last executing test programs: 22m34.434676443s ago: executing program 0 (id=1): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x4, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$kcm(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8003}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x8, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20403, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, @perf_config_ext={0x9}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x5, @empty, 0x20000, 0x1}, 0x80, 0x0}, 0x240440d1) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x88, 0x67, &(0x7f00000002c0), 0x4) sendmsg$inet(r4, &(0x7f0000000080)={&(0x7f0000000040)={0x2, 0x4e1f, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac14140be0000002000000a62206878fe00010000000000000000000"], 0x30}, 0x844) sendmsg$kcm(r1, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0x0, @empty}, 0x80, 0x0}, 0x20000001) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000440)="a6", 0xffffff58}], 0x1}, 0x40001) r5 = socket$kcm(0x10, 0x400000002, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="1400000016000b63d25a80648c2594f90424fc60", 0x14}, {&(0x7f0000000580)="9da853", 0x3}], 0x2, 0x0, 0xffffffffffffff18, 0x600}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000760091"], 0xfe33) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000140)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x75, &(0x7f0000000200)=[{}, {}], 0x10, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0xf9, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x2, @perf_config_ext={0x40000000000000, 0x4}, 0x0, 0x701, 0x43a1bd7a, 0x7, 0x5, 0x6, 0xa, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x5, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x18, &(0x7f0000000100), 0x120) 22m32.732075652s ago: executing program 0 (id=7): r0 = socket$kcm(0x2, 0x3, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x2, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0xffff7ffd}, [@alu={0x4, 0x0, 0xd, 0xa, 0x0, 0x0, 0x20}]}, &(0x7f0000000000)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41000, 0x65, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000001}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000200), 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x4, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000, 0x590f}, 0x2920, 0x0, 0x0, 0x8, 0x80000000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000300)="6000000022007f029e607dd75fcb520000a124b244de91f7f414adcf41bfafdd1b1e93c6292aefa3ca89563a63fb94b2584ca2faa20f2c308b0fe298acec10e3019e1e26e6efd0166e6c1b01132e5423294ac2f4d53c3870c3068461957e5357", 0x60}], 0x1, 0x0, 0x0, 0x6}, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000240)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="2f0000002820000004000000", @ANYRES32, @ANYBLOB="88117037b8f7ac835d72f65d3b2fd92f2ee3a4beb365050dc86cc5096207eea56d89a81f8fd246efc65c022fd1d72cd088ec1dd514ed4f21117b65d39d02b1447c67b3ed5334d5a98da7", @ANYRES64=0x0], 0x20) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8916, &(0x7f0000000000)={'veth1_to_bridge\x00', @random="02000400ac14"}) 22m30.818067122s ago: executing program 0 (id=9): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="d800000010008104687da3aa7143a0b8c81d080b25000000e8fe55a118001500060014c3ff0000120800070043000040a80019000400014006000d00036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a9d7c7c0b7a196e6f6d7f3ef48286112c88ac417898516277ce06bbace80177ccbec4c2ee5a7cef4260000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c0aaac99eddc64193071e9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb06000000588a6364", 0xd8}], 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000100)}, 0x828, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d80000001800810804000000db44b904021d080010000000e8fe55a10a", 0x1d}], 0x1, 0x0, 0x0, 0x6000}, 0x6000800) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x3, 0x2, 0x2}}, 0x80, 0x0}, 0x0) close(0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="d8000000210081044e81f7d28344b904020000", 0x2}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x33fe0) r2 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r2, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @remote}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000a0000001001000001"], 0x18}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0xffff, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x80, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x20000000) close(r2) r3 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="0206e7ec02000000ffffffff006d97dc", 0x10}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000300)="2e00000010008108090f9becdb4cb92e0a4831371400000069bd6efb2502eaf60d000100020400bf050005001201", 0x2e}, {&(0x7f00000006c0)="4db1126b2eae346e233258322c43a4fc348075cad40a527de83d8c732fa9172193febdfc8f6c4e3eda800db8e53a45c1c6852e47ef4cc936723c9886f54cbd18b65733e31965f773613e883559f3a0759cd851886faad213e0fe1acd6d1162fa1e4b9c33d1089ce3a736e7a46ae40c5acfdff9", 0x73}, {&(0x7f0000000740)="b645", 0x2}, {&(0x7f0000000a40)="99d4c54e21d15af3c8941bf54decfbdf75fe20549c50794ebc1f61bfe46e37abeebda5d5d5baeb75e6d1799d9614d8e441b654f276561d8e7cbd73f573d89f90ce8e108ab7b2438a1823c8be4da94f6515bb733503d813c6fa145b380d80c1a32666aeba61f37f141630e37e238939ccccb6c4ffb85ea562d397a33c87ff34ec09ba8383b77a969cb798267237d0558a7659e0c3ad987fc5d09d8b8c564eb4b6166c5cb92434669c5c525dd9bec14387685c5c5d0ffe4e99747a4fd23e80d0f46af0b13bd68f2f469ff7", 0x105}], 0x4}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x3, &(0x7f0000000000)=ANY=[], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"/3432], &(0x7f0000000340)='GPL\x00'}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000001c0)="f11564c6", 0x4}], 0x1}, 0x40044) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x2, 0x10, 0x0, 0x8, 0x820a4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x10000004000}, 0xd832, 0x200000000000c8, 0x806, 0x9, 0xfffffffffffffffb, 0x80000000, 0x3, 0x0, 0xfffffffc, 0x0, 0x100000000001000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r7, &(0x7f0000000880)={0x0, 0x0, 0x0}, 0x24040014) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5}, 0x48) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000180)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd631180fc020c2f00db5b686158bbcfe8875a060300000023000000000000000000000000ac1414aa3a2008"], 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r5, 0x18000000000002a0, 0x10, 0x0, &(0x7f00000005c0)="5aee41dea43e00005486f92def4dd72d", 0x0, 0xf004, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 22m28.192229409s ago: executing program 0 (id=12): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000009, 0x2, @perf_config_ext={0x0, 0x6}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0xa, 0x1, 0x106) sendmsg$sock(r1, &(0x7f0000000400)={&(0x7f0000000180)=@l2tp6={0xa, 0x0, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x6}, 0x80, 0x0}, 0x2004c040) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x700, @private2, 0x500000, 0x4}, 0x80, 0x0}, 0x20040010) r2 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x0) r3 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f00000008c0), 0x43) write$cgroup_subtree(r3, 0x0, 0x101d0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x10006, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100000, 0x4, 0x2, 0x9, 0x7d, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x94) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1458}, 0x48800) sendmsg$kcm(r3, &(0x7f0000000900)={&(0x7f0000000040)=@ax25={{0x3, @bcast, 0x1}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000580)}, {&(0x7f0000000700)}], 0x2}, 0x4000481) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfd, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef43c000000e3bd6efb440009000e000a0010000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0), 0x8) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xfe, 0xbd, 0x0, 0x0, 0x0, 0x0, 0x4401, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x6, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x8020) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102038700fe08000e40000200875a65969ff57b00ff11"], 0xfdef) r9 = openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r9, &(0x7f0000000100)=ANY=[], 0x0) 22m26.884101577s ago: executing program 0 (id=15): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1e000000040000000008000005000000040000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000050000000000000003000000000000000000000000000000b30da742cbd7f1312e620a076847b77835e6bdca91ec40014599a220af43f9f11265986e4c13cbb65507c6050f9a1ab1c9999aed7e6f9ac58e0233ce672aaf7baed4a54d90735c96360588271fa453c947c99fe7450ff572b6fe5496dbc01a427970c9d5f40febea76"], 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000580)='!%**[$/&\\]\x00') ioctl$TUNGETVNETLE(r1, 0x800454dd, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1a089, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x1}, 0x2018, 0x0, 0x1ff, 0x8, 0x1000, 0x9, 0x7, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_clone(0x8020000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000ff0100007b8af8ff00000000bfa200000000000007020000f8ffffffb703000004000000b704000000000000850000001500000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1080a2, 0x0, 0x0, 0x0, 0x0, 0x80020000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0f00000004000000040000000700000000000000", @ANYRES32, @ANYBLOB="0000000000040000040000000000000000000040", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r3, &(0x7f0000000100), &(0x7f0000000000)=""/95, 0x2}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r0}, &(0x7f0000000080), 0x0}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r4 = socket$kcm(0x10, 0x400000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x10e, 0xb, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x454140, 0x0) ioctl$TUNSETVNETLE(r5, 0x400454dc, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2c, 0x41, 0x0, 0x2, 0x0, 0x9, 0x402, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0xc000, 0xffeffffffffffffa, 0x43a1bd76, 0x7, 0x9, 0x6, 0x4, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x0) r8 = openat$cgroup_devices(r6, &(0x7f0000000240)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r8, &(0x7f0000000080)=ANY=[@ANYBLOB="61202a3a2a2002eb"], 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={@map, 0x6, 0x1, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0857f9f582f0300000000000500", 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) 22m10.721847919s ago: executing program 32 (id=15): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1e000000040000000008000005000000040000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000050000000000000003000000000000000000000000000000b30da742cbd7f1312e620a076847b77835e6bdca91ec40014599a220af43f9f11265986e4c13cbb65507c6050f9a1ab1c9999aed7e6f9ac58e0233ce672aaf7baed4a54d90735c96360588271fa453c947c99fe7450ff572b6fe5496dbc01a427970c9d5f40febea76"], 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000580)='!%**[$/&\\]\x00') ioctl$TUNGETVNETLE(r1, 0x800454dd, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1a089, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x1}, 0x2018, 0x0, 0x1ff, 0x8, 0x1000, 0x9, 0x7, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_clone(0x8020000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000ff0100007b8af8ff00000000bfa200000000000007020000f8ffffffb703000004000000b704000000000000850000001500000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1080a2, 0x0, 0x0, 0x0, 0x0, 0x80020000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0f00000004000000040000000700000000000000", @ANYRES32, @ANYBLOB="0000000000040000040000000000000000000040", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000001100)={r3, &(0x7f0000000100), &(0x7f0000000000)=""/95, 0x2}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r0}, &(0x7f0000000080), 0x0}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r4 = socket$kcm(0x10, 0x400000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x10e, 0xb, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x454140, 0x0) ioctl$TUNSETVNETLE(r5, 0x400454dc, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2c, 0x41, 0x0, 0x2, 0x0, 0x9, 0x402, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0xc000, 0xffeffffffffffffa, 0x43a1bd76, 0x7, 0x9, 0x6, 0x4, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x0) r8 = openat$cgroup_devices(r6, &(0x7f0000000240)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r8, &(0x7f0000000080)=ANY=[@ANYBLOB="61202a3a2a2002eb"], 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={@map, 0x6, 0x1, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0857f9f582f0300000000000500", 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) 21m57.721841117s ago: executing program 3 (id=33): r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="0007000042009103"], 0xfe33) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000180)={0x2ba6e7ea}, 0x8) bpf$BPF_PROG_DETACH(0x1c, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="2f000000001d00025f91b087fd5446361c0aa688f9000f46", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x20) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x12100) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000000100)={&(0x7f00000004c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000003a00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x2a}, @multicast1}}}], 0x20}, 0x4008804) perf_event_open(0x0, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x9) r3 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r3, &(0x7f0000003780)={0x0, 0x0, &(0x7f0000000080)}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000280)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0), 0x4) sendmsg$inet(r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x300060c1) bpf$ENABLE_STATS(0x20, 0x0, 0x0) mkdir(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$MAP_CREATE(0x0, 0x0, 0x48) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_int(r6, &(0x7f0000000140)='cgroup.max.descendants\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f00000002c0)=ANY=[@ANYBLOB='-', @ANYRESOCT=r6, @ANYRESDEC=r6], 0x27) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x746f2f51, &(0x7f0000000080)=[{&(0x7f0000000040)="3f0400001c00810ce00f80ecdb4cb9f207c804a01f000000020005fb0a0002000a0ada1b40d80300000000000200", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 21m55.990815747s ago: executing program 3 (id=35): setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x8000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x3, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f00000002c0), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001600)={&(0x7f0000001480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x9, [@struct={0x4, 0x2, 0x0, 0x4, 0x1, 0xc, [{0x7, 0x2, 0x8}, {0x6, 0x2, 0x3}]}]}, {0x0, [0x2e, 0x2e, 0x30, 0x61, 0x2e, 0x0, 0x5f]}}, &(0x7f0000001500)=""/215, 0x45, 0xd7, 0x1, 0x8}, 0x28) sendmsg$inet(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x2, 0x4e20, @loopback}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000440)="9b", 0x1}], 0x1}, 0x4000044) r1 = socket$kcm(0xa, 0x2, 0x88) sendmsg$inet(r1, &(0x7f0000000000)={&(0x7f0000001340)={0x2, 0x6, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000001580)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x41}, @multicast1}}}], 0x20}, 0x8000) sendmsg$inet(r1, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000040)=[{0x0, 0x47}], 0x1}, 0x48800) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x22, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xb}, 0x100000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0x0}, 0x50) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0x10, &(0x7f0000000000)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {0x7, 0x0, 0xb, 0x6, 0x0, 0x0, 0xffffff1f}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x2}}, [@alu={0x4, 0x1, 0x9, 0x8, 0x6, 0x1}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={r2, 0xffffffffffffffff}, 0x4) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1e, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000010000800000000000000000b7080000000000007b8af8ff00000000b7080000040000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7050000080000008500000004000000b7080000000000007baaf8ff00000000b5080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000b300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x79, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 21m53.796402721s ago: executing program 3 (id=36): r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000100000000000000000000048500000018000000180100002020782500000000002020207b1af8ff00000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, 0x0, r0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10001}, 0x0, 0x0, 0x0, 0x9, 0x9}, 0x0, 0xf, 0xffffffffffffffff, 0x9) r1 = socket$kcm(0x2a, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001f80)={&(0x7f0000001d00)=@qipcrtr={0x2a, 0xffffffffffffffff, 0xfffffffe}, 0x80, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x40000100) syz_clone(0xa000100, &(0x7f0000000340)="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", 0xfb, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000440)="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") perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0xff, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x11, 0x5}, 0x100e64, 0xc78, 0x0, 0x0, 0x0, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, @perf_bp={0x0, 0x4}, 0x1, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x2a, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={&(0x7f0000000300), 0x4}, 0x104101, 0x4, 0x0, 0x1, 0x101, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001480)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000062000000ad0000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0xfffffffffffffffc, 0x0, 0x0, '\x00', 0x0, 0x38}, 0x94) close(r3) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x11, 0x16, 0x2, 0x0, 0x0, 0x0, 0x5020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801, 0x0, @perf_bp={0x0, 0x6}, 0x101809, 0xca, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x100002000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r2, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x2040) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000800)='cpuset.mems\x00', 0x2, 0x0) r6 = openat$cgroup_procs(r4, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000380), 0x12) write$cgroup_int(r5, &(0x7f0000000040), 0x1) 21m51.883827821s ago: executing program 1 (id=37): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0xff, 0x5, 0x0, 0x7, 0xe2898, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0xfffffffffffffff8, 0x4}, 0x0, 0xc8, 0x7fffffe, 0x5, 0xffdffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000340)="5ed0fc370c692126507f36d1a5f9318998", 0x11}], 0x1}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1a210, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x8001000, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000180), 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000fc0)={&(0x7f0000001340)=@hci={0x1f, 0x0, 0x31}, 0x80, &(0x7f0000001000)=[{&(0x7f0000001040)="b8b2cc1e00c1dba49dbb66ca3a66", 0xe}], 0x1}, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000009c0)={0x0, 0xfffffff8, 0x30}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0x1a, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9}, {}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x48ac, 0x0, 0x0, 0x0, 0x3}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000780)='GPL\x00', 0x9, 0xca, &(0x7f0000000840)=""/202, 0x1f00, 0x36, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x5, 0xe, 0x16, 0x3ff}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000a00)=[r2, r3], &(0x7f0000000a40)=[{0x5, 0x5, 0x0, 0xc}, {0x7, 0x2, 0x5, 0x9}, {0x1, 0x3, 0x4, 0xb}], 0x10, 0x9}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, 0x0, 0x8c4) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81e6971100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e6"], 0xfdef) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) r8 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r8) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x3b, 0x6, 0x8, 0x2, 0x0, 0x0, 0x8002, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x1240, 0x1b9, 0x8, 0x7, 0x2e31a4e0, 0xf9c8, 0x7, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xc, r8, 0x2) close(r7) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x103000, 0x4, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r9 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b11d25a806c8c6f94f90424fc601000407a0a000600053582c137153e37000c11802f2ff4072f00", 0x33fe0}], 0x1, 0x0, 0x0, 0x35}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) 21m48.396414463s ago: executing program 3 (id=39): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002080)={0x1, 0x58, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002180)=@bpf_tracing={0x1a, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="0bea020001af934a85000000300000001801f3070000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702008008000000b7030000050000008500000006000000f96800000000000018440000ffffffff00000000000000007aaafcfff70c839f"], &(0x7f0000000380)='syzkaller\x00', 0x10001, 0x1000, &(0x7f0000001000)=""/4096, 0x41100, 0x30, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000020c0)={0x1, 0x10, 0x5, 0x2}, 0x10, 0x25f8e, 0xffffffffffffffff, 0x1, &(0x7f0000002100), &(0x7f0000002140)=[{0x1, 0x3, 0x6, 0xc}], 0x10, 0x7}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x64099, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x4, @perf_bp={0x0, 0xa}, 0x0, 0x7, 0x43a1bd78, 0x9, 0x10009, 0x6, 0xfffd, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc, 0x1, 0x0, 0x0, 0x0, 0x8, 0x221, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x4}, 0x80, 0x0, 0x0, 0x4, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x4, 0x6}, 0x100002, 0x0, 0xfffffffc, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002240)={0x0, 0x80, 0x8, 0x4, 0xa0, 0x81, 0x0, 0xb5f2, 0x200, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x374b, 0x1, @perf_bp={&(0x7f00000003c0), 0x2}, 0x1000, 0x9, 0x9, 0x4, 0x1, 0xfffffffb, 0x2, 0x0, 0x5, 0x0, 0x1}, r3, 0xffffffffffffffff, r2, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x34, 0x10000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x6}, 0x2c) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000fc0)={&(0x7f0000000000)="7b3467ee885d5a25dc294377bc8e46454adc79a31759a687176b5583e06b8d99718ad7d22d614389427ceef63ad433e51f1fcb04d896532925bf9b4450bc5d30d1cc62a1e7df40b03a323b62c88a58f8e0292b7d3c9e866f68", &(0x7f0000000e00)=""/235, &(0x7f0000000f00)="26dd63242e74b60145d523b816e5e97cab8771674fefe14239f099e8bbb9335217cd588c31b7568d3f112781a11d0fc7e765564c61147448d9334b697fad9e6fa8c8d34acaf77f74da4ae85128c68d06e809eca13656ffb88ae7b07d0f7a1fdc0e68358eae12d02fd0199a255dffabd51264b3c1188b5c95f9d0", &(0x7f0000000f80)="031c41c2e66c8b0e41203b872633a88beccfe851f931165c0a9f71965ff443d8928f41", 