09: 1ffff11006012c67 [ 252.929225][ T7712] R10: dffffc0000000000 R11: ffffed1006012c68 R12: 0000200000002200 [ 252.937226][ T7712] R13: 0000000000000340 R14: ffff888030096000 R15: 0000200000001ec0 [ 252.945246][ T7712] ? _copy_from_user+0x11/0xe0 [ 252.950042][ T7712] _copy_from_user+0x8b/0xe0 [ 252.954660][ T7712] bpf_prog_test_run_xdp+0xd77/0x10e0 [ 252.960187][ T7712] ? dev_put+0x80/0x80 [ 252.964377][ T7712] ? dev_put+0x80/0x80 [ 252.968469][ T7712] bpf_prog_test_run+0x321/0x390 [ 252.973432][ T7712] __sys_bpf+0x49d/0x890 [ 252.977697][ T7712] ? bpf_link_show_fdinfo+0x390/0x390 [ 252.983100][ T7712] ? lock_chain_count+0x20/0x20 [ 252.987998][ T7712] __x64_sys_bpf+0x7c/0x90 [ 252.992614][ T7712] do_syscall_64+0x55/0xa0 [ 252.997061][ T7712] ? clear_bhb_loop+0x40/0x90 [ 253.001761][ T7712] ? clear_bhb_loop+0x40/0x90 [ 253.006472][ T7712] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 253.012392][ T7712] RIP: 0033:0x7fd32459c799 [ 253.016832][ T7712] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 253.036636][ T7712] RSP: 002b:00007fd3254bc028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 253.045160][ T7712] RAX: ffffffffffffffda RBX: 00007fd324815fa0 RCX: 00007fd32459c799 [ 253.053173][ T7712] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 253.061177][ T7712] RBP: 00007fd324632c99 R08: 0000000000000000 R09: 0000000000000000 [ 253.069181][ T7712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 253.077260][ T7712] R13: 00007fd324816038 R14: 00007fd324815fa0 R15: 00007ffe70e7deb8 [ 253.085369][ T7712] [ 253.088411][ T7712] [ 253.090748][ T7712] Allocated by task 7712: [ 253.095088][ T7712] kasan_set_track+0x4e/0x70 [ 253.099966][ T7712] __kasan_kmalloc+0x8f/0xa0 [ 253.104589][ T7712] __kmalloc_node+0xb4/0x230 [ 253.109206][ T7712] bpf_map_area_alloc+0x5e/0x110 [ 253.114170][ T7712] prealloc_elems_and_freelist+0x86/0x1c0 [ 253.119916][ T7712] stack_map_alloc+0x33a/0x4c0 [ 253.124705][ T7712] map_create+0x877/0x12f0 [ 253.129141][ T7712] __sys_bpf+0x651/0x890 [ 253.133404][ T7712] __x64_sys_bpf+0x7c/0x90 [ 253.137835][ T7712] do_syscall_64+0x55/0xa0 [ 253.142279][ T7712] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 253.148282][ T7712] [ 253.150623][ T7712] The buggy address belongs to the object at ffff8880605cf880 [ 253.150623][ T7712] which belongs to the cache kmalloc-cg-64 of size 64 [ 253.164784][ T7712] The buggy address is located 16 bytes inside of [ 253.164784][ T7712] allocated 40-byte region [ffff8880605cf880, ffff8880605cf8a8) [ 253.178770][ T7712] [ 253.181108][ T7712] The buggy address belongs to the physical page: [ 253.187615][ T7712] page:ffffea00018173c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff8880605cf080 pfn:0x605cf [ 253.199090][ T7712] memcg:ffff88802647ca01 [ 253.203345][ T7712] flags: 0xfff00000000800(slab|node=0|zone=1|lastcpupid=0x7ff) [ 253.210907][ T7712] page_type: 0xffffffff() [ 253.215261][ T7712] raw: 00fff00000000800 ffff888017c4da00 ffffea0000932f40 0000000000000002 [ 253.223865][ T7712] raw: ffff8880605cf080 000000008020001f 00000001ffffffff ffff88802647ca01 [ 253.232457][ T7712] page dumped because: kasan: bad access detected [ 253.238883][ T7712] page_owner tracks the page as allocated [ 253.244623][ T7712] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 5769, tgid 5769 (syz-executor), ts 77248991307, free_ts 77234175852 [ 253.262965][ T7712] post_alloc_hook+0x1c1/0x200 [ 253.267773][ T7712] get_page_from_freelist+0x1951/0x19e0 [ 253.273340][ T7712] __alloc_pages+0x1f0/0x460 [ 253.277950][ T7712] alloc_slab_page+0x5d/0x160 [ 253.282653][ T7712] new_slab+0x87/0x2d0 [ 253.286746][ T7712] ___slab_alloc+0xc5d/0x12f0 [ 253.291446][ T7712] __kmem_cache_alloc_node+0x19e/0x250 [ 253.296931][ T7712] __kmalloc_node+0xa4/0x230 [ 253.301605][ T7712] kvmalloc_node+0x70/0x180 [ 253.306132][ T7712] nf_hook_entries_grow+0x27d/0x6d0 [ 253.311354][ T7712] __nf_register_net_hook+0x2c9/0x910 [ 253.316745][ T7712] nf_register_net_hook+0xb2/0x190 [ 253.321878][ T7712] nf_register_net_hooks+0x44/0x1b0 [ 253.327102][ T7712] brnf_device_event+0x132/0x1d0 [ 253.332060][ T7712] notifier_call_chain+0x197/0x380 [ 253.337195][ T7712] register_netdevice+0x16a5/0x1bb0 [ 253.342415][ T7712] page last free stack trace: [ 253.347097][ T7712] free_unref_page_prepare+0x7b2/0x8c0 [ 253.352583][ T7712] free_unref_page_list+0xbe/0x860 [ 253.357733][ T7712] release_pages+0x1f7a/0x2200 [ 253.362595][ T7712] tlb_flush_mmu+0x379/0x510 [ 253.367213][ T7712] tlb_finish_mmu+0xf9/0x220 [ 253.371829][ T7712] exit_mmap+0x428/0xb90 [ 253.376107][ T7712] __mmput+0x118/0x3c0 [ 253.380302][ T7712] exit_mm+0x1f2/0x2c0 [ 253.384488][ T7712] do_exit+0x8dd/0x2460 [ 253.388670][ T7712] do_group_exit+0x21b/0x2d0 [ 253.393288][ T7712] __x64_sys_exit_group+0x3f/0x40 [ 253.398336][ T7712] do_syscall_64+0x55/0xa0 [ 253.402875][ T7712] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 253.408878][ T7712] [ 253.411213][ T7712] Memory state around the buggy address: [ 253.416853][ T7712] ffff8880605cf780: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc [ 253.424938][ T7712] ffff8880605cf800: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc [ 253.433127][ T7712] >ffff8880605cf880: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 253.441298][ T7712] ^ [ 253.446692][ T7712] ffff8880605cf900: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 253.454782][ T7712] ffff8880605cf980: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc [ 253.462854][ T7712] ================================================================== [ 253.471050][ T7712] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 253.478258][ T7712] CPU: 1 PID: 7712 Comm: syz.0.600 Not tainted syzkaller #0 [ 253.485559][ T7712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 253.495636][ T7712] Call Trace: [ 253.498935][ T7712] [ 253.501884][ T7712] dump_stack_lvl+0x18c/0x250 [ 253.506689][ T7712] ? show_regs_print_info+0x20/0x20 [ 253.512095][ T7712] ? load_image+0x400/0x400 [ 253.516660][ T7712] panic+0x2dc/0x730 [ 253.520599][ T7712] ? __lock_acquire+0x7d40/0x7d40 [ 253.525668][ T7712] ? bpf_jit_dump+0xd0/0xd0 [ 253.530215][ T7712] ? _raw_spin_unlock_irqrestore+0xc5/0x120 [ 253.536163][ T7712] ? _raw_spin_unlock+0x40/0x40 [ 253.541044][ T7712] ? __bpf_get_stackid+0x6bf/0x900 [ 253.546184][ T7712] check_panic_on_warn+0x84/0xa0 [ 253.551247][ T7712] ? __bpf_get_stackid+0x6bf/0x900 [ 253.556498][ T7712] end_report+0x6f/0x130 [ 253.560787][ T7712] kasan_report+0x128/0x150 [ 253.565338][ T7712] ? __bpf_get_stackid+0x6bf/0x900 [ 253.570488][ T7712] kasan_check_range+0x241/0x290 [ 253.575462][ T7712] ? __bpf_get_stackid+0x6bf/0x900 [ 253.580696][ T7712] __asan_memcpy+0x40/0x70 [ 253.585142][ T7712] __bpf_get_stackid+0x6bf/0x900 [ 253.590110][ T7712] bpf_get_stackid_pe+0x343/0x410 [ 253.595166][ T7712] bpf_prog_a448e89f4c9ad9d1+0x30/0x4a [ 253.600645][ T7712] bpf_overflow_handler+0x1fc/0x510 [ 253.605873][ T7712] ? bpf_overflow_handler+0xde/0x510 [ 253.611199][ T7712] ? tp_perf_event_destroy+0x20/0x20 [ 253.616509][ T7712] ? perf_trace_preemptirq_template+0x144/0x330 [ 253.622782][ T7712] ? __perf_event_account_interrupt+0x187/0x280 [ 253.629054][ T7712] __perf_event_overflow+0x447/0x630 [ 253.634365][ T7712] perf_swevent_event+0x319/0x570 [ 253.639421][ T7712] ? perf_tp_event+0x1520/0x1520 [ 253.644389][ T7712] ___perf_sw_event+0x4a7/0x730 [ 253.649261][ T7712] ? ___perf_sw_event+0x199/0x730 [ 253.654305][ T7712] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 253.660745][ T7712] ? __lock_acquire+0x1347/0x7d40 [ 253.665796][ T7712] ? rep_movs_alternative+0x4a/0x90 [ 253.671026][ T7712] ? verify_lock_unused+0x140/0x140 [ 253.676261][ T7712] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 253.682267][ T7712] ? lock_chain_count+0x20/0x20 [ 253.687146][ T7712] __perf_sw_event+0x139/0x270 [ 253.691939][ T7712] do_user_addr_fault+0x123e/0x12c0 [ 253.697172][ T7712] ? rcu_is_watching+0x15/0xb0 [ 253.701961][ T7712] exc_page_fault+0x64/0x100 [ 253.706581][ T7712] asm_exc_page_fault+0x26/0x30 [ 253.711460][ T7712] RIP: 0010:rep_movs_alternative+0x4a/0x90 [ 253.717287][ T7712] Code: 75 f1 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 df 83 f9 08 73 e8 eb c9 a4 c3 48 8b 06 48 89 07 48 8d 47 08 48 83 e0 f8 48 29 f8 48 01 [ 253.737105][ T7712] RSP: 0018:ffffc9000376fb90 EFLAGS: 00050206 [ 253.743375][ T7712] RAX: ffffffff842a1401 RBX: 0000000000000340 RCX: 0000000000000200 [ 253.751463][ T7712] RDX: 0000000000000001 RSI: 0000200000002000 RDI: ffff888030096140 [ 253.759458][ T7712] RBP: ffffc9000376fd38 R08: ffff88803009633f R09: 1ffff11006012c67 [ 253.767534][ T7712] R10: dffffc0000000000 R11: ffffed1006012c68 R12: 0000200000002200 [ 253.775527][ T7712] R13: 0000000000000340 R14: ffff888030096000 R15: 0000200000001ec0 [ 253.783529][ T7712] ? _copy_from_user+0x11/0xe0 [ 253.788337][ T7712] _copy_from_user+0x8b/0xe0 [ 253.793045][ T7712] bpf_prog_test_run_xdp+0xd77/0x10e0 [ 253.798472][ T7712] ? dev_put+0x80/0x80 [ 253.802692][ T7712] ? dev_put+0x80/0x80 [ 253.806785][ T7712] bpf_prog_test_run+0x321/0x390 [ 253.811749][ T7712] __sys_bpf+0x49d/0x890 [ 253.816161][ T7712] ? bpf_link_show_fdinfo+0x390/0x390 [ 253.821584][ T7712] ? lock_chain_count+0x20/0x20 [ 253.826497][ T7712] __x64_sys_bpf+0x7c/0x90 [ 253.830942][ T7712] do_syscall_64+0x55/0xa0 [ 253.835395][ T7712] ? clear_bhb_loop+0x40/0x90 [ 253.840102][ T7712] ? clear_bhb_loop+0x40/0x90 [ 253.844799][ T7712] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 253.850718][ T7712] RIP: 0033:0x7fd32459c799 [ 253.855332][ T7712] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 253.875048][ T7712] RSP: 002b:00007fd3254bc028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 253.883507][ T7712] RAX: ffffffffffffffda RBX: 00007fd324815fa0 RCX: 00007fd32459c799 [ 253.891508][ T7712] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 253.899678][ T7712] RBP: 00007fd324632c99 R08: 0000000000000000 R09: 0000000000000000 [ 253.907671][ T7712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 253.915748][ T7712] R13: 00007fd324816038 R14: 00007fd324815fa0 R15: 00007ffe70e7deb8 [ 253.923755][ T7712] [ 253.927386][ T7712] Kernel Offset: disabled [ 253.931706][ T7712] Rebooting in 86400 seconds..