last executing test programs: 54m53.704104841s ago: executing program 2 (id=262): openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair(0x1d, 0x2, 0x7, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0x0, 0x0, 0x0, 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) socketpair(0x3, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00', 0x10}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff7ffc}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe5d334e042b4ac0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x20}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a2, &(0x7f0000000080)) 54m50.826444512s ago: executing program 2 (id=267): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x4, &(0x7f0000000580)=ANY=[@ANYBLOB="18010000000000000000000000000000850000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) 54m50.704836462s ago: executing program 2 (id=268): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x94) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) close(r1) close(0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) recvmsg$unix(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000006c0)=""/179, 0x33fe0}], 0x1}, 0x0) write$cgroup_int(r1, 0x0, 0x0) 54m42.855164185s ago: executing program 2 (id=298): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2e}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond0\x00', 0x800}) socketpair(0x1, 0x803, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89fb, &(0x7f0000000080)) 54m42.658907968s ago: executing program 2 (id=301): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x404, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000fc0)={&(0x7f0000001340)=@hci={0x1f, 0x200, 0x31}, 0x80}, 0x0) 54m42.508183033s ago: executing program 0 (id=303): r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000280)=@caif=@dgm={0x25, 0x9, 0x9}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000680)="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", 0x148}, {&(0x7f0000000c00)="294f28dfe56d2c8ba23606bc7ecd1f634665cb5bed07bac5684da6eb21da1d6926910c5a0c653b0106869a804dd2a44ce42557b2e32e2bd367e9d01a5e7380cc4fc8e7c9044cc4115b978ca7427d749beaefdf2e48b369cb169ad7b1ced26bb161297c7e56a3e83e91b379c179017f8b4657d1b22eca6bca33036d33e1a684059c53cea91ca6637ac780ab2bcfc22a666cd4e5876f11e9aee4724b7cb59731c97e70ebd7f7483994eb07de2f3c6a9448c3206cff6d290b433f331c2399e99ee3bdecf5689eddc3e549966c1106a933bbc47b65ca6e9d7efbee6e3b1dbe87313111e85336d6890002db17751b6044f964dc90ea466f9085", 0xf7}], 0x2}, 0x4008001) 54m42.433334186s ago: executing program 2 (id=306): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x94) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) close(r1) close(0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(0x3) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) recvmsg$unix(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000006c0)=""/179, 0x33fe0}], 0x1}, 0x0) write$cgroup_int(r1, 0x0, 0x0) 54m42.362114217s ago: executing program 0 (id=307): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000000000000000850000007d00000095"], 0x0, 0x0, 0x23}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000180)=r3) write$cgroup_devices(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 54m34.365324045s ago: executing program 0 (id=331): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0e000000040000000800000007"], 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x80000000, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000000c0)={r1}, 0xc) 54m34.160371529s ago: executing program 0 (id=335): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x0, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x36, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macvlan1\x00', 0x4000}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89b0, 0x0) 54m34.056587807s ago: executing program 0 (id=337): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x404, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000fc0)={&(0x7f0000001340)=@hci={0x1f, 0x200, 0x31}, 0x80, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 54m33.91511539s ago: executing program 0 (id=340): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000000000000000850000007d00000095"], 0x0, 0x0, 0x23}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000180)=r3) write$cgroup_devices(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 54m27.390889991s ago: executing program 32 (id=306): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x94) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) close(r1) close(0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(0x3) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) recvmsg$unix(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000006c0)=""/179, 0x33fe0}], 0x1}, 0x0) write$cgroup_int(r1, 0x0, 0x0) 54m18.839401502s ago: executing program 33 (id=340): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000000000000000850000007d00000095"], 0x0, 0x0, 0x23}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000180)=r3) write$cgroup_devices(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 53m52.678818596s ago: executing program 3 (id=411): r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000280)=@caif=@dgm={0x25, 0x9, 0x9}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000680)="62042700590200000000002f1eafbcf706e12b30087f5c582d26116642c47a5f8786ee601e65ab3c06d4b8bf4a81cb3e247345af215542f41ddf82f618438a34f90186cee8441e2305e495d04ad68ab8fef69d456fbb48b63f60c9c9097be968ea872c4801e5d0711b4373c7224ed7a9cbd49d40f82bdb6afc0036824be26fc96e49a70e90797e6caa1b38ddacb3cb2b3eac7c068a185b644582f25edfa3d6a46e2a894ca809a422a6a29bd7145bb6e7992570484dcb0b28356a710292ea0c3f97b7cbff701684b13c5593262534a7af9eab48f2ca2d74d9a4de33000000c3c0afa58c8ba7b0611c6f8dbb26d1cf4b054e57ec07fac560d6c6945355dd2aed617e6adfc2a90516a7fefd0ac29d321af6123cf53b2e9d912f662823dd2c15017e6921040ca2355b79fa6c39ebdee3bb0264ac5de34c547f2f24878a463cf3d17b80bd61f933f9db62b7323f00efec9eb460ca5997a2647dfb1c5d82db13df38b44da3a3496494459b5d58b2e5e63338b00f3d085bc20c86bdf99a2473efde74eb8ba488802db107df99d8e3eb37b2e6e598fc86099ab308cfaeb60c3f964537bd6c4602424de10540d023e8da1c2905", 0x1af}, {&(0x7f0000000c00)="294f28dfe56d2c8ba23606bc7ecd1f634665cb5bed07bac5684da6eb21da1d6926910c5a0c653b0106869a804dd2a44ce42557b2e32e2bd367e9d01a5e7380cc4fc8e7c9044cc4115b978ca7427d749beaefdf2e48b369cb169ad7b1ced26bb161297c7e56a3e83e91b379c179017f8b4657d1b22eca6bca33036d33e1a684059c53cea91ca6637ac780ab2bcfc22a666cd4e5876f11e9aee4724b7cb59731c97e70ebd7f7483994eb07de2f3c6a9448c3206cff6d290b433f331c2399e99ee3bdecf5689eddc3e549966c1106a933bbc47b65ca6e9d7efbee6e3b1dbe87313111e85336d6890002db17751b6044f964dc90ea466f9085", 0xf7}], 0x2}, 0x4008001) 53m49.952044792s ago: executing program 3 (id=412): openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair(0x1d, 0x2, 0x7, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0x0, 0x0, 0x0, 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) socketpair(0x3, 0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00', 0x10}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff7ffc}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe5d334e042b4ac0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x20}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a2, &(0x7f0000000080)) 53m49.676583569s ago: executing program 3 (id=415): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r0) r1 = socket$kcm(0xa, 0x1, 0x106) sendmsg$kcm(r1, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0xfffffffd, @empty}, 0x80, 0x0}, 0x20000001) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) 53m49.397705765s ago: executing program 3 (id=417): socket$kcm(0x10, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x640b9, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x8, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x8}, 0x4202, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0), 0xe8}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee68888a8", 0x0, 0xaded, 0x4000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 53m48.391165294s ago: executing program 3 (id=419): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) socket$kcm(0x10, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x640b9, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x8, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x8}, 0x4202, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0), 0xe8}, 0x0) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee68888a8", 0x0, 0xaded, 0x4000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 53m45.188617639s ago: executing program 3 (id=421): openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair(0x1d, 0x2, 0x7, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0x0, 0x0, 0x0, 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00', 0x10}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff7ffc}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe5d334e042b4ac0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x20}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a2, &(0x7f0000000080)) 53m29.57418562s ago: executing program 34 (id=421): openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair(0x1d, 0x2, 0x7, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0x0, 0x0, 0x0, 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00', 0x10}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff7ffc}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe5d334e042b4ac0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x20}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a2, &(0x7f0000000080)) 48m32.788424321s ago: executing program 6 (id=890): socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x640b9, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x8, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x8}, 0x4202, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0), 0xe8}, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x0, 0xe, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee68888a8", 0x0, 0xaded, 0x4000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 48m29.881454467s ago: executing program 6 (id=894): r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x19, 0x4, 0x4, 0x4, 0x0, 0x1, 0xfefffffe}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x10, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000010000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000000100850000008600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800002c0000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000}, 0x94) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000640)=ANY=[], 0x0, 0x2d, 0x0, 0x1, 0x7fffffff}, 0x28) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00'}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r6, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000004c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000500)=[0x0], 0x0, 0x0, 0xd4, 0x0, 0x0, 0x10, &(0x7f0000000840), 0x0, 0x0, 0xf3, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x4, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x3, 0x2, 0x4, 0x6, 0x7, 0x30, 0xc}]}, &(0x7f0000000100)='syzkaller\x00', 0x96, 0xb, &(0x7f0000000180)=""/11, 0x40f00, 0x4, '\x00', r7, 0x25, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0)={0x4, 0x6, 0x7a, 0x4}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000200)=[r4, r4], &(0x7f0000000280)=[{0x5, 0x4, 0xb}, {0x5, 0x5, 0xe}, {0x4, 0x5, 0xc, 0x9}, {0x0, 0x3, 0x10, 0x6}], 0x10, 0x8}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r3, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x5, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x2d, &(0x7f00000005c0)=[{}, {}], 0x10, 0x0, 0x0, &(0x7f0000000680), 0x8, 0xfa, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)={0x1b, 0x0, 0x0, 0x8, 0x0, r1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x50) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1, 0xfffffffc}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x14, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000100000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000000600000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bca2000000000000a6020000f8ffffffb703000018000000b70400000000000085"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r8}, &(0x7f0000000080), &(0x7f0000000280)=r9}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b80)={r3, 0x2000012, 0xe, 0x0, &(0x7f0000000000)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0xfffffffe, 0x0, 0xfffffdd2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x1a) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="2000000011008188040f80ec59acbc0413a181000d0000000f01000000000000", 0x20}], 0x1}, 0x0) 48m29.632844189s ago: executing program 6 (id=895): r0 = socket$kcm(0x2, 0x3, 0x84) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000181100002e9b72ffd1744eb82dbd2278bc9c6da2395c45258632cc9e1f674e295ce21fe42c82190203af7dab948b1f51661ad54c3b67540d7e210d40afe0894c637ddd99b668505d49d5", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe5}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000049c0)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000001140)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xfffffffffffffff8, 0x3}, 0x0, 0x0, 0x2, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(0x0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=ANY=[], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0xe, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000003000000b70400000000000085000000030000001800000000000000000000000000000095"], &(0x7f0000000200)='syzkaller\x00', 0xa}, 0x94) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x6) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x50, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000b40)) r6 = socket$kcm(0xa, 0x2, 0x73) sendmsg$inet(r6, &(0x7f0000001180)={&(0x7f0000000000)={0xa, 0x0, @multicast2}, 0x3c, &(0x7f0000001080)=[{&(0x7f0000000040)="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", 0x1000}, {&(0x7f0000001040)="9d7fcf3efc63f4a6a555ba8b4726d7ccaf8a207100e69cfac4377876021d7131b838029f96bd206d4776368ed2a92432e5af71", 0x33}], 0x2, &(0x7f00000010c0)=[@ip_tos_int={{0x14, 0x29, 0x34}}, @ip_tos_u8={{0x14, 0x29, 0x3e}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @remote}}}], 0x50}, 0xff00) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000100)="1f7a149fc15afde5b3403f50018bf3a8", 0xffeb}], 0x1}, 0x20040000) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x8000, 0x10000, 0x364, 0x5, 0x4, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair(0xa, 0x3, 0xff, &(0x7f0000000000)) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0xa, 0x9, 0x8, 0x2}, 0x48) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x3, 0x6, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r7, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xbffffffe, 0xe8030000, 0x0, 0x0, 0x0, 0x0}, 0x50) 48m26.153817721s ago: executing program 6 (id=899): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00"/14], 0x48) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x10, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000022bf000000000000ff7f000018110000"], &(0x7f0000000200)='syzkaller\x00', 0x8, 0xd4, &(0x7f0000000040)=""/212}, 0x94) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x4}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r0, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0], 0x0, 0xbd, &(0x7f0000000580)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000680), &(0x7f00000006c0), 0x8, 0x31, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$kcm(0x10, 0x400000002, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001100)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="33fe00006a"], 0xfe33) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x10000000, &(0x7f0000000780)="8b0773cda2f846a143357b193dceb6ec9c315bedd436e5cba50f4ffeebfcab792b324a9b9154eb394500e4ead1265ab777dbf909067a53b979c6ad6702fa6316573bfa6c387071147cd4401f1573f621980f98f972e92893f6", 0x59, &(0x7f0000000240), &(0x7f00000003c0), &(0x7f0000000a40)="2e395a3dfb67cf42f498e7138875d771f6c533a61e1648bba1652c13df3e57505c2c0cf3ca75f60742265de1a29275dc939efc6d5f697fc9562b24c381a9b179bb5bf8299f1fe02da503055b9e065760b4b93a633e5fc218c7d06d487508f2b5ed9494c68d9754ad07d852fe7b908025a5386304d8183ac19f28f0894cfe3aab9b662ae1ea519eaeb5e961f5336ed1f0aff91da8389ecc3d82") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYRESHEX, @ANYRES64=0x0, @ANYBLOB, @ANYBLOB="d62663962c9a4bd80f824cbc8ed83b5455e9cbed2b2c57588f09261710cc97fb9400fa0173f72345c328845f7d3fff344a2eb6d9bbeae19223f90c8db53aa01d50f433f6fec6af30"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000400850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r5, 0x5, 0xe, 0x0, &(0x7f00000003c0)="000000000000000000000001e370", 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x50) bpf$TOKEN_CREATE(0x24, &(0x7f0000000340)={0x0, r2}, 0x8) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x5, 0x400000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000180)="1c0000005e007f62516a071c02f8abc36f1d73dbe1ce84ebc7c4c1c9", 0x1c}], 0x1}, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x1c1341, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x64099, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7f, 0x2, @perf_bp={0x0, 0x9}, 0x0, 0x32, 0x43a1bd76, 0x6, 0x9, 0x2, 0x812, 0x0, 0x0, 0x0, 0x22009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848290000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x80) 48m22.467621407s ago: executing program 6 (id=902): r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) close(r2) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x24, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc012}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @jmp={0x5, 0x1, 0x6, 0x8, 0x5, 0xfffffffffffffffc, 0xfffffffffffffffc}, @generic={0x4, 0x6, 0x6, 0x7cc7, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @ldst={0x1, 0x3, 0x0, 0x4, 0x4, 0xfffffffffffffffc, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000440)='GPL\x00', 0xea, 0xb2, &(0x7f0000000640)=""/178, 0x40f00, 0x49, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000700)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0), &(0x7f0000000800)=[{0x2, 0x1, 0x8, 0x6}, {0x2, 0x2, 0x9}]}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000a00)={@fallback=r2, 0xf, 0x1, 0x80000000, &(0x7f0000000900)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000940)=[0x0], &(0x7f0000000980)=[0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0], 0x0}, 0x40) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ac0)={0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f0000000a80)='\x00', 0x0}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a40)={@cgroup=r2, r2, 0x36, 0x30, r3, @void, @void, @void, @value=r5, r4}, 0x20) socket$kcm(0x10, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8b26, &(0x7f0000000080)={'veth0_to_bond\x00', @broadcast}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) close(r1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000), 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={@cgroup, 0xffffffffffffffff, 0xd, 0x18}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000200)={r6, &(0x7f0000000080), &(0x7f0000000000)=""/10, 0x2}, 0x20) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000180)=r2) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000040)="a72d11a15c048c0a7d63aebc5cea1f81510ff60914", 0x15}], 0x1}, 0x0) r7 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r7, &(0x7f0000000600)={&(0x7f0000000100)=@in={0x2, 0x4e21, @remote}, 0x80, &(0x7f0000000000)=[{&(0x7f00000006c0)='@', 0x1}], 0x1, &(0x7f0000000040)=[{0x18, 0x84, 0x0, 'r'}, {0x20, 0x84, 0x8, "eeb4fe8ba15e3999ef"}], 0x38}, 0x41) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="2e00000011008188040f80ec59acbc0413a181003f00000001010000000200000e000a000f000000028002002d1f", 0x2e}], 0x1}, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="12000000040000000400000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000002000000850000000800000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRESHEX=r2, @ANYBLOB="000000000000c3b9abe562c290cc000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000049000000000000000000000000fd"], 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r10, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/185, 0xb9}], 0x1}, 0x40000002) 48m19.285641869s ago: executing program 6 (id=909): perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x100c, 0x7, 0x0, 0x9, 0x0, 0x7, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0xffffffffffffffff, 0x2b4}, 0x0, 0x10000, 0x0, 0x0, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000300)="6000000022007f029e607dd75fcb520002a124b244de91f7f414adcf41bfafdd1b1e93c6292aefa3ca89563a63fb94b2584ca2faa20f2c308b0fe298acec10e3019e1e26e6efd0166e6c1b01132e5423294ac2f4d53c3870c3068461957e5357", 0x60}], 0x1, 0x0, 0x0, 0x6}, 0x0) recvmsg$kcm(r0, &(0x7f0000002a80)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRES64=r0, @ANYRESDEC=0x0, @ANYRESOCT=r0], 0x50) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) close(r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x16, 0x0, 0x0, 0xfffffff9}]}) ioctl$TUNGETVNETLE(r1, 0x40107446, &(0x7f0000000180)) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x4004743d, 0x110e22fff6) r2 = getpid() socket$kcm(0x11, 0x200000000000003, 0x300) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) perf_event_open(&(0x7f0000001100)={0x5, 0x80, 0x9, 0x8, 0xb, 0xfb, 0x0, 0x3c, 0xc002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x18842, 0x0, 0x7fffffff, 0x2, 0x3cd, 0x3, 0x7, 0x0, 0x0, 0x0, 0x7}, r2, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 48m4.164760898s ago: executing program 35 (id=909): perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x100c, 0x7, 0x0, 0x9, 0x0, 0x7, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0xffffffffffffffff, 0x2b4}, 0x0, 0x10000, 0x0, 0x0, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000300)="6000000022007f029e607dd75fcb520002a124b244de91f7f414adcf41bfafdd1b1e93c6292aefa3ca89563a63fb94b2584ca2faa20f2c308b0fe298acec10e3019e1e26e6efd0166e6c1b01132e5423294ac2f4d53c3870c3068461957e5357", 0x60}], 0x1, 0x0, 0x0, 0x6}, 0x0) recvmsg$kcm(r0, &(0x7f0000002a80)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRES64=r0, @ANYRESDEC=0x0, @ANYRESOCT=r0], 0x50) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) close(r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x16, 0x0, 0x0, 0xfffffff9}]}) ioctl$TUNGETVNETLE(r1, 0x40107446, &(0x7f0000000180)) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x4004743d, 0x110e22fff6) r2 = getpid() socket$kcm(0x11, 0x200000000000003, 0x300) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) perf_event_open(&(0x7f0000001100)={0x5, 0x80, 0x9, 0x8, 0xb, 0xfb, 0x0, 0x3c, 0xc002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x18842, 0x0, 