0x7ff, 0x1}, 0x38) 21m47.158929927s ago: executing program 1 (id=40): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x9, 0x80000001, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/pid\x00') perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x1, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x4904100, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000005c0), &(0x7f0000000600)}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000580)={@map=r2, 0xf, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x50) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xfffffffffffffff8, 0x3}, 0x0, 0x0, 0x2, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xcf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402000a, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x29, 0x23, &(0x7f0000000040), 0xcf) r4 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r4, &(0x7f0000003780)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000400)="0212970902000000e4a17c45c85686605e85da4a", 0x14}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="00000000000000000000003d7397cb0000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000380000003800000003000000030000000000000e030000000000000000233b45000000000000010500000010000000000000000000000300000000000000000200005570597203ecb86b9011b60000000000006100"], 0x0, 0x53}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r5, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000140)='%pS \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{r7}, &(0x7f0000000240), &(0x7f0000000380)='%pK \x00'}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r6, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700), 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000740)={r8, r6, 0x0, r6}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x204, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_config_ext={0x4, 0x8}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000280)=ANY=[@ANYBLOB="611230000000000061134c0000000000bf2000000000000016000200071b48013d030100000000009500020100000000bc26100000000000bf67080000000000070200000fff07006702000003000000360600000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a83683d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf5fe7030586a51309834c1b8894af585e9134cf05d811"], &(0x7f0000000100)='GPL\x00'}, 0x48) 21m45.982807358s ago: executing program 3 (id=41): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0xff, 0x5, 0x0, 0x7, 0xe2898, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0xfffffffffffffff8, 0x4}, 0x0, 0xc8, 0x7fffffe, 0x5, 0xffdffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000340)="5ed0fc370c692126507f36d1a5f9318998", 0x11}], 0x1}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1a210, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x8001000, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000180), 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000fc0)={&(0x7f0000001340)=@hci={0x1f, 0x0, 0x31}, 0x80, &(0x7f0000001000)=[{&(0x7f0000001040)="b8b2cc1e00c1dba49dbb66ca3a66", 0xe}], 0x1}, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000009c0)={0x0, 0xfffffff8, 0x30}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0x1a, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9}, {}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x48ac, 0x0, 0x0, 0x0, 0x3}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000780)='GPL\x00', 0x9, 0xca, &(0x7f0000000840)=""/202, 0x1f00, 0x36, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x5, 0xe, 0x16, 0x3ff}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000a00)=[r2, r3], &(0x7f0000000a40)=[{0x5, 0x5, 0x0, 0xc}, {0x7, 0x2, 0x5, 0x9}, {0x1, 0x3, 0x4, 0xb}], 0x10, 0x9}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000001f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x8c4) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, 0x0, 0xfdef) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) r8 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r8) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x3b, 0x6, 0x8, 0x2, 0x0, 0x0, 0x8002, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x1240, 0x1b9, 0x8, 0x7, 0x2e31a4e0, 0xf9c8, 0x7, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xc, r8, 0x2) close(r7) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x103000, 0x4, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r9 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x35}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) 21m45.805776658s ago: executing program 1 (id=42): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8003}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x8, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/31], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r2, 0x29, 0x18, &(0x7f0000000100), 0x120) 21m44.459855738s ago: executing program 1 (id=43): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'\x00', 0x2}) ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, 0xffffffffffffffff) ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, &(0x7f00000000c0)=0x7) 21m42.337576529s ago: executing program 1 (id=44): bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0xffffffffffffffff) socket$kcm(0x2b, 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x81, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000040)=r1) perf_event_open(&(0x7f0000000500)={0x2, 0x37, 0x28, 0x1, 0x0, 0x0, 0x0, 0x400, 0x94001, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0xffffffffffffffff}, 0x8000, 0x5, 0x3, 0xaaf04684de878bda, 0x9, 0x6, 0xfffe, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000080)={'some', 0x20, 0x2000000005, 0x20, 0x10000000fffff}, 0x2f) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'batadv_slave_0\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x17, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0xffffffffffffffa5, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="18000073e598962303a9ed64745f91607d9c76f8c6000000000000000000fdffffff950000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0xf, 0xe1c3}, 0x0, 0x10000, 0x0, 0x8, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8905, 0x0) socket$kcm(0x2, 0x5, 0x84) socket$kcm(0x2, 0x200000000000001, 0x106) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffff56a, 0x100000000}, 0x250a, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_merged\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) 21m39.025007401s ago: executing program 1 (id=45): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0xff, 0x5, 0x0, 0x7, 0xe2898, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0xfffffffffffffff8, 0x4}, 0x0, 0xc8, 0x7fffffe, 0x5, 0xffdffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000340)="5ed0fc370c692126507f36d1a5f9318998", 0x11}], 0x1}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1a210, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x8001000, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000180), 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000fc0)={&(0x7f0000001340)=@hci={0x1f, 0x0, 0x31}, 0x80, &(0x7f0000001000)=[{&(0x7f0000001040)="b8b2cc1e00c1dba49dbb66ca3a66", 0xe}], 0x1}, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000009c0)={0x0, 0xfffffff8, 0x30}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0x1a, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9}, {}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x48ac, 0x0, 0x0, 0x0, 0x3}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000780)='GPL\x00', 0x9, 0xca, &(0x7f0000000840)=""/202, 0x1f00, 0x36, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x5, 0xe, 0x16, 0x3ff}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000a00)=[r2, r3], &(0x7f0000000a40)=[{0x5, 0x5, 0x0, 0xc}, {0x7, 0x2, 0x5, 0x9}, {0x1, 0x3, 0x4, 0xb}], 0x10, 0x9}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, 0x0, 0x8c4) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81e6971100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e6"], 0xfdef) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) r8 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r8) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x3b, 0x6, 0x8, 0x2, 0x0, 0x0, 0x8002, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x1240, 0x1b9, 0x8, 0x7, 0x2e31a4e0, 0xf9c8, 0x7, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xc, r8, 0x2) close(r7) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x103000, 0x4, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r9 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b11d25a806c8c6f94f90424fc601000407a0a000600053582c137153e37000c11802f2ff4072f00", 0x33fe0}], 0x1, 0x0, 0x0, 0x35}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) 21m38.535449016s ago: executing program 3 (id=47): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0xff, 0x5, 0x0, 0x7, 0xe2898, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0xfffffffffffffff8, 0x4}, 0x0, 0xc8, 0x7fffffe, 0x5, 0xffdffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000340)="5ed0fc370c692126507f36d1a5f9318998", 0x11}], 0x1}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1a210, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x8001000, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000180), 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000fc0)={&(0x7f0000001340)=@hci={0x1f, 0x0, 0x31}, 0x80, &(0x7f0000001000)=[{&(0x7f0000001040)="b8b2cc1e00c1dba49dbb66ca3a66", 0xe}], 0x1}, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000009c0)={0x0, 0xfffffff8, 0x30}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0x1a, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9}, {}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x48ac, 0x0, 0x0, 0x0, 0x3}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000780)='GPL\x00', 0x9, 0xca, &(0x7f0000000840)=""/202, 0x1f00, 0x36, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x5, 0xe, 0x16, 0x3ff}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000a00)=[r2, r3], &(0x7f0000000a40)=[{0x5, 0x5, 0x0, 0xc}, {0x7, 0x2, 0x5, 0x9}, {0x1, 0x3, 0x4, 0xb}], 0x10, 0x9}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, 0x0, 0x8c4) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81e6971100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e6"], 0xfdef) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) r8 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r8) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x3b, 0x6, 0x8, 0x2, 0x0, 0x0, 0x8002, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x1240, 0x1b9, 0x8, 0x7, 0x2e31a4e0, 0xf9c8, 0x7, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xc, r8, 0x2) close(r7) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x103000, 0x4, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r9 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b11d25a806c8c6f94f90424fc601000407a0a000600053582c137153e37000c11802f2ff4072f00", 0x33fe0}], 0x1, 0x0, 0x0, 0x35}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) 21m21.022743389s ago: executing program 33 (id=45): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0xff, 0x5, 0x0, 0x7, 0xe2898, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0xfffffffffffffff8, 0x4}, 0x0, 0xc8, 0x7fffffe, 0x5, 0xffdffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000340)="5ed0fc370c692126507f36d1a5f9318998", 0x11}], 0x1}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1a210, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x8001000, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000180), 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000fc0)={&(0x7f0000001340)=@hci={0x1f, 0x0, 0x31}, 0x80, &(0x7f0000001000)=[{&(0x7f0000001040)="b8b2cc1e00c1dba49dbb66ca3a66", 0xe}], 0x1}, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000009c0)={0x0, 0xfffffff8, 0x30}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0x1a, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9}, {}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x48ac, 0x0, 0x0, 0x0, 0x3}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000780)='GPL\x00', 0x9, 0xca, &(0x7f0000000840)=""/202, 0x1f00, 0x36, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x5, 0xe, 0x16, 0x3ff}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000a00)=[r2, r3], &(0x7f0000000a40)=[{0x5, 0x5, 0x0, 0xc}, {0x7, 0x2, 0x5, 0x9}, {0x1, 0x3, 0x4, 0xb}], 0x10, 0x9}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, 0x0, 0x8c4) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81e6971100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e6"], 0xfdef) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) r8 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r8) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x3b, 0x6, 0x8, 0x2, 0x0, 0x0, 0x8002, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x1240, 0x1b9, 0x8, 0x7, 0x2e31a4e0, 0xf9c8, 0x7, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xc, r8, 0x2) close(r7) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x103000, 0x4, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r9 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b11d25a806c8c6f94f90424fc601000407a0a000600053582c137153e37000c11802f2ff4072f00", 0x33fe0}], 0x1, 0x0, 0x0, 0x35}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) 21m20.755312063s ago: executing program 34 (id=47): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0xff, 0x5, 0x0, 0x7, 0xe2898, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0xfffffffffffffff8, 0x4}, 0x0, 0xc8, 0x7fffffe, 0x5, 0xffdffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000340)="5ed0fc370c692126507f36d1a5f9318998", 0x11}], 0x1}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1a210, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x8001000, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000180), 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000fc0)={&(0x7f0000001340)=@hci={0x1f, 0x0, 0x31}, 0x80, &(0x7f0000001000)=[{&(0x7f0000001040)="b8b2cc1e00c1dba49dbb66ca3a66", 0xe}], 0x1}, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000009c0)={0x0, 0xfffffff8, 0x30}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0x1a, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9}, {}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x48ac, 0x0, 0x0, 0x0, 0x3}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000780)='GPL\x00', 0x9, 0xca, &(0x7f0000000840)=""/202, 0x1f00, 0x36, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x5, 0xe, 0x16, 0x3ff}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000a00)=[r2, r3], &(0x7f0000000a40)=[{0x5, 0x5, 0x0, 0xc}, {0x7, 0x2, 0x5, 0x9}, {0x1, 0x3, 0x4, 0xb}], 0x10, 0x9}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, 0x0, 0x8c4) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81e6971100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e6"], 0xfdef) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) r8 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r8) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x3b, 0x6, 0x8, 0x2, 0x0, 0x0, 0x8002, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x1240, 0x1b9, 0x8, 0x7, 0x2e31a4e0, 0xf9c8, 0x7, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0xc, r8, 0x2) close(r7) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x103000, 0x4, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r9 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b11d25a806c8c6f94f90424fc601000407a0a000600053582c137153e37000c11802f2ff4072f00", 0x33fe0}], 0x1, 0x0, 0x0, 0x35}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) 16m30.87871277s ago: executing program 5 (id=1014): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe89}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r2}, 0xc) 16m30.372305346s ago: executing program 5 (id=1018): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x28, '\x00', 0x0, @sk_reuseport=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0xff, 0x5, 0x0, 0x2, 0xe2898, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0xfffffffffffffff8, 0x4}, 0x0, 0xc8, 0x7fffffe, 0x5, 0xffdffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) perf_event_open(&(0x7f00000008c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0xffffffffffffffff, 0x2b4}, 0x0, 0x10000, 0x0, 0x0, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r7, 0x0, 0xff00) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000b40)=ANY=[@ANYRES32=r6, @ANYRES32=r5, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r3}, 0x20) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1, 0x0, 0x3e80}, 0x0) 16m28.749530001s ago: executing program 5 (id=1025): r0 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x3, 0x2, 0xfffd}, {0x10000002, 0x0, 0x0, 0x9}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x100) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10, 0x0, 0x59}, 0x10) socket$kcm(0x2, 0x1, 0x84) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180200000700000000006a720080000085000000750000009500000000000000"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r5) setsockopt$sock_attach_bpf(r0, 0x84, 0x6e, &(0x7f0000000000)=r3, 0x10) r7 = gettid() perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x2a040, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x10, 0x0, 0x0, 0x0, 0x9}, r7, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(0x0, r7, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$kcm(0x22, 0x2, 0x26) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="1400000010003507d25a806f8c6394f90324fc60", 0x14}], 0x1}, 0x0) recvmsg$kcm(r9, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000003940)=[{&(0x7f0000000400)=""/89, 0x59}, {&(0x7f0000000040)=""/56, 0x38}, {&(0x7f0000000880)=""/250, 0xfa}], 0x3}, 0x0) close(r8) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0xfffffffffffffff8, 0xe}, 0x8000, 0xcdd, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x7, 0x0, 0x200a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7}, 0x48) bpf$ENABLE_STATS(0x20, &(0x7f0000000080), 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r10, 0x18000000000002a0, 0xe80, 0x0, &(0x7f0000001280)="b9354b27b553aeeee8ae0b0000a4df2a9080f3", 0x0, 0x603, 0x60000009, 0x0, 0x0, 0x0, 0x0}, 0x4d) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r7, r3, 0x0, 0xa, &(0x7f00000002c0)='syzkaller\x00'}, 0x30) 16m27.728558804s ago: executing program 5 (id=1031): r0 = socket$kcm(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x400, 0x4556, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x3, 0x3}, 0x18, 0x0, 0xfffffffe, 0x1, 0x5, 0x2, 0x103, 0x0, 0x2, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1b) r1 = socket$kcm(0xa, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1e000000000000000700400008"], 0x50) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)={r2}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8922, 0x0) sendmsg$inet(r0, &(0x7f0000000000)={&(0x7f0000001340)={0x2, 0x6, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000001580)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x41}, @multicast1}}}], 0x20}, 0xc000) sendmsg$inet(r0, &(0x7f0000000880)={0x0, 0x0, 0x0}, 0x0) 16m27.401843201s ago: executing program 5 (id=1033): r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x25}, 0x94) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x10000000}, 0x80) 16m26.864265559s ago: executing program 5 (id=1034): r0 = socket$kcm(0x2, 0x3, 0x84) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x202, 0x8, 0xffffffff, 0x7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000040)="100000002d000b02d25a806f8c6394f9101a04000a7401", 0x17}], 0x1}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000340)=ANY=[@ANYRES32=r0, @ANYRES32=r2, @ANYRESOCT=r0], 0xfe33) r3 = syz_clone(0x40000000, &(0x7f0000000180)="faf3e4e66511f6f7261eb216e817a48d1dad93d9bc07090fdccbdc7d3909e9c2f384aa73b080c4a11985feaec567290babcfcc22328ef08bbf4aa75babb7670b125e6825db27d1311256d492ab069cf40196acdf7a720484b779f2d3767b35b1d39a530b62fe68a7dbfa15f2c241c8b1b99c3150587c33e1f3f04da1", 0x7c, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="80c237086697e618b5334bc1258636d69d76a0075c96f6874a9b45d2ebf17dd89fee19cbf80b87fdb86956809691a0981125424ba01b9f45b35780672810888abb0f7dcf27dbc4991566b56e31ba94503db0d1f4cb8f75e55a0f4cdfe2b7b99187a42ffcd05fbea1bbd0e1adfeac755345158a8aede807ec31b6d58d0418d9fe4dcd95663f5429e9c2227f7383019628f954d2672f32651a1e28e278ed8c4b6611dc7b52daa4778a2944ec262f4875811243392cb304") perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff7ffa}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001640), 0xc) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r4, 0x107, 0x12, &(0x7f00000008c0)=r6, 0x4) r7 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={@fallback=r7, 0x1, 0x0, 0x6def81ae, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0], 0x0, 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000640)=ANY=[@ANYRES32=r6, @ANYRES32=r6, @ANYBLOB="3000000002000000", @ANYRES32=r6, @ANYBLOB, @ANYRES32=r6, @ANYBLOB="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", @ANYRES64=r8], 0x20) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r9) write$cgroup_pid(r9, &(0x7f0000000700), 0x12) r10 = getpid() sendmsg$unix(r9, &(0x7f0000000200)={0x0, 0x64, &(0x7f0000000440)=[{&(0x7f00000004c0)="e60d", 0x2}], 0x1, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {r10, 0x0, 0xee00}}}], 0x20, 0x10}, 0x10044001) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000400)={@map=r9, 0xffffffffffffffff, 0x23, 0x20, 0x0, @void, @void, @void, @value=0xffffffffffffffff, r8}, 0x20) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_clone(0x200000, 0x0, 0x0, 0x0, 0x0, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x6, 0x8, &(0x7f0000001f80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0xd}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x2800000002000000, 0xe, 0x55, &(0x7f0000000140)="a06ad876d56a0064d082778c3938", &(0x7f0000000380)=""/85, 0x500, 0x4000000}, 0x28) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0xff, 0x35, 0xb1, 0x9b, 0x0, 0x9, 0x10000, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x195c, 0x1, @perf_bp={&(0x7f00000000c0), 0x1}, 0x3, 0x800000000000000, 0xfffffffb, 0x0, 0x8, 0xfffffffc, 0x7, 0x0, 0x7, 0x0, 0x5}, r3, 0x2, r1, 0x9) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @loopback}}}], 0x20}, 0x40010) 16m11.506046921s ago: executing program 35 (id=1034): r0 = socket$kcm(0x2, 0x3, 0x84) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x202, 0x8, 0xffffffff, 0x7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000040)="100000002d000b02d25a806f8c6394f9101a04000a7401", 0x17}], 0x1}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000340)=ANY=[@ANYRES32=r0, @ANYRES32=r2, @ANYRESOCT=r0], 0xfe33) r3 = syz_clone(0x40000000, &(0x7f0000000180)="faf3e4e66511f6f7261eb216e817a48d1dad93d9bc07090fdccbdc7d3909e9c2f384aa73b080c4a11985feaec567290babcfcc22328ef08bbf4aa75babb7670b125e6825db27d1311256d492ab069cf40196acdf7a720484b779f2d3767b35b1d39a530b62fe68a7dbfa15f2c241c8b1b99c3150587c33e1f3f04da1", 