0x7fffffff, 0x2, 0x3cd, 0x3, 0x7, 0x0, 0x0, 0x0, 0x7}, r2, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 6.560528463s ago: executing program 1 (id=17441): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x6c0bd, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6c9, 0x1, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) r3 = socket$kcm(0x2, 0x922000000001, 0x106) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) setsockopt$sock_attach_bpf(r3, 0x6, 0x24, &(0x7f0000000000)=r4, 0xff7b) 6.407969838s ago: executing program 1 (id=17442): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1000000}, 0x94) socket$kcm(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1000001}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') ioctl$TUNSETIFF(r0, 0xb701, 0x0) socket$kcm(0x1e, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x20000, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000090000000700000000000061bb000000000040000000006100d86bdb00840e50c30785f825922dc8f4c5df56002434f0"], 0x0, 0x2d}, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYRES8, @ANYRES8], 0x12) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="2e00000011008188040f80ec59acbc0413a181003100000001010000000000000e000a000f000000028002002d1fb6", 0x2f}], 0x1}, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000}}, 0x80, &(0x7f0000002580)=[{&(0x7f0000000500)='\x00', 0x1}], 0x1}, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xd1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9602, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0xfffffffffffffffe}, 0x12280, 0x2, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000500)={0x0, 0x4000000, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) 5.309707172s ago: executing program 1 (id=17451): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x6c0bd, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6c9, 0x1, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) r3 = socket$kcm(0x2, 0x922000000001, 0x106) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) setsockopt$sock_attach_bpf(r3, 0x6, 0x24, &(0x7f0000000000)=r4, 0xff7b) 5.218950417s ago: executing program 1 (id=17453): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) openat$cgroup_type(r0, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='-0'], 0x9) syz_clone(0x4001000, 0x0, 0x408, &(0x7f0000000140), 0x0, 0x0) 5.053617734s ago: executing program 1 (id=17457): ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x1d, &(0x7f0000000200), 0x8) 4.060262951s ago: executing program 1 (id=17461): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x4, &(0x7f00000001c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1b}, 0x94) r0 = socket$kcm(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x1c0) setsockopt$sock_attach_bpf(r0, 0x6, 0x1b, &(0x7f0000000100)=r3, 0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x4, &(0x7f00000001c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1b}, 0x94) (async) socket$kcm(0x2b, 0x1, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) close(r2) (async) recvmsg$unix(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x1c0) (async) setsockopt$sock_attach_bpf(r0, 0x6, 0x1b, &(0x7f0000000100)=r3, 0x4) (async) 3.58390778s ago: executing program 7 (id=17465): r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xb, 0x8, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x63, 0xa, 0xff04}, [@call={0x44, 0x0, 0x0, 0x7400}, @exit, @map_fd, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x100}]}, &(0x7f0000000140)='GPL\x00', 0x2, 0x8a, &(0x7f0000000180)=""/138}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYRES32=r0], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) syz_clone(0xae12e400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x46, 0x0, &(0x7f00000002c0)="b90103616908068c3c270040e700009e0dc5cf1d66fff2fcffff8100632f0806", 0x0, 0x8104, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000100)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0xfffffffc, 0x2}, 0x50) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4e) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000180)=r1}, 0x20) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500), 0x4) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0200430904000000080000000100000080000002", @ANYRES32=r2, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03000000010000000400"/28], 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@bloom_filter={0x1e, 0x6, 0xa, 0xb, 0x62000, r4, 0x200, '\x00', 0x0, r3, 0x5, 0x5, 0x1, 0x4}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_int(r6, &(0x7f0000000e00)='cpuset.mems\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0xd, 0xd, &(0x7f0000000240)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x6}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r8}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0xcab9, '\x00', 0x0, r3, 0x5}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r12}, &(0x7f0000000280), &(0x7f0000000240)=r9}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ac0)={0x6, 0x2, &(0x7f0000000640)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @call={0x85, 0x0, 0x0, 0x97}], &(0x7f0000000680)='GPL\x00', 0x0, 0x6, &(0x7f0000000800)=""/6, 0x40f00, 0x2, '\x00', 0x0, 0x25, r7, 0x8, &(0x7f0000000840)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000940)={0x4, 0x9, 0x1, 0x7}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f00000009c0)=[{0x5, 0x5, 0x2, 0x1}, {0x0, 0x1, 0xc, 0x1}], 0x10, 0x8000}, 0x94) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r12, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r10, 0x1, 0x32, &(0x7f00000000c0)=r13, 0x4) sendmsg$inet(r11, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000100)=ANY=[@ANYBLOB='N-N:N/8'], 0x6a) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1c, 0x22, &(0x7f00000006c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xdb, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@map_idx_val={0x18, 0x2, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x56}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc37}}, @call={0x85, 0x0, 0x0, 0x14}, @ldst={0x2, 0x0, 0x0, 0x6, 0x4, 0x18, 0xffffffffffffffff}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000000c0)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r14}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x11, &(0x7f0000000380)=@framed={{0x18, 0x8, 0x0, 0x0, 0x3ffffffe}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @generic={0xc6, 0x8, 0x0, 0x0, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @map_fd={0x18, 0xb, 0x1, 0x0, r2}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}]}, &(0x7f00000001c0)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x8}, 0x94) 3.140156485s ago: executing program 7 (id=17469): r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r0, &(0x7f0000000000)={0x0, 0xf00, &(0x7f0000000040)=[{&(0x7f00000000c0)="5c00000014006b02c84e21100af32c6e0a0675f8d34460400140000000005c1e6182949a36c23d3b48dfd8cdbf9367b498fa51f60a64c9f4d493803792684b71bdd70000b6c0504bb9183132be471b93c91b5d7870743719b4b53cf2", 0x91}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) (fail_nth: 6) 2.550069263s ago: executing program 7 (id=17470): r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x10, &(0x7f00000003c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@jmp={0x5, 0x1, 0x8, 0x8, 0x4, 0x6}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x9, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r1 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x2a040, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x3, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x50) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x10, &(0x7f0000000840)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r4, @ANYBLOB="0000000002000000b705000008000000850000005d00000095"], &(0x7f0000000300)='GPL\x00', 0x5, 0x0, 0x0, 0x41000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001880)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000180)=r5, 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) sendmsg$kcm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="1400000016000b63d25a80648c2566e506bce1e8", 0x14}], 0x1}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x5, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0xfa, 0x0, 0x0, 0x0, 0x10001, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0xa}, 0x8000, 0x0, 0x80000, 0x1, 0x4, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0xa, 0x2, 0x88) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001340), 0x0, 0x0, 0x0, 0xc9e}, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xfd, 0x0, 0x0, 0xd2, 0x0, 0x0, 0x60300, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x8000, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781c2"], 0xfdef) 1.835354453s ago: executing program 5 (id=17474): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x6c0bd, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6c9, 0x1, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) r3 = socket$kcm(0x2, 0x922000000001, 0x106) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) setsockopt$sock_attach_bpf(r3, 0x6, 0x24, &(0x7f0000000000)=r4, 0xff7b) 1.67270812s ago: executing program 7 (id=17476): r0 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa16ae, 0x9, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x2}, 0x90, 0xa4, 0x2, 0x5, 0xa1, 0x9b9b, 0x8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000e9ff00000400000018120700", @ANYRES32=0x0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) perf_event_open(0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) 1.653649083s ago: executing program 5 (id=17477): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth1_vlan\x00', @remote}) (fail_nth: 6) 1.444225008s ago: executing program 5 (id=17478): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) close(r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r2 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f00000001c0)=r1, 0xa1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x6, 0xf, 0x8, 0x41}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001580)={{r3}, &(0x7f0000001500), &(0x7f0000001540)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe5}, 0x94) r4 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x4044}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') close(r2) 1.444017978s ago: executing program 4 (id=17479): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x60}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0xa5c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1f, &(0x7f0000000000)='/proc/sys]c_\x00lz,\x00\x00\x00\x00\x00\x00\x00\x18\x00\x00\x00\x00\x00\x00\x00'}, 0x30) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080), 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) 1.347305424s ago: executing program 7 (id=17480): socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$inet(r3, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x20}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000007880)=ANY=[@ANYBLOB="1100000000000000004003000100000000000000000000001c00000000000000000f00fd08000000", @ANYRES32=0x0, @ANYBLOB="ac1414bbe0000001000000001c0000000000000000078f0208000000", @ANYRES32=0x0, @ANYBLOB="a00500000000000000000000240000000000000000000000070000009404000044108800000000000000000000000000000000001100000000000000000000c2d63c67000000000000000000"], 0x98}, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x594f, 0x3}, 0x1041a1, 0xc, 0x9, 0x1, 0x0, 0x300, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00000012002f8c35093f974b21b9", 0xf}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="1310000016"], 0xfe33) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = gettid() sendmsg$unix(r5, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[@rights={{0x14, 0x1, 0x1, [r4]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xffffffffffffffff}}}], 0x58, 0x4000}, 0x40014) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x746f2f51, &(0x7f0000000080)=[{&(0x7f0000000040)="3f0400001c00810ce00f80ecdb4cb9f207c804a01f000000030006fb0a0002000a0ada1b40d80300000000000000", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 1.189345051s ago: executing program 5 (id=17481): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd8, &(0x7f00000021c0)=[{&(0x7f0000000040)="d8000000100081044e81f782db44b904021d006a0f000000e8fe55a1290015000600142603600e120900040044000000a80016000a0003402e60000000000000b94dcf5c0461c1d67f6f94007134cf6ee08021a0e408e8d8ef52a985162f7ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d3220a7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x35}, 0x60044084) 1.124099682s ago: executing program 4 (id=17482): r0 = socket$kcm(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000005000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0xfffffffffffffffc, 0xfffffffffffffe6b) bpf$PROG_LOAD(0x2, &(0x7f0000000680)={0x3, 0x3, &(0x7f0000000740)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r2) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x1}, 0x80000, 0xca, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0xe, 0x0, 0x8}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) recvmsg$unix(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x1c0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYRES8=r2, @ANYBLOB="3e0002"], 0x9a) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000021c0)=[{&(0x7f0000000040)="d8000000100081044e81f782db44b904021d006a0f000000e8fe55a1290015000600142603600e120900040044000000a80016000a0003402e60000000000000b94dcf5c0461c1d67f6f94007134cf6ee08021a0e408e8d8ef52a985162f7ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d3220a7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x35}, 0x60044084) 965.836888ms ago: executing program 4 (id=17483): r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000240)="1400000010003507d25a806f8c630200032400a3ede00554cfd8945a93c6fb5bed67d6b84840d85a30fe59c17671284406331d90491ee8efb5101c502277e08d001f028069e58de19630c355678a39f7f9212156b8bd1c04effc0fe472ae0ca29a3a0b72c346e1dcd865c72454e285a2ae9b13876fff7f8f3ddb1d59deec567e59adb3abda8cf6c1aca7ae115638be", 0x8f}, {&(0x7f0000000140)="1f4a1b0dd706519e1f7e047a3ac2dfde99164edb5de8670126ab48bb58d6545cbf1975f997cd381d2e62f3eeaca169cadb60e6c4e331eea329da8ed008b53e0a850fcaff86383a95e8b9733da40a747e4f97ce155ceb47dc68f42cf56388ea", 0x5f}, {&(0x7f0000000300)="e6615f4da23d4863a8d7501d595f04c5a8a93b055f21c1fc30983f8c2a5b785a20cc9a0989e12a0be20ae40595bdaf42b9a2904642b5c388ee1ca77b04762038d97eb4cf4ce44c5443ddfcdffbeb2c5d4f4397b7", 0x54}, {&(0x7f0000001500)="ef27eece3d00a0faaa70eccd8ac992084fb46c2a52618b477d4b572bc30840da95651011287d839dda442533e26320f614a2e7cde0cc30eead109d0a5ca35276867d81a37c43f17b22534879edfa83fc0ff25592cc56b52ffd600dbac909fd2002233a3f20dc9a5ffe95ca0ed3f76c0a2b0b281623bf0062089efab4063bb41a06bcd538e9c289a70125e8e336", 0x8d}, {&(0x7f00000015c0)="37ff1a01bc3cabaea6b2140828183facf118c1dbd464e3075f7a1abc40372b73424d2cbfca4b33b4878c509218ea4e937749f61beeccb96583d7de0a2d33498717181e594aa13daab5b103f176feccdea25cacf83dc606d3a8e6e48d9f26183fbe609bd3c3cc382024d3de578ca18466364224e250afd48086f0153ff2a50a93463868c61a6dfef9bb21e2151291fcaf9898d254190871a7979fc338b9c427425bff4a9ef2be", 0xa6}], 0x5}, 0x40000) recvmsg$kcm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1}, 0x10100) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x5, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0xf, 0xe1bf}, 0x0, 0x10000, 0x0, 0x8, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$kcm(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x78}, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x22, &(0x7f0000000000)=r5, 0x10) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000fcffffff0000000007000000850000007b0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000005000000850000000400000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x34}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000080000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000070000008500000010"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001700)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0x3) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x85, 0x1, 0x0, 0x0, 0x0, 0x2, 0x20022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x0, 0x0, 0x9, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r8) r9 = syz_clone(0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="1400000010003507d25a806f8c6394f90324fc60", 0x14}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000004c0)=""/4091, 0xffb}], 0x1}, 0x0) r10 = socket$kcm(0x2, 0x5, 0x84) r11 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x1000005}, {0x2, 0x4, 0x0, 0x9}]}, 0x94) sendmsg$inet(r10, &(0x7f00000000c0)={&(0x7f0000001040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10, &(0x7f00000028c0)=[{&(0x7f0000000140)="d7", 0x1}, {&(0x7f00000018c0)="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", 0x1000}], 0x2}, 0x4000090) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xd, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41000, 0x15, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x2, 0x1, 0x0, 0x100}, 0x10, 0x0, r11, 0x0, 0x0, 0x0, 0x10, 0x7fff}, 0x94) close(r12) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0xdb10, 0x235fd, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xd}, 0x20085, 0x4, 0x1, 0xf, 0x4000003, 0x400, 0x0, 0x0, 0x80, 0x0, 0x40}, r9, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 839.974009ms ago: executing program 4 (id=17484): bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200), 0x4) socket$kcm(0x2, 0x5, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0x11, 0x0, &(0x7f0000000000)="66d4692a0a1b30e6f5d85a2d88a8e26808", 0x0, 0x1, 0x503, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe, 0x9}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x4, &(0x7f0000000000)='%', 0x0, 0xd01, 0x80040033, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) (fail_nth: 6) 684.106275ms ago: executing program 5 (id=17485): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x6c0bd, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6c9, 0x1, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) r3 = socket$kcm(0x2, 0x922000000001, 0x106) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) setsockopt$sock_attach_bpf(r3, 0x6, 0x24, &(0x7f0000000000)=r4, 0xff7b) 279.685553ms ago: executing program 4 (id=17486): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x26, 0xc, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x382a, 0xffffffffffff0001}, 0x8000, 0x3, 0x43a1bd76, 0x7, 0x9, 0x658, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$kcm(r0, 0x0, 0x40000001) 229.261931ms ago: executing program 5 (id=17487): bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33a2d912}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@func_proto, @func={0x4, 0x0, 0x0, 0xc, 0x1}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}]}, {0x0, [0x2e, 0x30, 0x2e, 0x61]}}, 0x0, 0x42, 0x0, 0x1}, 0x28) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000010040), 0x391, 0xffffffffffffffff, 0x4}, 0x38) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x0, 0x3ff78000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000b40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8b04, &(0x7f0000000000)={'wlan1\x00', @random="0200"}) (fail_nth: 5) 179.946249ms ago: executing program 7 (id=17488): r0 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa16ae, 0x9, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x2}, 0x90, 0xa4, 0x2, 0x5, 0xa1, 0x9b9b, 0x8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000e9ff00000400000018120700", @ANYRES32=0x0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) perf_event_open(0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) 0s ago: executing program 4 (id=17489): recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0xc0011102) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0xc}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3}, 0x10}, 0x94) r0 = socket$kcm(0x1e, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f00000008c0), 0x43) sendmsg$sock(r0, &(0x7f00000005c0)={&(0x7f0000000300)=@tipc=@name={0x1e, 0x2, 0x1, {{0x41}}}, 0x80, 0x0}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000702000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000400000006a0a80fe000000008500000053000000b7000000000000009500001000000000a80501363034fdb117168bd07ba00af739d1a1ee35fe163a255c33282044b32495ef8ab9adc67ccc945f105d802f5132143c0a9fc7a84452569957c1002ed7d4d8e17f791f4798c8eb483e9973320d046c3126c6afcfd84de03352c69b3edff5be26f8ffa5f8f2879021c2ea53ea79acd7fb38dd1abb75aa393cea26d465637d11f705000000473e7b7c4ae7dd5e4dee88518ddf12dddd4bfc6a4dd3b6beba51074229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff2357ef17f95a25780c3a057844f226ef4e912f01a201e694e3806e8c70e8b69524cd19f7525d8d66bb766f7f3f918c86a70252236800001897133af94a5a4cfc794d8b9d7c33632152c48eaf302f0b2e0c252b00000000000000006f1bbefbe08de65e3762e194ba4cae8b13535d7d11ee917bca4885bbf597a14ab2458efce78510d86272d88e0c8088f404f011289ebc5623faa1182632161e073af1d69a2e36bed435000025ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222674280f55e98107450c19b9d86329bd5b4697336112b0b8754ce3574046bf6114d1a88597850b77378fa8edfff8faf8b8ec039bab385cac0535373bb8fab90539b1a65ddff841eb671f3faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4f189edbf9fb7c42b1f435ccd4d96822e6b70100912c92e3943e9c4f45d8bcd528fa8a3ea847f10e9b2506f3bb506f1d7fbde8010000000000a073d0de5538ab42e170b3baae34c35987b0dda497ac3f5e97e6e6aeea15c6d5ed24310100000003bb6030f84b63aaf8690db0221b1705c501f802ff59b4e683efa4b6e77e042072bd2ac37d413008ec9eb8166f6e28b49a77ed91befc65315896f88a8fb1dd679fb4c515f8b7a5b7aca6a251a89d47b728502f7e621cc0e3ba04000000c149ee6601728c750d304197c22da8650579475afd96187d881e93b42a5fdfd686d8900c44c67133dad58037fda65885a15a429edfe3027a5ebf95254744f10fd607bc3300b94932b8d944e0b083bbd86b19cb074577a25ff581d92af08a06f857310a2f14326b0b290205e91a682e00c8762cbc6b904c980eef6e6a1def886c95676dce6a8194479700a02b92bdc8d05eae1f24fdd7b80d1bb404c22f681594de2ebb9687219de8d73ac83823feb402a2415a9850d5f0183ec67be96dc0e4c2d7acf1dfe79d6771903b76e21190c22d641030e1ddacf006c3116e1803af20a5f2b5f7ba58aca5bcabbbab24414a3810788e5503e4be66d683daac5f0001000077339b4200000000108a3c87b19d5b9a00c75d84a92d6dcf00ba96edf35ede0e2b57c26e94801b498924166bde57d5f24258d9fd028096cc15a8b912b494d4bbe609031ea1ca65a548971d5d16296dd08e020000007a27310d5d01f8a8a0f5212d7f628f554afea715ccbc66cbb1016490f5d579308cb3188cf2fcaf67e0c16443d526ba4b968f07ae362c2133c168313e84beb871203880dd453c45d0a137d7f5a8b039dbfa62fb2b4214f8e69f967bf1fbd89e77fcca110000000800000000000000f8877994ebdc35f7efd41e3babd9b3782edd6776d5b6cb4ecd72c9de9b5503747d71440378cf2c2c7ea2dc5febb654a867f853713cf4c0bb322fbbe446d18dee4c821275ef18259cafc346c8b3b9fb0f3adcf6ea310a6b9a3f59e29a5909ea047fb61affb4bc8bbea1fb761b8933795b1a91358a7791aa843d07020e8bb6fc18458c49ac6313e7165b7d9f65e94a62b69f1011b94340cdb7303f01e5cdb5682ddf73d65c3de1d88dd7496d6345d5b9de0223988056a53e19a8b96b9640bc6c09d3c2ff894d626b57c776ed53f94d5e22ff148061b37f72bd92924cb1d0a725e19b264346b7cae0251a850de78316503f3c3d395c7e3f04fc8d52583327cd2341ce4b2d092815376299686f41353b2823814563011a2223b9dd00000000000000000000003a131374a3371cb3e2a9bb4d798b91cefa444501f40b7c9589e8c0bb6c82123d2b45ce905d0903b32ecf30e828c71a07a83f3275f3d661d1af0ffbd5d7f0"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0xfeffff, 0x680, 0x3f000002, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0xf0, 0xffffff0c}, 0x40) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)}, 0xc0011102) (async) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0xc}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x3}, 0x10}, 0x94) (async) socket$kcm(0x1e, 0x5, 0x0) (async) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f00000008c0), 0x43) (async) sendmsg$sock(r0, &(0x7f00000005c0)={&(0x7f0000000300)=@tipc=@name={0x1e, 0x2, 0x1, {{0x41}}}, 0x80, 0x0}, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0xfeffff, 0x680, 0x3f000002, &(0x7f0000000700)="c45c57ce395de5b289f07d637a223920f181c2e57d71483cfb2d075a3ff07258e080a194805cdb0c26d3f7ffb1e0d9cf4fa36dcb2168b72de48ac8f93e6804f1c4d70898d0810e044d7e1778eaac5dfdcc9f1208905522025bcfdf1b6f969b094d5c022c2b7ffefde71e0627b9a2069cc1e0175c4b8860aad4b0a103c589f676b6c4e85eb3950c533b6e62c39ccf9ae9bfe54ee5887358d44f46337fbe090d7c7e55847edee8130ffd3d1e719e01a68b0e691c0d35b0b56e0b514036342fd56f08ac0083f3c2fe41a1295a3d23cf3d160d4fd90f66beba68860456ed41272e1e68d16c2564c85f5556e18784113c493d13253e14d6eb891707fba3c30d07d5ee8619e4426cafec4cf6a3723c455d09b586b248", 0x0, 0xf0, 0x0, 0xf0, 0xffffff0c}, 0x40) (async) kernel console output (not intermixed with test programs): 94.971167][T25973] RIP: 0033:0x7f19cd79c819 [ 3294.975934][T25973] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3294.995547][T25973] RSP: 002b:00007f19ce6b6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3295.003966][T25973] RAX: ffffffffffffffda RBX: 00007f19cda15fa0 RCX: 00007f19cd79c819 [ 3295.011979][T25973] RDX: 0000000000000094 RSI: 0000200000000180 RDI: 0000000000000005 [ 3295.020134][T25973] RBP: 00007f19ce6b6090 R08: 0000000000000000 R09: 0000000000000000 [ 3295.028108][T25973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3295.036214][T25973] R13: 00007f19cda16038 R14: 00007f19cda15fa0 R15: 00007fff6ddeacb8 [ 3295.044236][T25973] [ 3295.705609][T25989] netlink: 'syz.4.16775': attribute type 10 has an invalid length. [ 3295.747461][T25992] netlink: 1047 bytes leftover after parsing attributes in process `syz.7.16777'. [ 3295.798341][T25992] bridge_slave_1: default FDB implementation only supports local addresses [ 3296.097362][T25999] netlink: 'syz.5.16778': attribute type 10 has an invalid length. [ 3296.275294][T24625] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 3296.286274][T24625] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 3296.295745][T24625] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 3296.327204][T24625] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 3296.345426][T24625] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 3296.355718][T24625] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 3296.864167][ T1143] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 3296.886487][ T1143] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 3296.902182][ T1143] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 3296.910290][ T1143] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 3296.943066][ T1143] batman_adv: batadv0: Interface deactivated: veth1_virt_wifi [ 3296.957567][ T1143] batman_adv: batadv0: Removing interface: veth1_virt_wifi [ 3297.011261][ T1143] veth1_macvtap: left promiscuous mode [ 3297.017287][ T1143] veth1_vlan: left promiscuous mode [ 3297.022685][ T1143] veth0_vlan: left promiscuous mode [ 3298.446550][T16827] Bluetooth: hci2: command tx timeout [ 3300.519959][T16827] Bluetooth: hci2: command tx timeout [ 3300.920646][ T1143] team0 (unregistering): Port device team_slave_1 removed [ 3300.980546][ T1143] team0 (unregistering): Port device team_slave_0 removed [ 3301.050168][ T1143] .` (unregistering): (slave bond_slave_1): Releasing backup interface [ 3301.118141][ T1143] .` (unregistering): (slave bond_slave_0): Releasing backup interface [ 3301.601774][ T1143] .` (unregistering): (slave team0): Releasing backup interface [ 3301.650047][ T1143] .` (unregistering): Released all slaves [ 3301.734804][T26015] netlink: 'syz.4.16781': attribute type 10 has an invalid length. [ 3301.830454][T26027] netlink: 'syz.5.16783': attribute type 10 has an invalid length. [ 3301.850589][T26027] netlink: 40 bytes leftover after parsing attributes in process `syz.5.16783'. [ 3301.861270][T26027] FAULT_INJECTION: forcing a failure. [ 3301.861270][T26027] name failslab, interval 1, probability 0, space 0, times 0 [ 3301.874543][T26027] CPU: 0 PID: 26027 Comm: syz.5.16783 Not tainted syzkaller #0 [ 3301.882132][T26027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3301.892398][T26027] Call Trace: [ 3301.895717][T26027] [ 3301.898696][T26027] dump_stack_lvl+0x18c/0x250 [ 3301.903483][T26027] ? verify_lock_unused+0x140/0x140 [ 3301.908693][T26027] ? show_regs_print_info+0x20/0x20 [ 3301.914079][T26027] ? load_image+0x420/0x420 [ 3301.918645][T26027] ? perf_trace_lock+0xfc/0x3b0 [ 3301.923784][T26027] ? trace_event_raw_event_lock+0x250/0x250 [ 3301.929890][T26027] should_fail_ex+0x39d/0x4d0 [ 3301.934698][T26027] should_failslab+0x9/0x20 [ 3301.939258][T26027] slab_pre_alloc_hook+0x59/0x310 [ 3301.944347][T26027] ? __hw_addr_add_ex+0x202/0x710 [ 3301.949404][T26027] __kmem_cache_alloc_node+0x53/0x250 [ 3301.954889][T26027] ? __hw_addr_add_ex+0x202/0x710 [ 3301.960112][T26027] kmalloc_trace+0x2a/0xe0 [ 3301.964541][T26027] __hw_addr_add_ex+0x202/0x710 [ 3301.969416][T26027] dev_mc_sync_multiple+0x208/0x3e0 [ 3301.974721][T26027] team_set_rx_mode+0x133/0x210 [ 3301.979672][T26027] ? team_set_rx_mode+0x23/0x210 [ 3301.984620][T26027] ? team_change_rx_flags+0x330/0x330 [ 3301.990090][T26027] dev_set_rx_mode+0x21c/0x2d0 [ 3301.994867][T26027] __dev_open+0x33f/0x430 [ 3301.999298][T26027] ? dev_open+0x190/0x190 [ 3302.003811][T26027] __dev_change_flags+0x211/0x6a0 [ 3302.008847][T26027] ? vprintk_emit+0x53d/0x610 [ 3302.013563][T26027] ? dev_get_flags+0x1c0/0x1c0 [ 3302.018422][T26027] ? printk_sprint+0x460/0x460 [ 3302.023280][T26027] ? _raw_spin_unlock_irqrestore+0xc5/0x120 [ 3302.029341][T26027] ? _raw_spin_unlock+0x40/0x40 [ 3302.034231][T26027] dev_change_flags+0x88/0x1a0 [ 3302.039023][T26027] do_setlink+0xc58/0x4130 [ 3302.043557][T26027] ? load_image+0x420/0x420 [ 3302.048266][T26027] ? nlmsg_parse_deprecated_strict+0x110/0x110 [ 3302.054427][T26027] ? rcu_is_watching+0x15/0xb0 [ 3302.059290][T26027] ? do_trace_netlink_extack+0x7e/0x1a0 [ 3302.065015][T26027] ? __nla_validate_parse+0x262c/0x2ea0 [ 3302.070583][T26027] ? perf_trace_lock+0xfc/0x3b0 [ 3302.075440][T26027] ? __nla_validate+0x50/0x50 [ 3302.080214][T26027] ? mark_lock+0x94/0x320 [ 3302.084655][T26027] ? __lock_acquire+0x1347/0x7d40 [ 3302.090072][T26027] ? validate_linkmsg+0x719/0x910 [ 3302.095143][T26027] rtnl_setlink+0x3d9/0x4e0 [ 3302.099672][T26027] ? verify_lock_unused+0x140/0x140 [ 3302.104913][T26027] ? rtnl_dump_ifinfo+0x13c0/0x13c0 [ 3302.110131][T26027] ? perf_trace_lock+0xfc/0x3b0 [ 3302.115017][T26027] ? trace_event_raw_event_lock+0x250/0x250 [ 3302.120987][T26027] ? mutex_lock_nested+0x20/0x20 [ 3302.126051][T26027] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 3302.131231][T26027] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 3302.136764][T26027] ? rtnl_dump_ifinfo+0x13c0/0x13c0 [ 3302.142181][T26027] rtnetlink_rcv_msg+0x869/0xfa0 [ 3302.147354][T26027] ? rtnetlink_bind+0x80/0x80 [ 3302.152240][T26027] ? perf_trace_preemptirq_template+0xac/0x330 [ 3302.158439][T26027] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 3302.164706][T26027] ? lock_chain_count+0x20/0x20 [ 3302.169751][T26027] ? __local_bh_enable_ip+0x13a/0x1c0 [ 3302.175226][T26027] ? lockdep_hardirqs_on+0x98/0x150 [ 3302.180533][T26027] ? __local_bh_enable_ip+0x13a/0x1c0 [ 3302.186036][T26027] ? _local_bh_enable+0xa0/0xa0 [ 3302.191178][T26027] ? __dev_queue_xmit+0x265/0x3660 [ 3302.196407][T26027] ? __dev_queue_xmit+0x265/0x3660 [ 3302.201523][T26027] ? __dev_queue_xmit+0x1b2c/0x3660 [ 3302.206733][T26027] ? __dev_queue_xmit+0x265/0x3660 [ 3302.211944][T26027] ? perf_trace_lock+0xfc/0x3b0 [ 3302.216811][T26027] netlink_rcv_skb+0x241/0x4d0 [ 3302.221621][T26027] ? rtnetlink_bind+0x80/0x80 [ 3302.226301][T26027] ? netlink_ack+0x1180/0x1180 [ 3302.231078][T26027] ? __lock_acquire+0x7d40/0x7d40 [ 3302.236141][T26027] ? netlink_deliver_tap+0x2e/0x1b0 [ 3302.241353][T26027] netlink_unicast+0x751/0x8d0 [ 3302.246138][T26027] netlink_sendmsg+0x8d0/0xbf0 [ 3302.250941][T26027] ? netlink_getsockopt+0x590/0x590 [ 3302.256177][T26027] ? aa_sock_msg_perm+0x94/0x150 [ 3302.261128][T26027] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 3302.266505][T26027] ? security_socket_sendmsg+0x80/0xa0 [ 3302.271974][T26027] ? netlink_getsockopt+0x590/0x590 [ 3302.277197][T26027] ____sys_sendmsg+0x5ba/0x960 [ 3302.281972][T26027] ? __asan_memset+0x22/0x40 [ 3302.286576][T26027] ? __sys_sendmsg_sock+0x30/0x30 [ 3302.291601][T26027] ? __import_iovec+0x5f2/0x850 [ 3302.296460][T26027] ? import_iovec+0x73/0xa0 [ 3302.300971][T26027] ___sys_sendmsg+0x2a6/0x360 [ 3302.305743][T26027] ? __sys_sendmsg+0x2a0/0x2a0 [ 3302.310548][T26027] ? __lock_acquire+0x7d40/0x7d40 [ 3302.315596][T26027] __se_sys_sendmsg+0x1c2/0x2b0 [ 3302.320461][T26027] ? __x64_sys_sendmsg+0x80/0x80 [ 3302.325417][T26027] ? lockdep_hardirqs_on+0x98/0x150 [ 3302.330894][T26027] do_syscall_64+0x55/0xa0 [ 3302.335366][T26027] ? clear_bhb_loop+0x40/0x90 [ 3302.340117][T26027] ? clear_bhb_loop+0x40/0x90 [ 3302.344919][T26027] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3302.350982][T26027] RIP: 0033:0x7f19cd79c819 [ 3302.355603][T26027] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3302.375319][T26027] RSP: 002b:00007f19ce6b6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3302.383747][T26027] RAX: ffffffffffffffda RBX: 00007f19cda15fa0 RCX: 00007f19cd79c819 [ 3302.391721][T26027] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000003 [ 3302.399695][T26027] RBP: 00007f19ce6b6090 R08: 0000000000000000 R09: 0000000000000000 [ 3302.407668][T26027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3302.415643][T26027] R13: 00007f19cda16038 R14: 00007f19cda15fa0 R15: 00007fff6ddeacb8 [ 3302.423733][T26027] [ 3302.445749][T26027] team0: entered promiscuous mode [ 3302.451360][T26027] C: entered promiscuous mode [ 3302.456949][T26027] team_slave_1: entered promiscuous mode [ 3302.469982][T26027] macvlan0: entered promiscuous mode [ 3302.479551][T26027] team0: entered allmulticast mode [ 3302.484940][T26027] C: entered allmulticast mode [ 3302.490624][T26027] team_slave_1: entered allmulticast mode [ 3302.496688][T26027] macvlan0: entered allmulticast mode [ 3302.502241][T26027] veth1_vlan: entered allmulticast mode [ 3302.508877][T26027] 8021q: adding VLAN 0 to HW filter on device team0 [ 3302.568576][T26027] bond0: (slave team0): Releasing backup interface [ 3302.586452][T26027] bridge0: port 3(team0) entered blocking state [ 3302.593620][T16827] Bluetooth: hci2: command tx timeout [ 3302.599255][T26027] bridge0: port 3(team0) entered disabled state [ 3302.614196][T26029] netlink: 'syz.4.16784': attribute type 21 has an invalid length. [ 3302.699480][T26001] chnl_net:caif_netlink_parms(): no params data found [ 3302.922858][T26001] bridge0: port 1(bridge_slave_0) entered blocking state [ 3302.981115][T26001] bridge0: port 1(bridge_slave_0) entered disabled state [ 3302.991448][T26001] bridge_slave_0: entered allmulticast mode [ 3303.022759][T26001] bridge_slave_0: entered promiscuous mode [ 3303.054215][T26035] netlink: 1047 bytes leftover after parsing attributes in process `syz.7.16786'. [ 3303.064235][T26035] bridge_slave_1: default FDB implementation only supports local addresses [ 3303.090308][T26001] bridge0: port 2(bridge_slave_1) entered blocking state [ 3303.114650][T26001] bridge0: port 2(bridge_slave_1) entered disabled state [ 3303.141447][T26001] bridge_slave_1: entered allmulticast mode [ 3303.150509][T26001] bridge_slave_1: entered promiscuous mode [ 3303.177065][T26042] netlink: 1047 bytes leftover after parsing attributes in process `syz.4.16787'. [ 3303.188442][T26042] bridge_slave_1: default FDB implementation only supports local addresses [ 3303.217202][T26001] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3303.228885][T26001] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3303.276144][T26001] team0: Port device team_slave_0 added [ 3303.286306][T26001] team0: Port device team_slave_1 added [ 3303.348160][T26001] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3303.374350][T26001] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3303.435817][T26001] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3303.458977][T26001] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3303.494335][T26001] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3303.559563][T26001] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3303.580918][T26048] netlink: 1047 bytes leftover after parsing attributes in process `syz.7.16790'. [ 3303.594425][T26048] bridge_slave_1: default FDB implementation only supports local addresses [ 3303.649347][T26001] hsr_slave_0: entered promiscuous mode [ 3303.661196][T26001] hsr_slave_1: entered promiscuous mode [ 3303.674933][T26001] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 3303.682593][T26001] Cannot create hsr debugfs directory [ 3303.880058][T26054] netlink: 'syz.4.16791': attribute type 10 has an invalid length. [ 3303.957457][T26052] netlink: 1047 bytes leftover after parsing attributes in process `syz.5.16798'. [ 3303.969436][T26052] bridge_slave_1: default FDB implementation only supports local addresses [ 3304.098465][T26001] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3304.140454][T26060] netlink: 'syz.7.16793': attribute type 10 has an invalid length. [ 3304.208108][T26001] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3304.252296][T26062] netlink: 'syz.5.16794': attribute type 10 has an invalid length. [ 3304.269840][T26062] netlink: 40 bytes leftover after parsing attributes in process `syz.5.16794'. [ 3304.288261][T26062] bridge0: port 3(team0) entered blocking state [ 3304.294887][T26062] bridge0: port 3(team0) entered forwarding state [ 3304.307353][T26062] 8021q: adding VLAN 0 to HW filter on device team0 [ 3304.369704][T26001] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3304.502550][T26001] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3304.531909][T26069] netlink: 'syz.5.16796': attribute type 10 has an invalid length. [ 3304.672142][T26072] netlink: 1047 bytes leftover after parsing attributes in process `syz.7.16797'. [ 3304.694026][T16827] Bluetooth: hci2: command tx timeout [ 3304.706980][T26072] bridge_slave_1: default FDB implementation only supports local addresses [ 3304.766162][ T1143] tipc: Left network mode [ 3304.898323][T26001] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 3304.909334][T26001] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 3304.922576][T26001] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 3304.936774][T26001] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 3305.061953][T26001] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3305.106238][T26001] 8021q: adding VLAN 0 to HW filter on device team0 [ 3305.118928][T13320] bridge0: port 1(bridge_slave_0) entered blocking state [ 3305.126504][T13320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3305.142747][T25922] bridge0: port 2(bridge_slave_1) entered blocking state [ 3305.150064][T25922] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3305.446547][T26001] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3305.519503][T26001] veth0_vlan: entered promiscuous mode [ 3305.532836][T26001] veth1_vlan: entered promiscuous mode [ 3305.590925][T26001] veth0_macvtap: entered promiscuous mode [ 3305.608976][T26001] veth1_macvtap: entered promiscuous mode [ 3305.626188][T26001] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3305.637298][T26001] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3305.648352][T26001] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3305.660596][T26001] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3305.671509][T26001] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 3305.682573][T26001] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3305.696123][T26001] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3305.709033][T26001] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3305.719824][T26001] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3305.730028][T26001] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3305.741073][T26001] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3305.752468][T26001] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 3305.763916][T26001] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 3305.775392][T26001] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3305.809401][T26001] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3305.818296][T26001] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3305.828253][T26001] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3305.837635][T26001] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3305.956611][ T59] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3305.966465][ T59] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3306.029481][ T1143] bond0: (slave wlan1): Releasing backup interface [ 3306.050521][T30143] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3306.060548][T30143] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3306.200101][T26083] FAULT_INJECTION: forcing a failure. [ 3306.200101][T26083] name failslab, interval 1, probability 0, space 0, times 0 [ 3306.234599][T26083] CPU: 1 PID: 26083 Comm: syz.7.16808 Not tainted syzkaller #0 [ 3306.242308][T26083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3306.252503][T26083] Call Trace: [ 3306.255786][T26083] [ 3306.258731][T26083] dump_stack_lvl+0x18c/0x250 [ 3306.263424][T26083] ? show_regs_print_info+0x20/0x20 [ 3306.268670][T26083] ? load_image+0x420/0x420 [ 3306.273362][T26083] ? __lock_acquire+0x1273/0x7d40 [ 3306.278417][T26083] should_fail_ex+0x39d/0x4d0 [ 3306.283144][T26083] should_failslab+0x9/0x20 [ 3306.287686][T26083] slab_pre_alloc_hook+0x59/0x310 [ 3306.292743][T26083] ? lockdep_hardirqs_on+0x98/0x150 [ 3306.297958][T26083] ? ___neigh_create+0x6d2/0x2440 [ 3306.303107][T26083] ? ___neigh_create+0x6d2/0x2440 [ 3306.308415][T26083] __kmem_cache_alloc_node+0x53/0x250 [ 3306.313994][T26083] ? _local_bh_enable+0xa0/0xa0 [ 3306.318866][T26083] ? ___neigh_create+0x6d2/0x2440 [ 3306.324029][T26083] __kmalloc+0xa4/0x230 [ 3306.328202][T26083] ___neigh_create+0x6d2/0x2440 [ 3306.333068][T26083] ? __nf_conntrack_confirm+0xb2/0xf70 [ 3306.338553][T26083] ip_neigh_gw4+0x35a/0x4e0 [ 3306.343785][T26083] ? ip_finish_output2+0x11e0/0x11e0 [ 3306.349105][T26083] ? nf_nat_ipv4_out+0x3af/0x4d0 [ 3306.354072][T26083] ip_finish_output2+0xf31/0x11e0 [ 3306.359393][T26083] ? ip_finish_output2+0x457/0x11e0 [ 3306.364612][T26083] ? nf_hook+0xa2/0x390 [ 3306.368780][T26083] ? __ip_local_out+0x5f0/0x5f0 [ 3306.373803][T26083] ? nf_hook+0xa2/0x390 [ 3306.377966][T26083] ? ip_fragment+0x210/0x210 [ 3306.382646][T26083] ? ip_mc_finish_output+0x250/0x250 [ 3306.388046][T26083] ? ip_skb_dst_mtu+0x58a/0x9c0 [ 3306.393016][T26083] ? ip_finish_output+0x3ef/0x4c0 [ 3306.398416][T26083] ip_output+0x2a1/0x3b0 [ 3306.402690][T26083] ? ip_output+0x60/0x3b0 [ 3306.407031][T26083] ip_send_skb+0x12f/0x1d0 [ 3306.411543][T26083] udp_send_skb+0xa37/0x13a0 [ 3306.416244][T26083] udp_sendmsg+0x743/0x23b0 [ 3306.420761][T26083] ? ip_skb_dst_mtu+0x9c0/0x9c0 [ 3306.425610][T26083] ? udp_cmsg_send+0x350/0x350 [ 3306.430479][T26083] ? aa_sk_perm+0x83c/0x970 [ 3306.435001][T26083] ? aa_af_perm+0x330/0x330 [ 3306.439603][T26083] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 3306.446143][T26083] ? sock_rps_record_flow+0x19/0x3f0 [ 3306.451446][T26083] ? inet_sendmsg+0x7c/0x2f0 [ 3306.456041][T26083] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 3306.461576][T26083] ? security_socket_sendmsg+0x80/0xa0 [ 3306.467138][T26083] ? inet_send_prepare+0x260/0x260 [ 3306.472262][T26083] ____sys_sendmsg+0x5ba/0x960 [ 3306.477150][T26083] ? __sys_sendmsg_sock+0x30/0x30 [ 3306.482294][T26083] ? __import_iovec+0x3fa/0x850 [ 3306.487349][T26083] ? import_iovec+0x73/0xa0 [ 3306.492037][T26083] ___sys_sendmsg+0x2a6/0x360 [ 3306.496778][T26083] ? __sys_sendmsg+0x2a0/0x2a0 [ 3306.501580][T26083] ? __lock_acquire+0x7d40/0x7d40 [ 3306.506644][T26083] __se_sys_sendmsg+0x1c2/0x2b0 [ 3306.511507][T26083] ? __x64_sys_sendmsg+0x80/0x80 [ 3306.516553][T26083] ? lockdep_hardirqs_on+0x98/0x150 [ 3306.521906][T26083] do_syscall_64+0x55/0xa0 [ 3306.526756][T26083] ? clear_bhb_loop+0x40/0x90 [ 3306.531440][T26083] ? clear_bhb_loop+0x40/0x90 [ 3306.536321][T26083] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3306.542422][T26083] RIP: 0033:0x7f884ab9c819 [ 3306.547078][T26083] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3306.567358][T26083] RSP: 002b:00007f884bb31028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3306.576066][T26083] RAX: ffffffffffffffda RBX: 00007f884ae15fa0 RCX: 00007f884ab9c819 [ 3306.584138][T26083] RDX: 0000000020044000 RSI: 00002000000004c0 RDI: 0000000000000003 [ 3306.592215][T26083] RBP: 00007f884bb31090 R08: 0000000000000000 R09: 0000000000000000 [ 3306.600467][T26083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3306.608565][T26083] R13: 00007f884ae16038 R14: 00007f884ae15fa0 R15: 00007ffe0b65bf38 [ 3306.616569][T26083] [ 3306.633998][T26085] netlink: 64859 bytes leftover after parsing attributes in process `syz.4.16807'. [ 3306.740860][ T1143] veth1_vlan: left allmulticast mode [ 3306.747386][ T1143] veth1_vlan: left promiscuous mode [ 3306.756156][ T1143] veth0_vlan: left promiscuous mode [ 3310.968966][ T1143] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3311.031372][ T1143] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3311.475906][ T1143] bond0 (unregistering): Released all slaves [ 3311.528656][T26098] netlink: 1047 bytes leftover after parsing attributes in process `syz.5.16810'. [ 3311.538143][T26098] bridge_slave_1: default FDB implementation only supports local addresses [ 3311.550161][T26094] netlink: 'syz.4.16800': attribute type 10 has an invalid length. [ 3311.891098][T26112] netlink: 1047 bytes leftover after parsing attributes in process `syz.1.16803'. [ 3311.908317][T26112] bridge_slave_1: default FDB implementation only supports local addresses [ 3311.927096][T26109] netlink: 1047 bytes leftover after