0x7c, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="80c237086697e618b5334bc1258636d69d76a0075c96f6874a9b45d2ebf17dd89fee19cbf80b87fdb86956809691a0981125424ba01b9f45b35780672810888abb0f7dcf27dbc4991566b56e31ba94503db0d1f4cb8f75e55a0f4cdfe2b7b99187a42ffcd05fbea1bbd0e1adfeac755345158a8aede807ec31b6d58d0418d9fe4dcd95663f5429e9c2227f7383019628f954d2672f32651a1e28e278ed8c4b6611dc7b52daa4778a2944ec262f4875811243392cb304") perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff7ffa}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001640), 0xc) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r4, 0x107, 0x12, &(0x7f00000008c0)=r6, 0x4) r7 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={@fallback=r7, 0x1, 0x0, 0x6def81ae, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0], 0x0, 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000640)=ANY=[@ANYRES32=r6, @ANYRES32=r6, @ANYBLOB="3000000002000000", @ANYRES32=r6, @ANYBLOB, @ANYRES32=r6, @ANYBLOB="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", @ANYRES64=r8], 0x20) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r9) write$cgroup_pid(r9, &(0x7f0000000700), 0x12) r10 = getpid() sendmsg$unix(r9, &(0x7f0000000200)={0x0, 0x64, &(0x7f0000000440)=[{&(0x7f00000004c0)="e60d", 0x2}], 0x1, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {r10, 0x0, 0xee00}}}], 0x20, 0x10}, 0x10044001) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000400)={@map=r9, 0xffffffffffffffff, 0x23, 0x20, 0x0, @void, @void, @void, @value=0xffffffffffffffff, r8}, 0x20) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_clone(0x200000, 0x0, 0x0, 0x0, 0x0, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x6, 0x8, &(0x7f0000001f80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0xd}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x2800000002000000, 0xe, 0x55, &(0x7f0000000140)="a06ad876d56a0064d082778c3938", &(0x7f0000000380)=""/85, 0x500, 0x4000000}, 0x28) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0xff, 0x35, 0xb1, 0x9b, 0x0, 0x9, 0x10000, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x195c, 0x1, @perf_bp={&(0x7f00000000c0), 0x1}, 0x3, 0x800000000000000, 0xfffffffb, 0x0, 0x8, 0xfffffffc, 0x7, 0x0, 0x7, 0x0, 0x5}, r3, 0x2, r1, 0x9) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @loopback}}}], 0x20}, 0x40010) 3m55.843775788s ago: executing program 6 (id=3864): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r0, &(0x7f00000006c0)={&(0x7f00000000c0)={0x2, 0x4e1f, @private=0xa010101}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000400)="e050", 0x2}], 0x1}, 0xc000) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) 3m54.394777864s ago: executing program 6 (id=3868): r0 = socket$kcm(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x13, &(0x7f0000000200)=r2, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f0000000200)=[0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x62, &(0x7f0000000280)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0xe1, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000001c0)='0\t&\xaa') perf_event_open(0x0, 0x0, 0xffeffffffffffffd, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r3, 0x29, 0x1a, &(0x7f0000000140), 0x4) sendmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000040)=@in6={0xa, 0x4e23, 0xd, @local, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000000)="f8", 0x1}], 0x1}, 0x40040) 3m51.964020311s ago: executing program 6 (id=3871): r0 = socket$kcm(0x10, 0x2, 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0x3) socket$kcm(0x2, 0x1, 0x84) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x8, 0x4}, 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) bpf$MAP_DELETE_BATCH(0x1b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4000000) socket$kcm(0x10, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2, 0x0, @local}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000580)='i', 0x1}], 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB="20000000110000008400000002000000050040"], 0x20}, 0x50) 3m51.21219329s ago: executing program 6 (id=3874): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r2, 0x0, 0x0}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/32], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x113, 0x4, 0x0, 0x0) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r4, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @broadcast}, 0x10, 0x0}, 0xd000894) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x3, 0x2000007d, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r5, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 3m50.81517634s ago: executing program 6 (id=3876): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x3, 0x8, 0x2, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000020000000000000000ee000095"], &(0x7f00000002c0)='syzkaller\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0x560b0007, &(0x7f0000000000)="259a53f271a76d2688634c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) socketpair(0x26, 0x3, 0x1, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b28, 0x0) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r2, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) sendmsg(r2, &(0x7f00000019c0)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000380)="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", 0xb6d}], 0x1}, 0x4c004) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f0000000100)=r3, 0x4) sendmsg$inet(r2, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f0000002800)='A', 0x1}], 0x1}, 0x4040) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0x2ee0}], 0x13, 0x0, 0x0, 0x10000000}, 0x12cd) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfe33) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8953, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000400006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcff7ffa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d0f65acc0d06d1a1434e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622e03b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67e6ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c690220b87b20581e7be6ba0dc001c4510555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd713089856f756436303767d2e24f297446d22384e5dad9796edb697aeea0182babd18cace339f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff22dc518afc9ffc2cc788bee1b47683db01a2f9398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a833784456c386e22cc22ee17476d000000009682e24b92533ac2a997d3ae526aca54183fb01c73f979ca9857399537f5831808b0dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db00002e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e4845535a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9003f07000099d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11be359454a3f2239cfe35f81b7a490f18215523167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3037ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cb8846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545b50f576b2b5cc7f819abd0f885cc4806f40300966f08294cd6f496e5dee734fe7da3770845cf442d488afd80e17000000000000000000000000000000000000000000000000052007563885a1105000000dc1c56d59f35d319909ea4a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f00000000000000010100000000000057a8abef8b64237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2c09000000bfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a8639034a75f4c7df3ea8fc2018d07000000ef060cd4403a099f32468f65bd06b4092140faed0c329be610c3082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbcbf2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa412af3bb4efb82055a3b61227ad40f52c9f2500579aca11033bb9cc16bd83a00a40e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f651600eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce1d9bc7ef3e3f40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734137ff47547f164391c673b6079e65d7295eed164ca63e4ea26d65f6b3ce0f6591d80dfb8f386bb74b5589829b6b067903000000000000003d9950d48c774eaa35b24fce696af061c9e53addddc620ce73c5d177e3d097159f2768636fc10276c6a0adc57483b3f7083f66b87ef296ee85e9bb70009a5d30f479e293a3302e11350ea857b37e76ca2f50378e4092ce2c80c57ed04dbc574ad278b9b7b71792e523077d033d8cea3cc571afb207"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) socket$kcm(0x21, 0x2, 0x2) socket$kcm(0x2, 0x3, 0x106) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 3m49.2943522s ago: executing program 6 (id=3881): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xe2880, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'dvmrp0\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000180)={0x2, &(0x7f00000002c0)=[{0x20, 0xfe, 0x0, 0xfffff018}, {0x6, 0xff}]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8992, &(0x7f0000000000)={'bond0\x00', @random="013701369eff"}) r2 = socket$kcm(0x2, 0x200000000000006, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x5452, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'veth0_to_bond\x00', @broadcast}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x33a) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x50) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="8fcacb7907051175f37538e486dd6300800701082c00db5b686158bbcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd6372ce22fdb911"], 0xfdef) r6 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x10, 0xfd, 0x0, 0xffffffffffffffff, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x54b2359a, 0x52d0}, 0x408, 0x800000000000ca, 0x0, 0x9, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socket$kcm(0xa, 0x922000000003, 0x11) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x8, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r7 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r7, &(0x7f0000000100)={&(0x7f0000000140)={0x2, 0x4001, @local}, 0x10, 0x0}, 0x30040041) 3m34.056379925s ago: executing program 36 (id=3881): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xe2880, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'dvmrp0\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000180)={0x2, &(0x7f00000002c0)=[{0x20, 0xfe, 0x0, 0xfffff018}, {0x6, 0xff}]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8992, &(0x7f0000000000)={'bond0\x00', @random="013701369eff"}) r2 = socket$kcm(0x2, 0x200000000000006, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x5452, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'veth0_to_bond\x00', @broadcast}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x33a) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x50) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="8fcacb7907051175f37538e486dd6300800701082c00db5b686158bbcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd6372ce22fdb911"], 0xfdef) r6 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x10, 0xfd, 0x0, 0xffffffffffffffff, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x54b2359a, 0x52d0}, 0x408, 0x800000000000ca, 0x0, 0x9, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socket$kcm(0xa, 0x922000000003, 0x11) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x8, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r7 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r7, &(0x7f0000000100)={&(0x7f0000000140)={0x2, 0x4001, @local}, 0x10, 0x0}, 0x30040041) 3m31.041390093s ago: executing program 2 (id=3903): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0100000008001000040000000800000001"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000c40)={{r0}, &(0x7f0000000bc0), &(0x7f0000000c00)='%-5lx \x00'}, 0x20) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) 3m30.652085933s ago: executing program 2 (id=3906): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20849f9}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r1, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[], 0x50) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = socket$kcm(0x23, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000000c0)=r5, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000940)={r5, r5}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r6 = socket$kcm(0x29, 0x2, 0x0) close(r6) r7 = socket$kcm(0x2b, 0x1, 0x0) close(r7) r8 = socket$kcm(0xa, 0x5, 0x0) socket$kcm(0x2, 0x200000000000001, 0x106) r9 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x310c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair(0x1, 0x1, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB='1-'], 0x31) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$kcm(r8, &(0x7f0000002dc0)={&(0x7f0000001640)=@l2tp6={0xa, 0x0, 0x7fff, @local, 0x8}, 0x80, &(0x7f0000000340)=[{&(0x7f00000003c0)='`', 0x1}], 0x1}, 0x41) 3m29.592233258s ago: executing program 2 (id=3909): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0}, 0x0, 0x4, 0x0, 0x3, 0x0, 0x10, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="1400000037000b63446a80648c2594f90b24fc60", 0x14}], 0x1}, 0x5006) r3 = socket$kcm(0x29, 0x5, 0x0) r4 = socket$kcm(0x10, 0x7, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNGETVNETLE(r5, 0x800454dd, &(0x7f00000001c0)) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="240000002c008188040f80ec59acbc0413a1f8480e0000005e140602110000000e000400", 0x24}], 0x1}, 0x0) sendmsg$kcm(r3, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000002140)=[{&(0x7f0000001d40)="e2", 0x1}], 0x1}, 0x40) close(r3) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000000c0)='FREEZING\x00', 0x9) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}], 0x70}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000b80)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca^\xf9\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x96\x86\xdb\xa9\xd3\x01\xb2\xc7\xf8G\x069\x90,\xda\xf6\xc5\xcd\xec\xa3B\xc3\"4\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\x7f\xec\xb2\xc5E\x00\xdd\xf2e\xa8\xf1<\xb2\xc82\xbf=o\x00`\xc1A\'\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x92\xbb\xe3Y\x97\xc2') perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0xcdd, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/20, @ANYRES32=0x1], 0x48) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000001000)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed@n\x00\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xf3\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x9c\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8b04, &(0x7f0000000040)={'wlan1\x00', @random='@\x00'}) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{}, 0x0, &(0x7f0000000780)='%pI4 \x00'}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000120000007f00000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r6}, &(0x7f00000007c0), &(0x7f0000000640)=r5}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r6, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)=r5}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a40)={{r7}, &(0x7f0000000740), &(0x7f0000000a00)=r5}, 0x20) write$cgroup_devices(r5, &(0x7f0000000340)=ANY=[@ANYBLOB='b 75:*\tw'], 0xa) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='pids.events\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2e, &(0x7f0000000640)=r8, 0x4) openat$cgroup_pressure(r1, &(0x7f0000000280)='memory.pressure\x00', 0x2, 0x0) recvmsg$unix(r8, &(0x7f0000001700)={&(0x7f0000000140), 0x6e, &(0x7f0000001580)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1, &(0x7f00000015c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x118}, 0x2060) openat$cgroup_procs(r9, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_devices(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="560001000000000000"], 0x9) 3m27.08414353s ago: executing program 2 (id=3913): write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x3, 0x4, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x7, 0x61, 0x11, 0x4c}, [@call={0x85, 0x0, 0x0, 0x15}]}, &(0x7f0000000ac0)='GPL\x00', 0x6, 0x0, 0x0, 0x41000}, 0x94) r0 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0xb, 0xffffffffffffffff}, 0x8, 0x0, 0x0, 0x0, 0x6, 0x800000, 0x4, 0x0, 0x0, 0x0, 0x400200000000043d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2b, 0x1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffeca, 0x0, 0x0, 0x10, 0x2}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, @fallback=0x37}, 0x94) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r5 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000180)="1400000017000b63d25a80648c2594f93da3c92b", 0x14}], 0x1}, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000800)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="ef000000000050e4000000000000", @ANYRES32=r5, @ANYRESDEC=r2, @ANYRES64=0x0], 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f0, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0xc0189436, &(0x7f0000000000)={'xfrm0\x00', @local}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000080)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x7, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, r4, 0x2) r7 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$kcm(r7, 0x0, 0x20040000) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb0100180000601fac8b00e2c30d000c00000005000000fdffffff0000000604000000839a6ab19c15f93747692e19f5f757860712df9ec5be3423764c2ccaf3e78fe8d2d2b6c64e34f78894fd7566d763eb89be4f198af192c873ba35d3f238b59aaafc2c445a7a19c9100af292fd50d3cf7257441a8a9dbd45626b09ea6e65aa79ea"], 0x0, 0x29, 0x0, 0x1, 0xfffffffa}, 0x28) r9 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x5, 0x90, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x5, &(0x7f0000000740)=ANY=[@ANYRESHEX=r0, @ANYRESOCT=r9, @ANYRESDEC=r6, @ANYRESDEC=r0], 0x0, 0xd, 0x41, &(0x7f00000005c0)=""/65, 0x41000, 0x20, '\x00', 0x0, @sched_cls=0x36, r8, 0x8, &(0x7f0000000640)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000006c0), 0x0, 0x10, 0x58586df}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x21, '\x00', 0x0, @flow_dissector=0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="1c00000000000300000000000000010045"], 0x0}, 0x90) 3m25.112163882s ago: executing program 2 (id=3917): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='net_prio.prioidx\x00', 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a1c, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x50) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000009c0)="d80000001e0081064e81f782db44b9040002080006007c09e8fe11a10a0015c00200142603600e120800080024000000a80009001100014003001000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x24000000) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000880), 0xde9, r3}, 0x38) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r5) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb}, 0x50) socket$kcm(0x10, 0x2, 0x4) syz_clone(0x41200000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x404, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) 3m9.721056186s ago: executing program 37 (id=3917): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='net_prio.prioidx\x00', 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a1c, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x50) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000009c0)="d80000001e0081064e81f782db44b9040002080006007c09e8fe11a10a0015c00200142603600e120800080024000000a80009001100014003001000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x24000000) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000880), 0xde9, r3}, 0x38) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r5) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb}, 0x50) socket$kcm(0x10, 0x2, 0x4) syz_clone(0x41200000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x404, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) 4.868113976s ago: executing program 8 (id=4681): r0 = bpf$TOKEN_CREATE(0x24, &(0x7f00000007c0), 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x26, 0x26, 0x6, [@datasec={0xa, 0x2, 0x0, 0xf, 0x2, [{0x5, 0x886, 0x3}, {0x5, 0xf, 0x9}], "e830"}]}, {0x0, [0x30, 0x0, 0x0, 0x0]}}, &(0x7f0000000680)=""/199, 0x46, 0xc7, 0x0, 0x9, 0x10000, @value=r0}, 0x28) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x5, 0x835c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0xa348, 0x4, 0x3, 0x0, 0x6d1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000040)="c00e020023000b02d25a80d0bcb924f93045fc60040f12", 0x17}], 0x1}, 0x4010) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000720000001801"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], 0x0}, 0x94) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0xffffffffffffffd0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@map=r5, 0x2b, 0x0, 0xdd3, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0]}, 0x40) setsockopt$sock_attach_bpf(r2, 0x84, 0x83, &(0x7f0000000000)=r5, 0x8) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x1) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="33fe0000180091c8b14a0778a8123d181d"], 0xfe33) 4.275632116s ago: executing program 8 (id=4682): r0 = socket$kcm(0xa, 0x922000000003, 0x11) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) close(r1) ioctl$SIOCSIFHWADDR(r1, 0x8b14, &(0x7f0000000000)={'wlan1\x00', @random="0100ffffffff"}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003b000b05d25a802e8c6394f90324fc601000050008000900053582c104003e37000c0180fc0b2000f80b", 0x33fe0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001440)={r1, 0x0, 0xf3, 0x1000, &(0x7f0000000100)="0b8f2c1cad5cfe7437fb3b11897238e4f055d627e77f512caf7e50258a401582d23895ce7b54bd03cc286c7f5641e9c1b27e3f728cc9906600f4427e8075c462587e2699aee5aff1ef54521b2e946be5cdaa7d1d95bf15bd089c5e867d9ba26e7eda6b4fab49343f34dee9affd2a9d28b80ddaaab82e25f8d694a770a79d70762198d27060b4ae2437ff3f9d92fa6cc9306503572b3458e690ea92d48b1f0a70d517e24884c2b2020d05061e70108b0d1dfa6ebb512ca5ece9bd3da422498c499c5e4fe5677ae513acce5b961e0d290083bc9b5ec87294d84a8d5de8ea12877a2e86825209ad8fb8398a8375eb99983c3b7921", &(0x7f0000000380)=""/4096, 0x1f, 0x0, 0xe, 0x42, &(0x7f0000001380)="e5fec39ce1ee8cf61a3d62e82636", &(0x7f00000013c0)="c1962b98640ca2b97c5f424618607d0219484afd93575e2ce3e52b0f501299fe3b6018ed60e1dfdf062efe145fb21b8ae83b86b9bc80a9a2e187dc637de47975e727", 0x4, 0x0, 0xff}, 0x50) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f00000002c0)=@l2tp6={0xa, 0x0, 0x0, @private1, 0x9}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="f400000000002c00fe8000000000000000000000000000000100"/40, 0x28}], 0x1}, 0x0) 4.154026303s ago: executing program 9 (id=4683): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe89}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, 0x0, 0x0}, 0x20) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500), 0xc) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0xffffffff, 0xc3, &(0x7f00000004c0)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) close(r3) r4 = socket$kcm(0x2, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r5, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)=r3}, 0x20) recvmsg(r4, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f00000002c0)=""/34, 0x56}], 