parsing attributes in process `syz.5.16815'. [ 3311.952625][T26109] bridge_slave_1: default FDB implementation only supports local addresses [ 3312.674858][T26117] netlink: 'syz.7.16805': attribute type 10 has an invalid length. [ 3312.682847][T26117] netlink: 40 bytes leftover after parsing attributes in process `syz.7.16805'. [ 3312.713726][T26117] team0: entered promiscuous mode [ 3312.719109][T26117] team_slave_0: entered promiscuous mode [ 3312.728131][T26117] team_slave_1: entered promiscuous mode [ 3312.734414][T26117] team0: entered allmulticast mode [ 3312.742118][T26117] team_slave_0: entered allmulticast mode [ 3312.748460][T26117] team_slave_1: entered allmulticast mode [ 3312.756748][T26117] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 3313.070939][T26129] FAULT_INJECTION: forcing a failure. [ 3313.070939][T26129] name failslab, interval 1, probability 0, space 0, times 0 [ 3313.073598][T26126] netlink: 60 bytes leftover after parsing attributes in process `syz.5.16812'. [ 3313.099809][T26129] CPU: 0 PID: 26129 Comm: syz.1.16813 Not tainted syzkaller #0 [ 3313.107596][T26129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3313.118764][T26129] Call Trace: [ 3313.122233][T26129] [ 3313.125199][T26129] dump_stack_lvl+0x18c/0x250 [ 3313.130059][T26129] ? show_regs_print_info+0x20/0x20 [ 3313.135675][T26129] ? load_image+0x420/0x420 [ 3313.140225][T26129] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 3313.146243][T26129] ? __asan_memset+0x22/0x40 [ 3313.150847][T26129] should_fail_ex+0x39d/0x4d0 [ 3313.155557][T26129] should_failslab+0x9/0x20 [ 3313.160179][T26129] slab_pre_alloc_hook+0x59/0x310 [ 3313.165427][T26129] ? __debug_object_init+0xec/0x450 [ 3313.170819][T26129] kmem_cache_alloc+0x5a/0x2d0 [ 3313.175870][T26129] ? slab_build_skb+0x2b/0x3f0 [ 3313.180809][T26129] slab_build_skb+0x2b/0x3f0 [ 3313.185414][T26129] bpf_prog_test_run_skb+0x3c8/0x12b0 [ 3313.190885][T26129] ? __fget_files+0x28/0x4b0 [ 3313.195665][T26129] ? __fget_files+0x28/0x4b0 [ 3313.200872][T26129] ? __fget_files+0x43d/0x4b0 [ 3313.205751][T26129] ? cpu_online+0x60/0x60 [ 3313.210228][T26129] bpf_prog_test_run+0x321/0x390 [ 3313.215182][T26129] __sys_bpf+0x49d/0x890 [ 3313.219519][T26129] ? bpf_link_show_fdinfo+0x390/0x390 [ 3313.225255][T26129] ? lock_chain_count+0x20/0x20 [ 3313.230128][T26129] __x64_sys_bpf+0x7c/0x90 [ 3313.234547][T26129] do_syscall_64+0x55/0xa0 [ 3313.238970][T26129] ? clear_bhb_loop+0x40/0x90 [ 3313.243660][T26129] ? clear_bhb_loop+0x40/0x90 [ 3313.248358][T26129] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3313.254253][T26129] RIP: 0033:0x7f94a439c819 [ 3313.258668][T26129] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3313.278450][T26129] RSP: 002b:00007f94a51da028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3313.286966][T26129] RAX: ffffffffffffffda RBX: 00007f94a4615fa0 RCX: 00007f94a439c819 [ 3313.295116][T26129] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 000000000000000a [ 3313.303261][T26129] RBP: 00007f94a51da090 R08: 0000000000000000 R09: 0000000000000000 [ 3313.311239][T26129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3313.319574][T26129] R13: 00007f94a4616038 R14: 00007f94a4615fa0 R15: 00007ffe72d40008 [ 3313.328081][T26129] [ 3313.531240][T26137] FAULT_INJECTION: forcing a failure. [ 3313.531240][T26137] name failslab, interval 1, probability 0, space 0, times 0 [ 3313.613776][T26137] CPU: 1 PID: 26137 Comm: syz.1.16818 Not tainted syzkaller #0 [ 3313.621493][T26137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3313.631576][T26137] Call Trace: [ 3313.634865][T26137] [ 3313.637799][T26137] dump_stack_lvl+0x18c/0x250 [ 3313.642490][T26137] ? show_regs_print_info+0x20/0x20 [ 3313.647694][T26137] ? load_image+0x420/0x420 [ 3313.652206][T26137] ? __might_sleep+0xe0/0xe0 [ 3313.656800][T26137] ? __lock_acquire+0x7d40/0x7d40 [ 3313.661837][T26137] ? perf_trace_lock+0xfc/0x3b0 [ 3313.666694][T26137] should_fail_ex+0x39d/0x4d0 [ 3313.671382][T26137] should_failslab+0x9/0x20 [ 3313.675887][T26137] slab_pre_alloc_hook+0x59/0x310 [ 3313.680916][T26137] ? __get_vm_area_node+0x125/0x370 [ 3313.686174][T26137] __kmem_cache_alloc_node+0x53/0x250 [ 3313.691598][T26137] ? __get_vm_area_node+0x125/0x370 [ 3313.696822][T26137] kmalloc_node_trace+0x26/0xe0 [ 3313.701723][T26137] __get_vm_area_node+0x125/0x370 [ 3313.706757][T26137] __vmalloc_node_range+0x36e/0x1330 [ 3313.712045][T26137] ? netlink_sendmsg+0x602/0xbf0 [ 3313.716999][T26137] ? netlink_insert+0x109f/0x13a0 [ 3313.722130][T26137] ? netlink_data_ready+0x10/0x10 [ 3313.727189][T26137] ? free_vm_area+0x50/0x50 [ 3313.731789][T26137] ? netlink_sendmsg+0x602/0xbf0 [ 3313.736745][T26137] vmalloc+0x79/0x90 [ 3313.740734][T26137] ? netlink_sendmsg+0x602/0xbf0 [ 3313.745782][T26137] netlink_sendmsg+0x602/0xbf0 [ 3313.750666][T26137] ? netlink_getsockopt+0x590/0x590 [ 3313.755897][T26137] ? aa_sock_msg_perm+0x94/0x150 [ 3313.760941][T26137] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 3313.766234][T26137] ? security_socket_sendmsg+0x80/0xa0 [ 3313.771820][T26137] sock_write_iter+0x2df/0x420 [ 3313.776680][T26137] ? sock_read_iter+0x3e0/0x3e0 [ 3313.781834][T26137] ? common_file_perm+0x198/0x1f0 [ 3313.787480][T26137] vfs_write+0x46c/0x990 [ 3313.792235][T26137] ? file_end_write+0x250/0x250 [ 3313.797576][T26137] ? __fget_files+0x43d/0x4b0 [ 3313.802533][T26137] ? __fdget_pos+0x1d8/0x330 [ 3313.807162][T26137] ? ksys_write+0x75/0x260 [ 3313.811671][T26137] ksys_write+0x150/0x260 [ 3313.816184][T26137] ? __ia32_sys_read+0x90/0x90 [ 3313.822651][T26137] ? lockdep_hardirqs_on+0x98/0x150 [ 3313.828307][T26137] do_syscall_64+0x55/0xa0 [ 3313.832966][T26137] ? clear_bhb_loop+0x40/0x90 [ 3313.837929][T26137] ? clear_bhb_loop+0x40/0x90 [ 3313.842707][T26137] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3313.848981][T26137] RIP: 0033:0x7f94a439c819 [ 3313.853431][T26137] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3313.874047][T26137] RSP: 002b:00007f94a51da028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3313.882967][T26137] RAX: ffffffffffffffda RBX: 00007f94a4615fa0 RCX: 00007f94a439c819 [ 3313.892153][T26137] RDX: 000000000000fe33 RSI: 0000200000000000 RDI: 0000000000000011 [ 3313.901525][T26137] RBP: 00007f94a51da090 R08: 0000000000000000 R09: 0000000000000000 [ 3313.910573][T26137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3313.919352][T26137] R13: 00007f94a4616038 R14: 00007f94a4615fa0 R15: 00007ffe72d40008 [ 3313.927743][T26137] [ 3313.950197][T26135] netlink: 'syz.4.16817': attribute type 33 has an invalid length. [ 3313.960752][T26137] warn_alloc: 1 callbacks suppressed [ 3313.960771][T26137] syz.1.16818: vmalloc error: size 65408, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz1,mems_allowed=0-1 [ 3313.961018][T26137] CPU: 1 PID: 26137 Comm: syz.1.16818 Not tainted syzkaller #0 [ 3313.961036][T26137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3313.961047][T26137] Call Trace: [ 3313.961055][T26137] [ 3313.961066][T26137] dump_stack_lvl+0x18c/0x250 [ 3313.961101][T26137] ? show_regs_print_info+0x20/0x20 [ 3313.961126][T26137] ? load_image+0x420/0x420 [ 3313.961151][T26137] ? cpuset_print_current_mems_allowed+0x1f/0x360 [ 3313.961174][T26137] ? cpuset_print_current_mems_allowed+0x2e7/0x360 [ 3313.961198][T26137] warn_alloc+0x246/0x340 [ 3313.961222][T26137] ? __get_vm_area_node+0x125/0x370 [ 3313.961249][T26137] ? zone_watermark_ok_safe+0x230/0x230 [ 3313.961275][T26137] ? rcu_is_watching+0x15/0xb0 [ 3313.961304][T26137] ? __get_vm_area_node+0x356/0x370 [ 3313.961335][T26137] __vmalloc_node_range+0x393/0x1330 [ 3313.961357][T26137] ? netlink_insert+0x109f/0x13a0 [ 3313.961402][T26137] ? netlink_data_ready+0x10/0x10 [ 3313.961429][T26137] ? free_vm_area+0x50/0x50 [ 3313.961460][T26137] ? netlink_sendmsg+0x602/0xbf0 [ 3313.961484][T26137] vmalloc+0x79/0x90 [ 3313.961506][T26137] ? netlink_sendmsg+0x602/0xbf0 [ 3313.961530][T26137] netlink_sendmsg+0x602/0xbf0 [ 3313.961564][T26137] ? netlink_getsockopt+0x590/0x590 [ 3313.961591][T26137] ? aa_sock_msg_perm+0x94/0x150 [ 3313.961615][T26137] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 3313.961636][T26137] ? security_socket_sendmsg+0x80/0xa0 [ 3313.961660][T26137] sock_write_iter+0x2df/0x420 [ 3313.961683][T26137] ? sock_read_iter+0x3e0/0x3e0 [ 3313.961712][T26137] ? common_file_perm+0x198/0x1f0 [ 3313.961742][T26137] vfs_write+0x46c/0x990 [ 3313.961774][T26137] ? file_end_write+0x250/0x250 [ 3313.961801][T26137] ? __fget_files+0x43d/0x4b0 [ 3313.961834][T26137] ? __fdget_pos+0x1d8/0x330 [ 3313.961854][T26137] ? ksys_write+0x75/0x260 [ 3313.961880][T26137] ksys_write+0x150/0x260 [ 3313.961905][T26137] ? __ia32_sys_read+0x90/0x90 [ 3313.961932][T26137] ? lockdep_hardirqs_on+0x98/0x150 [ 3313.961963][T26137] do_syscall_64+0x55/0xa0 [ 3313.961979][T26137] ? clear_bhb_loop+0x40/0x90 [ 3313.962000][T26137] ? clear_bhb_loop+0x40/0x90 [ 3313.962023][T26137] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3313.962044][T26137] RIP: 0033:0x7f94a439c819 [ 3313.962061][T26137] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3313.962077][T26137] RSP: 002b:00007f94a51da028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3313.962096][T26137] RAX: ffffffffffffffda RBX: 00007f94a4615fa0 RCX: 00007f94a439c819 [ 3313.962110][T26137] RDX: 000000000000fe33 RSI: 0000200000000000 RDI: 0000000000000011 [ 3313.962122][T26137] RBP: 00007f94a51da090 R08: 0000000000000000 R09: 0000000000000000 [ 3313.962134][T26137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3313.962146][T26137] R13: 00007f94a4616038 R14: 00007f94a4615fa0 R15: 00007ffe72d40008 [ 3313.962176][T26137] [ 3313.962275][T26137] Mem-Info: [ 3313.962289][T26137] active_anon:14436 inactive_anon:0 isolated_anon:0 [ 3313.962289][T26137] active_file:21424 inactive_file:41218 isolated_file:0 [ 3313.962289][T26137] unevictable:768 dirty:281 writeback:0 [ 3313.962289][T26137] slab_reclaimable:11686 slab_unreclaimable:98711 [ 3313.962289][T26137] mapped:25316 shmem:1451 pagetables:854 [ 3313.962289][T26137] sec_pagetables:0 bounce:0 [ 3313.962289][T26137] kernel_misc_reclaimable:0 [ 3313.962289][T26137] free:1328090 free_pcp:3132 free_cma:0 [ 3313.962341][T26137] Node 0 active_anon:57744kB inactive_anon:0kB active_file:85696kB inactive_file:164668kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:101264kB dirty:1120kB writeback:0kB shmem:4268kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:11328kB pagetables:3416kB sec_pagetables:0kB all_unreclaimable? no [ 3314.423526][T26135] netlink: 152 bytes leftover after parsing attributes in process `syz.4.16817'. [ 3314.427000][T26137] Node 1 active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:204kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:1536kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:16kB pagetables:0kB sec_pagetables:0kB all_unreclaimable? no [ 3314.465623][T26136] netlink: 1047 bytes leftover after parsing attributes in process `syz.5.16816'. [ 3314.481731][T26136] bridge_slave_1: default FDB implementation only supports local addresses [ 3314.508915][T26143] netlink: 1047 bytes leftover after parsing attributes in process `syz.7.16819'. [ 3314.525007][T26137] Node 0 DMA free:15360kB boost:0kB min:204kB low:252kB high:300kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3314.554816][T26143] bridge_slave_1: default FDB implementation only supports local addresses [ 3314.563535][T26137] lowmem_reserve[]: 0 2521 2522 2522 2522 [ 3314.572576][T26137] Node 0 DMA32 free:1384712kB boost:0kB min:34644kB low:43304kB high:51964kB reserved_highatomic:0KB active_anon:57780kB inactive_anon:0kB active_file:85696kB inactive_file:163852kB unevictable:1536kB writepending:1172kB present:3129332kB managed:2586952kB mlocked:0kB bounce:0kB free_pcp:13612kB local_pcp:9680kB free_cma:0kB [ 3314.627126][T26137] lowmem_reserve[]: 0 0 0 0 0 [ 3314.635182][T26137] Node 0 Normal free:8kB boost:0kB min:8kB low:8kB high:8kB reserved_highatomic:0KB active_anon:40kB inactive_anon:0kB active_file:0kB inactive_file:816kB unevictable:0kB writepending:0kB present:1048576kB managed:872kB mlocked:0kB bounce:0kB free_pcp:8kB local_pcp:0kB free_cma:0kB [ 3314.663851][T26137] lowmem_reserve[]: 0 0 0 0 0 [ 3314.672489][T26137] Node 1 Normal free:3911324kB boost:0kB min:55244kB low:69052kB high:82860kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:204kB unevictable:1536kB writepending:4kB present:4194304kB managed:4117312kB mlocked:0kB bounce:0kB free_pcp:1344kB local_pcp:0kB free_cma:0kB [ 3314.702291][T26137] lowmem_reserve[]: 0 0 0 0 0 [ 3314.738136][T26137] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 3314.783526][T26137] Node 0 DMA32: 216*4kB (UM) 997*8kB (UME) 1144*16kB (UME) 2134*32kB (UME) 1915*64kB (UME) 903*128kB (UME) 299*256kB (UM) 104*512kB (UM) 20*1024kB (UM) 4*2048kB (UM) 218*4096kB (UM) = 1384968kB [ 3314.847421][T26137] Node 0 Normal: 0*4kB 1*8kB (M) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8kB [ 3314.946455][T26137] Node 1 Normal: 237*4kB (UE) 67*8kB (UE) 45*16kB (UE) 230*32kB (UE) 91*64kB (UME) 33*128kB (UME) 8*256kB (UE) 3*512kB (UME) 3*1024kB (UE) 1*2048kB (E) 948*4096kB (M) = 3911324kB [ 3314.972906][T26137] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 3314.993008][T26137] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 3315.023337][T26137] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 3315.040697][T26137] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 3315.042897][T26152] netlink: 1047 bytes leftover after parsing attributes in process `syz.4.16822'. [ 3315.050947][T26137] 64051 total pagecache pages [ 3315.050966][T26137] 0 pages in swap cache [ 3315.050973][T26137] Free swap = 124996kB [ 3315.050981][T26137] Total swap = 124996kB [ 3315.050998][T26137] 2097051 pages RAM [ 3315.051006][T26137] 0 pages HighMem/MovableOnly [ 3315.051013][T26137] 416927 pages reserved [ 3315.051020][T26137] 0 pages cma reserved [ 3315.105674][T26152] bridge_slave_1: default FDB implementation only supports local addresses [ 3315.348952][T26172] netlink: 60 bytes leftover after parsing attributes in process `syz.1.16830'. [ 3316.139091][T26177] netlink: 'syz.4.16832': attribute type 1 has an invalid length. [ 3316.633176][T26194] __nla_validate_parse: 3 callbacks suppressed [ 3316.633239][T26194] netlink: 1047 bytes leftover after parsing attributes in process `syz.1.16838'. [ 3316.660340][T26194] bridge_slave_1: default FDB implementation only supports local addresses [ 3316.708523][T26203] FAULT_INJECTION: forcing a failure. [ 3316.708523][T26203] name failslab, interval 1, probability 0, space 0, times 0 [ 3316.754005][T26203] CPU: 1 PID: 26203 Comm: syz.4.16843 Not tainted syzkaller #0 [ 3316.762059][T26203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3316.772219][T26203] Call Trace: [ 3316.775502][T26203] [ 3316.778445][T26203] dump_stack_lvl+0x18c/0x250 [ 3316.783133][T26203] ? show_regs_print_info+0x20/0x20 [ 3316.788611][T26203] ? load_image+0x420/0x420 [ 3316.793117][T26203] ? __might_sleep+0xe0/0xe0 [ 3316.797797][T26203] ? __lock_acquire+0x7d40/0x7d40 [ 3316.802824][T26203] should_fail_ex+0x39d/0x4d0 [ 3316.807512][T26203] should_failslab+0x9/0x20 [ 3316.812023][T26203] slab_pre_alloc_hook+0x59/0x310 [ 3316.817059][T26203] ? sk_prot_alloc+0xe7/0x210 [ 3316.821925][T26203] ? sk_prot_alloc+0xe7/0x210 [ 3316.826697][T26203] __kmem_cache_alloc_node+0x53/0x250 [ 3316.832086][T26203] ? sk_prot_alloc+0xe7/0x210 [ 3316.836862][T26203] __kmalloc+0xa4/0x230 [ 3316.841198][T26203] sk_prot_alloc+0xe7/0x210 [ 3316.845726][T26203] ? sk_alloc+0x24/0x360 [ 3316.849975][T26203] sk_alloc+0x3a/0x360 [ 3316.854479][T26203] ? bpf_ctx_init+0x163/0x1a0 [ 3316.859245][T26203] ? bpf_prog_test_run_skb+0x273/0x12b0 [ 3316.865431][T26203] bpf_prog_test_run_skb+0x3a5/0x12b0 [ 3316.870943][T26203] ? __fget_files+0x28/0x4b0 [ 3316.875651][T26203] ? __fget_files+0x28/0x4b0 [ 3316.880260][T26203] ? __fget_files+0x43d/0x4b0 [ 3316.885124][T26203] ? cpu_online+0x60/0x60 [ 3316.889525][T26203] bpf_prog_test_run+0x321/0x390 [ 3316.894672][T26203] __sys_bpf+0x49d/0x890 [ 3316.899232][T26203] ? bpf_link_show_fdinfo+0x390/0x390 [ 3316.906403][T26203] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 3316.912772][T26203] __x64_sys_bpf+0x7c/0x90 [ 3316.917206][T26203] do_syscall_64+0x55/0xa0 [ 3316.921622][T26203] ? clear_bhb_loop+0x40/0x90 [ 3316.926409][T26203] ? clear_bhb_loop+0x40/0x90 [ 3316.931275][T26203] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3316.937272][T26203] RIP: 0033:0x7f842a19c819 [ 3316.941692][T26203] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3316.961414][T26203] RSP: 002b:00007f842b05e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3316.969859][T26203] RAX: ffffffffffffffda RBX: 00007f842a415fa0 RCX: 00007f842a19c819 [ 3316.978210][T26203] RDX: 0000000000000050 RSI: 00002000000003c0 RDI: 000000000000000a [ 3316.986201][T26203] RBP: 00007f842b05e090 R08: 0000000000000000 R09: 0000000000000000 [ 3316.994173][T26203] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3317.002195][T26203] R13: 00007f842a416038 R14: 00007f842a415fa0 R15: 00007ffc2fb8e348 [ 3317.010269][T26203] [ 3317.266160][T26206] netlink: 209852 bytes leftover after parsing attributes in process `syz.7.16841'. [ 3318.159339][T26229] netlink: 'syz.5.16847': attribute type 1 has an invalid length. [ 3319.462266][T26256] netlink: 1047 bytes leftover after parsing attributes in process `syz.4.16858'. [ 3319.485897][T26256] bridge_slave_1: default FDB implementation only supports local addresses [ 3322.614657][T26268] netlink: 'syz.1.16860': attribute type 1 has an invalid length. [ 3323.264952][T26292] netlink: 'syz.4.16867': attribute type 10 has an invalid length. [ 3323.288692][T26292] netlink: 2 bytes leftover after parsing attributes in process `syz.4.16867'. [ 3323.302167][T26292] bond0: entered promiscuous mode [ 3323.315125][T26292] bond_slave_1: entered promiscuous mode [ 3323.386861][T26299] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.16871'. [ 3323.520165][T26299] netlink: 'syz.1.16871': attribute type 10 has an invalid length. [ 3323.678082][T26311] FAULT_INJECTION: forcing a failure. [ 3323.678082][T26311] name failslab, interval 1, probability 0, space 0, times 0 [ 3323.681811][T26299] team0: Device xfrm0 is of different type [ 3323.721587][T26311] CPU: 1 PID: 26311 Comm: syz.5.16876 Not tainted syzkaller #0 [ 3323.729816][T26311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3323.740688][T26311] Call Trace: [ 3323.744175][T26311] [ 3323.747129][T26311] dump_stack_lvl+0x18c/0x250 [ 3323.751931][T26311] ? __stack_depot_save+0x1f/0x630 [ 3323.757174][T26311] ? show_regs_print_info+0x20/0x20 [ 3323.762591][T26311] ? load_image+0x420/0x420 [ 3323.767227][T26311] ? kasan_set_track+0x5f/0x70 [ 3323.772227][T26311] should_fail_ex+0x39d/0x4d0 [ 3323.777035][T26311] should_failslab+0x9/0x20 [ 3323.781663][T26311] slab_pre_alloc_hook+0x59/0x310 [ 3323.786773][T26311] kmem_cache_alloc+0x5a/0x2d0 [ 3323.791587][T26311] ? dst_alloc+0x105/0x170 [ 3323.796133][T26311] dst_alloc+0x105/0x170 [ 3323.800431][T26311] ip_route_output_key_hash_rcu+0x14f6/0x2370 [ 3323.806632][T26311] ? ip_route_output_key_hash+0x13d/0x330 [ 3323.812485][T26311] ip_route_output_key_hash+0x1f3/0x330 [ 3323.818072][T26311] ? kfree+0x31/0x190 [ 3323.822089][T26311] ? ip_route_input_rcu+0x30f0/0x30f0 [ 3323.827507][T26311] ? ip_cmsg_send+0x9c0/0xa70 [ 3323.832222][T26311] ip_route_output_flow+0x2a/0x150 [ 3323.837537][T26311] ? security_sk_classify_flow+0x7b/0x90 [ 3323.843194][T26311] raw_sendmsg+0x129a/0x1c00 [ 3323.847973][T26311] ? compat_raw_ioctl+0x70/0x70 [ 3323.853095][T26311] ? tomoyo_socket_sendmsg_permission+0x216/0x2f0 [ 3323.859743][T26311] ? sock_rps_record_flow+0x19/0x3f0 [ 3323.865142][T26311] ? inet_sendmsg+0x7c/0x2f0 [ 3323.869854][T26311] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 3323.875507][T26311] ? security_socket_sendmsg+0x80/0xa0 [ 3323.880986][T26311] ? inet_send_prepare+0x260/0x260 [ 3323.886189][T26311] ____sys_sendmsg+0x5ba/0x960 [ 3323.891260][T26311] ? __lock_acquire+0x7d40/0x7d40 [ 3323.896321][T26311] ? __sys_sendmsg_sock+0x30/0x30 [ 3323.901370][T26311] ? __import_iovec+0x3fa/0x850 [ 3323.906335][T26311] ? import_iovec+0x73/0xa0 [ 3323.910993][T26311] ___sys_sendmsg+0x2a6/0x360 [ 3323.915903][T26311] ? __sys_sendmsg+0x2a0/0x2a0 [ 3323.920889][T26311] ? __lock_acquire+0x7d40/0x7d40 [ 3323.926139][T26311] __se_sys_sendmsg+0x1c2/0x2b0 [ 3323.931019][T26311] ? __x64_sys_sendmsg+0x80/0x80 [ 3323.936165][T26311] ? lockdep_hardirqs_on+0x98/0x150 [ 3323.941472][T26311] do_syscall_64+0x55/0xa0 [ 3323.946333][T26311] ? clear_bhb_loop+0x40/0x90 [ 3323.951026][T26311] ? clear_bhb_loop+0x40/0x90 [ 3323.955746][T26311] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3323.961927][T26311] RIP: 0033:0x7f19cd79c819 [ 3323.966364][T26311] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3323.986170][T26311] RSP: 002b:00007f19ce6b6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3323.994614][T26311] RAX: ffffffffffffffda RBX: 00007f19cda15fa0 RCX: 00007f19cd79c819 [ 3324.003667][T26311] RDX: 0000000020002880 RSI: 0000200000001640 RDI: 0000000000000003 [ 3324.011657][T26311] RBP: 00007f19ce6b6090 R08: 0000000000000000 R09: 0000000000000000 [ 3324.019739][T26311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3324.027811][T26311] R13: 00007f19cda16038 R14: 00007f19cda15fa0 R15: 00007fff6ddeacb8 [ 3324.035997][T26311] [ 3324.231010][T26317] FAULT_INJECTION: forcing a failure. [ 3324.231010][T26317] name failslab, interval 1, probability 0, space 0, times 0 [ 3324.252041][T26317] CPU: 1 PID: 26317 Comm: syz.7.16877 Not tainted syzkaller #0 [ 3324.259699][T26317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3324.270137][T26317] Call Trace: [ 3324.273438][T26317] [ 3324.276387][T26317] dump_stack_lvl+0x18c/0x250 [ 3324.281110][T26317] ? show_regs_print_info+0x20/0x20 [ 3324.286371][T26317] ? load_image+0x420/0x420 [ 3324.290912][T26317] ? perf_trace_lock_acquire+0x104/0x410 [ 3324.296584][T26317] ? verify_lock_unused+0x140/0x140 [ 3324.301839][T26317] ? perf_trace_lock_acquire+0x104/0x410 [ 3324.307712][T26317] should_fail_ex+0x39d/0x4d0 [ 3324.312419][T26317] should_failslab+0x9/0x20 [ 3324.316952][T26317] slab_pre_alloc_hook+0x59/0x310 [ 3324.322037][T26317] kmem_cache_alloc+0x5a/0x2d0 [ 3324.326844][T26317] ? skb_clone+0x1eb/0x370 [ 3324.331362][T26317] skb_clone+0x1eb/0x370 [ 3324.335669][T26317] __netlink_deliver_tap+0x41c/0x830 [ 3324.341169][T26317] ? netlink_deliver_tap+0x2e/0x1b0 [ 3324.346469][T26317] netlink_deliver_tap+0x19c/0x1b0 [ 3324.351620][T26317] netlink_unicast+0x72c/0x8d0 [ 3324.356430][T26317] netlink_sendmsg+0x8d0/0xbf0 [ 3324.361221][T26317] ? netlink_getsockopt+0x590/0x590 [ 3324.366425][T26317] ? aa_sock_msg_perm+0x94/0x150 [ 3324.371375][T26317] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 3324.376770][T26317] ? security_socket_sendmsg+0x80/0xa0 [ 3324.382344][T26317] ? netlink_getsockopt+0x590/0x590 [ 3324.388088][T26317] ____sys_sendmsg+0x5ba/0x960 [ 3324.392862][T26317] ? __asan_memset+0x22/0x40 [ 3324.397454][T26317] ? __sys_sendmsg_sock+0x30/0x30 [ 3324.402587][T26317] ? __import_iovec+0x5f2/0x850 [ 3324.407475][T26317] ? import_iovec+0x73/0xa0 [ 3324.411994][T26317] ___sys_sendmsg+0x2a6/0x360 [ 3324.417220][T26317] ? __sys_sendmsg+0x2a0/0x2a0 [ 3324.422068][T26317] ? __lock_acquire+0x7d40/0x7d40 [ 3324.427132][T26317] __se_sys_sendmsg+0x1c2/0x2b0 [ 3324.432016][T26317] ? __x64_sys_sendmsg+0x80/0x80 [ 3324.437147][T26317] ? lockdep_hardirqs_on+0x98/0x150 [ 3324.442348][T26317] do_syscall_64+0x55/0xa0 [ 3324.446766][T26317] ? clear_bhb_loop+0x40/0x90 [ 3324.451450][T26317] ? clear_bhb_loop+0x40/0x90 [ 3324.456155][T26317] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3324.462075][T26317] RIP: 0033:0x7f884ab9c819 [ 3324.466551][T26317] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3324.486550][T26317] RSP: 002b:00007f884bb31028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3324.495184][T26317] RAX: ffffffffffffffda RBX: 00007f884ae15fa0 RCX: 00007f884ab9c819 [ 3324.503284][T26317] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 3324.511319][T26317] RBP: 00007f884bb31090 R08: 0000000000000000 R09: 0000000000000000 [ 3324.519399][T26317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3324.527463][T26317] R13: 00007f884ae16038 R14: 00007f884ae15fa0 R15: 00007ffe0b65bf38 [ 3324.535471][T26317] [ 3324.901742][T26324] netlink: 'syz.7.16881': attribute type 10 has an invalid length. [ 3324.912781][T26324] netlink: 2 bytes leftover after parsing attributes in process `syz.7.16881'. [ 3324.922834][T26324] bond0: entered promiscuous mode [ 3324.964203][T26324] bond_slave_0: entered promiscuous mode [ 3324.984899][T26324] bond_slave_1: entered promiscuous mode [ 3325.568540][T26343] netlink: 199836 bytes leftover after parsing attributes in process `syz.7.16888'. [ 3325.703740][T26343] netlink: 'syz.7.16888': attribute type 10 has an invalid length. [ 3325.777177][T26343] xfrm0: entered promiscuous mode [ 3325.783233][T26343] xfrm0: entered allmulticast mode [ 3325.790277][T26343] team0: Device xfrm0 is of different type [ 3326.317455][T26361] netlink: 1047 bytes leftover after parsing attributes in process `syz.7.16903'. [ 3326.332918][T26361] bridge_slave_1: default FDB implementation only supports local addresses [ 3326.445236][T26367] netlink: 'syz.5.16894': attribute type 10 has an invalid length. [ 3326.459139][T26367] netlink: 2 bytes leftover after parsing attributes in process `syz.5.16894'. [ 3326.469215][T26367] bond0: entered promiscuous mode [ 3326.480825][T26367] bond_slave_0: entered promiscuous mode [ 3326.487887][T26367] bond_slave_1: entered promiscuous mode [ 3326.502634][T26367] bridge0: port 4(bond0) entered blocking state [ 3326.519322][T26367] bridge0: port 4(bond0) entered disabled state [ 3326.527791][T26367] bond0: entered allmulticast mode [ 3326.535092][T26367] bond_slave_0: entered allmulticast mode [ 3326.540968][T26367] bond_slave_1: entered allmulticast mode [ 3326.581586][T26367] bridge0: port 4(bond0) entered blocking state [ 3326.588147][T26367] bridge0: port 4(bond0) entered forwarding state [ 3327.192887][T26381] netlink: 'syz.1.16901': attribute type 27 has an invalid length. [ 3327.208861][T26381] netlink: 2418 bytes leftover after parsing attributes in process `syz.1.16901'. [ 3327.859860][T26395] netlink: 1047 bytes leftover after parsing attributes in process `syz.1.16907'. [ 3327.901336][T26395] bridge_slave_1: default FDB implementation only supports local addresses [ 3328.040832][ T1282] ieee802154 phy0 wpan0: encryption failed: -22 [ 3328.049018][ T1282] ieee802154 phy1 wpan1: encryption failed: -22 [ 3330.661017][T26400] netlink: 'syz.4.16908': attribute type 21 has an invalid length. [ 3330.685088][T26400] netlink: 156 bytes leftover after parsing attributes in process `syz.4.16908'. [ 3330.970360][T26405] syzkaller0: left promiscuous mode [ 3330.981317][T26405] syzkaller0: left allmulticast mode [ 3331.311762][T26418] netlink: 199836 bytes leftover after parsing attributes in process `syz.5.16918'. [ 3331.464207][T26418] netlink: 'syz.5.16918': attribute type 10 has an invalid length. [ 3331.523342][T26418] xfrm0: entered promiscuous mode [ 3331.555602][T26418] xfrm0: entered allmulticast mode [ 3331.564861][T26418] team0: Device xfrm0 is of different type [ 3331.620097][T26420] netlink: 1047 bytes leftover after parsing attributes in process `syz.4.16919'. [ 3331.660521][T26420] bridge_slave_1: default FDB implementation only supports local addresses [ 3335.126877][T26440] FAULT_INJECTION: forcing a failure. [ 3335.126877][T26440] name failslab, interval 1, probability 0, space 0, times 0 [ 3335.153616][T26440] CPU: 0 PID: 26440 Comm: syz.1.16926 Not tainted syzkaller #0 [ 3335.161523][T26440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3335.172553][T26440] Call Trace: [ 3335.176566][T26440] [ 3335.179522][T26440] dump_stack_lvl+0x18c/0x250 [ 3335.185048][T26440] ? show_regs_print_info+0x20/0x20 [ 3335.190479][T26440] ? load_image+0x420/0x420 [ 3335.195132][T26440] ? __might_sleep+0xe0/0xe0 [ 3335.199762][T26440] ? __lock_acquire+0x7d40/0x7d40 [ 3335.204999][T26440] should_fail_ex+0x39d/0x4d0 [ 3335.209976][T26440] should_failslab+0x9/0x20 [ 3335.214562][T26440] slab_pre_alloc_hook+0x59/0x310 [ 3335.219635][T26440] ? _raw_spin_unlock+0x40/0x40 [ 3335.224520][T26440] ? string+0x26d/0x2b0 [ 3335.228793][T26440] ? __request_module+0x2d1/0x600 [ 3335.233824][T26440] __kmem_cache_alloc_node+0x53/0x250 [ 3335.239232][T26440] ? __request_module+0x2d1/0x600 [ 3335.244282][T26440] kmalloc_trace+0x2a/0xe0 [ 3335.248731][T26440] __request_module+0x2d1/0x600 [ 3335.253740][T26440] ? module_enforce_rwx_sections+0x150/0x150 [ 3335.259874][T26440] ? __up_read+0x2b6/0x6b0 [ 3335.264311][T26440] ? __crypto_alg_lookup+0x4a8/0x4d0 [ 3335.269703][T26440] crypto_alg_mod_lookup+0x9a/0x570 [ 3335.274910][T26440] crypto_has_alg+0x24/0x110 [ 3335.279515][T26440] xfrm_probe_algs+0x2b1/0x360 [ 3335.284371][T26440] pfkey_register+0x113/0x890 [ 3335.289143][T26440] pfkey_sendmsg+0xc45/0x10e0 [ 3335.293961][T26440] ? __might_sleep+0xe0/0xe0 [ 3335.298677][T26440] ? pfkey_release+0x320/0x320 [ 3335.303533][T26440] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 3335.309581][T26440] ? aa_sock_msg_perm+0x94/0x150 [ 3335.314528][T26440] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 3335.319849][T26440] ? security_socket_sendmsg+0x80/0xa0 [ 3335.325561][T26440] ? pfkey_release+0x320/0x320 [ 3335.330333][T26440] ____sys_sendmsg+0x5ba/0x960 [ 3335.335194][T26440] ? __asan_memset+0x22/0x40 [ 3335.339922][T26440] ? __sys_sendmsg_sock+0x30/0x30 [ 3335.344961][T26440] ? __import_iovec+0x5f2/0x850 [ 3335.349835][T26440] ? import_iovec+0x73/0xa0 [ 3335.354356][T26440] ___sys_sendmsg+0x2a6/0x360 [ 3335.359128][T26440] ? __sys_sendmsg+0x2a0/0x2a0 [ 3335.363940][T26440] ? seqcount_lockdep_reader_access+0x17b/0x1d0 [ 3335.370233][T26440] __se_sys_sendmsg+0x1c2/0x2b0 [ 3335.375204][T26440] ? __x64_sys_sendmsg+0x80/0x80 [ 3335.380270][T26440] ? lockdep_hardirqs_on+0x98/0x150 [ 3335.385479][T26440] do_syscall_64+0x55/0xa0 [ 3335.389892][T26440] ? clear_bhb_loop+0x40/0x90 [ 3335.394778][T26440] ? clear_bhb_loop+0x40/0x90 [ 3335.399489][T26440] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3335.405393][T26440] RIP: 0033:0x7f94a439c819 [ 3335.409829][T26440] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3335.429437][T26440] RSP: 002b:00007f94a51da028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3335.437858][T26440] RAX: ffffffffffffffda RBX: 00007f94a4615fa0 RCX: 00007f94a439c819 [ 3335.445914][T26440] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000005 [ 3335.453888][T26440] RBP: 00007f94a51da090 R08: 0000000000000000 R09: 0000000000000000 [ 3335.461866][T26440] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3335.469847][T26440] R13: 00007f94a4616038 R14: 00007f94a4615fa0 R15: 00007ffe72d40008 [ 3335.477925][T26440] [ 3336.049769][T26462] netlink: 'syz.4.16934': attribute type 3 has an invalid length. [ 3336.066216][T26462] netlink: 130984 bytes leftover after parsing attributes in process `syz.4.16934'. [ 3336.164708][T26465] netlink: 'syz.5.16935': attribute type 10 has an invalid length. [ 3336.189697][T26466] netlink: 1047 bytes leftover after parsing attributes in process `syz.1.16936'. [ 3336.206919][T26466] bridge_slave_1: default FDB implementation only supports local addresses [ 3336.717622][T26478] netlink: 'syz.7.16940': attribute type 10 has an invalid length. [ 3340.160555][T26503] netlink: 'syz.5.16947': attribute type 3 has an invalid length. [ 3340.170891][T26503] netlink: 130984 bytes leftover after parsing attributes in process `syz.5.16947'. [ 3340.566501][T26520] netlink: 1047 bytes leftover after parsing attributes in process `syz.1.16961'. [ 3340.630789][T26520] bridge_slave_1: default FDB implementation only supports local addresses [ 3340.672320][T26521] netlink: 1047 bytes leftover after parsing attributes in process `syz.4.16953'. [ 3340.688806][T26521] bridge_slave_1: default FDB implementation only supports local addresses [ 3340.717110][T26522] netlink: 'syz.5.16956': attribute type 10 has an invalid length. [ 3341.262719][T26533] netlink: 'syz.1.16968': attribute type 10 has an invalid length. [ 3341.272624][T26533] hsr_slave_0: left promiscuous mode [ 3341.309365][T26533] hsr_slave_1: left promiscuous mode [ 3341.832087][T26552] netlink: 'syz.7.16966': attribute type 3 has an invalid length. [ 3341.846700][T26552] netlink: 130984 bytes leftover after parsing attributes in process `syz.7.16966'. [ 3342.047509][T26559] netlink: 1047 bytes leftover after parsing attributes in process `syz.5.16969'. [ 3342.062896][T26559] bridge_slave_1: default FDB implementation only supports local addresses [ 3342.090456][T26564] FAULT_INJECTION: forcing a failure. [ 3342.090456][T26564] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3342.112547][T26564] CPU: 0 PID: 26564 Comm: syz.4.16979 Not tainted syzkaller #0 [ 3342.120346][T26564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3342.130437][T26564] Call Trace: [ 3342.133752][T26564] [ 3342.136710][T26564] dump_stack_lvl+0x18c/0x250 [ 3342.141429][T26564] ? show_regs_print_info+0x20/0x20 [ 3342.146666][T26564] ? load_image+0x420/0x420 [ 3342.151208][T26564] ? __lock_acquire+0x7d40/0x7d40 [ 3342.156281][T26564] should_fail_ex+0x39d/0x4d0 [ 3342.161069][T26564] prepare_alloc_pages+0x1e2/0x5f0 [ 3342.166302][T26564] __alloc_pages+0x134/0x460 [ 3342.171018][T26564] ? rcu_is_watching+0x15/0xb0 [ 3342.175860][T26564] ? zone_statistics+0x170/0x170 [ 3342.180850][T26564] ? __build_skb_around+0x255/0x3d0 [ 3342.186227][T26564] alloc_skb_with_frags+0x23c/0x7b0 [ 3342.191565][T26564] sock_alloc_send_pskb+0x883/0x9a0 [ 3342.196798][T26564] ? sock_kzfree_s+0x50/0x50 [ 3342.201406][T26564] tun_get_user+0x82c/0x3ca0 [ 3342.206049][T26564] ? aa_file_perm+0x11b/0xee0 [ 3342.210747][T26564] ? rcu_read_unlock+0xa0/0xa0 [ 3342.215556][T26564] ? tun_get+0x1c/0x2e0 [ 3342.219727][T26564] ? __lock_acquire+0x7d40/0x7d40 [ 3342.224840][T26564] ? tun_get+0x1c/0x2e0 [ 3342.229005][T26564] tun_chr_write_iter+0x119/0x200 [ 3342.234031][T26564] vfs_write+0x46c/0x990 [ 3342.238283][T26564] ? file_end_write+0x250/0x250 [ 3342.243226][T26564] ? __fget_files+0x43d/0x4b0 [ 3342.247916][T26564] ? __fdget_pos+0x1d8/0x330 [ 3342.252604][T26564] ? ksys_write+0x75/0x260 [ 3342.257027][T26564] ksys_write+0x150/0x260 [ 3342.261364][T26564] ? __ia32_sys_read+0x90/0x90 [ 3342.266143][T26564] ? lockdep_hardirqs_on+0x98/0x150 [ 3342.271523][T26564] do_syscall_64+0x55/0xa0 [ 3342.275969][T26564] ? clear_bhb_loop+0x40/0x90 [ 3342.280661][T26564] ? clear_bhb_loop+0x40/0x90 [ 3342.285346][T26564] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3342.291248][T26564] RIP: 0033:0x7f842a19c819 [ 3342.295666][T26564] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3342.315285][T26564] RSP: 002b:00007f842b05e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3342.323711][T26564] RAX: ffffffffffffffda RBX: 00007f842a415fa0 RCX: 00007f842a19c819 [ 3342.331782][T26564] RDX: 000000000000fdef RSI: 0000200000000300 RDI: 00000000000000c8 [ 3342.339955][T26564] RBP: 00007f842b05e090 R08: 0000000000000000 R09: 0000000000000000 [ 3342.347936][T26564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3342.355910][T26564] R13: 00007f842a416038 R14: 00007f842a415fa0 R15: 00007ffc2fb8e348 [ 3342.363999][T26564] [ 3342.396847][T26567] netlink: 'syz.1.16971': attribute type 1 has an invalid length. [ 3342.501373][T26566] netlink: 202920 bytes leftover after parsing attributes in process `syz.1.16971'. [ 3342.957794][T26580] netlink: 'syz.4.16977': attribute type 10 has an invalid length. [ 3343.655622][T26597] netlink: 'syz.1.16982': attribute type 10 has an invalid length. [ 3343.889360][T26604] netlink: 1047 bytes leftover after parsing attributes in process `syz.5.16984'. [ 3343.937800][T26604] bridge_slave_1: default FDB implementation only supports local addresses [ 3344.599175][T26627] netlink: 'syz.1.16992': attribute type 10 has an invalid length. [ 3344.776371][T26634] netlink: 1047 bytes leftover after parsing attributes in process `syz.4.16993'. [ 3344.800201][T26634] bridge_slave_1: default FDB implementation only supports local addresses [ 3344.838704][T26633] netlink: 1047 bytes leftover after parsing attributes in process `syz.7.16994'. [ 3344.862261][T26633] bridge_slave_1: default FDB implementation only supports local addresses [ 3344.900181][T26638] FAULT_INJECTION: forcing a failure. [ 3344.900181][T26638] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3344.947202][T26638] CPU: 0 PID: 26638 Comm: syz.5.16995 Not tainted syzkaller #0 [ 3344.954915][T26638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3344.965187][T26638] Call Trace: [ 3344.968620][T26638] [ 3344.971654][T26638] dump_stack_lvl+0x18c/0x250 [ 3344.976383][T26638] ? show_regs_print_info+0x20/0x20 [ 3344.981798][T26638] ? load_image+0x420/0x420 [ 3344.986352][T26638] ? __lock_acquire+0x7d40/0x7d40 [ 3344.991602][T26638] should_fail_ex+0x39d/0x4d0 [ 3344.996410][T26638] prepare_alloc_pages+0x1e2/0x5f0 [ 3345.001564][T26638] __alloc_pages+0x134/0x460 [ 3345.006418][T26638] ? zone_statistics+0x170/0x170 [ 3345.011415][T26638] __pmd_alloc+0x9a/0x8b0 [ 3345.015812][T26638] ? mt_find+0x169/0x650 [ 3345.020107][T26638] ? __lock_acquire+0x7d40/0x7d40 [ 3345.025184][T26638] ? __pud_alloc+0x1f0/0x1f0 [ 3345.029816][T26638] ? hugepage_vma_check+0x488/0x5a0 [ 3345.035163][T26638] handle_mm_fault+0xb5d/0x4c00 [ 3345.040315][T26638] ? handle_mm_fault+0xe7/0x4c00 [ 3345.045306][T26638] ? numa_migrate_prep+0x350/0x350 [ 3345.050568][T26638] ? lock_mm_and_find_vma+0x9c/0x2f0 [ 3345.055893][T26638] do_user_addr_fault+0x730/0x12c0 [ 3345.061052][T26638] exc_page_fault+0x64/0x100 [ 3345.065789][T26638] asm_exc_page_fault+0x26/0x30 [ 3345.070755][T26638] RIP: 0010:rep_movs_alternative+0x30/0x90 [ 3345.076708][T26638] Code: f9 40 73 40 83 f9 08 73 21 85 c9 74 0f 8a 06 88 07 48 ff c7 48 ff c6 48 ff c9 75 f1 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 <48> 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 df 83 f9 08 [ 3345.096594][T26638] RSP: 0018:ffffc9000e437a10 EFLAGS: 00050216 [ 3345.102685][T26638] RAX: ffffffff842a2101 RBX: 0000000000000020 RCX: 0000000000000020 [ 3345.110684][T26638] RDX: 0000000000000001 RSI: 000000110c230000 RDI: ffff88805c750240 [ 3345.118678][T26638] RBP: ffffc9000e437bb0 R08: ffff88805c75025f R09: 1ffff1100b8ea04b [ 3345.126943][T26638] R10: dffffc0000000000 R11: ffffed100b8ea04c R12: 000000110c230020 [ 3345.135100][T26638] R13: ffff88805c750240 R14: ffff88805c750240 R15: 000000110c230000 [ 3345.143186][T26638] ? _copy_from_user+0x31/0xe0 [ 3345.148073][T26638] _copy_from_user+0x8b/0xe0 [ 3345.152710][T26638] ioctl_standard_iw_point+0x5d3/0xcf0 [ 3345.158326][T26638] ? cfg80211_wext_giwap+0x120/0x120 [ 3345.163816][T26638] ? iw_handler_get_iwstats+0x110/0x110 [ 3345.169503][T26638] ? wext_ioctl_dispatch+0x115/0x600 [ 3345.174904][T26638] ? dev_load+0x21/0x1f0 [ 3345.179257][T26638] ? mutex_lock_nested+0x20/0x20 [ 3345.184239][T26638] ? apparmor_capable+0x137/0x1a0 [ 3345.189291][T26638] ? cfg80211_wext_giwap+0x120/0x120 [ 3345.194643][T26638] ioctl_standard_call+0xb7/0x2b0 [ 3345.199698][T26638] ? cfg80211_wext_giwap+0x120/0x120 [ 3345.205038][T26638] wext_ioctl_dispatch+0x1cb/0x600 [ 3345.210302][T26638] ? wext_ioctl_dispatch+0x600/0x600 [ 3345.215616][T26638] ? iw_handler_get_private+0x1f0/0x1f0 [ 3345.221213][T26638] ? wext_handle_ioctl+0x1d0/0x1d0 [ 3345.226345][T26638] ? __might_fault+0xaa/0x120 [ 3345.231042][T26638] ? __might_fault+0xc6/0x120 [ 3345.235854][T26638] ? __might_fault+0xaa/0x120 [ 3345.240553][T26638] wext_handle_ioctl+0x117/0x1d0 [ 3345.245516][T26638] ? call_commit_handler+0xf0/0xf0 [ 3345.250763][T26638] sock_ioctl+0x15d/0x7e0 [ 3345.255114][T26638] ? sock_poll+0x3e0/0x3e0 [ 3345.259700][T26638] ? bpf_lsm_file_ioctl+0x9/0x10 [ 3345.264845][T26638] ? security_file_ioctl+0x80/0xa0 [ 3345.270161][T26638] ? sock_poll+0x3e0/0x3e0 [ 3345.274733][T26638] __se_sys_ioctl+0xfd/0x170 [ 3345.279436][T26638] do_syscall_64+0x55/0xa0 [ 3345.283865][T26638] ? clear_bhb_loop+0x40/0x90 [ 3345.288584][T26638] ? clear_bhb_loop+0x40/0x90 [ 3345.293288][T26638] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3345.299299][T26638] RIP: 0033:0x7f19cd79c819 [ 3345.303826][T26638] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3345.323889][T26638] RSP: 002b:00007f19ce6b6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3345.332325][T26638] RAX: ffffffffffffffda RBX: 00007f19cda15fa0 RCX: 00007f19cd79c819 [ 3345.340416][T26638] RDX: 0000200000000000 RSI: 0000000000008b1a RDI: 0000000000000004 [ 3345.348496][T26638] RBP: 00007f19ce6b6090 R08: 0000000000000000 R09: 0000000000000000 [ 3345.356580][T26638] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3345.364575][T26638] R13: 00007f19cda16038 R14: 00007f19cda15fa0 R15: 00007fff6ddeacb8 [ 3345.372852][T26638] [ 3345.403776][T26638] mac80211_hwsim hwsim790 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 3345.417444][T26645] netlink: 1047 bytes leftover after parsing attributes in process `syz.7.16997'. [ 3345.435798][T26645] bridge_slave_1: default FDB implementation only supports local addresses [ 3345.781720][T26657] FAULT_INJECTION: forcing a failure. [ 3345.781720][T26657] name failslab, interval 1, probability 0, space 0, times 0 [ 3345.794790][T26657] CPU: 0 PID: 26657 Comm: syz.7.17003 Not tainted syzkaller #0 [ 3345.802382][T26657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3345.812468][T26657] Call Trace: [ 3345.815860][T26657] [ 3345.818911][T26657] dump_stack_lvl+0x18c/0x250 [ 3345.823807][T26657] ? show_regs_print_info+0x20/0x20 [ 3345.829035][T26657] ? load_image+0x420/0x420 [ 3345.833570][T26657] ? __might_sleep+0xe0/0xe0 [ 3345.838198][T26657] ? __lock_acquire+0x7d40/0x7d40 [ 3345.843348][T26657] should_fail_ex+0x39d/0x4d0 [ 3345.848078][T26657] should_failslab+0x9/0x20 [ 3345.852622][T26657] slab_pre_alloc_hook+0x59/0x310 [ 3345.857692][T26657] ? perf_trace_lock+0xfc/0x3b0 [ 3345.862577][T26657] ? sock_kmalloc+0x96/0xf0 [ 3345.867112][T26657] ? sock_kmalloc+0x96/0xf0 [ 3345.871645][T26657] __kmem_cache_alloc_node+0x53/0x250 [ 3345.877051][T26657] ? sock_kmalloc+0x96/0xf0 [ 3345.881596][T26657] __kmalloc+0xa4/0x230 [ 3345.885800][T26657] sock_kmalloc+0x96/0xf0 [ 3345.890260][T26657] ____sys_sendmsg+0x1be/0x960 [ 3345.895077][T26657] ? __asan_memset+0x22/0x40 [ 3345.899697][T26657] ? __sys_sendmsg_sock+0x30/0x30 [ 3345.904733][T26657] ? __import_iovec+0x3fa/0x850 [ 3345.909620][T26657] ? import_iovec+0x73/0xa0 [ 3345.914125][T26657] ___sys_sendmsg+0x2a6/0x360 [ 3345.918818][T26657] ? __sys_sendmsg+0x2a0/0x2a0 [ 3345.923600][T26657] ? __lock_acquire+0x7d40/0x7d40 [ 3345.928662][T26657] __se_sys_sendmsg+0x1c2/0x2b0 [ 3345.933552][T26657] ? __x64_sys_sendmsg+0x80/0x80 [ 3345.938532][T26657] ? lockdep_hardirqs_on+0x98/0x150 [ 3345.943842][T26657] do_syscall_64+0x55/0xa0 [ 3345.948372][T26657] ? clear_bhb_loop+0x40/0x90 [ 3345.953075][T26657] ? clear_bhb_loop+0x40/0x90 [ 3345.957800][T26657] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3345.963814][T26657] RIP: 0033:0x7f884ab9c819 [ 3345.968281][T26657] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3345.987985][T26657] RSP: 002b:00007f884bb31028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3345.996505][T26657] RAX: ffffffffffffffda RBX: 00007f884ae15fa0 RCX: 00007f884ab9c819 [ 3346.004588][T26657] RDX: 0000000020044000 RSI: 00002000000004c0 RDI: 0000000000000003 [ 3346.012585][T26657] RBP: 00007f884bb31090 R08: 0000000000000000 R09: 0000000000000000 [ 3346.020569][T26657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3346.028765][T26657] R13: 00007f884ae16038 R14: 00007f884ae15fa0 R15: 00007ffe0b65bf38 [ 3346.037481][T26657] [ 3346.371132][T26665] netlink: 1047 bytes leftover after parsing attributes in process `syz.4.17006'. [ 3346.388364][T26665] bridge_slave_1: default FDB implementation only supports local addresses [ 3346.796659][T26679] netlink: 'syz.7.17011': attribute type 10 has an invalid length. [ 3347.017828][T26673] netlink: 1047 bytes leftover after parsing attributes in process `syz.5.17007'. [ 3347.063358][T26673] bridge_slave_1: default FDB implementation only supports local addresses [ 3347.272018][T26687] netlink: 1047 bytes leftover after parsing attributes in process `syz.4.17012'. [ 3347.302257][T26687] bridge_slave_1: default FDB implementation only supports local addresses [ 3347.796708][T26706] netlink: 60 bytes leftover after parsing attributes in process `syz.5.17021'. [ 3347.829471][T26707] netlink: 1047 bytes leftover after parsing attributes in process `syz.7.17018'. [ 3347.852431][T26707] bridge_slave_1: default FDB implementation only supports local addresses [ 3347.863111][T26706] netlink: 60 bytes leftover after parsing attributes in process `syz.5.17021'. [ 3347.882369][T26708] netlink: 60 bytes leftover after parsing attributes in process `syz.5.17021'. [ 3347.905004][T26709] mac80211_hwsim hwsim799 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 3348.198051][ T1143] wlan1: Trigger new scan to find an IBSS to join [ 3348.448349][T26722] netlink: 1047 bytes leftover after parsing attributes in process `syz.7.17025'. [ 3348.458323][T26722] bridge_slave_1: default FDB implementation only supports local addresses [ 3348.712974][T26727] netlink: 1047 bytes leftover after parsing attributes in process `syz.1.17026'. [ 3348.734340][T26727] bridge_slave_1: default FDB implementation only supports local addresses [ 3348.871103][T26736] netlink: 1047 bytes leftover after parsing attributes in process `syz.5.17030'. [ 3348.885107][T26736] bridge_slave_1: default FDB implementation only supports local addresses [ 3348.959418][T26740] netlink: 60 bytes leftover after parsing attributes in process `syz.1.17032'. [ 3349.245751][T26752] bridge_slave_1: default FDB implementation only supports local addresses [ 3349.515816][T26772] bridge_slave_1: default FDB implementation only supports local addresses [ 3349.707370][T26784] netlink: 'syz.7.17046': attribute type 46 has an invalid length. [ 3349.729636][T26784] netlink: 'syz.7.17046': attribute type 46 has an invalid length. [ 3349.756077][T26780] bridge_slave_1: default FDB implementation only supports local addresses [ 3349.970643][T26795] FAULT_INJECTION: forcing a failure. [ 3349.970643][T26795] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3349.990143][T26795] CPU: 1 PID: 26795 Comm: syz.7.17052 Not tainted syzkaller #0 [ 3349.998035][T26795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3350.008282][T26795] Call Trace: [ 3350.011653][T26795] [ 3350.014592][T26795] dump_stack_lvl+0x18c/0x250 [ 3350.019371][T26795] ? show_regs_print_info+0x20/0x20 [ 3350.024602][T26795] ? load_image+0x420/0x420 [ 3350.029146][T26795] ? __lock_acquire+0x7d40/0x7d40 [ 3350.034225][T26795] should_fail_ex+0x39d/0x4d0 [ 3350.038948][T26795] prepare_alloc_pages+0x1e2/0x5f0 [ 3350.044119][T26795] __alloc_pages+0x134/0x460 [ 3350.048757][T26795] ? rcu_is_watching+0x15/0xb0 [ 3350.053556][T26795] ? zone_statistics+0x170/0x170 [ 3350.058522][T26795] ? __build_skb_around+0x255/0x3d0 [ 3350.063843][T26795] alloc_skb_with_frags+0x23c/0x7b0 [ 3350.069180][T26795] sock_alloc_send_pskb+0x883/0x9a0 [ 3350.074439][T26795] ? sock_kzfree_s+0x50/0x50 [ 3350.079253][T26795] tun_get_user+0x82c/0x3ca0 [ 3350.083876][T26795] ? aa_file_perm+0x11b/0xee0 [ 3350.088686][T26795] ? rcu_read_unlock+0xa0/0xa0 [ 3350.093475][T26795] ? tun_get+0x1c/0x2e0 [ 3350.097649][T26795] ? __lock_acquire+0x7d40/0x7d40 [ 3350.102710][T26795] ? tun_get+0x1c/0x2e0 [ 3350.106903][T26795] tun_chr_write_iter+0x119/0x200 [ 3350.111956][T26795] vfs_write+0x46c/0x990 [ 3350.116246][T26795] ? file_end_write+0x250/0x250 [ 3350.121230][T26795] ? __fget_files+0x43d/0x4b0 [ 3350.125953][T26795] ? __fdget_pos+0x1d8/0x330 [ 3350.130576][T26795] ? ksys_write+0x75/0x260 [ 3350.135088][T26795] ksys_write+0x150/0x260 [ 3350.139450][T26795] ? __ia32_sys_read+0x90/0x90 [ 3350.144250][T26795] ? lockdep_hardirqs_on+0x98/0x150 [ 3350.149561][T26795] do_syscall_64+0x55/0xa0 [ 3350.154015][T26795] ? clear_bhb_loop+0x40/0x90 [ 3350.158823][T26795] ? clear_bhb_loop+0x40/0x90 [ 3350.163555][T26795] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3350.169553][T26795] RIP: 0033:0x7f884ab9c819 [ 3350.173983][T26795] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3350.193867][T26795] RSP: 002b:00007f884bb31028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3350.202386][T26795] RAX: ffffffffffffffda RBX: 00007f884ae15fa0 RCX: 00007f884ab9c819 [ 3350.210373][T26795] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 00000000000000c8 [ 3350.218375][T26795] RBP: 00007f884bb31090 R08: 0000000000000000 R09: 0000000000000000 [ 3350.226362][T26795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3350.234610][T26795] R13: 00007f884ae16038 R14: 00007f884ae15fa0 R15: 00007ffe0b65bf38 [ 3350.242637][T26795] [ 3350.258005][T26797] bridge_slave_1: default FDB implementation only supports local addresses [ 3350.289655][T30143] wlan1: Trigger new scan to find an IBSS to join [ 3350.710636][T26813] bridge_slave_1: default FDB implementation only supports local addresses [ 3351.028186][T26829] FAULT_INJECTION: forcing a failure. [ 3351.028186][T26829] name failslab, interval 1, probability 0, space 0, times 0 [ 3351.073626][T26829] CPU: 1 PID: 26829 Comm: syz.1.17065 Not tainted syzkaller #0 [ 3351.081251][T26829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3351.091431][T26829] Call Trace: [ 3351.094733][T26829] [ 3351.097686][T26829] dump_stack_lvl+0x18c/0x250 [ 3351.102400][T26829] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 3351.108597][T26829] ? show_regs_print_info+0x20/0x20 [ 3351.113835][T26829] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 3351.120030][T26829] ? dump_stack+0x9/0x20 [ 3351.124319][T26829] should_fail_ex+0x39d/0x4d0 [ 3351.129045][T26829] should_failslab+0x9/0x20 [ 3351.133580][T26829] slab_pre_alloc_hook+0x59/0x310 [ 3351.138647][T26829] ? sk_prot_alloc+0xe7/0x210 [ 3351.143362][T26829] ? sk_prot_alloc+0xe7/0x210 [ 3351.148171][T26829] __kmem_cache_alloc_node+0x53/0x250 [ 3351.153593][T26829] ? sk_prot_alloc+0xe7/0x210 [ 3351.158338][T26829] __kmalloc+0xa4/0x230 [ 3351.162602][T26829] sk_prot_alloc+0xe7/0x210 [ 3351.167215][T26829] ? sk_alloc+0x24/0x360 [ 3351.171582][T26829] sk_alloc+0x3a/0x360 [ 3351.175705][T26829] ? bpf_ctx_init+0x163/0x1a0 [ 3351.180421][T26829] ? bpf_prog_test_run_skb+0x273/0x12b0 [ 3351.186021][T26829] bpf_prog_test_run_skb+0x3a5/0x12b0 [ 3351.191521][T26829] ? __fget_files+0x28/0x4b0 [ 3351.196182][T26829] ? __fget_files+0x28/0x4b0 [ 3351.200819][T26829] ? __fget_files+0x43d/0x4b0 [ 3351.206070][T26829] ? cpu_online+0x60/0x60 [ 3351.210428][T26829] bpf_prog_test_run+0x321/0x390 [ 3351.215410][T26829] __sys_bpf+0x49d/0x890 [ 3351.219700][T26829] ? bpf_link_show_fdinfo+0x390/0x390 [ 3351.225127][T26829] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 3351.230982][T26831] bridge_slave_1: default FDB implementation only supports local addresses [ 3351.231308][T26829] __x64_sys_bpf+0x7c/0x90 [ 3351.231337][T26829] do_syscall_64+0x55/0xa0 [ 3351.231354][T26829] ? clear_bhb_loop+0x40/0x90 [ 3351.253558][T26829] ? clear_bhb_loop+0x40/0x90 [ 3351.258369][T26829] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3351.264295][T26829] RIP: 0033:0x7f94a439c819 [ 3351.268748][T26829] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3351.288510][T26829] RSP: 002b:00007f94a51da028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3351.297039][T26829] RAX: ffffffffffffffda RBX: 00007f94a4615fa0 RCX: 00007f94a439c819 [ 3351.305035][T26829] RDX: 0000000000000050 RSI: 00002000000003c0 RDI: 000000000000000a [ 3351.313115][T26829] RBP: 00007f94a51da090 R08: 0000000000000000 R09: 0000000000000000 [ 3351.321104][T26829] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3351.329284][T26829] R13: 00007f94a4616038 R14: 00007f94a4615fa0 R15: 00007ffe72d40008 [ 3351.337406][T26829] [ 3351.368803][T26764] wlan1: Trigger new scan to find an IBSS to join [ 3352.420912][T26861] netlink: 'syz.4.17076': attribute type 10 has an invalid length. [ 3354.193837][T30143] wlan1: Trigger new scan to find an IBSS to join [ 3354.627493][T26764] wlan1: Creating new IBSS network, BSSID ce:1b:84:c6:20:d6 [ 3354.762788][T26866] FAULT_INJECTION: forcing a failure. [ 3354.762788][T26866] name failslab, interval 1, probability 0, space 0, times 0 [ 3354.857221][T26866] CPU: 1 PID: 26866 Comm: syz.5.17077 Not tainted syzkaller #0 [ 3354.864844][T26866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3354.874931][T26866] Call Trace: [ 3354.878329][T26866] [ 3354.881360][T26866] dump_stack_lvl+0x18c/0x250 [ 3354.886188][T26866] ? show_regs_print_info+0x20/0x20 [ 3354.891692][T26866] ? load_image+0x420/0x420 [ 3354.896311][T26866] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 3354.902404][T26866] ? __asan_memset+0x22/0x40 [ 3354.907537][T26866] should_fail_ex+0x39d/0x4d0 [ 3354.912239][T26866] should_failslab+0x9/0x20 [ 3354.916940][T26866] slab_pre_alloc_hook+0x59/0x310 [ 3354.922013][T26866] kmem_cache_alloc+0x5a/0x2d0 [ 3354.926837][T26866] ? slab_build_skb+0x2b/0x3f0 [ 3354.931654][T26866] slab_build_skb+0x2b/0x3f0 [ 3354.936364][T26866] bpf_prog_test_run_skb+0x3c8/0x12b0 [ 3354.941765][T26866] ? __fget_files+0x28/0x4b0 [ 3354.946722][T26866] ? __fget_files+0x28/0x4b0 [ 3354.951421][T26866] ? __fget_files+0x43d/0x4b0 [ 3354.956134][T26866] ? cpu_online+0x60/0x60 [ 3354.960475][T26866] bpf_prog_test_run+0x321/0x390 [ 3354.965432][T26866] __sys_bpf+0x49d/0x890 [ 3354.969809][T26866] ? bpf_link_show_fdinfo+0x390/0x390 [ 3354.975238][T26866] ? lock_chain_count+0x20/0x20 [ 3354.980105][T26866] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 3354.986126][T26866] __x64_sys_bpf+0x7c/0x90 [ 3354.990627][T26866] do_syscall_64+0x55/0xa0 [ 3354.995161][T26866] ? clear_bhb_loop+0x40/0x90 [ 3355.000113][T26866] ? clear_bhb_loop+0x40/0x90 [ 3355.004814][T26866] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3355.011279][T26866] RIP: 0033:0x7f19cd79c819 [ 3355.015722][T26866] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3355.035887][T26866] RSP: 002b:00007f19ce6b6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3355.044325][T26866] RAX: ffffffffffffffda RBX: 00007f19cda15fa0 RCX: 00007f19cd79c819 [ 3355.052311][T26866] RDX: 0000000000000050 RSI: 0000200000000640 RDI: 000000000000000a [ 3355.060296][T26866] RBP: 00007f19ce6b6090 R08: 0000000000000000 R09: 0000000000000000 [ 3355.068287][T26866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3355.076276][T26866] R13: 00007f19cda16038 R14: 00007f19cda15fa0 R15: 00007fff6ddeacb8 [ 3355.084460][T26866] [ 3355.102078][T26868] __nla_validate_parse: 9 callbacks suppressed [ 3355.102112][T26868] netlink: 1047 bytes leftover after parsing attributes in process `syz.1.17078'. [ 3355.145442][T26868] bridge_slave_1: default FDB implementation only supports local addresses [ 3355.239849][T26878] ÿÿÿÿÿÿ: renamed from vlan1 (while UP) [ 3355.249499][T26878] FAULT_INJECTION: forcing a failure. [ 3355.249499][T26878] name failslab, interval 1, probability 0, space 0, times 0 [ 3355.262748][T26878] CPU: 1 PID: 26878 Comm: syz.4.17081 Not tainted syzkaller #0 [ 3355.270350][T26878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3355.280454][T26878] Call Trace: [ 3355.283753][T26878] [ 3355.286716][T26878] dump_stack_lvl+0x18c/0x250 [ 3355.291419][T26878] ? show_regs_print_info+0x20/0x20 [ 3355.296640][T26878] ? load_image+0x420/0x420 [ 3355.301373][T26878] ? __might_sleep+0xe0/0xe0 [ 3355.306015][T26878] ? __lock_acquire+0x7d40/0x7d40 [ 3355.311060][T26878] ? mark_lock+0x94/0x320 [ 3355.315420][T26878] should_fail_ex+0x39d/0x4d0 [ 3355.320143][T26878] should_failslab+0x9/0x20 [ 3355.324668][T26878] slab_pre_alloc_hook+0x59/0x310 [ 3355.330533][T26878] ? kobject_get_path+0xc3/0x2c0 [ 3355.335580][T26878] ? kobject_get_path+0xc3/0x2c0 [ 3355.340613][T26878] __kmem_cache_alloc_node+0x53/0x250 [ 3355.346007][T26878] ? __lock_acquire+0x7d40/0x7d40 [ 3355.351144][T26878] ? kobject_get_path+0xc3/0x2c0 [ 3355.356185][T26878] __kmalloc+0xa4/0x230 [ 3355.360370][T26878] ? slab_free_freelist_hook+0x130/0x1a0 [ 3355.366042][T26878] kobject_get_path+0xc3/0x2c0 [ 3355.370843][T26878] kobject_rename+0x193/0x510 [ 3355.375652][T26878] ? kobject_init_and_add+0x1a0/0x1a0 [ 3355.381405][T26878] ? sysfs_rename_link_ns+0x17f/0x1b0 [ 3355.386818][T26878] device_rename+0x15d/0x1e0 [ 3355.391613][T26878] dev_change_name+0x307/0x8c0 [ 3355.396395][T26878] ? end_current_label_crit_section+0x170/0x170 [ 3355.402753][T26878] ? dev_load+0x21/0x1f0 [ 3355.407103][T26878] ? dev_ioctl+0x5dc/0x1140 [ 3355.411802][T26878] ? dev_alloc_name+0x1d0/0x1d0 [ 3355.416759][T26878] ? full_name_hash+0x92/0xe0 [ 3355.421648][T26878] ? dev_ifsioc+0x316/0xc40 [ 3355.426188][T26878] dev_ioctl+0x5ec/0x1140 [ 3355.430597][T26878] sock_do_ioctl+0x239/0x310 [ 3355.435311][T26878] ? sock_show_fdinfo+0xb0/0xb0 [ 3355.440214][T26878] sock_ioctl+0x5ba/0x7e0 [ 3355.444743][T26878] ? sock_poll+0x3e0/0x3e0 [ 3355.449228][T26878] ? bpf_lsm_file_ioctl+0x9/0x10 [ 3355.454269][T26878] ? security_file_ioctl+0x80/0xa0 [ 3355.459407][T26878] ? sock_poll+0x3e0/0x3e0 [ 3355.463926][T26878] __se_sys_ioctl+0xfd/0x170 [ 3355.468585][T26878] do_syscall_64+0x55/0xa0 [ 3355.473043][T26878] ? clear_bhb_loop+0x40/0x90 [ 3355.477844][T26878] ? clear_bhb_loop+0x40/0x90 [ 3355.482919][T26878] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3355.489091][T26878] RIP: 0033:0x7f842a19c819 [ 3355.493698][T26878] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3355.513596][T26878] RSP: 002b:00007f842b05e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3355.522206][T26878] RAX: ffffffffffffffda RBX: 00007f842a415fa0 RCX: 00007f842a19c819 [ 3355.530450][T26878] RDX: 0000200000000000 RSI: 0000000000008923 RDI: 0000000000000009 [ 3355.538445][T26878] RBP: 00007f842b05e090 R08: 0000000000000000 R09: 0000000000000000 [ 3355.546526][T26878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3355.554516][T26878] R13: 00007f842a416038 R14: 00007f842a415fa0 R15: 00007ffc2fb8e348 [ 3355.562807][T26878] [ 3355.604254][T30143] wlan1: Creating new IBSS network, BSSID 36:32:85:52:5a:da [ 3355.717693][T24625] Bluetooth: hci0: command 0x0406 tx timeout [ 3355.857334][T26887] netlink: 4595 bytes leftover after parsing attributes in process `syz.1.17085'. [ 3356.021098][T26892] netlink: 'syz.5.17087': attribute type 10 has an invalid length. [ 3356.320468][T26898] netlink: 1047 bytes leftover after parsing attributes in process `syz.4.17089'. [ 3356.367664][T26898] bridge_slave_1: default FDB implementation only supports local addresses [ 3356.794767][T26913] netlink: 1047 bytes leftover after parsing attributes in process `syz.1.17094'. [ 3356.814394][T26913] bridge_slave_1: default FDB implementation only supports local addresses [ 3357.004097][T26924] netlink: 'syz.1.17100': attribute type 12 has an invalid length. [ 3357.012089][T26924] netlink: 132 bytes leftover after parsing attributes in process `syz.1.17100'. [ 3357.061540][T26922] netlink: 4595 bytes leftover after parsing attributes in process `syz.5.17099'. [ 3357.210647][T26927] netlink: 1047 bytes leftover after parsing attributes in process `syz.1.17101'. [ 3357.227332][T26927] bridge_slave_1: default FDB implementation only supports local addresses [ 3357.553253][T26934] netlink: 'syz.5.17105': attribute type 10 has an invalid length. [ 3357.846157][T26940] netlink: 1047 bytes leftover after parsing attributes in process `syz.7.17108'. [ 3357.881977][T26940] bridge_slave_1: default FDB implementation only supports local addresses [ 3358.016569][T26947] netlink: 172 bytes leftover after parsing attributes in process `syz.1.17110'. [ 3358.036832][T26950] netlink: 'syz.4.17111': attribute type 3 has an invalid length. [ 3358.063535][T26950] netlink: 13435 bytes leftover after parsing attributes in process `syz.4.17111'. [ 3358.658042][T26969] bridge_slave_1: default FDB implementation only supports local addresses [ 3358.986531][T26986] netlink: 'syz.4.17128': attribute type 10 has an invalid length. [ 3360.149458][T27016] __nla_validate_parse: 2 callbacks suppressed [ 3360.149477][T27016] netlink: 68 bytes leftover after parsing attributes in process `syz.1.17140'. [ 3360.617364][T27025] netlink: 209852 bytes leftover after parsing attributes in process `syz.7.17143'. [ 3360.635158][T27022] netlink: 'syz.5.17142': attribute type 10 has an invalid length. [ 3363.295415][T27073] netlink: 1047 bytes leftover after parsing attributes in process `syz.4.17163'. [ 3363.331681][T27073] bridge_slave_1: default FDB implementation only supports local addresses [ 3363.805072][T27081] netlink: 1047 bytes leftover after parsing attributes in process `syz.7.17166'. [ 3363.849003][T27081] bridge_slave_1: default FDB implementation only supports local addresses [ 3364.234398][T27100] FAULT_INJECTION: forcing a failure. [ 3364.234398][T27100] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3364.274449][T27100] CPU: 1 PID: 27100 Comm: syz.4.17173 Not tainted syzkaller #0 [ 3364.282056][T27100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3364.292152][T27100] Call Trace: [ 3364.295463][T27100] [ 3364.298419][T27100] dump_stack_lvl+0x18c/0x250 [ 3364.303136][T27100] ? show_regs_print_info+0x20/0x20 [ 3364.308359][T27100] ? load_image+0x420/0x420 [ 3364.313081][T27100] ? __might_fault+0xaa/0x120 [ 3364.317874][T27100] ? __lock_acquire+0x7d40/0x7d40 [ 3364.322944][T27100] should_fail_ex+0x39d/0x4d0 [ 3364.327755][T27100] _copy_from_user+0x2f/0xe0 [ 3364.332375][T27100] kstrtouint_from_user+0xde/0x170 [ 3364.337514][T27100] ? kstrtol_from_user+0x190/0x190 [ 3364.342663][T27100] proc_fail_nth_write+0x8f/0x250 [ 3364.347827][T27100] ? proc_fail_nth_read+0x260/0x260 [ 3364.353058][T27100] ? proc_fail_nth_read+0x260/0x260 [ 3364.358286][T27100] vfs_write+0x296/0x990 [ 3364.362801][T27100] ? file_end_write+0x250/0x250 [ 3364.367670][T27100] ? __fget_files+0x28/0x4b0 [ 3364.372264][T27100] ? __fget_files+0x28/0x4b0 [ 3364.376958][T27100] ? __fget_files+0x43d/0x4b0 [ 3364.381830][T27100] ? __fdget_pos+0x2a3/0x330 [ 3364.386444][T27100] ? ksys_write+0x75/0x260 [ 3364.391304][T27100] ksys_write+0x150/0x260 [ 3364.395734][T27100] ? __ia32_sys_read+0x90/0x90 [ 3364.400594][T27100] ? lockdep_hardirqs_on+0x98/0x150 [ 3364.405888][T27100] do_syscall_64+0x55/0xa0 [ 3364.410310][T27100] ? clear_bhb_loop+0x40/0x90 [ 3364.415459][T27100] ? clear_bhb_loop+0x40/0x90 [ 3364.420231][T27100] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3364.426128][T27100] RIP: 0033:0x7f842a15d04e [ 3364.430641][T27100] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 3364.450351][T27100] RSP: 002b:00007f842b05dfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3364.458771][T27100] RAX: ffffffffffffffda RBX: 00007f842b05e6c0 RCX: 00007f842a15d04e [ 3364.466836][T27100] RDX: 0000000000000001 RSI: 00007f842b05e0a0 RDI: 0000000000000005 [ 3364.474840][T27100] RBP: 00007f842b05e090 R08: 0000000000000000 R09: 0000000000000000 [ 3364.482992][T27100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3364.490962][T27100] R13: 00007f842a416038 R14: 00007f842a415fa0 R15: 00007ffc2fb8e348 [ 3364.499039][T27100] [ 3364.790412][T27112] netlink: 65039 bytes leftover after parsing attributes in process `syz.4.17178'. [ 3364.933300][T27112] tc_dump_action: action bad kind [ 3365.643748][T27124] netlink: 1047 bytes leftover after parsing attributes in process `syz.5.17180'. [ 3365.677437][T27124] bridge_slave_1: default FDB implementation only supports local addresses [ 3365.972779][T24625] Bluetooth: hci4: command 0x0406 tx timeout [ 3366.555099][T27136] netlink: 'syz.4.17188': attribute type 10 has an invalid length. [ 3366.810912][T27143] netlink: 1047 bytes leftover after parsing attributes in process `syz.1.17190'. [ 3366.831961][T27143] bridge_slave_1: default FDB implementation only supports local addresses [ 3367.102759][T27149] netlink: 1047 bytes leftover after parsing attributes in process `syz.5.17191'. [ 3367.120569][T27149] bridge_slave_1: default FDB implementation only supports local addresses [ 3368.727296][T27175] netlink: 1047 bytes leftover after parsing attributes in process `syz.1.17201'. [ 3368.770512][T27175] bridge_slave_1: default FDB implementation only supports local addresses [ 3369.020834][T27176] netlink: 1047 bytes leftover after parsing attributes in process `syz.4.17202'. [ 3369.030881][T27176] bridge_slave_1: default FDB implementation only supports local addresses [ 3369.213901][T27181] netlink: 199836 bytes leftover after parsing attributes in process `syz.7.17205'. [ 3369.827534][T27199] netlink: 'syz.7.17212': attribute type 10 has an invalid length. [ 3373.171605][T27219] netlink: 1047 bytes leftover after parsing attributes in process `syz.4.17217'. [ 3373.193366][T27219] bridge_slave_1: default FDB implementation only supports local addresses [ 3373.671927][T27229] netlink: 1047 bytes leftover after parsing attributes in process `syz.7.17220'. [ 3373.703815][T27229] bridge_slave_1: default FDB implementation only supports local addresses [ 3376.833555][T27242] netlink: 'syz.7.17226': attribute type 39 has an invalid length. [ 3377.121825][T27252] netlink: 'syz.1.17230': attribute type 10 has an invalid length. [ 3377.915765][T27272] FAULT_INJECTION: forcing a failure. [ 3377.915765][T27272] name failslab, interval 1, probability 0, space 0, times 0 [ 3377.929143][T27272] CPU: 1 PID: 27272 Comm: syz.4.17236 Not tainted syzkaller #0 [ 3377.936819][T27272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3377.946988][T27272] Call Trace: [ 3377.950291][T27272] [ 3377.953301][T27272] dump_stack_lvl+0x18c/0x250 [ 3377.958012][T27272] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 3377.964203][T27272] ? show_regs_print_info+0x20/0x20 [ 3377.969467][T27272] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 3377.975789][T27272] should_fail_ex+0x39d/0x4d0 [ 3377.980521][T27272] should_failslab+0x9/0x20 [ 3377.985046][T27272] slab_pre_alloc_hook+0x59/0x310 [ 3377.990426][T27272] ? sk_prot_alloc+0xe7/0x210 [ 3377.995193][T27272] ? sk_prot_alloc+0xe7/0x210 [ 3377.999871][T27272] __kmem_cache_alloc_node+0x53/0x250 [ 3378.005344][T27272] ? sk_prot_alloc+0xe7/0x210 [ 3378.010045][T27272] __kmalloc+0xa4/0x230 [ 3378.014209][T27272] sk_prot_alloc+0xe7/0x210 [ 3378.018802][T27272] ? sk_alloc+0x24/0x360 [ 3378.023048][T27272] sk_alloc+0x3a/0x360 [ 3378.027469][T27272] ? bpf_ctx_init+0x163/0x1a0 [ 3378.032145][T27272] ? bpf_prog_test_run_skb+0x273/0x12b0 [ 3378.037700][T27272] bpf_prog_test_run_skb+0x3a5/0x12b0 [ 3378.043074][T27272] ? __fget_files+0x28/0x4b0 [ 3378.047674][T27272] ? __fget_files+0x28/0x4b0 [ 3378.052267][T27272] ? __fget_files+0x43d/0x4b0 [ 3378.056959][T27272] ? cpu_online+0x60/0x60 [ 3378.061293][T27272] bpf_prog_test_run+0x321/0x390 [ 3378.066334][T27272] __sys_bpf+0x49d/0x890 [ 3378.070588][T27272] ? bpf_link_show_fdinfo+0x390/0x390 [ 3378.076059][T27272] ? lock_chain_count+0x20/0x20 [ 3378.081263][T27272] __x64_sys_bpf+0x7c/0x90 [ 3378.085725][T27272] do_syscall_64+0x55/0xa0 [ 3378.090340][T27272] ? clear_bhb_loop+0x40/0x90 [ 3378.095024][T27272] ? clear_bhb_loop+0x40/0x90 [ 3378.099703][T27272] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3378.105770][T27272] RIP: 0033:0x7f842a19c819 [ 3378.110289][T27272] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3378.130399][T27272] RSP: 002b:00007f842b05e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3378.139288][T27272] RAX: ffffffffffffffda RBX: 00007f842a415fa0 RCX: 00007f842a19c819 [ 3378.147703][T27272] RDX: 0000000000000050 RSI: 00002000000003c0 RDI: 000000000000000a [ 3378.155682][T27272] RBP: 00007f842b05e090 R08: 0000000000000000 R09: 0000000000000000 [ 3378.163753][T27272] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3378.171817][T27272] R13: 00007f842a416038 R14: 00007f842a415fa0 R15: 00007ffc2fb8e348 [ 3378.179902][T27272] [ 3379.329247][T27308] netlink: 60 bytes leftover after parsing attributes in process `syz.5.17250'. [ 3379.348718][T27308] netlink: 60 bytes leftover after parsing attributes in process `syz.5.17250'. [ 3379.372743][T27301] netlink: 'syz.1.17247': attribute type 39 has an invalid length. [ 3379.551004][T27308] netlink: 60 bytes leftover after parsing attributes in process `syz.5.17250'. [ 3380.082612][T27325] netlink: 'syz.7.17256': attribute type 9 has an invalid length. [ 3380.131804][T27325] netlink: 126588 bytes leftover after parsing attributes in process `syz.7.17256'. [ 3382.193719][T26755] wlan1: Trigger new scan to find an IBSS to join [ 3384.264157][T27357] FAULT_INJECTION: forcing a failure. [ 3384.264157][T27357] name failslab, interval 1, probability 0, space 0, times 0 [ 