0x1}, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r6, &(0x7f0000000440)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x4, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000020000800000000000000000611063000000"], &(0x7f0000000100)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) r7 = socket$kcm(0xa, 0x1, 0x106) sendmsg$kcm(r7, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0xe07e872420dfefca) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x200, 0x10, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85a, 0x0, @perf_config_ext={0x8a15, 0x5}, 0x411, 0x1, 0xb, 0x5, 0xe4c2, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x6) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001780)={r1, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x18, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x9, 0x1000, &(0x7f0000000700)=""/4096, 0x41100, 0x20, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x5, 0x7, 0x9, 0x7}, 0x10, 0x0, 0x0, 0x9, &(0x7f00000017c0)=[r8], &(0x7f0000001800)=[{0x0, 0x1, 0x0, 0x9}, {0x2, 0x3, 0x7, 0xb}, {0x5, 0x1, 0xf, 0x7}, {0x4, 0x2, 0xe, 0xc}, {0x1, 0x3, 0xf, 0xc}, {0x3, 0x1, 0xe, 0xb}, {0x0, 0xc4, 0x4, 0xe}, {0x1, 0x1, 0xb, 0x2}, {0x1, 0x4, 0x6, 0x7}], 0x10, 0x7}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb810018"], 0x0, 0x39, 0x0, 0x1}, 0x28) 4.060132268s ago: executing program 7 (id=4684): r0 = socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0xe0000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x2}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x41, &(0x7f0000000040)=r2, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{0x1}, &(0x7f0000000100), &(0x7f00000001c0)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{}, &(0x7f0000000240), &(0x7f0000000280)}, 0x20) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r4}, &(0x7f0000000100)=0x7d8, &(0x7f0000000140)='%pi6 \x00'}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={r2, 0x36, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000800)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=@base={0x8, 0x2, 0x0, 0x5, 0x400, r4, 0xf, '\x00', r5, r2, 0x1, 0x4, 0x3}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) sendmsg$inet(r3, 0x0, 0x840) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0xb, 0x8, 0xc, 0x1, 0xa, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000900)}, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="d800000019008111e0020f060d8107040a60090000bed7f95c0255a12a00090008000699e3ffffff14000500fe8081780c000567b8b7b940020000090a0016060000000000000000d67f6f9400f7d1d9bbe94fa27100a007a2f7457f01896034277ce06bbace8017cb39b62ee5a7cef4090000001fb791643a5e83d42365f003724a237ee4b11602b2a10000000014d6d930dfe1d9c322fe040000005025acca262f3d40fad95667e006dcdf634c1f215ce3bb9ad809d50b694138c9f1ac76efb42a9ecbee5de6ccd44242f4d643f6fd0f26187b51980dd6", 0xd8}], 0x1}, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000110b0008850000007100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sched_cls=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x0, 0xe, 0x0, &(0x7f00000001c0)="c9188e9bb95d02ff4284860188a8", 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$inet(r0, &(0x7f00000000c0)={0x0, 0x2100, &(0x7f0000001640)=[{&(0x7f0000000340)="5c00000013006bcd9e3fe3dc4e48aa31086b8703140000001f03000000330000040014000d000a000d0000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x4040844) 3.968602783s ago: executing program 8 (id=4685): r0 = socket$kcm(0x10, 0x3, 0x0) write$cgroup_subtree(r0, &(0x7f0000001ec0)=ANY=[@ANYBLOB="13120000120091ef04e9befbbd00005c0a"], 0xfe33) recvmsg$kcm(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/233, 0xe9}, {&(0x7f0000000a80)=""/205, 0xcd}, {&(0x7f0000000180)=""/93, 0x5d}, {&(0x7f0000000400)=""/195, 0xc3}, {&(0x7f00000008c0)=""/210, 0xd2}, {&(0x7f0000000000)=""/209, 0xd1}], 0x7}, 0x100) 3.965866413s ago: executing program 4 (id=4686): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x3, 0x8, 0x2, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000020000000000000000ee00"], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b28, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000100), 0x4) sendmsg$inet(r1, 0x0, 0x12cd) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfe33) r2 = socket$kcm(0x2, 0xa, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) ioctl$SIOCSIFHWADDR(r2, 0x8953, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) socket$kcm(0x21, 0x2, 0x2) socket$kcm(0x2, 0x3, 0x106) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 3.540953945s ago: executing program 8 (id=4687): openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x9000, 0x5, 0x0, 0x4, 0xed}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x1) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000001c0)='(pu&\"&\t&&') ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0xa}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x4}, 0xc00, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x106) ioctl$SIOCSIFHWADDR(r3, 0x8b1b, &(0x7f0000000000)={'wlan1\x00', @broadcast}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8941, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB="fdffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000040000000000000000000000000000000000000000000000395134271b382edcc2f7bb8f697841eec46a6f64a4773a0aee8a3c0fbfbd43845c441005baee04c1f653d8f4dc93469e28021453c0d158fd12082edc044b9a7c0eb0b0e05bafadf1230f7b11243bc444873db3fced3230aeca4def3d9abfc7094fcd14859c56"], 0x50) 3.339758355s ago: executing program 4 (id=4688): r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f00000002c0)=@l2tp6={0xa, 0x0, 0x2a, @mcast1, 0x9}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="f400000000002c00fe8000000000000000000000000000000100"/40, 0x2a}], 0x1}, 0x0) 3.25587382s ago: executing program 9 (id=4689): sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x20008000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001a80)={0x1, 0x58, &(0x7f0000001a00)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001d80)={0xffffffffffffffff, 0xe0, &(0x7f0000001c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000001ac0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f0000001b00)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001b40)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x31, &(0x7f0000001b80)=[{}], 0x8, 0x10, &(0x7f0000001bc0), &(0x7f0000001c00), 0x8, 0x74, 0x8, 0x8, &(0x7f0000001c40)}}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x4}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x3}, @ptr, @volatile={0x0, 0x0, 0x0, 0x9, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x52}, 0x20) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000000)=[{&(0x7f0000004500)="d800000016008111e00212ba0d8105040a601100ff0f040b067c55a1bc0009001e0006990300000015000500fe808178a8021500030001400200000901ac04000bd67f6f9400710016277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04000000730d7a5025ccca262f3d40fad85667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b440431629b0b5aa14c3d21e2fa353905e2a9ecbee5de6ccd40dd6e4edef3d93452a92307f00000e970300"/216, 0xd8}], 0x1}, 0x0) 3.094296229s ago: executing program 4 (id=4690): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180200007bfdffff0000000000000000850000004100000085000000a000000095000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x0, 0x0, 0x3, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x18, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) socket$kcm(0x2, 0x5, 0x84) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r2, &(0x7f00000031c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000b40)}], 0x1, &(0x7f0000000740)=ANY=[@ANYRESOCT=r1], 0x18}, 0x8080) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000780)) socket$kcm(0x2, 0x5, 0x84) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x1, &(0x7f00000001c0)=@raw=[@exit], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x11}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x5, 0x7, 0x7, 0x0, 0x1, 0x10000}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000), 0x4) 3.048268231s ago: executing program 7 (id=4691): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffc}, [@call={0x85, 0x0, 0x0, 0x2f}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xe, 0x300, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.840179762s ago: executing program 7 (id=4692): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0xe45b0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0xcdd, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x2, 0x0, 0x2009}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000300)="d8000000190081054e81f782db4cb9041c1d0800fe007c05e8fe55a10a0015000200142603600e12080005007f370401a8000600200002400400027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}, {&(0x7f00000001c0)="54d7c2f52eea976e6b09f6bfdb5b66fabef634ea8b4173f41f98f5f9ee7c821a", 0x20}, {&(0x7f0000000440)="135f074a70cb0dac8b731924d0d2716bf153e6fd0a395f756f07d37b9e5ad1d415a034b44d3b6150e2cfe317c6820b62b75d8c59e1fc28ce5bf125b195bd5f56fe0ece9b0805e4798d86243dc48ba5b35f1eb0717313f9d10c6a8e105da10412e624774c027c99993546799c2c382e28286418ce0c385be83d5ef087f9eeb7237559385fa5c4010b", 0x88}], 0x3, 0x0, 0x0, 0x98ffffff}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b80)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc}, 0x94) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000000c0)={0x1, 0x80, 0x4, 0x6, 0x2, 0x2, 0x0, 0x2, 0x5004, 0xa, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xb, 0x2, @perf_config_ext={0x7, 0x1}, 0x10000, 0x6, 0xdfa0b224, 0x5, 0x2, 0xffffffff, 0x2, 0x0, 0x80000000, 0x0, 0x3}) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40e00}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = socket$kcm(0x2a, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0x5, 0x0, &(0x7f0000000000)="259a53f271", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x4, 0xd}, {0x10000002, 0x0, 0xf, 0x6}], 0x10, 0x4000001}, 0x94) r4 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40000000) setsockopt$sock_attach_bpf(r4, 0x84, 0x6e, &(0x7f0000000000)=r7, 0x10) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, @perf_config_ext={0x8, 0x100000001}, 0x880, 0x800, 0x0, 0x0, 0x0, 0x7, 0xffff, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x24044441) r8 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r8, 0x84, 0x83, &(0x7f0000000000)=r11, 0x8) close(r3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x1300, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) ioctl$TUNSETIFF(r12, 0x400454ca, &(0x7f0000000140)={'nr0\x00', 0x6132}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xc) write$cgroup_subtree(r12, &(0x7f0000000000)=ANY=[], 0xfe3a) 2.149058318s ago: executing program 4 (id=4693): r0 = socket$kcm(0x10, 0x3, 0x0) write$cgroup_subtree(r0, &(0x7f0000001ec0)=ANY=[@ANYBLOB="13120000120091ef"], 0xfe33) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000001f00)=""/4100, 0xa83}, {&(0x7f0000000bc0)=""/209, 0xa5}, {&(0x7f0000000900)=""/204, 0xcc}, {&(0x7f0000000340)=""/108, 0x75}, {&(0x7f0000000600)=""/239, 0xef}, {&(0x7f00000001c0)=""/154, 0xaa}, {&(0x7f0000001c40)=""/219, 0xdb}, {&(0x7f0000000700)=""/171}, {&(0x7f0000000800)=""/206}, {&(0x7f0000000280)=""/124}], 0x8}, 0x102) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000030a2c99a874e709e480000000000000000000000000000000000000000000043e0c8f5adf0eb185fe4b1950799526e334b7f4add9fe910b2c782e51617016694fa4f03c727692e61c7e74a205323b8cfaa0e0dc462366efe092bcf26d219f1e85202c17f251a522d7d562c"], 0x50) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0xfede, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73772cc9f1ba1f848420000005e140602000000000e000a0010000000028000001294", 0x2e}], 0x1}, 0x0) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000140)=ANY=[@ANYRES32=r1, @ANYRES32=r3, @ANYBLOB="0500"], 0x10) r5 = bpf$MAP_CREATE_TAIL_CALL(0x9, &(0x7f0000000140)=ANY=[], 0xc) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x823, 0x4, 0x4, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x11, &(0x7f0000000440)=ANY=[@ANYBLOB="ac770000c2ac012e579b56b0ec55a900"/31, @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018420000f8ffffff0000000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f00000002c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x5, 0xf, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000340)=[{0x1, 0x5, 0xe, 0xb}, {0x3, 0x3, 0x9, 0xa}, {0x4, 0x3, 0xa, 0x3}, {0x2, 0x2, 0x1, 0x7}], 0x10, 0x2}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0)={0x0, r5}, 0x8) bpf$TOKEN_CREATE(0x24, &(0x7f00000006c0)={0x0, r5}, 0x8) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYRES8=r4], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x58, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r3) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r8) r9 = socket$kcm(0xf, 0x0, 0x2) sendmsg$inet(r9, &(0x7f0000003780)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="020a000202000000e4a17c45c8d260c9", 0x10}, {&(0x7f0000000500)="1695004b53f13975cdc79b0e13b983f1440e1a40bdc699a98901a1c062e1d72d1dace0023adcfffffffffffff8003b0abf807d4f8be2639d77145392520a37b604a46315d7480b6d7e484c9610a65be64875d3292f9d111aab56cac2421e3ffcaa46912c172925b6de572c3c843e7970055d83c98f4bf61bd7ed76aacf37062ddc2f8e3b5449c66255871899092aca1e4582d08603846ae042c76dd00e126179631e02b8886973e0fc4a45d9", 0xac}], 0x2}, 0x440c1) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 2.084404772s ago: executing program 9 (id=4694): r0 = socket$kcm(0xa, 0x922000000003, 0x11) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) close(r1) ioctl$SIOCSIFHWADDR(r1, 0x8b14, &(0x7f0000000000)={'wlan1\x00', @random="0100ffffffff"}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003b000b05d25a802e8c6394f90324fc601000050008000900053582c104003e37000c0180fc0b2000f80b", 0x33fe0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001440)={r1, 0x0, 0xf3, 0x1000, &(0x7f0000000100)="0b8f2c1cad5cfe7437fb3b11897238e4f055d627e77f512caf7e50258a401582d23895ce7b54bd03cc286c7f5641e9c1b27e3f728cc9906600f4427e8075c462587e2699aee5aff1ef54521b2e946be5cdaa7d1d95bf15bd089c5e867d9ba26e7eda6b4fab49343f34dee9affd2a9d28b80ddaaab82e25f8d694a770a79d70762198d27060b4ae2437ff3f9d92fa6cc9306503572b3458e690ea92d48b1f0a70d517e24884c2b2020d05061e70108b0d1dfa6ebb512ca5ece9bd3da422498c499c5e4fe5677ae513acce5b961e0d290083bc9b5ec87294d84a8d5de8ea12877a2e86825209ad8fb8398a8375eb99983c3b7921", &(0x7f0000000380)=""/4096, 0x1f, 0x0, 0xe, 0x42, &(0x7f0000001380)="e5fec39ce1ee8cf61a3d62e82636", &(0x7f00000013c0)="c1962b98640ca2b97c5f424618607d0219484afd93575e2ce3e52b0f501299fe3b6018ed60e1dfdf062efe145fb21b8ae83b86b9bc80a9a2e187dc637de47975e727", 0x4, 0x0, 0xff}, 0x50) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f00000002c0)=@l2tp6={0xa, 0x0, 0x0, @private1, 0x9}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="f400000000002c00fe8000000000000000000000000000000100"/40, 0x28}], 0x1}, 0x0) 2.000121806s ago: executing program 8 (id=4695): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0}, 0x0, 0x4, 0x0, 0x3, 0x0, 0x10, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="1400000037000b63446a80648c2594f90b24fc60", 0x14}], 0x1}, 0x5006) r3 = socket$kcm(0x29, 0x5, 0x0) r4 = socket$kcm(0x10, 0x7, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNGETVNETLE(r5, 0x800454dd, &(0x7f00000001c0)) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="240000002c008188040f80ec59acbc0413a1f8480e0000005e140602110000000e000400", 0x24}], 0x1}, 0x0) sendmsg$kcm(r3, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000002140)=[{&(0x7f0000001d40)="e2", 0x1}], 0x1}, 0x40) close(r3) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000000c0)='FREEZING\x00', 0x9) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}], 0x70}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000b80)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca^\xf9\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x96\x86\xdb\xa9\xd3\x01\xb2\xc7\xf8G\x069\x90,\xda\xf6\xc5\xcd\xec\xa3B\xc3\"4\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\x7f\xec\xb2\xc5E\x00\xdd\xf2e\xa8\xf1<\xb2\xc82\xbf=o\x00`\xc1A\'\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x92\xbb\xe3Y\x97\xc2') perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0xcdd, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7a, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x2400, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/20, @ANYRES32=0x1], 0x48) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000001000)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed@n\x00\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xf3\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x9c\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)=r3}, 0x20) recvmsg(r4, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f00000002c0)=""/34, 0x56}], 0x1}, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000480)={r6, &(0x7f0000000440)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x4, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000020000800000000000000000611063000000"], &(0x7f0000000100)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) r7 = socket$kcm(0xa, 0x1, 0x106) sendmsg$kcm(r7, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0xe07e872420dfefca) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x200, 0x10, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85a, 0x0, @perf_config_ext={0x8a15, 0x5}, 0x411, 0x1, 0xb, 0x5, 0xe4c2, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x6) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001780)={r1, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000018c0)={0x18, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x9, 0x1000, &(0x7f0000000700)=""/4096, 0x41100, 0x20, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x5, 0x7, 0x9, 0x7}, 0x10, 0x0, 0x0, 0x9, &(0x7f00000017c0)=[r8], &(0x7f0000001800)=[{0x0, 0x1, 0x0, 0x9}, {0x2, 0x3, 0x7, 0xb}, {0x5, 0x1, 0xf, 0x7}, {0x4, 0x2, 0xe, 0xc}, {0x1, 0x3, 0xf, 0xc}, {0x3, 0x1, 0xe, 0xb}, {0x0, 0xc4, 0x4, 0xe}, {0x1, 0x1, 0xb, 0x2}, {0x1, 0x4, 0x6, 0x7}], 0x10, 0x7}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb810018"], 0x0, 0x39, 0x0, 0x1}, 0x28) 1.675329233s ago: executing program 7 (id=4698): r0 = socket$kcm(0x10, 0x400000002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0xffffffff, 0x0, 0xb, 0x3}, {0x10000002, 0x20, 0x400084, 0x3}]}, 0x94) close(0x3) r1 = socket$kcm(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x64, &(0x7f0000000000)=r4, 0x10) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000140)=[{&(0x7f00000005c0)="df", 0x1}], 0x1}, 0x0) sendmsg$inet(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 1.036200986s ago: executing program 9 (id=4699): r0 = socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0xe0000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x2}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r3, 0x1, 0x41, &(0x7f0000000040)=r2, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{0x1}, &(0x7f0000000100), &(0x7f00000001c0)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{}, &(0x7f0000000240), &(0x7f0000000280)}, 0x20) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r4}, &(0x7f0000000100)=0x7d8, &(0x7f0000000140)='%pi6 \x00'}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={r2, 0x36, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000800)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=@base={0x8, 0x2, 0x0, 0x5, 0x400, r4, 0xf, '\x00', r5, r2, 0x1, 0x4, 0x3}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) sendmsg$inet(r3, 0x0, 0x840) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0xb, 0x8, 0xc, 0x1, 0xa, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000900)}, 0x4) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="d800000019008111e0020f060d8107040a60090000bed7f95c0255a12a00090008000699e3ffffff14000500fe8081780c000567b8b7b940020000090a0016060000000000000000d67f6f9400f7d1d9bbe94fa27100a007a2f7457f01896034277ce06bbace8017cb39b62ee5a7cef4090000001fb791643a5e83d42365f003724a237ee4b11602b2a10000000014d6d930dfe1d9c322fe040000005025acca262f3d40fad95667e006dcdf634c1f215ce3bb9ad809d50b694138c9f1ac76efb42a9ecbee5de6ccd44242f4d643f6fd0f26187b51980dd6", 0xd8}], 0x1}, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000110b0008850000007100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sched_cls=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x0, 0xe, 0x0, &(0x7f00000001c0)="c9188e9bb95d02ff4284860188a8", 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$inet(r0, &(0x7f00000000c0)={0x0, 0x2100, &(0x7f0000001640)=[{&(0x7f0000000340)="5c00000013006bcd9e3fe3dc4e48aa31086b8703140000001f03000000330000040014000d000a000d0000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x4040844) 642.040167ms ago: executing program 7 (id=4700): r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r0, &(0x7f0000001000)={&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001640)="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"/1504, 0x5e0}, {&(0x7f0000000600)="3001fb90647586f4601659c5ad2644b99bfd65452e947b394c96c29278d097c5f170d77283a744139d2ce2a2f4bb5bb37e7396e7bac14056f25d17145e73bc246104000000000000002d1585e8a456763cfafcf7189145a6e261af6232014cbf8a0f898bf6d14136874b6a1fd7caf8ec9966b0419be0420dc6e247dfb7715ebafaa20fcbc57ade23cba05da1fbe4bba675b742472eebaabf356adc99866930e146125a272cef5baf5dfad4a28a01208d9908183ab2085a781e531f1bed4ac9c245ec19be383047656a7d857d364e6f69eccea5aca3964f", 0xd7}, {&(0x7f0000000b00)="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", 0x18e}, {&(0x7f0000000cc0)="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"/349, 0x15d}, {&(0x7f0000000700)="15c84609b06c6d85a5ca6f3a9a242f214aee4e7093161b717090c0c852a05393abd8992d91576f57bbd3488e85d8456d6c6c09de5c5228ee18819665861f01a2823a7cfa8e9260a5fe3921638db2dc5156149f86916810f913a944e1c8cd7fccb63f5b287016e512b050ca214125b2217260c9ce3019e88b80985402ff7ca34be17e0dbda4f028cec9973a2b9eed83eee86f35f2c0adf50a04296e99c0f709fb3990", 0xa2}], 0x5, &(0x7f0000000580)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @loopback}}}], 0x20}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.kill\x00', 0x275a, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x11, 0x68, &(0x7f0000000640), 0x4) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x6, 0x7, 0x9, 0x8, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = getpid() perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x1, 0x0, 0xf, 0x2, 0x0, 0x1, 0x40, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0xfffffffffffffffe, 0xff}, 0x400, 0x5, 0xffffff81, 0x0, 0x3, 0x2, 0x8, 0x0, 0x2, 0x0, 0x8000000000000001}, r3, 0xe, r2, 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x40080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x7, 0x0, 0x0, 0x0, 0x0, 0x86}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x42, &(0x7f0000000040), 0x3b) socket$kcm(0xa, 0x1, 0x0) r7 = socket$kcm(0xa, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000080000000200000000000000", @ANYRES32=r7], 0x50) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x8916, &(0x7f0000000000)={r7}) socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8936, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x19, 0xc, &(0x7f0000000dc0)=ANY=[@ANYBLOB="1800000000000000000000000000000885000000110000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000b986c12a850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$kcm(0x2, 0x200000000000001, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x5452, &(0x7f0000000100)) sendmsg$inet(r8, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @local}, 0x10, 0x0}, 0x3000c0c0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe89}, 0x94) 641.495237ms ago: executing program 8 (id=4701): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x98}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x6, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x21, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x5, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x4, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4002}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 77.566567ms ago: executing program 4 (id=4702): r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x404, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@enum={0x3, 0x0, 0x0, 0xf, 0x4000000}]}, {0x0, [0x0, 0x0, 0x5f, 0x25]}}, 0x0, 0x2a, 0x0, 0x1}, 0x28) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000100)={0x1b, 0x0, 0x0, 0x9, 0x0, 0x1, 0x8, '\x00', 0x0, r1, 0x3, 0x5, 0x1}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0x1, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_tracing={0x1a, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="18030000", @ANYRES32=0x1, @ANYBLOB="000000000800000094820400f0ffffff9500000000000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0x5c, &(0x7f0000000600)=""/92, 0x40f00, 0x10, '\x00', 0x0, 0x1a, r1, 0x8, &(0x7f0000000680)={0x2, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x12091, 0xffffffffffffffff, 0x7, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000700)=[{0x4, 0x1, 0x2, 0x4}, {0x5, 0x2, 0x0, 0xb}, {0x4, 0x2, 0xf, 0xa}, {0x2, 0x2, 0xc, 0xa}, {0x0, 0x2, 0x4, 0xc}, {0x3, 0x5, 0x7, 0xa}, {0x0, 0x1, 0xe, 0x4}], 0x10, 0x9}, 0x94) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetlb.1GB.usage_in_bytes\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x5, 0x5, &(0x7f0000000400)=ANY=[@ANYRESDEC=r5], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x58, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x10, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@jmp={0x5, 0x1, 0x6, 0x3, 0x3, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}}}, &(0x7f0000000200)='syzkaller\x00', 0x1000, 0x0, 0x0, 0x41100, 0x3, '\x00', r3, @fallback=0x14, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0xff, 0x7f}, 0x10, 0x0, r4, 0x0, &(0x7f0000000840)=[r5, r0], 0x0, 0x10, 0x100}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r6 = syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r7 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x2505, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8}, 0x0, 0x4, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000035000b0fd25a806c8c6f94f90224fc60", 0x14}], 0x1, 0x0, 0x0, 0x20000000}, 0x10) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r8, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x641b8, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x0, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffdf, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x4, 0x7fe2, 0x20000002}, 0x50) r9 = openat$cgroup_ro(r8, &(0x7f00000000c0)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x26e1, 0x0) write$cgroup_devices(r9, 0x0, 0xa) write$cgroup_pid(r9, &(0x7f00000005c0)=r6, 0x1) 61.298537ms ago: executing program 9 (id=4703): sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x20008000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001a80)={0x1, 0x58, &(0x7f0000001a00)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001d80)={0xffffffffffffffff, 0xe0, &(0x7f0000001c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000001ac0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f0000001b00)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001b40)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x31, &(0x7f0000001b80)=[{}], 0x8, 0x10, &(0x7f0000001bc0), &(0x7f0000001c00), 0x8, 0x74, 0x8, 0x8, &(0x7f0000001c40)}}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x4}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x3}, @ptr, @volatile={0x0, 0x0, 0x0, 0x9, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x52}, 0x20) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000000)=[{&(0x7f0000004500)="d800000016008111e00212ba0d8105040a601100ff0f040b067c55a1bc0009001e0006990300000015000500fe808178a8021500030001400200000901ac04000bd67f6f9400710016277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04000000730d7a5025ccca262f3d40fad85667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b440431629b0b5aa14c3d21e2fa353905e2a9ecbee5de6ccd40dd6e4edef3d93452a92307f00000e970300"/216, 0xd8}], 0x1}, 0x0) 0s ago: executing program 7 (id=4704): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe123, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0xd, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000001140)=ANY=[@ANYBLOB='1-2:5/6'], 0x31) r4 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r6, &(0x7f00000001c0)='cgroup.threads\x00', 0x2, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r7) r8 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x66137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="09000000010000006d0500000400000042000000", @ANYRES32, @ANYBLOB="001000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="381111b471205911c3330f000000000000005b6600000000000000007e1e8e0523b4"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600), &(0x7f0000001f80), 0xfffffffb, r10}, 0x38) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) r11 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r11, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030033000b07d25a806c8c6f94f90624fc60100005000a000200053582c137153e37000c0980fc0b10000300", 0x33fe0}], 0x1}, 0x0) kernel console output (not intermixed with test programs): 528][T20646] ? load_image+0x420/0x420 [ 1269.057064][T20646] ? __might_sleep+0xe0/0xe0 [ 1269.061683][T20646] ? __lock_acquire+0x7d40/0x7d40 [ 1269.066721][T20646] ? __se_sys_sendmsg+0x1c2/0x2b0 [ 1269.071786][T20646] should_fail_ex+0x39d/0x4d0 [ 1269.076494][T20646] should_failslab+0x9/0x20 [ 1269.081032][T20646] slab_pre_alloc_hook+0x59/0x310 [ 1269.086090][T20646] ? sctp_datamsg_from_user+0x88/0xee0 [ 1269.091586][T20646] __kmem_cache_alloc_node+0x53/0x250 [ 1269.096991][T20646] ? sctp_datamsg_from_user+0x88/0xee0 [ 1269.102475][T20646] kmalloc_trace+0x2a/0xe0 [ 1269.106929][T20646] sctp_datamsg_from_user+0x88/0xee0 [ 1269.112232][T20646] ? __sk_mem_raise_allocated+0xa29/0x1340 [ 1269.118070][T20646] ? sctp_primitive_ASSOCIATE+0x95/0xc0 [ 1269.123638][T20646] sctp_sendmsg_to_asoc+0x107f/0x1830 [ 1269.129027][T20646] ? __asan_memcpy+0x40/0x70 [ 1269.133653][T20646] ? sctp_assoc_add_peer+0xcf3/0x1390 [ 1269.139063][T20646] ? sctp_sendmsg_check_sflags+0x2d0/0x2d0 [ 1269.144888][T20646] ? __sctp_connect+0xd80/0xd80 [ 1269.149753][T20646] ? __local_bh_enable_ip+0x13a/0x1c0 [ 1269.155146][T20646] ? _local_bh_enable+0xa0/0xa0 [ 1269.160017][T20646] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 1269.165843][T20646] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 1269.171668][T20646] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 1269.177246][T20646] ? security_sctp_bind_connect+0x89/0xb0 [ 1269.182993][T20646] sctp_sendmsg+0x1b83/0x28c0 [ 1269.187704][T20646] ? sctp_getsockopt+0xb60/0xb60 [ 1269.192657][T20646] ? aa_sk_perm+0x83c/0x970 [ 1269.197206][T20646] ? aa_af_perm+0x330/0x330 [ 1269.201726][T20646] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 1269.208163][T20646] ? sock_rps_record_flow+0x19/0x3f0 [ 1269.213472][T20646] ? inet_sendmsg+0x7c/0x2f0 [ 1269.218079][T20646] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 1269.223382][T20646] ? security_socket_sendmsg+0x80/0xa0 [ 1269.228853][T20646] ? inet_send_prepare+0x260/0x260 [ 1269.233983][T20646] ____sys_sendmsg+0x5ba/0x960 [ 1269.238764][T20646] ? __lock_acquire+0x7d40/0x7d40 [ 1269.243812][T20646] ? __asan_memset+0x22/0x40 [ 1269.248421][T20646] ? __sys_sendmsg_sock+0x30/0x30 [ 1269.253455][T20646] ? __import_iovec+0x5f2/0x850 [ 1269.258329][T20646] ? import_iovec+0x73/0xa0 [ 1269.262847][T20646] ___sys_sendmsg+0x2a6/0x360 [ 1269.267536][T20646] ? get_pid_task+0x20/0x1e0 [ 1269.272164][T20646] ? __sys_sendmsg+0x2a0/0x2a0 [ 1269.276967][T20646] ? __lock_acquire+0x7d40/0x7d40 [ 1269.282122][T20646] __se_sys_sendmsg+0x1c2/0x2b0 [ 1269.286992][T20646] ? __x64_sys_sendmsg+0x80/0x80 [ 1269.291961][T20646] ? lockdep_hardirqs_on+0x98/0x150 [ 1269.297237][T20646] do_syscall_64+0x55/0xa0 [ 1269.301681][T20646] ? clear_bhb_loop+0x40/0x90 [ 1269.306381][T20646] ? clear_bhb_loop+0x40/0x90 [ 1269.311083][T20646] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1269.317000][T20646] RIP: 0033:0x7f991619c819 [ 1269.321439][T20646] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1269.341075][T20646] RSP: 002b:00007f99170d6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1269.349516][T20646] RAX: ffffffffffffffda RBX: 00007f9916415fa0 RCX: 00007f991619c819 [ 1269.357523][T20646] RDX: 00000000000080d1 RSI: 0000200000000140 RDI: 0000000000000003 [ 1269.365514][T20646] RBP: 00007f99170d6090 R08: 0000000000000000 R09: 0000000000000000 [ 1269.373505][T20646] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1269.381528][T20646] R13: 00007f9916416038 R14: 00007f9916415fa0 R15: 00007ffdaf3333d8 [ 1269.389544][T20646] [ 1269.472430][ T11] team_slave_1 (unregistering): left promiscuous mode [ 1269.485158][ T11] team_slave_1 (unregistering): left allmulticast mode [ 1269.523074][ T11] team0 (unregistering): Port device team_slave_1 removed [ 1269.593792][ T11] C (unregistering): left promiscuous mode [ 1269.604434][ T11] C (unregistering): left allmulticast mode [ 1269.615336][ T11] team0 (unregistering): Port device C removed [ 1269.710055][ T11] .` (unregistering): (slave bond_slave_1): Releasing backup interface [ 1269.822347][ T11] .` (unregistering): (slave bond_slave_0): Releasing backup interface [ 1270.149159][ T11] .` (unregistering): (slave dummy0): Releasing backup interface [ 1270.213837][ T11] .` (unregistering): Released all slaves [ 1270.269516][T20657] netlink: 'syz.4.3960': attribute type 8 has an invalid length. [ 1270.303610][T20657] netlink: 156 bytes leftover after parsing attributes in process `syz.4.3960'. [ 1270.665683][T20509] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1270.773010][T20509] 8021q: adding VLAN 0 to HW filter on device team0 [ 1270.803553][T17063] bridge0: port 1(bridge_slave_0) entered blocking state [ 1270.810769][T17063] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1270.855478][T17063] bridge0: port 2(bridge_slave_1) entered blocking state [ 1270.862720][T17063] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1271.744771][T20688] netlink: 149412 bytes leftover after parsing attributes in process `syz.8.3966'. [ 1271.856202][T20688] openvswitch: netlink: Key type 29 is not supported [ 1272.325885][T20509] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1273.940274][T20709] netlink: 40 bytes leftover after parsing attributes in process `syz.7.3968'. [ 1273.966410][T20709] netlink: 4 bytes leftover after parsing attributes in process `syz.7.3968'. [ 1274.055847][T20509] veth0_vlan: entered promiscuous mode [ 1274.120856][T20509] veth1_vlan: entered promiscuous mode [ 1274.254250][T20509] veth0_macvtap: entered promiscuous mode [ 1274.310554][T20509] veth1_macvtap: entered promiscuous mode [ 1274.414011][T20509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1274.450166][T20509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1274.506182][T20509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1274.585637][T20509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1274.636269][T20509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1274.662673][T20509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1274.745680][T20509] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1274.851170][T20509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1274.956050][T20509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1275.006090][T20509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1275.066063][T20509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1275.125166][T20509] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1275.193661][T20509] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1275.238446][T20509] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1275.270537][T20509] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1275.306476][T20509] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1275.494593][T20736] netlink: 'syz.8.3974': attribute type 4 has an invalid length. [ 1275.505916][T20736] netlink: 164 bytes leftover after parsing attributes in process `syz.8.3974'. [ 1275.518912][ T3451] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1275.545759][ T3451] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1275.632132][ T3451] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1275.651178][ T3451] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1278.300153][T20799] netlink: 209836 bytes leftover after parsing attributes in process `syz.9.3987'. [ 1278.910602][T20815] netlink: 16186 bytes leftover after parsing attributes in process `syz.7.3993'. [ 1281.883225][T20851] netlink: 209852 bytes leftover after parsing attributes in process `syz.9.4000'. [ 1281.985783][T20851] openvswitch: netlink: IP tunnel attribute has 3052 unknown bytes. [ 1282.464715][T20884] tap0: tun_chr_ioctl cmd 1074025673 [ 1282.493967][T20884] FAULT_INJECTION: forcing a failure. [ 1282.493967][T20884] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1282.527295][T20884] CPU: 0 PID: 20884 Comm: syz.7.4009 Not tainted syzkaller #0 [ 1282.534841][T20884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1282.544940][T20884] Call Trace: [ 1282.548257][T20884] [ 1282.551254][T20884] dump_stack_lvl+0x18c/0x250 [ 1282.555985][T20884] ? show_regs_print_info+0x20/0x20 [ 1282.561237][T20884] ? load_image+0x420/0x420 [ 1282.565787][T20884] ? __lock_acquire+0x7d40/0x7d40 [ 1282.570847][T20884] ? snprintf+0xe9/0x140 [ 1282.575141][T20884] should_fail_ex+0x39d/0x4d0 [ 1282.579890][T20884] _copy_to_user+0x2f/0xa0 [ 1282.584353][T20884] simple_read_from_buffer+0xe7/0x150 [ 1282.589784][T20884] proc_fail_nth_read+0x1e8/0x260 [ 1282.594868][T20884] ? proc_fault_inject_write+0x360/0x360 [ 1282.600541][T20884] ? fsnotify_perm+0x271/0x5e0 [ 1282.605348][T20884] ? proc_fault_inject_write+0x360/0x360 [ 1282.611060][T20884] vfs_read+0x28b/0x970 [ 1282.615277][T20884] ? kernel_read+0x1e0/0x1e0 [ 1282.619919][T20884] ? __fget_files+0x28/0x4b0 [ 1282.624546][T20884] ? __fget_files+0x28/0x4b0 [ 1282.629173][T20884] ? __fget_files+0x43d/0x4b0 [ 1282.633896][T20884] ? __fdget_pos+0x2a3/0x330 [ 1282.638526][T20884] ? ksys_read+0x75/0x260 [ 1282.642919][T20884] ksys_read+0x150/0x260 [ 1282.647204][T20884] ? vfs_write+0x990/0x990 [ 1282.651660][T20884] ? lockdep_hardirqs_on+0x98/0x150 [ 1282.656904][T20884] do_syscall_64+0x55/0xa0 [ 1282.661525][T20884] ? clear_bhb_loop+0x40/0x90 [ 1282.666239][T20884] ? clear_bhb_loop+0x40/0x90 [ 1282.670952][T20884] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1282.676881][T20884] RIP: 0033:0x7fd1c0f5d04e [ 1282.681322][T20884] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1282.700973][T20884] RSP: 002b:00007fd1c1ed9fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1282.710037][T20884] RAX: ffffffffffffffda RBX: 00007fd1c1eda6c0 RCX: 00007fd1c0f5d04e [ 1282.718037][T20884] RDX: 000000000000000f RSI: 00007fd1c1eda0a0 RDI: 0000000000000004 [ 1282.726092][T20884] RBP: 00007fd1c1eda090 R08: 0000000000000000 R09: 0000000000000000 [ 1282.734130][T20884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1282.742144][T20884] R13: 00007fd1c1216038 R14: 00007fd1c1215fa0 R15: 00007ffcd7f58298 [ 1282.750164][T20884] [ 1283.574828][T20917] netlink: 92 bytes leftover after parsing attributes in process `syz.4.4018'. [ 1283.601296][T20917] netlink: 92 bytes leftover after parsing attributes in process `syz.4.4018'. [ 1283.652722][T20913] netlink: 92 bytes leftover after parsing attributes in process `syz.4.4018'. [ 1285.078672][T20934] netlink: 188 bytes leftover after parsing attributes in process `syz.8.4022'. [ 1288.817900][T20986] tap0: tun_chr_ioctl cmd 1074025673 [ 1290.068827][T21014] netlink: 'syz.7.4033': attribute type 10 has an invalid length. [ 1290.445300][T21023] tap0: tun_chr_ioctl cmd 1074025673 [ 1290.884203][T21042] netlink: 'syz.4.4041': attribute type 10 has an invalid length. [ 1290.906124][T21042] batadv0: left promiscuous mode [ 1290.921556][T21042] batadv0: left allmulticast mode [ 1290.942393][T21042] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1290.983389][T21042] batadv0: entered promiscuous mode [ 1290.998184][T21042] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1291.061362][T21044] netlink: 144 bytes leftover after parsing attributes in process `syz.4.4041'. [ 1291.266389][T21042] netlink: 'syz.4.4041': attribute type 10 has an invalid length. [ 1291.333292][T21042] netlink: 40 bytes leftover after parsing attributes in process `syz.4.4041'. [ 1291.430453][T21042] batadv0: entered allmulticast mode [ 1291.509709][T21042] bond0: (slave batadv0): Releasing backup interface [ 1291.729563][T21042] A link change request failed with some changes committed already. Interface batadv0 may have been left with an inconsistent configuration, please check. [ 1293.841107][T21097] delete_channel: no stack [ 1294.180764][T21122] netlink: 'syz.8.4058': attribute type 10 has an invalid length. [ 1294.283392][T21122] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1294.393313][T21122] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1294.459011][T21123] netlink: 144 bytes leftover after parsing attributes in process `syz.8.4058'. [ 1294.701595][T21122] netlink: 'syz.8.4058': attribute type 10 has an invalid length. [ 1294.719644][T21122] netlink: 40 bytes leftover after parsing attributes in process `syz.8.4058'. [ 1294.776625][T21122] batadv0: entered promiscuous mode [ 1294.812241][T21122] batadv0: entered allmulticast mode [ 1294.858470][T21122] bond0: (slave batadv0): Releasing backup interface [ 1294.971919][T21122] bridge0: port 3(batadv0) entered blocking state [ 1294.999565][T21122] bridge0: port 3(batadv0) entered disabled state [ 1295.181787][T21135] FAULT_INJECTION: forcing a failure. [ 1295.181787][T21135] name failslab, interval 1, probability 0, space 0, times 0 [ 1295.236981][T21135] CPU: 1 PID: 21135 Comm: syz.4.4062 Not tainted syzkaller #0 [ 1295.244545][T21135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1295.254669][T21135] Call Trace: [ 1295.257990][T21135] [ 1295.260968][T21135] dump_stack_lvl+0x18c/0x250 [ 1295.265708][T21135] ? show_regs_print_info+0x20/0x20 [ 1295.270957][T21135] ? load_image+0x420/0x420 [ 1295.275512][T21135] ? __might_sleep+0xe0/0xe0 [ 1295.280150][T21135] ? __lock_acquire+0x7d40/0x7d40 [ 1295.285216][T21135] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 1295.291247][T21135] should_fail_ex+0x39d/0x4d0 [ 1295.295989][T21135] should_failslab+0x9/0x20 [ 1295.300543][T21135] slab_pre_alloc_hook+0x59/0x310 [ 1295.305622][T21135] ? lockdep_hardirqs_on+0x98/0x150 [ 1295.310876][T21135] ? bpf_prog_test_run_skb+0x238/0x12b0 [ 1295.316469][T21135] ? bpf_prog_test_run_skb+0x238/0x12b0 [ 1295.322057][T21135] __kmem_cache_alloc_node+0x53/0x250 [ 1295.327488][T21135] ? bpf_prog_test_run_skb+0x238/0x12b0 [ 1295.333157][T21135] __kmalloc+0xa4/0x230 [ 1295.337365][T21135] bpf_prog_test_run_skb+0x238/0x12b0 [ 1295.342816][T21135] ? __fget_files+0x28/0x4b0 [ 1295.347453][T21135] ? __fget_files+0x28/0x4b0 [ 1295.352091][T21135] ? __fget_files+0x43d/0x4b0 [ 1295.356831][T21135] ? cpu_online+0x60/0x60 [ 1295.361204][T21135] bpf_prog_test_run+0x321/0x390 [ 1295.366192][T21135] __sys_bpf+0x49d/0x890 [ 1295.370490][T21135] ? bpf_link_show_fdinfo+0x390/0x390 [ 1295.375918][T21135] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1295.382134][T21135] __x64_sys_bpf+0x7c/0x90 [ 1295.386592][T21135] do_syscall_64+0x55/0xa0 [ 1295.391149][T21135] ? clear_bhb_loop+0x40/0x90 [ 1295.395871][T21135] ? clear_bhb_loop+0x40/0x90 [ 1295.400593][T21135] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1295.406539][T21135] RIP: 0033:0x7f991619c819 [ 1295.411010][T21135] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1295.430758][T21135] RSP: 002b:00007f99170d6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1295.439248][T21135] RAX: ffffffffffffffda RBX: 00007f9916415fa0 RCX: 00007f991619c819 [ 1295.447265][T21135] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 1295.455281][T21135] RBP: 00007f99170d6090 R08: 0000000000000000 R09: 0000000000000000 [ 1295.463289][T21135] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1295.471303][T21135] R13: 00007f9916416038 R14: 00007f9916415fa0 R15: 00007ffdaf3333d8 [ 1295.480045][T21135] [ 1295.532557][ T3451] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 1295.541945][ T3451] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 1296.673083][T21171] syzkaller0: entered promiscuous mode [ 1296.743438][T21171] syzkaller0: entered allmulticast mode [ 1301.378571][ T1291] ieee802154 phy0 wpan0: encryption failed: -22 [ 1301.386077][ T1291] ieee802154 phy1 wpan1: encryption failed: -22 [ 1304.691332][T21211] tap0: tun_chr_ioctl cmd 1074025677 [ 1304.700272][T21211] tap0: linktype set to 778 [ 1304.705023][T21212] tap0: tun_chr_ioctl cmd 2147767511 [ 1304.724761][T21220] netlink: 'syz.7.4082': attribute type 10 has an invalid length. [ 1304.753476][T21220] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1304.764441][T21220] batadv0: entered promiscuous mode [ 1304.774364][T21220] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1304.783196][T21221] netlink: 144 bytes leftover after parsing attributes in process `syz.7.4082'. [ 1304.806417][T21222] netlink: 'syz.7.4082': attribute type 10 has an invalid length. [ 1304.814302][T21222] netlink: 40 bytes leftover after parsing attributes in process `syz.7.4082'. [ 1304.826030][T21222] batadv0: entered allmulticast mode [ 1304.846678][T21222] bond0: (slave batadv0): Releasing backup interface [ 1304.911880][T21222] bridge0: port 3(batadv0) entered blocking state [ 1304.949417][T21222] bridge0: port 3(batadv0) entered disabled state [ 1305.219935][T21239] C: renamed from team_slave_0 (while UP) [ 1305.222097][T20526] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 1305.235303][T20526] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 1305.263531][T21239] netlink: 'syz.8.4086': attribute type 4 has an invalid length. [ 1305.303426][T21239] netlink: 116 bytes leftover after parsing attributes in process `syz.8.4086'. [ 1305.317350][T21239] A link change request failed with some changes committed already. Interface C may have been left with an inconsistent