3384.285619][T27357] CPU: 1 PID: 27357 Comm: syz.4.17267 Not tainted syzkaller #0 [ 3384.293440][T27357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3384.303534][T27357] Call Trace: [ 3384.306857][T27357] [ 3384.309795][T27357] dump_stack_lvl+0x18c/0x250 [ 3384.314582][T27357] ? show_regs_print_info+0x20/0x20 [ 3384.319963][T27357] ? load_image+0x420/0x420 [ 3384.324484][T27357] ? __might_sleep+0xe0/0xe0 [ 3384.329110][T27357] ? __lock_acquire+0x7d40/0x7d40 [ 3384.334140][T27357] should_fail_ex+0x39d/0x4d0 [ 3384.338830][T27357] should_failslab+0x9/0x20 [ 3384.343429][T27357] slab_pre_alloc_hook+0x59/0x310 [ 3384.348471][T27357] ? sk_prot_alloc+0xe7/0x210 [ 3384.353148][T27357] ? sk_prot_alloc+0xe7/0x210 [ 3384.357875][T27357] __kmem_cache_alloc_node+0x53/0x250 [ 3384.363351][T27357] ? sk_prot_alloc+0xe7/0x210 [ 3384.368211][T27357] __kmalloc+0xa4/0x230 [ 3384.372383][T27357] sk_prot_alloc+0xe7/0x210 [ 3384.376889][T27357] ? sk_alloc+0x24/0x360 [ 3384.381140][T27357] sk_alloc+0x3a/0x360 [ 3384.385207][T27357] ? bpf_ctx_init+0x163/0x1a0 [ 3384.389898][T27357] ? bpf_prog_test_run_skb+0x273/0x12b0 [ 3384.395446][T27357] bpf_prog_test_run_skb+0x3a5/0x12b0 [ 3384.400847][T27357] ? __fget_files+0x28/0x4b0 [ 3384.405458][T27357] ? __fget_files+0x28/0x4b0 [ 3384.410170][T27357] ? __fget_files+0x43d/0x4b0 [ 3384.414893][T27357] ? cpu_online+0x60/0x60 [ 3384.419221][T27357] bpf_prog_test_run+0x321/0x390 [ 3384.424164][T27357] __sys_bpf+0x49d/0x890 [ 3384.428437][T27357] ? bpf_link_show_fdinfo+0x390/0x390 [ 3384.433972][T27357] ? lock_chain_count+0x20/0x20 [ 3384.438829][T27357] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 3384.445060][T27357] __x64_sys_bpf+0x7c/0x90 [ 3384.449882][T27357] do_syscall_64+0x55/0xa0 [ 3384.454320][T27357] ? clear_bhb_loop+0x40/0x90 [ 3384.459088][T27357] ? clear_bhb_loop+0x40/0x90 [ 3384.463787][T27357] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3384.469701][T27357] RIP: 0033:0x7f842a19c819 [ 3384.474118][T27357] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3384.494076][T27357] RSP: 002b:00007f842b05e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3384.502515][T27357] RAX: ffffffffffffffda RBX: 00007f842a415fa0 RCX: 00007f842a19c819 [ 3384.510495][T27357] RDX: 0000000000000050 RSI: 00002000000003c0 RDI: 000000000000000a [ 3384.518486][T27357] RBP: 00007f842b05e090 R08: 0000000000000000 R09: 0000000000000000 [ 3384.526498][T27357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3384.534644][T27357] R13: 00007f842a416038 R14: 00007f842a415fa0 R15: 00007ffc2fb8e348 [ 3384.542662][T27357] [ 3384.685745][T27361] netlink: 1047 bytes leftover after parsing attributes in process `syz.5.17269'. [ 3384.708673][T27361] bridge_slave_1: default FDB implementation only supports local addresses [ 3385.121183][T27372] ¿: renamed from vlan0 (while UP) [ 3385.200346][T27378] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17275'. [ 3385.232716][T27378] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17275'. [ 3385.255379][T27378] netlink: 60 bytes leftover after parsing attributes in process `syz.4.17275'. [ 3385.610367][T27387] netlink: 65047 bytes leftover after parsing attributes in process `syz.7.17279'. [ 3385.658878][T30142] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 3385.762578][T27391] netlink: 209852 bytes leftover after parsing attributes in process `syz.5.17280'. [ 3385.828776][T27395] FAULT_INJECTION: forcing a failure. [ 3385.828776][T27395] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3385.904797][T27395] CPU: 0 PID: 27395 Comm: syz.5.17280 Not tainted syzkaller #0 [ 3385.912478][T27395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3385.922661][T27395] Call Trace: [ 3385.925976][T27395] [ 3385.928937][T27395] dump_stack_lvl+0x18c/0x250 [ 3385.933658][T27395] ? show_regs_print_info+0x20/0x20 [ 3385.938898][T27395] ? load_image+0x420/0x420 [ 3385.943450][T27395] ? __might_fault+0xaa/0x120 [ 3385.948254][T27395] ? __lock_acquire+0x7d40/0x7d40 [ 3385.953492][T27395] should_fail_ex+0x39d/0x4d0 [ 3385.958228][T27395] _copy_from_user+0x2f/0xe0 [ 3385.963259][T27395] ___sys_sendmsg+0x1c7/0x360 [ 3385.968027][T27395] ? __sys_sendmsg+0x2a0/0x2a0 [ 3385.972849][T27395] ? __lock_acquire+0x7d40/0x7d40 [ 3385.978037][T27395] __se_sys_sendmsg+0x1c2/0x2b0 [ 3385.982926][T27395] ? __x64_sys_sendmsg+0x80/0x80 [ 3385.987935][T27395] ? lockdep_hardirqs_on+0x98/0x150 [ 3385.993468][T27395] do_syscall_64+0x55/0xa0 [ 3385.997889][T27395] ? clear_bhb_loop+0x40/0x90 [ 3386.002570][T27395] ? clear_bhb_loop+0x40/0x90 [ 3386.007258][T27395] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3386.013197][T27395] RIP: 0033:0x7f19cd79c819 [ 3386.017705][T27395] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3386.037486][T27395] RSP: 002b:00007f19ce695028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3386.045957][T27395] RAX: ffffffffffffffda RBX: 00007f19cda16090 RCX: 00007f19cd79c819 [ 3386.053935][T27395] RDX: 0000000024048890 RSI: 0000200000000080 RDI: 0000000000000007 [ 3386.061913][T27395] RBP: 00007f19ce695090 R08: 0000000000000000 R09: 0000000000000000 [ 3386.069998][T27395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3386.077980][T27395] R13: 00007f19cda16128 R14: 00007f19cda16090 R15: 00007fff6ddeacb8 [ 3386.086235][T27395] [ 3386.104341][T27397] netlink: 1047 bytes leftover after parsing attributes in process `syz.4.17281'. [ 3386.116408][T27397] bridge_slave_1: default FDB implementation only supports local addresses [ 3386.194722][T26764] wlan1: Trigger new scan to find an IBSS to join [ 3386.912953][T27418] netlink: 60 bytes leftover after parsing attributes in process `syz.5.17290'. [ 3386.941620][T27420] netlink: 'syz.1.17291': attribute type 10 has an invalid length. [ 3386.957858][T27418] netlink: 60 bytes leftover after parsing attributes in process `syz.5.17290'. [ 3386.983570][T27418] netlink: 60 bytes leftover after parsing attributes in process `syz.5.17290'. [ 3387.140602][T27422] netlink: 'syz.7.17292': attribute type 2 has an invalid length. [ 3387.148965][T27422] netlink: 'syz.7.17292': attribute type 8 has an invalid length. [ 3387.299460][T27429] bridge_slave_1: default FDB implementation only supports local addresses [ 3388.250937][T27468] bridge_slave_1: default FDB implementation only supports local addresses [ 3389.165034][T26755] wlan1: Trigger new scan to find an IBSS to join [ 3389.494241][ T1282] ieee802154 phy0 wpan0: encryption failed: -22 [ 3389.501003][ T1282] ieee802154 phy1 wpan1: encryption failed: -22 [ 3391.309869][T27484] netlink: 'syz.4.17316': attribute type 10 has an invalid length. [ 3391.801948][T27506] __nla_validate_parse: 6 callbacks suppressed [ 3391.801987][T27506] netlink: 1047 bytes leftover after parsing attributes in process `syz.1.17323'. [ 3391.828364][T27506] bridge_slave_1: default FDB implementation only supports local addresses [ 3391.896487][T27502] netlink: 1047 bytes leftover after parsing attributes in process `syz.7.17322'. [ 3391.907359][T27502] bridge_slave_1: default FDB implementation only supports local addresses [ 3392.167814][T27514] netlink: 144 bytes leftover after parsing attributes in process `syz.7.17328'. [ 3392.429171][T27521] netlink: 'syz.4.17329': attribute type 10 has an invalid length. [ 3392.467693][T27521] netlink: 40 bytes leftover after parsing attributes in process `syz.4.17329'. [ 3392.508311][T27521] team0: entered promiscuous mode [ 3392.524281][T27521] team_slave_0: entered promiscuous mode [ 3392.531037][T27521] team_slave_1: entered promiscuous mode [ 3392.550732][T27521] team0: entered allmulticast mode [ 3392.564646][T27521] team_slave_0: entered allmulticast mode [ 3392.571122][T27521] team_slave_1: entered allmulticast mode [ 3392.595207][T27521] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 3392.755836][T27530] netlink: 1047 bytes leftover after parsing attributes in process `syz.7.17334'. [ 3392.766979][T27530] bridge_slave_1: default FDB implementation only supports local addresses [ 3392.818584][T27535] netlink: 3 bytes leftover after parsing attributes in process `syz.4.17336'. [ 3393.016928][T27543] netlink: 'syz.7.17338': attribute type 10 has an invalid length. [ 3393.036314][T27539] netlink: 1047 bytes leftover after parsing attributes in process `syz.1.17337'. [ 3393.058389][T27539] bridge_slave_1: default FDB implementation only supports local addresses [ 3393.233882][T26764] wlan1: Trigger new scan to find an IBSS to join [ 3393.479741][T27560] netlink: 3 bytes leftover after parsing attributes in process `syz.1.17343'. [ 3393.516560][T27563] netlink: 1047 bytes leftover after parsing attributes in process `syz.4.17344'. [ 3393.545207][T27563] bridge_slave_1: default FDB implementation only supports local addresses [ 3393.679904][T27567] netlink: 1047 bytes leftover after parsing attributes in process `syz.5.17348'. [ 3393.704913][T27567] bridge_slave_1: default FDB implementation only supports local addresses [ 3393.995167][T27575] bridge_slave_1: default FDB implementation only supports local addresses [ 3394.152414][ T59] wlan1: Creating new IBSS network, BSSID 4a:a0:2a:88:34:e6 [ 3394.270806][T27588] bridge_slave_1: default FDB implementation only supports local addresses [ 3394.539876][T27599] bridge_slave_1: default FDB implementation only supports local addresses [ 3394.899586][T27607] netlink: 'syz.1.17365': attribute type 17 has an invalid length. [ 3394.917753][T27607] netlink: 'syz.1.17365': attribute type 16 has an invalid length. [ 3396.236884][T27627] bridge_slave_1: default FDB implementation only supports local addresses [ 3396.266846][T27624] netlink: 'syz.7.17370': attribute type 10 has an invalid length. [ 3396.291772][T27624] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 3396.801607][T27639] bridge_slave_1: default FDB implementation only supports local addresses [ 3397.052076][T27647] netlink: 'syz.1.17379': attribute type 10 has an invalid length. [ 3397.177395][T27651] netlink: 'syz.5.17381': attribute type 10 has an invalid length. [ 3397.635498][T27667] netlink: 'syz.7.17386': attribute type 29 has an invalid length. [ 3397.650344][T27668] netlink: 'syz.4.17387': attribute type 46 has an invalid length. [ 3397.754431][T27671] __nla_validate_parse: 9 callbacks suppressed [ 3397.754451][T27671] netlink: 209852 bytes leftover after parsing attributes in process `syz.4.17387'. [ 3397.772679][T27671] openvswitch: netlink: Key 32 has unexpected len 3064 expected 2 [ 3398.323105][T27693] netlink: 'syz.5.17397': attribute type 10 has an invalid length. [ 3398.489706][T27702] FAULT_INJECTION: forcing a failure. [ 3398.489706][T27702] name failslab, interval 1, probability 0, space 0, times 0 [ 3398.533609][T27702] CPU: 0 PID: 27702 Comm: syz.1.17399 Not tainted syzkaller #0 [ 3398.541684][T27702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3398.552313][T27702] Call Trace: [ 3398.555800][T27702] [ 3398.558759][T27702] dump_stack_lvl+0x18c/0x250 [ 3398.563488][T27702] ? show_regs_print_info+0x20/0x20 [ 3398.568732][T27702] ? load_image+0x420/0x420 [ 3398.573279][T27702] ? __might_sleep+0xe0/0xe0 [ 3398.578087][T27702] ? __lock_acquire+0x7d40/0x7d40 [ 3398.583230][T27702] should_fail_ex+0x39d/0x4d0 [ 3398.587937][T27702] should_failslab+0x9/0x20 [ 3398.592553][T27702] slab_pre_alloc_hook+0x59/0x310 [ 3398.597718][T27702] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 3398.603662][T27702] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 3398.609607][T27702] __kmem_cache_alloc_node+0x53/0x250 [ 3398.615087][T27702] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 3398.620924][T27702] __kmalloc+0xa4/0x230 [ 3398.625103][T27702] tomoyo_realpath_from_path+0xe3/0x5d0 [ 3398.630691][T27702] tomoyo_path_number_perm+0x248/0x620 [ 3398.636349][T27702] ? tomoyo_path_number_perm+0x217/0x620 [ 3398.641994][T27702] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 3398.648015][T27702] ? ksys_write+0x1c4/0x260 [ 3398.652554][T27702] ? __fget_files+0x28/0x4b0 [ 3398.657327][T27702] ? __fget_files+0x28/0x4b0 [ 3398.662013][T27702] security_file_ioctl+0x70/0xa0 [ 3398.666983][T27702] __se_sys_ioctl+0x48/0x170 [ 3398.671593][T27702] do_syscall_64+0x55/0xa0 [ 3398.676014][T27702] ? clear_bhb_loop+0x40/0x90 [ 3398.680702][T27702] ? clear_bhb_loop+0x40/0x90 [ 3398.685420][T27702] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3398.691316][T27702] RIP: 0033:0x7f94a439c819 [ 3398.695837][T27702] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3398.715804][T27702] RSP: 002b:00007f94a51da028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3398.724606][T27702] RAX: ffffffffffffffda RBX: 00007f94a4615fa0 RCX: 00007f94a439c819 [ 3398.732684][T27702] RDX: 0000200000000100 RSI: 000000000000890b RDI: 0000000000000005 [ 3398.740691][T27702] RBP: 00007f94a51da090 R08: 0000000000000000 R09: 0000000000000000 [ 3398.748720][T27702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3398.756703][T27702] R13: 00007f94a4616038 R14: 00007f94a4615fa0 R15: 00007ffe72d40008 [ 3398.764776][T27702] [ 3398.806558][T27702] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3399.313904][T27724] netlink: 'syz.4.17409': attribute type 21 has an invalid length. [ 3399.328483][T27724] netlink: 128 bytes leftover after parsing attributes in process `syz.4.17409'. [ 3400.058664][T27733] netlink: 1047 bytes leftover after parsing attributes in process `syz.1.17412'. [ 3400.071740][T27733] bridge_slave_1: default FDB implementation only supports local addresses [ 3400.091547][T27731] netlink: 1047 bytes leftover after parsing attributes in process `syz.7.17411'. [ 3400.118860][T27731] bridge_slave_1: default FDB implementation only supports local addresses [ 3400.141232][T27740] netlink: 1047 bytes leftover after parsing attributes in process `syz.4.17413'. [ 3400.152760][T27740] bridge_slave_1: default FDB implementation only supports local addresses [ 3400.529826][T27749] netlink: 'syz.7.17416': attribute type 10 has an invalid length. [ 3400.636515][T27760] netlink: 1047 bytes leftover after parsing attributes in process `syz.4.17420'. [ 3400.670357][T27760] bridge_slave_1: default FDB implementation only supports local addresses [ 3401.122212][T27762] tap0: tun_chr_ioctl cmd 1074025677 [ 3401.145068][T27762] tap0: linktype set to 778 [ 3401.191480][T27769] netlink: 'syz.4.17423': attribute type 10 has an invalid length. [ 3401.222914][T27762] netlink: 132 bytes leftover after parsing attributes in process `syz.5.17421'. [ 3401.541265][T27773] netlink: 1047 bytes leftover after parsing attributes in process `syz.1.17424'. [ 3401.568855][T27773] bridge_slave_1: default FDB implementation only supports local addresses [ 3401.812069][T27781] netlink: 129384 bytes leftover after parsing attributes in process `syz.7.17427'. [ 3406.493367][T27803] netlink: 'syz.1.17434': attribute type 10 has an invalid length. [ 3406.501858][T27805] netlink: 1047 bytes leftover after parsing attributes in process `syz.5.17433'. [ 3406.514027][T27805] bridge_slave_1: default FDB implementation only supports local addresses [ 3406.522917][T27815] netlink: 1047 bytes leftover after parsing attributes in process `syz.7.17437'. [ 3406.543520][T27815] bridge_slave_1: default FDB implementation only supports local addresses [ 3406.976111][T27830] netlink: 'syz.1.17442': attribute type 10 has an invalid length. [ 3407.122359][T27841] FAULT_INJECTION: forcing a failure. [ 3407.122359][T27841] name failslab, interval 1, probability 0, space 0, times 0 [ 3407.172678][T27841] CPU: 0 PID: 27841 Comm: syz.4.17447 Not tainted syzkaller #0 [ 3407.180441][T27841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3407.190699][T27841] Call Trace: [ 3407.194023][T27841] [ 3407.196998][T27841] dump_stack_lvl+0x18c/0x250 [ 3407.201747][T27841] ? verify_lock_unused+0x140/0x140 [ 3407.206989][T27841] ? show_regs_print_info+0x20/0x20 [ 3407.212326][T27841] ? load_image+0x420/0x420 [ 3407.216881][T27841] ? perf_trace_lock+0xfc/0x3b0 [ 3407.221784][T27841] ? trace_event_raw_event_lock+0x250/0x250 [ 3407.227721][T27841] should_fail_ex+0x39d/0x4d0 [ 3407.232438][T27841] should_failslab+0x9/0x20 [ 3407.237155][T27841] slab_pre_alloc_hook+0x59/0x310 [ 3407.242232][T27841] ? __hw_addr_add_ex+0x202/0x710 [ 3407.247270][T27841] __kmem_cache_alloc_node+0x53/0x250 [ 3407.252666][T27841] ? stack_depot_init+0x36/0xe0 [ 3407.257619][T27841] ? __hw_addr_add_ex+0x202/0x710 [ 3407.262829][T27841] kmalloc_trace+0x2a/0xe0 [ 3407.267256][T27841] __hw_addr_add_ex+0x202/0x710 [ 3407.272117][T27841] dev_addr_init+0x15f/0x240 [ 3407.276800][T27841] ? mutex_unlock+0x10/0x10 [ 3407.281304][T27841] ? dev_addr_flush+0x210/0x210 [ 3407.286158][T27841] ? kvmalloc_node+0x70/0x180 [ 3407.290842][T27841] ? trace_kmalloc+0x1f/0x90 [ 3407.295433][T27841] ? __kmalloc_node+0x157/0x230 [ 3407.300296][T27841] alloc_netdev_mqs+0x2e4/0x1040 [ 3407.305235][T27841] ? tun_get_tx_ring+0xa0/0xa0 [ 3407.310005][T27841] tun_set_iff+0x536/0xed0 [ 3407.314472][T27841] __tun_chr_ioctl+0x7ee/0x2000 [ 3407.319331][T27841] ? tun_flow_create+0x310/0x310 [ 3407.324360][T27841] ? bpf_lsm_file_ioctl+0x9/0x10 [ 3407.329309][T27841] ? security_file_ioctl+0x80/0xa0 [ 3407.334421][T27841] ? tun_chr_poll+0x630/0x630 [ 3407.339097][T27841] __se_sys_ioctl+0xfd/0x170 [ 3407.343823][T27841] do_syscall_64+0x55/0xa0 [ 3407.348281][T27841] ? clear_bhb_loop+0x40/0x90 [ 3407.353050][T27841] ? clear_bhb_loop+0x40/0x90 [ 3407.357753][T27841] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3407.363648][T27841] RIP: 0033:0x7f842a19c819 [ 3407.368068][T27841] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3407.387873][T27841] RSP: 002b:00007f842b05e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3407.396406][T27841] RAX: ffffffffffffffda RBX: 00007f842a415fa0 RCX: 00007f842a19c819 [ 3407.404472][T27841] RDX: 0000200000000100 RSI: 00000000400454ca RDI: 0000000000000003 [ 3407.412469][T27841] RBP: 00007f842b05e090 R08: 0000000000000000 R09: 0000000000000000 [ 3407.420575][T27841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3407.428734][T27841] R13: 00007f842a416038 R14: 00007f842a415fa0 R15: 00007ffc2fb8e348 [ 3407.436746][T27841] [ 3407.720667][T27849] netlink: 1047 bytes leftover after parsing attributes in process `syz.4.17449'. [ 3407.732323][T27849] bridge_slave_1: default FDB implementation only supports local addresses [ 3408.736729][T27871] FAULT_INJECTION: forcing a failure. [ 3408.736729][T27871] name failslab, interval 1, probability 0, space 0, times 0 [ 3408.802139][T27871] CPU: 0 PID: 27871 Comm: syz.5.17458 Not tainted syzkaller #0 [ 3408.809787][T27871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3408.820075][T27871] Call Trace: [ 3408.823469][T27871] [ 3408.826422][T27871] dump_stack_lvl+0x18c/0x250 [ 3408.831207][T27871] ? show_regs_print_info+0x20/0x20 [ 3408.836549][T27871] ? load_image+0x420/0x420 [ 3408.841097][T27871] ? __might_sleep+0xe0/0xe0 [ 3408.845727][T27871] ? __lock_acquire+0x7d40/0x7d40 [ 3408.850830][T27871] should_fail_ex+0x39d/0x4d0 [ 3408.855591][T27871] should_failslab+0x9/0x20 [ 3408.860250][T27871] slab_pre_alloc_hook+0x59/0x310 [ 3408.865372][T27871] ? apparmor_sk_alloc_security+0x77/0x100 [ 3408.871344][T27871] __kmem_cache_alloc_node+0x53/0x250 [ 3408.876789][T27871] ? apparmor_sk_alloc_security+0x77/0x100 [ 3408.882667][T27871] kmalloc_trace+0x2a/0xe0 [ 3408.887247][T27871] apparmor_sk_alloc_security+0x77/0x100 [ 3408.892922][T27871] security_sk_alloc+0x6e/0xa0 [ 3408.897733][T27871] sk_prot_alloc+0x101/0x210 [ 3408.902334][T27871] ? sk_alloc+0x24/0x360 [ 3408.906593][T27871] sk_alloc+0x3a/0x360 [ 3408.910752][T27871] ? bpf_ctx_init+0x163/0x1a0 [ 3408.915427][T27871] ? bpf_prog_test_run_skb+0x273/0x12b0 [ 3408.920975][T27871] bpf_prog_test_run_skb+0x3a5/0x12b0 [ 3408.926353][T27871] ? __fget_files+0x28/0x4b0 [ 3408.931044][T27871] ? __fget_files+0x28/0x4b0 [ 3408.935636][T27871] ? __fget_files+0x43d/0x4b0 [ 3408.940410][T27871] ? cpu_online+0x60/0x60 [ 3408.944843][T27871] bpf_prog_test_run+0x321/0x390 [ 3408.950312][T27871] __sys_bpf+0x49d/0x890 [ 3408.954599][T27871] ? bpf_link_show_fdinfo+0x390/0x390 [ 3408.960017][T27871] ? lock_chain_count+0x20/0x20 [ 3408.964879][T27871] __x64_sys_bpf+0x7c/0x90 [ 3408.969310][T27871] do_syscall_64+0x55/0xa0 [ 3408.973815][T27871] ? clear_bhb_loop+0x40/0x90 [ 3408.978498][T27871] ? clear_bhb_loop+0x40/0x90 [ 3408.983183][T27871] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3408.989265][T27871] RIP: 0033:0x7f19cd79c819 [ 3408.993687][T27871] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3409.013749][T27871] RSP: 002b:00007f19ce6b6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3409.022161][T27871] RAX: ffffffffffffffda RBX: 00007f19cda15fa0 RCX: 00007f19cd79c819 [ 3409.030223][T27871] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 3409.038451][T27871] RBP: 00007f19ce6b6090 R08: 0000000000000000 R09: 0000000000000000 [ 3409.046426][T27871] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3409.054399][T27871] R13: 00007f19cda16038 R14: 00007f19cda15fa0 R15: 00007fff6ddeacb8 [ 3409.062565][T27871] [ 3409.257157][ T59] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3409.416719][ T59] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3409.582877][ T59] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3409.749813][ T59] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3409.985870][T27894] netlink: 1047 bytes leftover after parsing attributes in process `syz.5.17467'. [ 3410.028460][T27894] bridge_slave_1: default FDB implementation only supports local addresses [ 3410.149025][T27898] FAULT_INJECTION: forcing a failure. [ 3410.149025][T27898] name failslab, interval 1, probability 0, space 0, times 0 [ 3410.161959][T27898] CPU: 0 PID: 27898 Comm: syz.7.17469 Not tainted syzkaller #0 [ 3410.169566][T27898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3410.179672][T27898] Call Trace: [ 3410.182979][T27898] [ 3410.185943][T27898] dump_stack_lvl+0x18c/0x250 [ 3410.190757][T27898] ? show_regs_print_info+0x20/0x20 [ 3410.196001][T27898] ? load_image+0x420/0x420 [ 3410.200554][T27898] ? skb_network_protocol+0x529/0x780 [ 3410.205990][T27898] should_fail_ex+0x39d/0x4d0 [ 3410.210754][T27898] should_failslab+0x9/0x20 [ 3410.215302][T27898] slab_pre_alloc_hook+0x59/0x310 [ 3410.220381][T27898] kmem_cache_alloc+0x5a/0x2d0 [ 3410.225242][T27898] ? skb_clone+0x1eb/0x370 [ 3410.229910][T27898] skb_clone+0x1eb/0x370 [ 3410.234220][T27898] ? dev_queue_xmit_nit+0x212/0xbb0 [ 3410.239850][T27898] dev_queue_xmit_nit+0x24d/0xbb0 [ 3410.245448][T27898] ? dev_queue_xmit_nit+0x2d/0xbb0 [ 3410.250873][T27898] ? validate_xmit_skb+0x949/0xf60 [ 3410.256062][T27898] dev_hard_start_xmit+0x148/0x740 [ 3410.261250][T27898] __dev_queue_xmit+0x19a3/0x3660 [ 3410.266428][T27898] ? __dev_queue_xmit+0x265/0x3660 [ 3410.271843][T27898] ? netdev_core_pick_tx+0x340/0x340 [ 3410.277340][T27898] ? __copy_skb_header+0xa3/0x4a0 [ 3410.282403][T27898] ? __asan_memcpy+0x40/0x70 [ 3410.287025][T27898] ? __skb_clone+0x63/0x790 [ 3410.291656][T27898] ? __skb_clone+0x480/0x790 [ 3410.296350][T27898] ? skb_clone+0x21f/0x370 [ 3410.300963][T27898] __netlink_deliver_tap+0x5ab/0x830 [ 3410.306312][T27898] ? netlink_deliver_tap+0x2e/0x1b0 [ 3410.311698][T27898] netlink_deliver_tap+0x19c/0x1b0 [ 3410.316862][T27898] netlink_unicast+0x72c/0x8d0 [ 3410.321675][T27898] netlink_sendmsg+0x8d0/0xbf0 [ 3410.326481][T27898] ? netlink_getsockopt+0x590/0x590 [ 3410.331899][T27898] ? aa_sock_msg_perm+0x94/0x150 [ 3410.336857][T27898] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 3410.342249][T27898] ? security_socket_sendmsg+0x80/0xa0 [ 3410.347711][T27898] ? netlink_getsockopt+0x590/0x590 [ 3410.352916][T27898] ____sys_sendmsg+0x5ba/0x960 [ 3410.357690][T27898] ? __asan_memset+0x22/0x40 [ 3410.362294][T27898] ? __sys_sendmsg_sock+0x30/0x30 [ 3410.367327][T27898] ? __import_iovec+0x5f2/0x850 [ 3410.372196][T27898] ? import_iovec+0x73/0xa0 [ 3410.376703][T27898] ___sys_sendmsg+0x2a6/0x360 [ 3410.381414][T27898] ? __sys_sendmsg+0x2a0/0x2a0 [ 3410.386199][T27898] ? __lock_acquire+0x7d40/0x7d40 [ 3410.391246][T27898] __se_sys_sendmsg+0x1c2/0x2b0 [ 3410.396186][T27898] ? __x64_sys_sendmsg+0x80/0x80 [ 3410.401139][T27898] ? lockdep_hardirqs_on+0x98/0x150 [ 3410.406346][T27898] do_syscall_64+0x55/0xa0 [ 3410.410764][T27898] ? clear_bhb_loop+0x40/0x90 [ 3410.415444][T27898] ? clear_bhb_loop+0x40/0x90 [ 3410.420129][T27898] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3410.426040][T27898] RIP: 0033:0x7f884ab9c819 [ 3410.430478][T27898] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3410.450389][T27898] RSP: 002b:00007f884bb31028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3410.458837][T27898] RAX: ffffffffffffffda RBX: 00007f884ae15fa0 RCX: 00007f884ab9c819 [ 3410.466818][T27898] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 3410.474792][T27898] RBP: 00007f884bb31090 R08: 0000000000000000 R09: 0000000000000000 [ 3410.482785][T27898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3410.490847][T27898] R13: 00007f884ae16038 R14: 00007f884ae15fa0 R15: 00007ffe0b65bf38 [ 3410.498837][T27898] [ 3410.581442][T24625] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 3410.596435][T24625] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 3410.619584][T24625] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 3410.629168][T24625] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 3410.663848][T29968] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 3410.671456][T24625] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 3410.817423][T27909] netlink: 'syz.4.17472': attribute type 10 has an invalid length. [ 3410.853605][T27912] FAULT_INJECTION: forcing a failure. [ 3410.853605][T27912] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3410.894116][T27912] CPU: 1 PID: 27912 Comm: syz.5.17471 Not tainted syzkaller #0 [ 3410.901732][T27912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3410.911894][T27912] Call Trace: [ 3410.915179][T27912] [ 3410.918111][T27912] dump_stack_lvl+0x18c/0x250 [ 3410.922892][T27912] ? show_regs_print_info+0x20/0x20 [ 3410.928097][T27912] ? load_image+0x420/0x420 [ 3410.932612][T27912] ? __might_fault+0xaa/0x120 [ 3410.937295][T27912] ? __lock_acquire+0x7d40/0x7d40 [ 3410.942325][T27912] should_fail_ex+0x39d/0x4d0 [ 3410.947016][T27912] _copy_from_user+0x2f/0xe0 [ 3410.951616][T27912] __sys_bpf+0x23e/0x890 [ 3410.955857][T27912] ? bpf_link_show_fdinfo+0x390/0x390 [ 3410.961258][T27912] __x64_sys_bpf+0x7c/0x90 [ 3410.965678][T27912] do_syscall_64+0x55/0xa0 [ 3410.970178][T27912] ? clear_bhb_loop+0x40/0x90 [ 3410.974856][T27912] ? clear_bhb_loop+0x40/0x90 [ 3410.979535][T27912] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3410.985463][T27912] RIP: 0033:0x7f19cd79c819 [ 3410.989880][T27912] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3411.009749][T27912] RSP: 002b:00007f19ce6b6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3411.018167][T27912] RAX: ffffffffffffffda RBX: 00007f19cda15fa0 RCX: 00007f19cd79c819 [ 3411.026137][T27912] RDX: 0000000000000094 RSI: 0000200000000400 RDI: 0000000000000005 [ 3411.034109][T27912] RBP: 00007f19ce6b6090 R08: 0000000000000000 R09: 0000000000000000 [ 3411.042086][T27912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3411.050158][T27912] R13: 00007f19cda16038 R14: 00007f19cda15fa0 R15: 00007fff6ddeacb8 [ 3411.058144][T27912] [ 3411.097321][T27909] vxcan1: entered promiscuous mode [ 3411.110269][T27909] vxcan1: entered allmulticast mode [ 3411.141034][T27909] team0: Device vxcan1 is of different type [ 3412.091084][T24625] Bluetooth: hci0: ISO packet for unknown connection handle 62 [ 3412.119131][T27950] netlink: 'syz.4.17482': attribute type 4 has an invalid length. [ 3412.139493][T27950] netlink: 152 bytes leftover after parsing attributes in process `syz.4.17482'. [ 3412.168490][T27950] .`: renamed from bond0 (while UP) [ 3412.186061][T27948] netlink: 1047 bytes leftover after parsing attributes in process `syz.7.17480'. [ 3412.224156][T27948] bridge_slave_1: default FDB implementation only supports local addresses [ 3412.242731][T27952] netlink: 'syz.5.17481': attribute type 4 has an invalid length. [ 3412.263215][T27952] netlink: 152 bytes leftover after parsing attributes in process `syz.5.17481'. [ 3412.330716][T27952] .`: renamed from bond0 (while UP) [ 3412.344673][T27952] bridge0: port 4(.`) entered disabled state [ 3412.524751][T27962] FAULT_INJECTION: forcing a failure. [ 3412.524751][T27962] name failslab, interval 1, probability 0, space 0, times 0 [ 3412.537863][T27962] CPU: 0 PID: 27962 Comm: syz.4.17484 Not tainted syzkaller #0 [ 3412.544390][T27901] chnl_net:caif_netlink_parms(): no params data found [ 3412.545444][T27962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3412.545458][T27962] Call Trace: [ 3412.566015][T27962] [ 3412.568959][T27962] dump_stack_lvl+0x18c/0x250 [ 3412.573825][T27962] ? show_regs_print_info+0x20/0x20 [ 3412.579306][T27962] ? load_image+0x420/0x420 [ 3412.584007][T27962] ? __might_sleep+0xe0/0xe0 [ 3412.588726][T27962] ? __lock_acquire+0x7d40/0x7d40 [ 3412.593957][T27962] should_fail_ex+0x39d/0x4d0 [ 3412.598660][T27962] should_failslab+0x9/0x20 [ 3412.603321][T27962] slab_pre_alloc_hook+0x59/0x310 [ 3412.608860][T27962] ? page_pool_create+0x71/0x5c0 [ 3412.614540][T27962] __kmem_cache_alloc_node+0x53/0x250 [ 3412.620040][T27962] ? page_pool_create+0x71/0x5c0 [ 3412.625181][T27962] kmalloc_node_trace+0x26/0xe0 [ 3412.630055][T27962] page_pool_create+0x71/0x5c0 [ 3412.634832][T27962] bpf_test_run_xdp_live+0x203/0x1b20 [ 3412.640221][T27962] ? 0xffffffffa0010b00 [ 3412.644667][T27962] ? 0xffffffffa0010b00 [ 3412.648847][T27962] ? bpf_dispatcher_change_prog+0xcbf/0xf10 [ 3412.654754][T27962] ? 0xffffffffa0010b00 [ 3412.658958][T27962] ? xdp_convert_md_to_buff+0x330/0x330 [ 3412.664557][T27962] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 3412.670919][T27962] ? _copy_from_user+0xa5/0xe0 [ 3412.675726][T27962] ? bpf_test_init+0x119/0x140 [ 3412.680647][T27962] ? xdp_convert_md_to_buff+0x5b/0x330 [ 3412.686232][T27962] bpf_prog_test_run_xdp+0x7ca/0x10e0 [ 3412.691710][T27962] ? dev_put+0x80/0x80 [ 3412.695911][T27962] ? dev_put+0x80/0x80 [ 3412.700150][T27962] bpf_prog_test_run+0x321/0x390 [ 3412.705120][T27962] __sys_bpf+0x49d/0x890 [ 3412.709388][T27962] ? bpf_link_show_fdinfo+0x390/0x390 [ 3412.715215][T27962] ? lock_chain_count+0x20/0x20 [ 3412.720264][T27962] __x64_sys_bpf+0x7c/0x90 [ 3412.724717][T27962] do_syscall_64+0x55/0xa0 [ 3412.729229][T27962] ? clear_bhb_loop+0x40/0x90 [ 3412.734031][T27962] ? clear_bhb_loop+0x40/0x90 [ 3412.738822][T27962] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3412.744727][T27962] RIP: 0033:0x7f842a19c819 [ 3412.749233][T27962] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3412.768940][T27962] RSP: 002b:00007f842b05e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3412.777376][T27962] RAX: ffffffffffffffda RBX: 00007f842a415fa0 RCX: 00007f842a19c819 [ 3412.785532][T27962] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 3412.793689][T27962] RBP: 00007f842b05e090 R08: 0000000000000000 R09: 0000000000000000 [ 3412.801677][T27962] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3412.809949][T27962] R13: 00007f842a416038 R14: 00007f842a415fa0 R15: 00007ffc2fb8e348 [ 3412.817942][T27962] [ 3412.834715][T24625] Bluetooth: hci2: command tx timeout [ 3413.180912][T27974] ================================================================== [ 3413.189125][T27974] BUG: KASAN: slab-out-of-bounds in __bpf_get_stackid+0x6bf/0x900 [ 3413.197161][T27974] Write of size 48 at addr ffff888060dbd410 by task syz.7.17488/27974 [ 3413.205444][T27974] [ 3413.207875][T27974] CPU: 0 PID: 27974 Comm: syz.7.17488 Not tainted syzkaller #0 [ 3413.215425][T27974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3413.225571][T27974] Call Trace: [ 3413.228867][T27974] [ 3413.231804][T27974] dump_stack_lvl+0x18c/0x250 [ 3413.236521][T27974] ? read_lock_is_recursive+0x20/0x20 [ 3413.241984][T27974] ? show_regs_print_info+0x20/0x20 [ 3413.247306][T27974] ? load_image+0x420/0x420 [ 3413.251843][T27974] ? _raw_spin_lock_irqsave+0xc0/0x100 [ 3413.257339][T27974] ? __virt_addr_valid+0x18c/0x540 [ 3413.262590][T27974] ? __virt_addr_valid+0x469/0x540 [ 3413.267893][T27974] print_report+0xa8/0x210 [ 3413.272418][T27974] ? __bpf_get_stackid+0x6bf/0x900 [ 3413.277545][T27974] kasan_report+0x117/0x150 [ 3413.282094][T27974] ? __bpf_get_stackid+0x6bf/0x900 [ 3413.287434][T27974] kasan_check_range+0x241/0x290 [ 3413.292411][T27974] ? __bpf_get_stackid+0x6bf/0x900 [ 3413.297645][T27974] __asan_memcpy+0x40/0x70 [ 3413.302077][T27974] __bpf_get_stackid+0x6bf/0x900 [ 3413.307025][T27974] bpf_get_stackid_pe+0x343/0x410 [ 3413.312149][T27974] bpf_prog_1649ecc1a5870555+0x29/0x39 [ 3413.317718][T27974] bpf_overflow_handler+0x1fc/0x510 [ 3413.323141][T27974] ? bpf_overflow_handler+0xde/0x510 [ 3413.328475][T27974] ? tp_perf_event_destroy+0x20/0x20 [ 3413.333799][T27974] ? __perf_event_account_interrupt+0x187/0x280 [ 3413.340166][T27974] __perf_event_overflow+0x447/0x630 [ 3413.345503][T27974] perf_swevent_overflow+0x268/0x340 [ 3413.350828][T27974] ? perf_event_switch_output+0x790/0x790 [ 3413.356554][T27974] ? rcu_is_watching+0x15/0xb0 [ 3413.361409][T27974] perf_swevent_event+0x45c/0x570 [ 3413.366433][T27974] ? perf_tp_event+0x1520/0x1520 [ 3413.371379][T27974] ___perf_sw_event+0x4a7/0x730 [ 3413.376232][T27974] ? trace_call_bpf+0xc3/0x6c0 [ 3413.380997][T27974] ? ___perf_sw_event+0x199/0x730 [ 3413.386021][T27974] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 3413.392456][T27974] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 3413.398448][T27974] ? lock_chain_count+0x20/0x20 [ 3413.403302][T27974] __perf_sw_event+0x139/0x270 [ 3413.408250][T27974] do_user_addr_fault+0x123e/0x12c0 [ 3413.413544][T27974] ? rcu_is_watching+0x15/0xb0 [ 3413.418310][T27974] exc_page_fault+0x64/0x100 [ 3413.422906][T27974] asm_exc_page_fault+0x26/0x30 [ 3413.428023][T27974] RIP: 0010:__get_user_4+0x11/0x20 [ 3413.433241][T27974] Code: 48 c1 fa 3f 48 09 d0 0f 01 cb 0f b7 10 31 c0 0f 01 ca c3 90 90 90 90 90 90 f3 0f 1e fa 48 89 c2 48 c1 fa 3f 48 09 d0 0f 01 cb <8b> 10 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 f3 0f 1e fa 48 89 c2 [ 3413.452990][T27974] RSP: 0018:ffffc900036afce0 EFLAGS: 00050202 [ 3413.459158][T27974] RAX: 0000000000000004 RBX: ffffc900036afde0 RCX: 678cd7ceea5f3800 [ 3413.467230][T27974] RDX: 0000000000000000 RSI: ffffffff8acadb60 RDI: ffffffff8b1c8e60 [ 3413.475267][T27974] RBP: ffffc900036aff10 R08: ffffffff8e8b14ef R09: 1ffffffff1d1629d [ 3413.483242][T27974] R10: dffffc0000000000 R11: fffffbfff1d1629e R12: 0000000000000000 [ 3413.491220][T27974] R13: 0000000000000004 R14: ffffc900036afde0 R15: 0000000000000000 [ 3413.499215][T27974] perf_copy_attr+0x45/0x840 [ 3413.503845][T27974] __se_sys_perf_event_open+0x11b/0x1c50 [ 3413.509507][T27974] ? perf_trace_run_bpf_submit+0x125/0x1c0 [ 3413.515759][T27974] ? __x64_sys_perf_event_open+0xc0/0xc0 [ 3413.521511][T27974] ? lock_chain_count+0x20/0x20 [ 3413.527168][T27974] ? lockdep_hardirqs_on+0x98/0x150 [ 3413.532371][T27974] ? __x64_sys_perf_event_open+0x20/0xc0 [ 3413.538217][T27974] do_syscall_64+0x55/0xa0 [ 3413.543155][T27974] ? clear_bhb_loop+0x40/0x90 [ 3413.547954][T27974] ? clear_bhb_loop+0x40/0x90 [ 3413.552634][T27974] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3413.558537][T27974] RIP: 0033:0x7f884ab9c819 [ 3413.562947][T27974] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3413.582645][T27974] RSP: 002b:00007f884bb31028 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 3413.591258][T27974] RAX: ffffffffffffffda RBX: 00007f884ae15fa0 RCX: 00007f884ab9c819 [ 3413.599861][T27974] RDX: fffffffffffffffc RSI: 0000000000000000 RDI: 0000000000000000 [ 3413.607944][T27974] RBP: 00007f884ac32c91 R08: 0000000000000000 R09: 0000000000000000 [ 3413.616064][T27974] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 3413.624057][T27974] R13: 00007f884ae16038 R14: 00007f884ae15fa0 R15: 00007ffe0b65bf38 [ 3413.632036][T27974] [ 3413.635070][T27974] [ 3413.637475][T27974] Allocated by task 27975: [ 3413.642092][T27974] kasan_set_track+0x4e/0x70 [ 3413.647049][T27974] __kasan_kmalloc+0x8f/0xa0 [ 3413.651742][T27974] __kmalloc_node+0xb4/0x230 [ 3413.656334][T27974] bpf_map_area_alloc+0x5e/0x110 [ 3413.661285][T27974] prealloc_elems_and_freelist+0x86/0x1c0 [ 3413.667005][T27974] stack_map_alloc+0x33a/0x4c0 [ 3413.671784][T27974] map_create+0x877/0x12f0 [ 3413.676204][T27974] __sys_bpf+0x651/0x890 [ 3413.680527][T27974] __x64_sys_bpf+0x7c/0x90 [ 3413.684940][T27974] do_syscall_64+0x55/0xa0 [ 3413.689876][T27974] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3413.695769][T27974] [ 3413.698098][T27974] Last potentially related work creation: [ 3413.703892][T27974] kasan_save_stack+0x3e/0x60 [ 3413.708569][T27974] __kasan_record_aux_stack+0xaf/0xc0 [ 3413.714330][T27974] call_rcu+0x153/0x950 [ 3413.718502][T27974] nf_unregister_net_hooks+0xcb/0x130 [ 3413.723977][T27974] setup_net+0x7e7/0xa30 [ 3413.728225][T27974] copy_net_ns+0x36d/0x5e0 [ 3413.732726][T27974] create_new_namespaces+0x3d3/0x6f0 [ 3413.738275][T27974] copy_namespaces+0x430/0x4a0 [ 3413.743035][T27974] copy_process+0x1724/0x3d80 [ 3413.747880][T27974] kernel_clone+0x24b/0x8a0 [ 3413.752474][T27974] __x64_sys_clone+0x1b7/0x230 [ 3413.757240][T27974] do_syscall_64+0x55/0xa0 [ 3413.761653][T27974] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3413.767546][T27974] [ 3413.769889][T27974] Second to last potentially related work creation: [ 3413.776466][T27974] kasan_save_stack+0x3e/0x60 [ 3413.781144][T27974] __kasan_record_aux_stack+0xaf/0xc0 [ 3413.786524][T27974] call_rcu+0x153/0x950 [ 3413.790817][T27974] nf_unregister_net_hooks+0xcb/0x130 [ 3413.796187][T27974] brnf_exit_net+0x61/0x120 [ 3413.800687][T27974] cleanup_net+0x70a/0xbb0 [ 3413.805278][T27974] process_scheduled_works+0xa5d/0x15d0 [ 3413.811459][T27974] worker_thread+0xa55/0xfc0 [ 3413.816146][T27974] kthread+0x2fa/0x390 [ 3413.820320][T27974] ret_from_fork+0x48/0x80 [ 3413.824870][T27974] ret_from_fork_asm+0x11/0x20 [ 3413.829635][T27974] [ 3413.831979][T27974] The buggy address belongs to the object at ffff888060dbd400 [ 3413.831979][T27974] which belongs to the cache kmalloc-cg-64 of size 64 [ 3413.846234][T27974] The buggy address is located 16 bytes inside of [ 3413.846234][T27974] allocated 40-byte region [ffff888060dbd400, ffff888060dbd428) [ 3413.860692][T27974] [ 3413.863107][T27974] The buggy address belongs to the physical page: [ 3413.869521][T27974] page:ffffea0001836f40 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888060dbd500 pfn:0x60dbd [ 3413.881668][T27974] memcg:ffff8880559eaa01 [ 3413.885904][T27974] flags: 0xfff00000000800(slab|node=0|zone=1|lastcpupid=0x7ff) [ 3413.893487][T27974] page_type: 0xffffffff() [ 3413.897904][T27974] raw: 00fff00000000800 ffff888017c4da00 ffffea00014f2140 dead000000000004 [ 3413.906577][T27974] raw: ffff888060dbd500 000000008020001c 00000001ffffffff ffff8880559eaa01 [ 3413.915250][T27974] page dumped because: kasan: bad access detected [ 3413.921672][T27974] page_owner tracks the page as allocated [ 3413.927640][T27974] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 21009, tgid 21008 (syz.5.15101), ts 3077298758686, free_ts 3077296189432 [ 3413.946771][T27974] post_alloc_hook+0x1c1/0x200 [ 3413.951543][T27974] get_page_from_freelist+0x1951/0x19e0 [ 3413.957084][T27974] __alloc_pages+0x1f0/0x460 [ 3413.961760][T27974] alloc_slab_page+0x5d/0x160 [ 3413.966436][T27974] new_slab+0x87/0x2d0 [ 3413.970501][T27974] ___slab_alloc+0xc5d/0x12f0 [ 3413.975177][T27974] __kmem_cache_alloc_node+0x19e/0x250 [ 3413.980650][T27974] __kmalloc_node+0xa4/0x230 [ 3413.985248][T27974] kvmalloc_node+0x70/0x180 [ 3413.989838][T27974] __nf_hook_entries_try_shrink+0x310/0x6d0 [ 3413.995753][T27974] __nf_unregister_net_hook+0x4e1/0x6e0 [ 3414.001383][T27974] nf_unregister_net_hooks+0xcb/0x130 [ 3414.006755][T27974] nf_ct_netns_put+0x2d2/0x520 [ 3414.011544][T27974] nf_conncount_destroy+0x41/0x150 [ 3414.016858][T27974] ovs_ct_exit+0x9c/0x200 [ 3414.021287][T27974] ovs_exit_net+0xed/0x7a0 [ 3414.025702][T27974] page last free stack trace: [ 3414.030373][T27974] free_unref_page_prepare+0x7b2/0x8c0 [ 3414.035833][T27974] free_unref_page+0x32/0x2e0 [ 3414.040518][T27974] vfree+0x1a6/0x320 [ 3414.044409][T27974] process_scheduled_works+0xa5d/0x15d0 [ 3414.049955][T27974] worker_thread+0xa55/0xfc0 [ 3414.054543][T27974] kthread+0x2fa/0x390 [ 3414.058685][T27974] ret_from_fork+0x48/0x80 [ 3414.063099][T27974] ret_from_fork_asm+0x11/0x20 [ 3414.067867][T27974] [ 3414.070269][T27974] Memory state around the buggy address: [ 3414.075891][T27974] ffff888060dbd300: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 3414.083970][T27974] ffff888060dbd380: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc [ 3414.092114][T27974] >ffff888060dbd400: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 3414.100689][T27974] ^ [ 3414.106059][T27974] ffff888060dbd480: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc [ 3414.114123][T27974] ffff888060dbd500: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 3414.122282][T27974] ================================================================== [ 3414.131084][T27974] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 3414.138768][T27974] CPU: 0 PID: 27974 Comm: syz.7.17488 Not tainted syzkaller #0 [ 3414.146577][T27974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 3414.157006][T27974] Call Trace: [ 3414.160985][T27974] [ 3414.164000][T27974] dump_stack_lvl+0x18c/0x250 [ 3414.168796][T27974] ? show_regs_print_info+0x20/0x20 [ 3414.173998][T27974] ? load_image+0x420/0x420 [ 3414.178623][T27974] panic+0x2dc/0x730 [ 3414.182602][T27974] ? __lock_acquire+0x7d40/0x7d40 [ 3414.187723][T27974] ? bpf_jit_dump+0xd0/0xd0 [ 3414.192490][T27974] ? _raw_spin_unlock_irqrestore+0xc5/0x120 [ 3414.198398][T27974] ? _raw_spin_unlock+0x40/0x40 [ 3414.203977][T27974] ? __bpf_get_stackid+0x6bf/0x900 [ 3414.209145][T27974] check_panic_on_warn+0x84/0xa0 [ 3414.214180][T27974] ? __bpf_get_stackid+0x6bf/0x900 [ 3414.219317][T27974] end_report+0x6f/0x130 [ 3414.223672][T27974] kasan_report+0x128/0x150 [ 3414.228276][T27974] ? __bpf_get_stackid+0x6bf/0x900 [ 3414.233489][T27974] kasan_check_range+0x241/0x290 [ 3414.238469][T27974] ? __bpf_get_stackid+0x6bf/0x900 [ 3414.243784][T27974] __asan_memcpy+0x40/0x70 [ 3414.248386][T27974] __bpf_get_stackid+0x6bf/0x900 [ 3414.253435][T27974] bpf_get_stackid_pe+0x343/0x410 [ 3414.259166][T27974] bpf_prog_1649ecc1a5870555+0x29/0x39 [ 3414.264725][T27974] bpf_overflow_handler+0x1fc/0x510 [ 3414.269933][T27974] ? bpf_overflow_handler+0xde/0x510 [ 3414.275396][T27974] ? tp_perf_event_destroy+0x20/0x20 [ 3414.280774][T27974] ? __perf_event_account_interrupt+0x187/0x280 [ 3414.287020][T27974] __perf_event_overflow+0x447/0x630 [ 3414.292842][T27974] perf_swevent_overflow+0x268/0x340 [ 3414.298224][T27974] ? perf_event_switch_output+0x790/0x790 [ 3414.303953][T27974] ? rcu_is_watching+0x15/0xb0 [ 3414.308821][T27974] perf_swevent_event+0x45c/0x570 [ 3414.313878][T27974] ? perf_tp_event+0x1520/0x1520 [ 3414.318822][T27974] ___perf_sw_event+0x4a7/0x730 [ 3414.323754][T27974] ? trace_call_bpf+0xc3/0x6c0 [ 3414.328799][T27974] ? ___perf_sw_event+0x199/0x730 [ 3414.333840][T27974] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 3414.340288][T27974] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 3414.346293][T27974] ? lock_chain_count+0x20/0x20 [ 3414.351192][T27974] __perf_sw_event+0x139/0x270 [ 3414.356155][T27974] do_user_addr_fault+0x123e/0x12c0 [ 3414.361448][T27974] ? rcu_is_watching+0x15/0xb0 [ 3414.366216][T27974] exc_page_fault+0x64/0x100 [ 3414.370906][T27974] asm_exc_page_fault+0x26/0x30 [ 3414.375757][T27974] RIP: 0010:__get_user_4+0x11/0x20 [ 3414.380875][T27974] Code: 48 c1 fa 3f 48 09 d0 0f 01 cb 0f b7 10 31 c0 0f 01 ca c3 90 90 90 90 90 90 f3 0f 1e fa 48 89 c2 48 c1 fa 3f 48 09 d0 0f 01 cb <8b> 10 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 f3 0f 1e fa 48 89 c2 [ 3414.400573][T27974] RSP: 0018:ffffc900036afce0 EFLAGS: 00050202 [ 3414.406647][T27974] RAX: 0000000000000004 RBX: ffffc900036afde0 RCX: 678cd7ceea5f3800 [ 3414.415548][T27974] RDX: 0000000000000000 RSI: ffffffff8acadb60 RDI: ffffffff8b1c8e60 [ 3414.423700][T27974] RBP: ffffc900036aff10 R08: ffffffff8e8b14ef R09: 1ffffffff1d1629d [ 3414.431861][T27974] R10: dffffc0000000000 R11: fffffbfff1d1629e R12: 0000000000000000 [ 3414.440014][T27974] R13: 0000000000000004 R14: ffffc900036afde0 R15: 0000000000000000 [ 3414.447995][T27974] perf_copy_attr+0x45/0x840 [ 3414.452684][T27974] __se_sys_perf_event_open+0x11b/0x1c50 [ 3414.458356][T27974] ? perf_trace_run_bpf_submit+0x125/0x1c0 [ 3414.464215][T27974] ? __x64_sys_perf_event_open+0xc0/0xc0 [ 3414.469871][T27974] ? lock_chain_count+0x20/0x20 [ 3414.474762][T27974] ? lockdep_hardirqs_on+0x98/0x150 [ 3414.480033][T27974] ? __x64_sys_perf_event_open+0x20/0xc0 [ 3414.486089][T27974] do_syscall_64+0x55/0xa0 [ 3414.490519][T27974] ? clear_bhb_loop+0x40/0x90 [ 3414.495285][T27974] ? clear_bhb_loop+0x40/0x90 [ 3414.500179][T27974] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 3414.506469][T27974] RIP: 0033:0x7f884ab9c819 [ 3414.510915][T27974] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 3414.531061][T27974] RSP: 002b:00007f884bb31028 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 3414.539509][T27974] RAX: ffffffffffffffda RBX: 00007f884ae15fa0 RCX: 00007f884ab9c819 [ 3414.547565][T27974] RDX: fffffffffffffffc RSI: 0000000000000000 RDI: 0000000000000000 [ 3414.555623][T27974] RBP: 00007f884ac32c91 R08: 0000000000000000 R09: 0000000000000000 [ 3414.563600][T27974] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 3414.572002][T27974] R13: 00007f884ae16038 R14: 00007f884ae15fa0 R15: 00007ffe0b65bf38 [ 3414.580001][T27974] [ 3414.583451][T27974] Kernel Offset: disabled [ 3414.587775][T27974] Rebooting in 86400 seconds..