configuration, please check. [ 1305.373870][T21247] netlink: 129384 bytes leftover after parsing attributes in process `syz.7.4088'. [ 1306.302568][T21267] netlink: 'syz.4.4091': attribute type 41 has an invalid length. [ 1307.012056][T21289] netlink: 129384 bytes leftover after parsing attributes in process `syz.9.4097'. [ 1307.078574][T21290] netlink: 'syz.8.4095': attribute type 10 has an invalid length. [ 1307.128485][T21290] batadv0: left allmulticast mode [ 1307.133614][T21290] batadv0: left promiscuous mode [ 1307.222519][T21290] bridge0: port 3(batadv0) entered disabled state [ 1307.340410][T21293] FAULT_INJECTION: forcing a failure. [ 1307.340410][T21293] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1307.366452][T21293] CPU: 1 PID: 21293 Comm: syz.4.4098 Not tainted syzkaller #0 [ 1307.374012][T21293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1307.384143][T21293] Call Trace: [ 1307.387487][T21293] [ 1307.390503][T21293] dump_stack_lvl+0x18c/0x250 [ 1307.395289][T21293] ? show_regs_print_info+0x20/0x20 [ 1307.400582][T21293] ? load_image+0x420/0x420 [ 1307.405176][T21293] ? __might_fault+0xaa/0x120 [ 1307.409932][T21293] ? __lock_acquire+0x7d40/0x7d40 [ 1307.415056][T21293] should_fail_ex+0x39d/0x4d0 [ 1307.419836][T21293] _copy_from_user+0x2f/0xe0 [ 1307.424489][T21293] generic_map_update_batch+0x59a/0x810 [ 1307.430126][T21293] ? rcu_read_unlock+0xa0/0xa0 [ 1307.434944][T21293] ? __fdget+0x180/0x210 [ 1307.439266][T21293] ? rcu_read_unlock+0xa0/0xa0 [ 1307.444079][T21293] bpf_map_do_batch+0x3d7/0x610 [ 1307.449021][T21293] __sys_bpf+0x381/0x890 [ 1307.453328][T21293] ? bpf_link_show_fdinfo+0x390/0x390 [ 1307.458792][T21293] ? lock_chain_count+0x20/0x20 [ 1307.463713][T21293] __x64_sys_bpf+0x7c/0x90 [ 1307.468176][T21293] do_syscall_64+0x55/0xa0 [ 1307.472630][T21293] ? clear_bhb_loop+0x40/0x90 [ 1307.477345][T21293] ? clear_bhb_loop+0x40/0x90 [ 1307.482067][T21293] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1307.487998][T21293] RIP: 0033:0x7f991619c819 [ 1307.492460][T21293] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1307.512121][T21293] RSP: 002b:00007f99170d6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1307.520694][T21293] RAX: ffffffffffffffda RBX: 00007f9916415fa0 RCX: 00007f991619c819 [ 1307.528880][T21293] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 1307.536905][T21293] RBP: 00007f99170d6090 R08: 0000000000000000 R09: 0000000000000000 [ 1307.544914][T21293] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1307.552949][T21293] R13: 00007f9916416038 R14: 00007f9916415fa0 R15: 00007ffdaf3333d8 [ 1307.561006][T21293] [ 1307.789346][T21290] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1307.861453][T21290] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1307.894853][T21294] netlink: 144 bytes leftover after parsing attributes in process `syz.8.4095'. [ 1308.001203][T21290] netlink: 'syz.8.4095': attribute type 10 has an invalid length. [ 1308.025872][T21290] netlink: 40 bytes leftover after parsing attributes in process `syz.8.4095'. [ 1308.068974][T21290] batadv0: entered promiscuous mode [ 1308.094829][T21290] batadv0: entered allmulticast mode [ 1308.138426][T21290] bond0: (slave batadv0): Releasing backup interface [ 1308.200322][T21290] bridge0: port 3(batadv0) entered blocking state [ 1308.213723][T21290] bridge0: port 3(batadv0) entered disabled state [ 1308.419374][T17063] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 1308.428900][T17063] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 1309.614505][T21330] netlink: 209852 bytes leftover after parsing attributes in process `syz.9.4106'. [ 1309.694480][T21330] debugfs: Directory '!!ô!' with parent 'ieee80211' already present! [ 1309.926923][T21332] netlink: 'syz.8.4105': attribute type 41 has an invalid length. [ 1310.021155][T21339] netlink: 16186 bytes leftover after parsing attributes in process `syz.4.4107'. [ 1310.167561][T21337] delete_channel: no stack [ 1310.167928][T21346] netlink: 129384 bytes leftover after parsing attributes in process `syz.9.4109'. [ 1310.625262][T21360] netlink: 'syz.8.4110': attribute type 9 has an invalid length. [ 1310.656289][T21360] netlink: 61951 bytes leftover after parsing attributes in process `syz.8.4110'. [ 1311.757125][T21376] FAULT_INJECTION: forcing a failure. [ 1311.757125][T21376] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1311.808214][T21376] CPU: 0 PID: 21376 Comm: syz.8.4115 Not tainted syzkaller #0 [ 1311.815854][T21376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1311.825952][T21376] Call Trace: [ 1311.829273][T21376] [ 1311.832244][T21376] dump_stack_lvl+0x18c/0x250 [ 1311.836977][T21376] ? show_regs_print_info+0x20/0x20 [ 1311.842232][T21376] ? load_image+0x420/0x420 [ 1311.846792][T21376] ? __might_fault+0xaa/0x120 [ 1311.851518][T21376] ? __lock_acquire+0x7d40/0x7d40 [ 1311.856595][T21376] should_fail_ex+0x39d/0x4d0 [ 1311.861342][T21376] _copy_to_user+0x2f/0xa0 [ 1311.865812][T21376] finalize_log+0xe4/0x160 [ 1311.870285][T21376] ? btf_parse_struct_metas+0xe40/0xe40 [ 1311.875881][T21376] ? btf_check_type_tags+0x674/0x680 [ 1311.881301][T21376] btf_new_fd+0x768/0x9f0 [ 1311.885765][T21376] ? bpf_btf_show_fdinfo+0x80/0x80 [ 1311.890915][T21376] ? capable+0x88/0xe0 [ 1311.895031][T21376] __sys_bpf+0x670/0x890 [ 1311.899405][T21376] ? bpf_link_show_fdinfo+0x390/0x390 [ 1311.904842][T21376] ? lock_chain_count+0x20/0x20 [ 1311.909756][T21376] __x64_sys_bpf+0x7c/0x90 [ 1311.914210][T21376] do_syscall_64+0x55/0xa0 [ 1311.918669][T21376] ? clear_bhb_loop+0x40/0x90 [ 1311.923389][T21376] ? clear_bhb_loop+0x40/0x90 [ 1311.928123][T21376] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1311.934062][T21376] RIP: 0033:0x7f19b2f9c819 [ 1311.938520][T21376] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1311.958167][T21376] RSP: 002b:00007f19b3ea0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1311.966634][T21376] RAX: ffffffffffffffda RBX: 00007f19b3215fa0 RCX: 00007f19b2f9c819 [ 1311.974639][T21376] RDX: 0000000000000020 RSI: 0000200000000140 RDI: 0000000000000012 [ 1311.982650][T21376] RBP: 00007f19b3ea0090 R08: 0000000000000000 R09: 0000000000000000 [ 1311.990661][T21376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1311.998675][T21376] R13: 00007f19b3216038 R14: 00007f19b3215fa0 R15: 00007ffd33ad88e8 [ 1312.006702][T21376] [ 1312.963633][T21390] netlink: 'syz.7.4119': attribute type 41 has an invalid length. [ 1313.381272][T21396] netlink: 129384 bytes leftover after parsing attributes in process `syz.8.4121'. [ 1313.699092][T21404] netlink: 'syz.7.4123': attribute type 10 has an invalid length. [ 1313.759115][T21404] batadv0: left allmulticast mode [ 1313.792263][T21404] batadv0: left promiscuous mode [ 1313.836801][T21404] bridge0: port 3(batadv0) entered disabled state [ 1313.970826][T21404] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1314.043103][T21404] batadv0: entered promiscuous mode [ 1314.137403][T21404] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1314.229095][T21416] lo: left promiscuous mode [ 1314.234279][T21416] lo: entered allmulticast mode [ 1314.326164][T21406] netlink: 144 bytes leftover after parsing attributes in process `syz.7.4123'. [ 1314.393550][T21412] netlink: 'syz.7.4123': attribute type 10 has an invalid length. [ 1314.443501][T21412] netlink: 40 bytes leftover after parsing attributes in process `syz.7.4123'. [ 1314.668657][T21412] batadv0: entered allmulticast mode [ 1314.764829][T21412] bond0: (slave batadv0): Releasing backup interface [ 1314.924722][T21412] bridge0: port 3(batadv0) entered blocking state [ 1314.958045][T21412] bridge0: port 3(batadv0) entered disabled state [ 1315.007808][T21411] lo: entered promiscuous mode [ 1315.013658][T21411] lo: left allmulticast mode [ 1315.431223][ T61] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 1315.440729][ T61] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 1317.636505][T21469] delete_channel: no stack [ 1318.581299][T21484] netlink: 129384 bytes leftover after parsing attributes in process `syz.8.4142'. [ 1322.280438][T21539] netlink: 'syz.8.4152': attribute type 10 has an invalid length. [ 1322.312804][T21539] netlink: 2 bytes leftover after parsing attributes in process `syz.8.4152'. [ 1322.336848][T21539] bond0: entered promiscuous mode [ 1322.352047][T21539] bond_slave_0: entered promiscuous mode [ 1322.375438][T21539] bond_slave_1: entered promiscuous mode [ 1322.737296][T21552] delete_channel: no stack [ 1323.240405][T21560] netlink: 'syz.9.4154': attribute type 10 has an invalid length. [ 1324.905250][T21560] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1324.933780][T21560] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1325.025414][T21564] netlink: 144 bytes leftover after parsing attributes in process `syz.9.4154'. [ 1325.059335][T21566] netlink: 'syz.9.4154': attribute type 10 has an invalid length. [ 1325.074430][T21566] netlink: 40 bytes leftover after parsing attributes in process `syz.9.4154'. [ 1325.096798][T21566] batadv0: entered promiscuous mode [ 1325.102060][T21566] batadv0: entered allmulticast mode [ 1325.122962][T21566] bond0: (slave batadv0): Releasing backup interface [ 1325.215109][T21566] bridge0: port 3(batadv0) entered blocking state [ 1325.221890][T21566] bridge0: port 3(batadv0) entered disabled state [ 1325.597493][T21584] netlink: 1047 bytes leftover after parsing attributes in process `syz.4.4161'. [ 1325.646490][T21584] bridge_slave_1: default FDB implementation only supports local addresses [ 1325.669568][T17063] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 1325.678955][T17063] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 1325.706938][T21584] netlink: 14 bytes leftover after parsing attributes in process `syz.4.4161'. [ 1327.192562][T21633] delete_channel: no stack [ 1329.030789][T21662] netlink: 132 bytes leftover after parsing attributes in process `syz.7.4174'. [ 1330.253031][T21688] netdevsim netdevsim7 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1330.697543][T21706] netlink: 'syz.4.4186': attribute type 10 has an invalid length. [ 1330.715705][T21706] batadv0: left promiscuous mode [ 1330.725800][T21706] batadv0: left allmulticast mode [ 1330.748136][T21706] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1330.798435][T21706] batadv0: entered promiscuous mode [ 1330.817338][T21706] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1330.848338][T21710] netlink: 'syz.8.4187': attribute type 10 has an invalid length. [ 1330.908843][T21710] batadv0: left allmulticast mode [ 1330.934230][T21710] batadv0: left promiscuous mode [ 1330.996357][T21710] bridge0: port 3(batadv0) entered disabled state [ 1331.056890][T21710] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1331.092504][T21710] batadv0: entered promiscuous mode [ 1331.108983][T21710] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1331.128225][T21711] netlink: 144 bytes leftover after parsing attributes in process `syz.4.4186'. [ 1331.146363][T21712] netlink: 144 bytes leftover after parsing attributes in process `syz.8.4187'. [ 1331.244779][T21706] netlink: 'syz.4.4186': attribute type 10 has an invalid length. [ 1331.286234][T21706] netlink: 40 bytes leftover after parsing attributes in process `syz.4.4186'. [ 1331.340025][T21706] batadv0: entered allmulticast mode [ 1331.415397][T21706] bond0: (slave batadv0): Releasing backup interface [ 1331.463272][T21706] A link change request failed with some changes committed already. Interface batadv0 may have been left with an inconsistent configuration, please check. [ 1331.504822][T21714] netlink: 'syz.8.4187': attribute type 10 has an invalid length. [ 1331.546103][T21714] netlink: 40 bytes leftover after parsing attributes in process `syz.8.4187'. [ 1331.575615][T21714] batadv0: entered allmulticast mode [ 1331.599353][T21714] bond0: (slave batadv0): Releasing backup interface [ 1331.710841][T21714] bridge0: port 3(batadv0) entered blocking state [ 1331.736711][T21714] bridge0: port 3(batadv0) entered disabled state [ 1331.754991][T21727] netlink: 'syz.9.4190': attribute type 10 has an invalid length. [ 1331.772622][T21727] netlink: 2 bytes leftover after parsing attributes in process `syz.9.4190'. [ 1331.796274][T21727] bond0: entered promiscuous mode [ 1331.821551][T21727] bond_slave_0: entered promiscuous mode [ 1331.842873][T21727] bond_slave_1: entered promiscuous mode [ 1331.853317][T21727] bridge0: port 4(bond0) entered blocking state [ 1331.860755][T21727] bridge0: port 4(bond0) entered disabled state [ 1331.902399][T21727] bond0: entered allmulticast mode [ 1331.936096][T21727] bond_slave_0: entered allmulticast mode [ 1331.967068][T21727] bond_slave_1: entered allmulticast mode [ 1331.986225][T21727] bridge0: port 4(bond0) entered blocking state [ 1331.992682][T21727] bridge0: port 4(bond0) entered forwarding state [ 1332.032960][T21733] netlink: 'syz.4.4192': attribute type 10 has an invalid length. [ 1332.211806][ T1092] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 1332.221408][ T1092] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 1333.654516][T21781] netlink: 'syz.9.4202': attribute type 10 has an invalid length. [ 1333.671805][T21781] batadv0: left allmulticast mode [ 1333.678486][T21781] batadv0: left promiscuous mode [ 1333.683957][T21781] bridge0: port 3(batadv0) entered disabled state [ 1333.712848][T21781] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1333.744246][T21781] batadv0: entered promiscuous mode [ 1333.760477][T21781] batadv0: entered allmulticast mode [ 1333.784346][T21781] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1333.818153][T21782] netlink: 'syz.8.4201': attribute type 10 has an invalid length. [ 1333.859384][T21782] batadv0: left allmulticast mode [ 1333.864534][T21782] batadv0: left promiscuous mode [ 1333.891377][T21782] bridge0: port 3(batadv0) entered disabled state [ 1333.934483][T21782] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1333.954851][T21782] batadv0: entered promiscuous mode [ 1333.965178][T21782] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1333.982349][T21784] netlink: 144 bytes leftover after parsing attributes in process `syz.8.4201'. [ 1334.006264][T21785] netlink: 144 bytes leftover after parsing attributes in process `syz.9.4202'. [ 1334.052824][T21787] netlink: 'syz.8.4201': attribute type 10 has an invalid length. [ 1334.084217][T21787] netlink: 40 bytes leftover after parsing attributes in process `syz.8.4201'. [ 1334.104770][T21787] batadv0: entered allmulticast mode [ 1334.127534][T21787] bond0: (slave batadv0): Releasing backup interface [ 1334.171802][T21787] bridge0: port 3(batadv0) entered blocking state [ 1334.192035][T21787] bridge0: port 3(batadv0) entered disabled state [ 1334.217339][T21781] netlink: 'syz.9.4202': attribute type 10 has an invalid length. [ 1334.231032][T21781] netlink: 40 bytes leftover after parsing attributes in process `syz.9.4202'. [ 1334.300094][T21781] bond0: (slave batadv0): Releasing backup interface [ 1334.329490][T21781] bridge0: port 3(batadv0) entered blocking state [ 1334.346873][T21781] bridge0: port 3(batadv0) entered disabled state [ 1334.590492][T17063] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 1334.600313][T17063] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 1335.181619][T21810] netlink: 830 bytes leftover after parsing attributes in process `syz.9.4210'. [ 1335.981602][T21832] netlink: 'syz.4.4215': attribute type 10 has an invalid length. [ 1335.989772][T21832] batadv0: left promiscuous mode [ 1336.000183][T21832] batadv0: left allmulticast mode [ 1336.023699][T21832] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1336.040750][T21832] batadv0: entered promiscuous mode [ 1336.067202][T21832] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1336.116844][T21832] netlink: 'syz.4.4215': attribute type 10 has an invalid length. [ 1336.165735][T21832] __nla_validate_parse: 5 callbacks suppressed [ 1336.165756][T21832] netlink: 40 bytes leftover after parsing attributes in process `syz.4.4215'. [ 1336.253901][T21832] batadv0: entered allmulticast mode [ 1336.313267][T21832] bond0: (slave batadv0): Releasing backup interface [ 1336.360747][T21832] A link change request failed with some changes committed already. Interface batadv0 may have been left with an inconsistent configuration, please check. [ 1336.873610][T21848] netlink: 1047 bytes leftover after parsing attributes in process `syz.8.4219'. [ 1336.896975][T21848] bridge_slave_1: default FDB implementation only supports local addresses [ 1337.446318][T21852] netlink: 14 bytes leftover after parsing attributes in process `syz.8.4219'. [ 1338.230684][T21872] netlink: 16278 bytes leftover after parsing attributes in process `syz.9.4225'. [ 1338.737411][T21889] FAULT_INJECTION: forcing a failure. [ 1338.737411][T21889] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1338.750718][T21889] CPU: 0 PID: 21889 Comm: syz.9.4228 Not tainted syzkaller #0 [ 1338.758422][T21889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1338.768613][T21889] Call Trace: [ 1338.771933][T21889] [ 1338.774918][T21889] dump_stack_lvl+0x18c/0x250 [ 1338.779670][T21889] ? show_regs_print_info+0x20/0x20 [ 1338.784936][T21889] ? load_image+0x420/0x420 [ 1338.789512][T21889] ? __might_fault+0xaa/0x120 [ 1338.794237][T21889] ? __lock_acquire+0x7d40/0x7d40 [ 1338.799317][T21889] should_fail_ex+0x39d/0x4d0 [ 1338.804068][T21889] _copy_from_user+0x2f/0xe0 [ 1338.808715][T21889] generic_map_update_batch+0x54b/0x810 [ 1338.814331][T21889] ? rcu_read_unlock+0xa0/0xa0 [ 1338.819148][T21889] ? __fdget+0x180/0x210 [ 1338.823452][T21889] ? rcu_read_unlock+0xa0/0xa0 [ 1338.828261][T21889] bpf_map_do_batch+0x3d7/0x610 [ 1338.833163][T21889] __sys_bpf+0x381/0x890 [ 1338.837467][T21889] ? bpf_link_show_fdinfo+0x390/0x390 [ 1338.842913][T21889] ? lock_chain_count+0x20/0x20 [ 1338.847826][T21889] __x64_sys_bpf+0x7c/0x90 [ 1338.852290][T21889] do_syscall_64+0x55/0xa0 [ 1338.856750][T21889] ? clear_bhb_loop+0x40/0x90 [ 1338.861472][T21889] ? clear_bhb_loop+0x40/0x90 [ 1338.866207][T21889] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1338.872154][T21889] RIP: 0033:0x7f7c6739c819 [ 1338.876627][T21889] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1338.896279][T21889] RSP: 002b:00007f7c68320028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1338.904751][T21889] RAX: ffffffffffffffda RBX: 00007f7c67615fa0 RCX: 00007f7c6739c819 [ 1338.913290][T21889] RDX: 0000000000000038 RSI: 0000200000000140 RDI: 000000000000001a [ 1338.921306][T21889] RBP: 00007f7c68320090 R08: 0000000000000000 R09: 0000000000000000 [ 1338.929321][T21889] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1338.937339][T21889] R13: 00007f7c67616038 R14: 00007f7c67615fa0 R15: 00007ffdc01c06e8 [ 1338.945383][T21889] [ 1339.444285][T21917] netlink: 'syz.7.4231': attribute type 10 has an invalid length. [ 1339.461199][T21917] batadv0: left allmulticast mode [ 1339.467829][T21917] batadv0: left promiscuous mode [ 1339.492879][T21917] bridge0: port 3(batadv0) entered disabled state [ 1339.591383][T21917] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1339.778897][T21917] batadv0: entered promiscuous mode [ 1339.819008][T21917] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1339.892853][T21918] netlink: 144 bytes leftover after parsing attributes in process `syz.7.4231'. [ 1339.957427][T21923] FAULT_INJECTION: forcing a failure. [ 1339.957427][T21923] name failslab, interval 1, probability 0, space 0, times 0 [ 1339.976558][T21921] netlink: 'syz.7.4231': attribute type 10 has an invalid length. [ 1339.984476][T21921] netlink: 40 bytes leftover after parsing attributes in process `syz.7.4231'. [ 1340.010686][T21923] CPU: 1 PID: 21923 Comm: syz.8.4235 Not tainted syzkaller #0 [ 1340.016750][T21921] batadv0: entered allmulticast mode [ 1340.018245][T21923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1340.018267][T21923] Call Trace: [ 1340.018281][T21923] [ 1340.018295][T21923] dump_stack_lvl+0x18c/0x250 [ 1340.044817][T21923] ? show_regs_print_info+0x20/0x20 [ 1340.050118][T21923] ? load_image+0x420/0x420 [ 1340.054758][T21923] ? __might_sleep+0xe0/0xe0 [ 1340.059443][T21923] ? __lock_acquire+0x7d40/0x7d40 [ 1340.064574][T21923] should_fail_ex+0x39d/0x4d0 [ 1340.069362][T21923] should_failslab+0x9/0x20 [ 1340.073952][T21923] slab_pre_alloc_hook+0x59/0x310 [ 1340.079066][T21923] ? __get_vm_area_node+0x125/0x370 [ 1340.084374][T21923] __kmem_cache_alloc_node+0x53/0x250 [ 1340.089858][T21923] ? __get_vm_area_node+0x125/0x370 [ 1340.095166][T21923] kmalloc_node_trace+0x26/0xe0 [ 1340.100120][T21923] __get_vm_area_node+0x125/0x370 [ 1340.105259][T21923] __vmalloc_node_range+0x36e/0x1330 [ 1340.110631][T21923] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 1340.116356][T21923] ? __lock_acquire+0x7d40/0x7d40 [ 1340.121468][T21923] ? mark_lock+0x94/0x320 [ 1340.125936][T21923] ? trace_call_bpf+0xc3/0x6c0 [ 1340.130813][T21923] ? free_vm_area+0x50/0x50 [ 1340.135492][T21923] ? end_current_label_crit_section+0x170/0x170 [ 1340.141834][T21923] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 1340.147464][T21923] __vmalloc+0x7a/0x90 [ 1340.151616][T21923] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 1340.157339][T21923] bpf_prog_alloc_no_stats+0x47/0x440 [ 1340.162793][T21923] ? bpf_prog_alloc+0x2b/0x1a0 [ 1340.167642][T21923] bpf_prog_alloc+0x3d/0x1a0 [ 1340.172322][T21923] bpf_prog_load+0x6eb/0x1670 [ 1340.177118][T21923] ? map_freeze+0x420/0x420 [ 1340.181817][T21923] ? __might_fault+0xaa/0x120 [ 1340.186582][T21923] ? __lock_acquire+0x7d40/0x7d40 [ 1340.191687][T21923] ? file_end_write+0x159/0x250 [ 1340.196617][T21923] ? __might_fault+0xaa/0x120 [ 1340.201350][T21923] ? __might_fault+0xc6/0x120 [ 1340.206077][T21923] ? __might_fault+0xaa/0x120 [ 1340.210806][T21923] ? bpf_lsm_bpf+0x9/0x10 [ 1340.215195][T21923] ? security_bpf+0x7e/0xa0 [ 1340.219764][T21923] __sys_bpf+0x5ba/0x890 [ 1340.224065][T21923] ? bpf_link_show_fdinfo+0x390/0x390 [ 1340.229519][T21923] ? lock_chain_count+0x20/0x20 [ 1340.234442][T21923] __x64_sys_bpf+0x7c/0x90 [ 1340.238905][T21923] do_syscall_64+0x55/0xa0 [ 1340.243367][T21923] ? clear_bhb_loop+0x40/0x90 [ 1340.248102][T21923] ? clear_bhb_loop+0x40/0x90 [ 1340.252857][T21923] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1340.258889][T21923] RIP: 0033:0x7f19b2f9c819 [ 1340.263356][T21923] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1340.283107][T21923] RSP: 002b:00007f19b3ea0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1340.291581][T21923] RAX: ffffffffffffffda RBX: 00007f19b3215fa0 RCX: 00007f19b2f9c819 [ 1340.299598][T21923] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 1340.307798][T21923] RBP: 00007f19b3ea0090 R08: 0000000000000000 R09: 0000000000000000 [ 1340.315821][T21923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1340.323846][T21923] R13: 00007f19b3216038 R14: 00007f19b3215fa0 R15: 00007ffd33ad88e8 [ 1340.331983][T21923] [ 1340.340807][T21921] bond0: (slave batadv0): Releasing backup interface [ 1340.344207][T21923] syz.8.4235: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz8,mems_allowed=0-1 [ 1340.365583][T21923] CPU: 1 PID: 21923 Comm: syz.8.4235 Not tainted syzkaller #0 [ 1340.373272][T21923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1340.383372][T21923] Call Trace: [ 1340.386695][T21923] [ 1340.389655][T21923] dump_stack_lvl+0x18c/0x250 [ 1340.394352][T21923] ? show_regs_print_info+0x20/0x20 [ 1340.399594][T21923] ? load_image+0x420/0x420 [ 1340.404135][T21923] ? cpuset_print_current_mems_allowed+0x1f/0x360 [ 1340.410570][T21923] ? cpuset_print_current_mems_allowed+0x2e7/0x360 [ 1340.417098][T21923] warn_alloc+0x246/0x340 [ 1340.421545][T21923] ? __get_vm_area_node+0x125/0x370 [ 1340.426777][T21923] ? zone_watermark_ok_safe+0x230/0x230 [ 1340.432349][T21923] ? rcu_is_watching+0x15/0xb0 [ 1340.437139][T21923] ? __get_vm_area_node+0x356/0x370 [ 1340.442370][T21923] __vmalloc_node_range+0x393/0x1330 [ 1340.447683][T21923] ? __lock_acquire+0x7d40/0x7d40 [ 1340.452724][T21923] ? mark_lock+0x94/0x320 [ 1340.457089][T21923] ? trace_call_bpf+0xc3/0x6c0 [ 1340.461883][T21923] ? free_vm_area+0x50/0x50 [ 1340.466407][T21923] ? end_current_label_crit_section+0x170/0x170 [ 1340.472677][T21923] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 1340.478328][T21923] __vmalloc+0x7a/0x90 [ 1340.482419][T21923] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 1340.487982][T21923] bpf_prog_alloc_no_stats+0x47/0x440 [ 1340.493373][T21923] ? bpf_prog_alloc+0x2b/0x1a0 [ 1340.498162][T21923] bpf_prog_alloc+0x3d/0x1a0 [ 1340.502780][T21923] bpf_prog_load+0x6eb/0x1670 [ 1340.507490][T21923] ? map_freeze+0x420/0x420 [ 1340.512020][T21923] ? __might_fault+0xaa/0x120 [ 1340.516806][T21923] ? __lock_acquire+0x7d40/0x7d40 [ 1340.521860][T21923] ? file_end_write+0x159/0x250 [ 1340.526740][T21923] ? __might_fault+0xaa/0x120 [ 1340.531438][T21923] ? __might_fault+0xc6/0x120 [ 1340.536142][T21923] ? __might_fault+0xaa/0x120 [ 1340.541019][T21923] ? bpf_lsm_bpf+0x9/0x10 [ 1340.545383][T21923] ? security_bpf+0x7e/0xa0 [ 1340.549911][T21923] __sys_bpf+0x5ba/0x890 [ 1340.554180][T21923] ? bpf_link_show_fdinfo+0x390/0x390 [ 1340.559589][T21923] ? lock_chain_count+0x20/0x20 [ 1340.564473][T21923] __x64_sys_bpf+0x7c/0x90 [ 1340.568912][T21923] do_syscall_64+0x55/0xa0 [ 1340.573353][T21923] ? clear_bhb_loop+0x40/0x90 [ 1340.578056][T21923] ? clear_bhb_loop+0x40/0x90 [ 1340.582756][T21923] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1340.588670][T21923] RIP: 0033:0x7f19b2f9c819 [ 1340.593133][T21923] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1340.612788][T21923] RSP: 002b:00007f19b3ea0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1340.621239][T21923] RAX: ffffffffffffffda RBX: 00007f19b3215fa0 RCX: 00007f19b2f9c819 [ 1340.629320][T21923] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 1340.637328][T21923] RBP: 00007f19b3ea0090 R08: 0000000000000000 R09: 0000000000000000 [ 1340.645320][T21923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1340.653307][T21923] R13: 00007f19b3216038 R14: 00007f19b3215fa0 R15: 00007ffd33ad88e8 [ 1340.661316][T21923] [ 1340.689738][T21921] bridge0: port 3(batadv0) entered blocking state [ 1340.699388][T21921] bridge0: port 3(batadv0) entered disabled state [ 1340.713217][T21923] Mem-Info: [ 1340.718203][T21923] active_anon:10561 inactive_anon:0 isolated_anon:0 [ 1340.718203][T21923] active_file:21246 inactive_file:40419 isolated_file:0 [ 1340.718203][T21923] unevictable:768 dirty:118 writeback:0 [ 1340.718203][T21923] slab_reclaimable:11059 slab_unreclaimable:97535 [ 1340.718203][T21923] mapped:26129 shmem:1433 pagetables:1066 [ 1340.718203][T21923] sec_pagetables:0 bounce:0 [ 1340.718203][T21923] kernel_misc_reclaimable:0 [ 1340.718203][T21923] free:1329531 free_pcp:10868 free_cma:0 [ 1340.901338][ T3451] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 1340.910675][ T3451] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 1341.021751][T21923] Node 0 active_anon:42244kB inactive_anon:0kB active_file:84984kB inactive_file:161476kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:100416kB dirty:472kB writeback:0kB shmem:4196kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:11980kB pagetables:4164kB sec_pagetables:0kB all_unreclaimable? no [ 1341.132032][T21923] Node 1 active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:200kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:1536kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:16kB pagetables:0kB sec_pagetables:0kB all_unreclaimable? no [ 1341.216964][T21923] Node 0 DMA free:15360kB boost:0kB min:204kB low:252kB high:300kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1341.300848][T21923] lowmem_reserve[]: 0 2521 2522 2522 2522 [ 1341.307533][T21923] Node 0 DMA32 free:1409272kB boost:0kB min:34644kB low:43304kB high:51964kB reserved_highatomic:0KB active_anon:42564kB inactive_anon:0kB active_file:84984kB inactive_file:160656kB unevictable:1536kB writepending:492kB present:3129332kB managed:2586952kB mlocked:0kB bounce:0kB free_pcp:21352kB local_pcp:15456kB free_cma:0kB [ 1341.357130][T21923] lowmem_reserve[]: 0 0 0 0 0 [ 1341.363349][T21923] Node 0 Normal free:0kB boost:0kB min:8kB low:8kB high:8kB reserved_highatomic:0KB active_anon:44kB inactive_anon:0kB active_file:0kB inactive_file:820kB unevictable:0kB writepending:0kB present:1048576kB managed:872kB mlocked:0kB bounce:0kB free_pcp:8kB local_pcp:8kB free_cma:0kB [ 1341.366146][T21939] netlink: 'syz.9.4239': attribute type 10 has an invalid length. [ 1341.406939][T21939] batadv0: left allmulticast mode [ 1341.426892][T21939] batadv0: left promiscuous mode [ 1341.436770][T21923] lowmem_reserve[]: 0 0 0 0 0 [ 1341.443035][T21939] bridge0: port 3(batadv0) entered disabled state [ 1341.471902][T21923] Node 1 Normal free:3893048kB boost:0kB min:55244kB low:69052kB high:82860kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:200kB unevictable:1536kB writepending:0kB present:4194304kB managed:4117312kB mlocked:0kB bounce:0kB free_pcp:20840kB local_pcp:9216kB free_cma:0kB [ 1341.530474][T21939] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1341.583117][T21923] lowmem_reserve[]: 0 0 0 0 0 [ 1341.587645][T21939] batadv0: entered promiscuous mode [ 1341.588403][T21923] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 1341.617420][T21939] batadv0: entered allmulticast mode [ 1341.697240][T21939] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1341.734591][T21923] Node 0 DMA32: 1661*4kB (UM) 2787*8kB (UM) 1569*16kB (UME) 1235*32kB (UME) 570*64kB (UME) 280*128kB (UME) 119*256kB (UME) 52*512kB (UME) 24*1024kB (UME) 9*2048kB (UME) 279*4096kB (UM) = 1408764kB [ 1341.779808][T21923] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 1341.783550][T21941] netlink: 144 bytes leftover after parsing attributes in process `syz.9.4239'. [ 1341.814295][T21923] Node 1 Normal: 274*4kB (UME) 60*8kB (UME) 41*16kB (UME) 46*32kB (UME) 15*64kB (UE) 6*128kB (UME) 2*256kB (E) 2*512kB (ME) 1*1024kB (U) 1*2048kB (E) 948*4096kB (M) = 3893048kB [ 1341.814840][T21946] netlink: 'syz.9.4239': attribute type 10 has an invalid length. [ 1341.832971][T21923] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1341.851653][T21923] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 1341.861456][T21923] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1341.872816][T21923] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 1341.889571][T21923] 63098 total pagecache pages [ 1341.897043][T21946] netlink: 40 bytes leftover after parsing attributes in process `syz.9.4239'. [ 1341.899674][T21923] 0 pages in swap cache [ 1341.912445][T21946] bond0: (slave batadv0): Releasing backup interface [ 1341.938350][T21946] bridge0: port 3(batadv0) entered blocking state [ 1341.945370][T21923] Free swap = 124996kB [ 1341.955423][T21946] bridge0: port 3(batadv0) entered disabled state [ 1341.965713][T21923] Total swap = 124996kB [ 1341.989749][T21923] 2097051 pages RAM [ 1341.993630][T21923] 0 pages HighMem/MovableOnly [ 1342.007059][T21923] 416927 pages reserved [ 1342.011380][T21923] 0 pages cma reserved [ 1342.271508][T21961] netlink: 'syz.9.4243': attribute type 1 has an invalid length. [ 1342.305592][T21961] netlink: 193500 bytes leftover after parsing attributes in process `syz.9.4243'. [ 1343.347248][T21983] lo: left promiscuous mode [ 1343.352439][T21983] lo: entered allmulticast mode [ 1343.491535][T21983] lo: entered promiscuous mode [ 1343.536216][T21983] lo: left allmulticast mode [ 1344.181509][T22002] netlink: 'syz.9.4251': attribute type 10 has an invalid length. [ 1344.218875][T22002] batadv0: left allmulticast mode [ 1344.224020][T22002] batadv0: left promiscuous mode [ 1344.262389][T22002] bridge0: port 3(batadv0) entered disabled state [ 1344.322954][T22002] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1344.348388][T22002] batadv0: entered promiscuous mode [ 1344.375120][T22002] batadv0: entered allmulticast mode [ 1344.399666][T22002] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1344.409871][T22004] netlink: 144 bytes leftover after parsing attributes in process `syz.9.4251'. [ 1344.435794][T22011] netlink: 'syz.9.4251': attribute type 10 has an invalid length. [ 1344.461478][T22011] netlink: 40 bytes leftover after parsing attributes in process `syz.9.4251'. [ 1344.532810][T22011] bond0: (slave batadv0): Releasing backup interface [ 1344.584983][T22011] bridge0: port 3(batadv0) entered blocking state [ 1344.608316][T22011] bridge0: port 3(batadv0) entered disabled state [ 1345.210091][T22022] netlink: 14719 bytes leftover after parsing attributes in process `syz.4.4256'. [ 1346.487305][T22045] lo: left promiscuous mode [ 1346.491947][T22045] lo: entered allmulticast mode [ 1346.613247][T22045] lo: entered promiscuous mode [ 1346.636972][T22045] lo: left allmulticast mode [ 1347.203009][T22065] netlink: 'syz.7.4267': attribute type 10 has an invalid length. [ 1347.223325][T22065] batadv0: left allmulticast mode [ 1347.235037][T22065] batadv0: left promiscuous mode [ 1347.255197][T22065] bridge0: port 3(batadv0) entered disabled state [ 1347.368050][T22065] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1347.398590][T22065] batadv0: entered promiscuous mode [ 1347.423874][T22065] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1347.503040][T22065] netlink: 'syz.7.4267': attribute type 10 has an invalid length. [ 1347.552494][T22065] netlink: 40 bytes leftover after parsing attributes in process `syz.7.4267'. [ 1347.608742][T22065] batadv0: entered allmulticast mode [ 1347.647082][T22065] bond0: (slave batadv0): Releasing backup interface [ 1347.705637][T22065] bridge0: port 3(batadv0) entered blocking state [ 1347.717165][T22065] bridge0: port 3(batadv0) entered disabled state [ 1347.735651][T22069] netlink: 144 bytes leftover after parsing attributes in process `syz.7.4267'. [ 1348.016321][T20526] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 1348.025711][T20526] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 1348.228858][T22084] FAULT_INJECTION: forcing a failure. [ 1348.228858][T22084] name failslab, interval 1, probability 0, space 0, times 0 [ 1348.261522][T22084] CPU: 0 PID: 22084 Comm: syz.4.4271 Not tainted syzkaller #0 [ 1348.269091][T22084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1348.279205][T22084] Call Trace: [ 1348.282534][T22084] [ 1348.285689][T22084] dump_stack_lvl+0x18c/0x250 [ 1348.290425][T22084] ? sctp_sendmsg+0x1575/0x28c0 [ 1348.295323][T22084] ? ___sys_sendmsg+0x2a6/0x360 [ 1348.300237][T22084] ? show_regs_print_info+0x20/0x20 [ 1348.305491][T22084] ? load_image+0x420/0x420 [ 1348.310075][T22084] should_fail_ex+0x39d/0x4d0 [ 1348.314824][T22084] should_failslab+0x9/0x20 [ 1348.319395][T22084] slab_pre_alloc_hook+0x59/0x310 [ 1348.324485][T22084] ? sctp_add_bind_addr+0x8c/0x360 [ 1348.329654][T22084] __kmem_cache_alloc_node+0x53/0x250 [ 1348.335097][T22084] ? sctp_add_bind_addr+0x8c/0x360 [ 1348.340250][T22084] kmalloc_trace+0x2a/0xe0 [ 1348.344697][T22084] sctp_add_bind_addr+0x8c/0x360 [ 1348.349750][T22084] sctp_copy_local_addr_list+0x315/0x4f0 [ 1348.355407][T22084] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 1348.361186][T22084] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 1348.367280][T22084] ? sctp_v4_is_any+0x35/0x60 [ 1348.371973][T22084] ? sctp_copy_one_addr+0x8c/0x350 [ 1348.377112][T22084] sctp_bind_addr_copy+0xb3/0x3c0 [ 1348.382156][T22084] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 1348.388549][T22084] sctp_connect_new_asoc+0x2f9/0x6a0 [ 1348.393863][T22084] ? __sctp_connect+0xd80/0xd80 [ 1348.398727][T22084] ? __local_bh_enable_ip+0x13a/0x1c0 [ 1348.404116][T22084] ? _local_bh_enable+0xa0/0xa0 [ 1348.408980][T22084] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 1348.414800][T22084] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 1348.420627][T22084] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 1348.426197][T22084] ? security_sctp_bind_connect+0x89/0xb0 [ 1348.432021][T22084] sctp_sendmsg+0x1575/0x28c0 [ 1348.436728][T22084] ? sctp_getsockopt+0xb60/0xb60 [ 1348.441684][T22084] ? aa_sk_perm+0x83c/0x970 [ 1348.446219][T22084] ? aa_af_perm+0x330/0x330 [ 1348.450738][T22084] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 1348.457172][T22084] ? sock_rps_record_flow+0x19/0x3f0 [ 1348.462489][T22084] ? inet_sendmsg+0x7c/0x2f0 [ 1348.467098][T22084] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 1348.472412][T22084] ? security_socket_sendmsg+0x80/0xa0 [ 1348.477887][T22084] ? inet_send_prepare+0x260/0x260 [ 1348.483027][T22084] ____sys_sendmsg+0x5ba/0x960 [ 1348.487807][T22084] ? __lock_acquire+0x7d40/0x7d40 [ 1348.492863][T22084] ? __asan_memset+0x22/0x40 [ 1348.497484][T22084] ? __sys_sendmsg_sock+0x30/0x30 [ 1348.502521][T22084] ? __import_iovec+0x5f2/0x850 [ 1348.507395][T22084] ? import_iovec+0x73/0xa0 [ 1348.511919][T22084] ___sys_sendmsg+0x2a6/0x360 [ 1348.516617][T22084] ? __sys_sendmsg+0x2a0/0x2a0 [ 1348.521417][T22084] ? __lock_acquire+0x7d40/0x7d40 [ 1348.526483][T22084] __se_sys_sendmsg+0x1c2/0x2b0 [ 1348.531356][T22084] ? __x64_sys_sendmsg+0x80/0x80 [ 1348.536325][T22084] ? lockdep_hardirqs_on+0x98/0x150 [ 1348.541542][T22084] do_syscall_64+0x55/0xa0 [ 1348.545970][T22084] ? clear_bhb_loop+0x40/0x90 [ 1348.550668][T22084] ? clear_bhb_loop+0x40/0x90 [ 1348.555365][T22084] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1348.561276][T22084] RIP: 0033:0x7f991619c819 [ 1348.565708][T22084] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1348.585333][T22084] RSP: 002b:00007f99170b5028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1348.593764][T22084] RAX: ffffffffffffffda RBX: 00007f9916416090 RCX: 00007f991619c819 [ 1348.601750][T22084] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000003 [ 1348.609738][T22084] RBP: 00007f99170b5090 R08: 0000000000000000 R09: 0000000000000000 [ 1348.617723][T22084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1348.625705][T22084] R13: 00007f9916416128 R14: 00007f9916416090 R15: 00007ffdaf3333d8 [ 1348.633801][T22084] [ 1348.689460][ T5778] Bluetooth: hci3: command 0x0406 tx timeout [ 1349.954479][T22103] lo: left promiscuous mode [ 1349.968941][T22103] lo: entered allmulticast mode [ 1350.128078][T22103] lo: entered promiscuous mode [ 1350.132967][T22103] lo: left allmulticast mode [ 1350.789500][T22114] netlink: 830 bytes leftover after parsing attributes in process `syz.8.4280'. [ 1350.922369][T22120] netlink: 'syz.4.4281': attribute type 10 has an invalid length. [ 1350.932480][T22120] batadv0: left promiscuous mode [ 1350.941423][T22120] batadv0: left allmulticast mode [ 1350.953385][T22120] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1350.964937][T22120] batadv0: entered promiscuous mode [ 1350.971369][T22120] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1351.003722][T22120] netlink: 144 bytes leftover after parsing attributes in process `syz.4.4281'. [ 1351.048995][T22120] netlink: 'syz.4.4281': attribute type 10 has an invalid length. [ 1351.074313][T22120] netlink: 40 bytes leftover after parsing attributes in process `syz.4.4281'. [ 1351.096106][T22120] batadv0: entered allmulticast mode [ 1351.132869][T22120] bond0: (slave batadv0): Releasing backup interface [ 1351.219916][T22120] A link change request failed with some changes committed already. Interface batadv0 may have been left with an inconsistent configuration, please check. [ 1352.146929][T22144] lo: left promiscuous mode [ 1352.166718][T22144] lo: entered allmulticast mode [ 1352.249655][T22144] lo: entered promiscuous mode [ 1352.274038][T22144] lo: left allmulticast mode [ 1352.451674][T22150] FAULT_INJECTION: forcing a failure. [ 1352.451674][T22150] name failslab, interval 1, probability 0, space 0, times 0 [ 1352.465016][T22150] CPU: 1 PID: 22150 Comm: syz.9.4291 Not tainted syzkaller #0 [ 1352.472545][T22150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1352.482665][T22150] Call Trace: [ 1352.486006][T22150] [ 1352.488998][T22150] dump_stack_lvl+0x18c/0x250 [ 1352.493770][T22150] ? tipc_sendmsg+0x55/0x70 [ 1352.498348][T22150] ? ___sys_sendmsg+0x2a6/0x360 [ 1352.503262][T22150] ? show_regs_print_info+0x20/0x20 [ 1352.508525][T22150] ? load_image+0x420/0x420 [ 1352.513270][T22150] should_fail_ex+0x39d/0x4d0 [ 1352.518071][T22150] should_failslab+0x9/0x20 [ 1352.522640][T22150] slab_pre_alloc_hook+0x59/0x310 [ 1352.527919][T22150] ? tipc_nametbl_lookup_group+0x78a/0xc10 [ 1352.533775][T22150] __kmem_cache_alloc_node+0x53/0x250 [ 1352.539226][T22150] ? tipc_nametbl_lookup_group+0x78a/0xc10 [ 1352.545080][T22150] kmalloc_trace+0x2a/0xe0 [ 1352.549558][T22150] tipc_nametbl_lookup_group+0x78a/0xc10 [ 1352.555295][T22150] ? tipc_nametbl_lookup_group+0xac/0xc10 [ 1352.561066][T22150] __tipc_sendmsg+0x152d/0x2bb0 [ 1352.566041][T22150] ? rht_unlock+0x1d0/0x1d0 [ 1352.570627][T22150] ? perf_trace_run_bpf_submit+0x125/0x1c0 [ 1352.576493][T22150] ? verify_lock_unused+0x140/0x140 [ 1352.581776][T22150] ? perf_trace_run_bpf_submit+0xf4/0x1c0 [ 1352.587589][T22150] ? mark_lock+0x94/0x320 [ 1352.591971][T22150] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 1352.598049][T22150] ? __local_bh_enable_ip+0x13a/0x1c0 [ 1352.603462][T22150] ? lockdep_hardirqs_on+0x98/0x150 [ 1352.608708][T22150] ? __local_bh_enable_ip+0x13a/0x1c0 [ 1352.614210][T22150] ? _local_bh_enable+0xa0/0xa0 [ 1352.619171][T22150] tipc_sendmsg+0x55/0x70 [ 1352.623564][T22150] ? tipc_recvmsg+0x1400/0x1400 [ 1352.628502][T22150] ____sys_sendmsg+0x5ba/0x960 [ 1352.633332][T22150] ? __lock_acquire+0x7d40/0x7d40 [ 1352.638444][T22150] ? __asan_memset+0x22/0x40 [ 1352.643187][T22150] ? __sys_sendmsg_sock+0x30/0x30 [ 1352.648277][T22150] ? __import_iovec+0x3fa/0x850 [ 1352.653219][T22150] ? import_iovec+0x73/0xa0 [ 1352.657794][T22150] ___sys_sendmsg+0x2a6/0x360 [ 1352.662531][T22150] ? get_pid_task+0x20/0x1e0 [ 1352.667330][T22150] ? __sys_sendmsg+0x2a0/0x2a0 [ 1352.672204][T22150] ? __lock_acquire+0x7d40/0x7d40 [ 1352.677393][T22150] __se_sys_sendmsg+0x1c2/0x2b0 [ 1352.682313][T22150] ? __x64_sys_sendmsg+0x80/0x80 [ 1352.687360][T22150] ? lockdep_hardirqs_on+0x98/0x150 [ 1352.692644][T22150] do_syscall_64+0x55/0xa0 [ 1352.697126][T22150] ? clear_bhb_loop+0x40/0x90 [ 1352.701867][T22150] ? clear_bhb_loop+0x40/0x90 [ 1352.706619][T22150] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1352.712647][T22150] RIP: 0033:0x7f7c6739c819 [ 1352.717131][T22150] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1352.736862][T22150] RSP: 002b:00007f7c68320028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1352.745335][T22150] RAX: ffffffffffffffda RBX: 00007f7c67615fa0 RCX: 00007f7c6739c819 [ 1352.753351][T22150] RDX: 0000000000000000 RSI: 0000200000000100 RDI: 0000000000000005 [ 1352.761398][T22150] RBP: 00007f7c68320090 R08: 0000000000000000 R09: 0000000000000000 [ 1352.769421][T22150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1352.777445][T22150] R13: 00007f7c67616038 R14: 00007f7c67615fa0 R15: 00007ffdc01c06e8 [ 1352.785521][T22150] [ 1352.908093][T22154] bridge0: entered promiscuous mode [ 1352.913847][T22154] bridge0: entered allmulticast mode [ 1353.180136][T22162] netlink: 'syz.9.4297': attribute type 29 has an invalid length. [ 1353.189050][T22162] netlink: 'syz.9.4297': attribute type 29 has an invalid length. [ 1353.199985][T22162] netlink: 'syz.9.4297': attribute type 29 has an invalid length. [ 1353.447559][T22167] netlink: 129384 bytes leftover after parsing attributes in process `syz.8.4299'. [ 1353.476958][T22170] netlink: 'syz.9.4298': attribute type 10 has an invalid length. [ 1353.485091][T22170] batadv0: left allmulticast mode [ 1353.506261][T22170] batadv0: left promiscuous mode [ 1353.511518][T22170] bridge0: port 3(batadv0) entered disabled state [ 1353.586186][T22170] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1353.631717][T22170] batadv0: entered promiscuous mode [ 1353.661859][T22170] batadv0: entered allmulticast mode [ 1353.753635][T22170] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1353.783980][T22173] netlink: 144 bytes leftover after parsing attributes in process `syz.9.4298'. [ 1353.885176][T22170] netlink: 'syz.9.4298': attribute type 10 has an invalid length. [ 1353.910164][T22170] netlink: 40 bytes leftover after parsing attributes in process `syz.9.4298'. [ 1353.955516][T22170] bond0: (slave batadv0): Releasing backup interface [ 1354.065470][T22170] bridge0: port 3(batadv0) entered blocking state [ 1354.082217][T22170] bridge0: port 3(batadv0) entered disabled state [ 1354.327016][T22185] lo: entered allmulticast mode [ 1354.413087][T22185] lo: entered promiscuous mode [ 1354.441808][T22185] lo: left allmulticast mode [ 1355.283063][T22195] netlink: 156 bytes leftover after parsing attributes in process `syz.7.4309'. [ 1355.327802][T22198] netlink: 129384 bytes leftover after parsing attributes in process `syz.8.4310'. [ 1355.807282][T22216] netlink: 'syz.7.4314': attribute type 10 has an invalid length. [ 1355.828718][T22216] batadv0: left allmulticast mode [ 1355.833851][T22216] batadv0: left promiscuous mode [ 1355.842415][T22216] bridge0: port 3(batadv0) entered disabled state [ 1355.875828][T22216] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1355.887458][T22216] batadv0: entered promiscuous mode [ 1355.910690][T22216] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1355.958436][T22219] netlink: 144 bytes leftover after parsing attributes in process `syz.7.4314'. [ 1356.156832][T22216] netlink: 'syz.7.4314': attribute type 10 has an invalid length. [ 1356.198332][T22216] netlink: 40 bytes leftover after parsing attributes in process `syz.7.4314'. [ 1356.226209][T22216] batadv0: entered allmulticast mode [ 1356.283215][T22216] bond0: (slave batadv0): Releasing backup interface [ 1356.469932][T22216] bridge0: port 3(batadv0) entered blocking state [ 1356.528804][T22216] bridge0: port 3(batadv0) entered disabled state [ 1356.617019][T22224] lo: entered allmulticast mode [ 1356.686617][T22225] lo: entered promiscuous mode [ 1356.702922][T22225] lo: left allmulticast mode [ 1356.836088][ T61] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 1356.845512][ T61] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 1356.953196][T22233] netlink: 129384 bytes leftover after parsing attributes in process `syz.4.4321'. [ 1357.223709][T22246] netlink: 'syz.9.4326': attribute type 46 has an invalid length. [ 1357.256516][T22246] netlink: 2 bytes leftover after parsing attributes in process `syz.9.4326'. [ 1357.503033][T22255] netlink: 'syz.8.4330': attribute type 10 has an invalid length. [ 1357.522635][T22255] batadv0: left allmulticast mode [ 1357.532054][T22255] batadv0: left promiscuous mode [ 1357.549607][T22255] bridge0: port 3(batadv0) entered disabled state [ 1357.644530][T22255] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1357.668202][T22255] batadv0: entered promiscuous mode [ 1357.728941][T22255] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1357.746173][T22259] netlink: 144 bytes leftover after parsing attributes in process `syz.8.4330'. [ 1358.071972][T22255] netlink: 'syz.8.4330': attribute type 10 has an invalid length. [ 1358.083714][T22255] batadv0: entered allmulticast mode [ 1358.102655][T22255] bond0: (slave batadv0): Releasing backup interface [ 1358.149772][T22255] bridge0: port 3(batadv0) entered blocking state [ 1358.160692][T22255] bridge0: port 3(batadv0) entered disabled state [ 1358.189532][T22264] netlink: 'syz.9.4332': attribute type 10 has an invalid length. [ 1358.206816][T22264] batadv0: left allmulticast mode [ 1358.219842][T22264] batadv0: left promiscuous mode [ 1358.241111][T22264] bridge0: port 3(batadv0) entered disabled state [ 1358.267099][T22264] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1358.288362][T22264] batadv0: entered promiscuous mode [ 1358.294954][T22264] batadv0: entered allmulticast mode [ 1358.319506][T22264] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1358.435379][T22268] netlink: 'syz.9.4332': attribute type 10 has an invalid length. [ 1358.470564][T22268] __nla_validate_parse: 3 callbacks suppressed [ 1358.470586][T22268] netlink: 40 bytes leftover after parsing attributes in process `syz.9.4332'. [ 1358.530089][ T11] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 1358.540399][ T11] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 1358.570805][T22268] bond0: (slave batadv0): Releasing backup interface [ 1358.658151][T22268] bridge0: port 3(batadv0) entered blocking state [ 1358.688930][T22268] bridge0: port 3(batadv0) entered disabled state [ 1358.861644][T22276] lo: left promiscuous mode [ 1358.876275][T22276] lo: entered allmulticast mode [ 1358.928613][T22276] lo: entered promiscuous mode [ 1358.945391][T22276] lo: left allmulticast mode [ 1358.969535][T22277] netlink: 'syz.7.4336': attribute type 49 has an invalid length. [ 1359.293010][T22274] syzkaller0: entered promiscuous mode [ 1359.322966][T22274] syzkaller0: entered allmulticast mode [ 1359.360341][T22277] netlink: 'syz.7.4336': attribute type 49 has an invalid length. [ 1361.974512][ T1291] ieee802154 phy0 wpan0: encryption failed: -22 [ 1361.981151][ T1291] ieee802154 phy1 wpan1: encryption failed: -22 [ 1362.367787][T22313] netlink: 'syz.4.4348': attribute type 10 has an invalid length. [ 1362.479615][T22313] 8021q: adding VLAN 0 to HW filter on device team0 [ 1362.495420][T22313] team0: entered promiscuous mode [ 1362.501502][T22313] C: entered promiscuous mode [ 1362.507964][T22313] team_slave_1: entered promiscuous mode [ 1362.521195][T22313] bond0: (slave team0): Enslaving as an active interface with an up link [ 1362.649649][T22322] lo: left promiscuous mode [ 1362.675271][T22322] lo: entered allmulticast mode [ 1362.771702][T22322] lo: entered promiscuous mode [ 1362.787017][T22322] lo: left allmulticast mode [ 1364.855437][T22356] tap0: tun_chr_ioctl cmd 1074025677 [ 1364.867365][T22356] tap0: linktype set to 825 [ 1365.114375][T22363] netlink: 60 bytes leftover after parsing attributes in process `syz.9.4364'. [ 1365.126032][T22363] netlink: 60 bytes leftover after parsing attributes in process `syz.9.4364'. [ 1365.152656][T22363] netlink: 60 bytes leftover after parsing attributes in process `syz.9.4364'. [ 1365.178827][T22363] netlink: 60 bytes leftover after parsing attributes in process `syz.9.4364'. [ 1365.336558][T22369] lo: left promiscuous mode [ 1365.341213][T22369] lo: entered allmulticast mode [ 1365.414607][T22369] lo: entered promiscuous mode [ 1365.447422][T22369] lo: left allmulticast mode [ 1365.871335][T22374] netlink: 'syz.9.4368': attribute type 10 has an invalid length. [ 1365.887583][T22374] netlink: 40 bytes leftover after parsing attributes in process `syz.9.4368'. [ 1365.925063][T22374] batman_adv: batadv0: Adding interface: vlan1 [ 1365.956867][T22374] batman_adv: batadv0: The MTU of interface vlan1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1366.032755][T22374] batman_adv: batadv0: Interface activated: vlan1 [ 1366.712553][T22394] netlink: 'syz.4.4376': attribute type 46 has an invalid length. [ 1366.742197][T22394] netlink: 2 bytes leftover after parsing attributes in process `syz.4.4376'. [ 1367.514859][T22405] lo: left promiscuous mode [ 1367.539712][T22405] lo: entered allmulticast mode [ 1367.598990][T22405] lo: entered promiscuous mode [ 1367.603876][T22405] lo: left allmulticast mode [ 1368.439494][T22411] netlink: 'syz.9.4381': attribute type 10 has an invalid length. [ 1368.489461][T22411] netlink: 40 bytes leftover after parsing attributes in process `syz.9.4381'. [ 1368.529489][T22411] ipvlan1: entered promiscuous mode [ 1368.575582][T22411] ipvlan1: entered allmulticast mode [ 1368.602176][T22411] veth0_vlan: entered allmulticast mode [ 1368.671688][T22411] bridge0: port 5(ipvlan1) entered blocking state [ 1368.706608][T22411] bridge0: port 5(ipvlan1) entered disabled state [ 1368.743721][T22411] A link change request failed with some changes committed already. Interface ipvlan1 may have been left with an inconsistent configuration, please check. [ 1368.886678][T22424] netlink: 'syz.4.4384': attribute type 10 has an invalid length. [ 1368.895808][T22424] batadv0: left promiscuous mode [ 1368.901677][T22424] batadv0: left allmulticast mode [ 1368.911725][T22424] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1368.939535][T22424] batadv0: entered promiscuous mode [ 1368.967269][T22424] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1369.000498][T22429] netlink: 144 bytes leftover after parsing attributes in process `syz.4.4384'. [ 1369.031285][T22430] netlink: 'syz.4.4384': attribute type 10 has an invalid length. [ 1369.039981][T22430] netlink: 40 bytes leftover after parsing attributes in process `syz.4.4384'. [ 1369.049799][T22430] batadv0: entered allmulticast mode [ 1369.069454][T22430] bond0: (slave batadv0): Releasing backup interface [ 1369.139160][T22430] A link change request failed with some changes committed already. Interface batadv0 may have been left with an inconsistent configuration, please check. [ 1369.584236][T22447] netlink: 121460 bytes leftover after parsing attributes in process `syz.9.4389'. [ 1369.644642][T22451] netlink: 'syz.9.4389': attribute type 16 has an invalid length. [ 1369.991298][T22460] netlink: 'syz.8.4393': attribute type 46 has an invalid length. [ 1370.820962][T22480] netlink: 'syz.4.4401': attribute type 10 has an invalid length. [ 1370.844210][T22480] batadv0: left promiscuous mode [ 1370.855001][T22480] batadv0: left allmulticast mode [ 1370.864900][T22480] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1370.882136][T22480] batadv0: entered promiscuous mode [ 1370.902304][T22480] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1370.982407][T22480] __nla_validate_parse: 3 callbacks suppressed [ 1370.982428][T22480] netlink: 144 bytes leftover after parsing attributes in process `syz.4.4401'. [ 1371.028912][T22480] netlink: 'syz.4.4401': attribute type 10 has an invalid length. [ 1371.047731][T22480] netlink: 40 bytes leftover after parsing attributes in process `syz.4.4401'. [ 1371.078205][T22480] batadv0: entered allmulticast mode [ 1371.115575][T22480] bond0: (slave batadv0): Releasing backup interface [ 1371.154331][T22480] A link change request failed with some changes committed already. Interface batadv0 may have been left with an inconsistent configuration, please check. [ 1371.774922][T22488] netlink: 4 bytes leftover after parsing attributes in process `syz.8.4404'. [ 1372.038879][T22496] netlink: 'syz.7.4406': attribute type 46 has an invalid length. [ 1372.081874][T22496] netlink: 2 bytes leftover after parsing attributes in process `syz.7.4406'. [ 1373.026033][T22505] netlink: 40 bytes leftover after parsing attributes in process `syz.4.4408'. [ 1373.160306][T22513] netlink: 4 bytes leftover after parsing attributes in process `syz.8.4411'. [ 1373.764175][T22517] lo: left promiscuous mode [ 1373.776597][T22517] lo: entered allmulticast mode [ 1373.997084][T22517] lo: entered promiscuous mode [ 1374.061901][T22517] lo: left allmulticast mode [ 1374.186634][T22519] netlink: 'syz.8.4414': attribute type 21 has an invalid length. [ 1374.194984][T22519] netlink: 'syz.8.4414': attribute type 6 has an invalid length. [ 1374.248171][T22519] netlink: 132 bytes leftover after parsing attributes in process `syz.8.4414'. [ 1374.284060][T22523] netlink: 132 bytes leftover after parsing attributes in process `syz.8.4414'. [ 1374.653376][T22527] FAULT_INJECTION: forcing a failure. [ 1374.653376][T22527] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1374.734729][T22527] CPU: 0 PID: 22527 Comm: syz.8.4417 Not tainted syzkaller #0 [ 1374.742272][T22527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1374.752373][T22527] Call Trace: [ 1374.755683][T22527] [ 1374.758642][T22527] dump_stack_lvl+0x18c/0x250 [ 1374.763370][T22527] ? show_regs_print_info+0x20/0x20 [ 1374.768698][T22527] ? load_image+0x420/0x420 [ 1374.773242][T22527] ? __might_fault+0xaa/0x120 [ 1374.777959][T22527] ? __lock_acquire+0x7d40/0x7d40 [ 1374.783031][T22527] should_fail_ex+0x39d/0x4d0 [ 1374.787754][T22527] _copy_from_iter+0x1d9/0x12e0 [ 1374.792659][T22527] ? __virt_addr_valid+0x18c/0x540 [ 1374.797817][T22527] ? __lock_acquire+0x7d40/0x7d40 [ 1374.802893][T22527] ? rcu_is_watching+0x15/0xb0 [ 1374.807705][T22527] ? copyout_mc+0x70/0x70 [ 1374.812076][T22527] ? __virt_addr_valid+0x18c/0x540 [ 1374.817226][T22527] ? __virt_addr_valid+0x18c/0x540 [ 1374.822373][T22527] ? __virt_addr_valid+0x469/0x540 [ 1374.827707][T22527] ? __check_object_size+0x506/0xa20 [ 1374.833033][T22527] kcm_sendmsg+0xd95/0x28b0 [ 1374.837794][T22527] ? kcm_getsockopt+0x280/0x280 [ 1374.842769][T22527] ? aa_sock_msg_perm+0x94/0x150 [ 1374.847750][T22527] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 1374.853069][T22527] ? security_socket_sendmsg+0x80/0xa0 [ 1374.858562][T22527] ? kcm_getsockopt+0x280/0x280 [ 1374.863453][T22527] ____sys_sendmsg+0x5ba/0x960 [ 1374.868274][T22527] ? __asan_memset+0x22/0x40 [ 1374.872914][T22527] ? __sys_sendmsg_sock+0x30/0x30 [ 1374.877979][T22527] ? __import_iovec+0x5f2/0x850 [ 1374.882909][T22527] ? import_iovec+0x73/0xa0 [ 1374.887450][T22527] ___sys_sendmsg+0x2a6/0x360 [ 1374.892166][T22527] ? get_pid_task+0x20/0x1e0 [ 1374.896812][T22527] ? __sys_sendmsg+0x2a0/0x2a0 [ 1374.901663][T22527] ? __lock_acquire+0x7d40/0x7d40 [ 1374.906780][T22527] __se_sys_sendmsg+0x1c2/0x2b0 [ 1374.911678][T22527] ? __x64_sys_sendmsg+0x80/0x80 [ 1374.916674][T22527] ? lockdep_hardirqs_on+0x98/0x150 [ 1374.921922][T22527] do_syscall_64+0x55/0xa0 [ 1374.926395][T22527] ? clear_bhb_loop+0x40/0x90 [ 1374.931118][T22527] ? clear_bhb_loop+0x40/0x90 [ 1374.935840][T22527] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1374.941778][T22527] RIP: 0033:0x7f19b2f9c819 [ 1374.946228][T22527] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1374.965886][T22527] RSP: 002b:00007f19b3ea0028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1374.974434][T22527] RAX: ffffffffffffffda RBX: 00007f19b3215fa0 RCX: 00007f19b2f9c819 [ 1374.982523][T22527] RDX: 0000000000000000 RSI: 0000200000002080 RDI: 0000000000000005 [ 1374.990525][T22527] RBP: 00007f19b3ea0090 R08: 0000000000000000 R09: 0000000000000000 [ 1374.998532][T22527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1375.006532][T22527] R13: 00007f19b3216038 R14: 00007f19b3215fa0 R15: 00007ffd33ad88e8 [ 1375.014554][T22527] [ 1376.000897][T22548] netlink: 132 bytes leftover after parsing attributes in process `syz.8.4424'. [ 1376.209216][T22539] netlink: 126588 bytes leftover after parsing attributes in process `syz.9.4421'. [ 1376.772830][T22561] netlink: 188 bytes leftover after parsing attributes in process `syz.4.4429'. [ 1379.413824][ T5778] Bluetooth: hci0: command 0x0406 tx timeout [ 1380.146582][T22576] netlink: 'syz.7.4433': attribute type 10 has an invalid length. [ 1380.166672][T22576] bridge0: port 2(bridge_slave_1) entered disabled state [ 1380.174227][T22576] bridge0: port 1(bridge_slave_0) entered disabled state [ 1380.196327][T22576] bridge0: left promiscuous mode [ 1380.201563][T22576] bridge0: left allmulticast mode [ 1380.233171][T22576] bridge0: port 2(bridge_slave_1) entered blocking state [ 1380.240444][T22576] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1380.248183][T22576] bridge0: port 1(bridge_slave_0) entered blocking state [ 1380.255392][T22576] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1380.323232][T22576] bridge0: entered promiscuous mode [ 1380.356960][T22576] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 1382.256845][T22615] lo: left promiscuous mode [ 1382.261838][T22615] lo: entered allmulticast mode [ 1382.306926][T22617] lo: entered promiscuous mode [ 1382.312124][T22617] lo: left allmulticast mode [ 1382.390369][T22623] netlink: 'syz.9.4444': attribute type 10 has an invalid length. [ 1382.416157][T22623] netlink: 40 bytes leftover after parsing attributes in process `syz.9.4444'. [ 1382.456477][T22623] vcan0: entered promiscuous mode [ 1382.472602][T22623] A link change request failed with some changes committed already. Interface vcan0 may have been left with an inconsistent configuration, please check. [ 1382.631779][T22630] netlink: 'syz.7.4447': attribute type 2 has an invalid length. [ 1382.663452][T22630] netlink: 4083 bytes leftover after parsing attributes in process `syz.7.4447'. [ 1382.695062][T22630] netlink: 'syz.7.4447': attribute type 10 has an invalid length. [ 1382.734119][T22630] netlink: 55 bytes leftover after parsing attributes in process `syz.7.4447'. [ 1383.138042][T22641] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 1383.144601][T22641] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 1385.849433][T22633] netlink: 'syz.9.4448': attribute type 10 has an invalid length. [ 1386.938204][T22669] lo: left promiscuous mode [ 1386.942836][T22669] lo: entered allmulticast mode [ 1387.020612][T22670] lo: entered promiscuous mode [ 1387.058255][T22670] lo: left allmulticast mode [ 1387.104469][T22673] netlink: 4083 bytes leftover after parsing attributes in process `syz.9.4459'. [ 1387.143366][T22671] netlink: 'syz.9.4459': attribute type 2 has an invalid length. [ 1387.219917][T22671] netlink: 'syz.9.4459': attribute type 10 has an invalid length. [ 1387.236151][T22671] netlink: 55 bytes leftover after parsing attributes in process `syz.9.4459'. [ 1387.381567][T22671] batman_adv: batadv0: Interface deactivated: vlan1 [ 1387.961827][T22671] batman_adv: batadv0: Removing interface: vlan1 [ 1388.309483][T22675] mac80211_hwsim hwsim57 wlan0: entered promiscuous mode [ 1388.333992][T22675] mac80211_hwsim hwsim57 wlan0: entered allmulticast mode [ 1388.898002][T22696] netlink: 'syz.8.4463': attribute type 10 has an invalid length. [ 1389.116191][T22696] batman_adv: batadv0: Adding interface: netdevsim0 [ 1389.242205][T22696] batman_adv: batadv0: The MTU of interface netdevsim0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1389.270436][T22696] batman_adv: batadv0: Not using interface netdevsim0 (retrying later): interface not active [ 1389.907281][T22714] netlink: 65051 bytes leftover after parsing attributes in process `syz.9.4469'. [ 1390.353545][T22717] FAULT_INJECTION: forcing a failure. [ 1390.353545][T22717] name failslab, interval 1, probability 0, space 0, times 0 [ 1390.366658][T22717] CPU: 1 PID: 22717 Comm: syz.7.4471 Not tainted syzkaller #0 [ 1390.374160][T22717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1390.384244][T22717] Call Trace: [ 1390.387564][T22717] [ 1390.390541][T22717] dump_stack_lvl+0x18c/0x250 [ 1390.395277][T22717] ? verify_lock_unused+0x140/0x140 [ 1390.400494][T22717] ? show_regs_print_info+0x20/0x20 [ 1390.405704][T22717] ? load_image+0x420/0x420 [ 1390.410241][T22717] ? mark_lock+0x94/0x320 [ 1390.414603][T22717] should_fail_ex+0x39d/0x4d0 [ 1390.419352][T22717] should_failslab+0x9/0x20 [ 1390.423914][T22717] slab_pre_alloc_hook+0x59/0x310 [ 1390.428992][T22717] kmem_cache_alloc+0x5a/0x2d0 [ 1390.433763][T22717] ? inet_frag_find+0x8f8/0x1ec0 [ 1390.438724][T22717] inet_frag_find+0x8f8/0x1ec0 [ 1390.443521][T22717] ? ip4_obj_hashfn+0x1e0/0x1e0 [ 1390.448387][T22717] ? inet_frag_find+0x138/0x1ec0 [ 1390.453348][T22717] ? inet_frag_destroy_rcu+0xc0/0xc0 [ 1390.458667][T22717] ? verify_lock_unused+0x140/0x140 [ 1390.463894][T22717] ip_defrag+0x33b/0x1fa0 [ 1390.468233][T22717] ? stack_trace_save+0xaa/0x100 [ 1390.473181][T22717] ? trace_call_bpf+0xc3/0x6c0 [ 1390.477993][T22717] ? __in_dev_get_rcu+0xc0/0xc0 [ 1390.482879][T22717] ? __bpf_trace_bpf_trace_printk+0x100/0x100 [ 1390.488952][T22717] ? __x64_sys_bpf+0x7c/0x90 [ 1390.493559][T22717] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1390.499672][T22717] ? ipv4_conntrack_defrag+0x3c5/0x5a0 [ 1390.505158][T22717] ipv4_conntrack_defrag+0x3df/0x5a0 [ 1390.510447][T22717] ? defrag4_net_exit+0xb0/0xb0 [ 1390.515308][T22717] nf_hook_slow+0xbd/0x200 [ 1390.519807][T22717] ? nf_hook+0x390/0x390 [ 1390.524073][T22717] nf_hook+0x228/0x390 [ 1390.528163][T22717] ? nf_hook+0xa2/0x390 [ 1390.532342][T22717] ? __ip_local_out+0x5f0/0x5f0 [ 1390.537212][T22717] ? nf_hook+0x390/0x390 [ 1390.541475][T22717] ? lockdep_hardirqs_on+0x98/0x150 [ 1390.546680][T22717] ? ip_fast_csum+0x1ee/0x2b0 [ 1390.551366][T22717] __ip_local_out+0x4db/0x5f0 [ 1390.556052][T22717] ? nf_hook+0x390/0x390 [ 1390.560321][T22717] ip_local_out+0x2a/0x130 [ 1390.564749][T22717] iptunnel_xmit+0x4f0/0x920 [ 1390.569368][T22717] ip_tunnel_xmit+0x1cbc/0x2410 [ 1390.574237][T22717] ? ip4_dst_hoplimit+0x2d0/0x2d0 [ 1390.579307][T22717] ? gre_build_header+0x25b/0x990 [ 1390.584382][T22717] ipgre_xmit+0x7a6/0xb20 [ 1390.588746][T22717] dev_hard_start_xmit+0x246/0x740 [ 1390.593886][T22717] __dev_queue_xmit+0x19a3/0x3660 [ 1390.598962][T22717] ? __dev_queue_xmit+0x265/0x3660 [ 1390.604119][T22717] ? netdev_core_pick_tx+0x340/0x340 [ 1390.609418][T22717] ? skb_release_data+0x1cf/0x800 [ 1390.614457][T22717] ? pskb_expand_head+0xbfe/0x1230 [ 1390.619606][T22717] __bpf_tx_skb+0x189/0x250 [ 1390.624233][T22717] bpf_clone_redirect+0x30f/0x4a0 [ 1390.629273][T22717] bpf_prog_208b094576c80b22+0x5e/0x63 [ 1390.634743][T22717] ? perf_trace_run_bpf_submit+0x125/0x1c0 [ 1390.640559][T22717] ? perf_trace_preemptirq_template+0x269/0x330 [ 1390.646845][T22717] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 1390.652861][T22717] ? lockdep_softirqs_on+0x580/0x580 [ 1390.658168][T22717] ? lock_chain_count+0x20/0x20 [ 1390.663046][T22717] ? seqcount_lockdep_reader_access+0x191/0x1d0 [ 1390.669301][T22717] ? __local_bh_disable_ip+0x108/0x1a0 [ 1390.674768][T22717] ? __cant_sleep+0x220/0x220 [ 1390.679474][T22717] ? __local_bh_enable_ip+0x13a/0x1c0 [ 1390.684875][T22717] ? _local_bh_enable+0xa0/0xa0 [ 1390.689742][T22717] ? bpf_test_timer_continue+0x135/0x380 [ 1390.695384][T22717] ? bpf_test_run+0x174/0x870 [ 1390.700103][T22717] bpf_test_run+0x2df/0x870 [ 1390.704657][T22717] ? bpf_test_run+0x174/0x870 [ 1390.709341][T22717] ? convert___skb_to_skb+0x590/0x590 [ 1390.714722][T22717] ? eth_get_headlen+0x210/0x210 [ 1390.719687][T22717] ? slab_build_skb+0x25f/0x3f0 [ 1390.724588][T22717] ? convert___skb_to_skb+0x3d/0x590 [ 1390.729879][T22717] bpf_prog_test_run_skb+0xad2/0x12b0 [ 1390.735277][T22717] ? cpu_online+0x60/0x60 [ 1390.739632][T22717] bpf_prog_test_run+0x321/0x390 [ 1390.744611][T22717] __sys_bpf+0x49d/0x890 [ 1390.748859][T22717] ? bpf_link_show_fdinfo+0x390/0x390 [ 1390.754244][T22717] ? lock_chain_count+0x20/0x20 [ 1390.759126][T22717] __x64_sys_bpf+0x7c/0x90 [ 1390.763584][T22717] do_syscall_64+0x55/0xa0 [ 1390.768000][T22717] ? clear_bhb_loop+0x40/0x90 [ 1390.772678][T22717] ? clear_bhb_loop+0x40/0x90 [ 1390.777379][T22717] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1390.783330][T22717] RIP: 0033:0x7fd1c0f9c819 [ 1390.787757][T22717] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1390.807374][T22717] RSP: 002b:00007fd1c1eda028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1390.815793][T22717] RAX: ffffffffffffffda RBX: 00007fd1c1215fa0 RCX: 00007fd1c0f9c819 [ 1390.823791][T22717] RDX: 0000000000000048 RSI: 0000200000000080 RDI: 000000000000000a [ 1390.831769][T22717] RBP: 00007fd1c1eda090 R08: 0000000000000000 R09: 0000000000000000 [ 1390.839757][T22717] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1390.847752][T22717] R13: 00007fd1c1216038 R14: 00007fd1c1215fa0 R15: 00007ffcd7f58298 [ 1390.855741][T22717] [ 1391.064060][T22717] netlink: 'syz.7.4471': attribute type 10 has an invalid length. [ 1391.075330][T22717] bridge0: port 2(bridge_slave_1) entered disabled state [ 1391.082881][T22717] bridge0: port 1(bridge_slave_0) entered disabled state [ 1391.236548][T22729] lo: left promiscuous mode [ 1391.241251][T22729] lo: entered allmulticast mode [ 1391.369552][T22725] lo: entered promiscuous mode [ 1391.374479][T22725] lo: left allmulticast mode [ 1392.130408][T22736] netlink: 'syz.4.4476': attribute type 10 has an invalid length. [ 1392.159691][T22736] netlink: 2 bytes leftover after parsing attributes in process `syz.4.4476'. [ 1392.207441][T22736] hsr0: entered promiscuous mode [ 1392.543101][T22755] bridge0: port 3(batadv0) entered disabled state [ 1392.618809][T22755] bridge_slave_1: left allmulticast mode [ 1392.624583][T22755] bridge_slave_1: left promiscuous mode [ 1392.642976][T22755] bridge0: port 2(bridge_slave_1) entered disabled state [ 1392.669384][T22755] bridge_slave_0: left allmulticast mode [ 1392.726305][T22755] bridge_slave_0: left promiscuous mode [ 1392.736769][T22755] bridge0: port 1(bridge_slave_0) entered disabled state [ 1393.762441][T22761] netlink: 12 bytes leftover after parsing attributes in process `syz.8.4482'. [ 1393.777001][T22775] lo: left promiscuous mode [ 1393.781534][T22775] lo: entered allmulticast mode [ 1393.794942][T22781] netlink: 16186 bytes leftover after parsing attributes in process `syz.9.4488'. [ 1393.811259][T22778] lo: entered promiscuous mode [ 1393.817293][T22778] lo: left allmulticast mode [ 1393.836174][T22784] netlink: 'syz.4.4489': attribute type 16 has an invalid length. [ 1393.844051][T22784] netlink: 48 bytes leftover after parsing attributes in process `syz.4.4489'. [ 1393.867034][T22784] veth1_macvtap: entered allmulticast mode [ 1394.202422][T22798] netlink: 209852 bytes leftover after parsing attributes in process `syz.7.4491'. [ 1394.218822][T22798] openvswitch: netlink: Tunnel attr 0 has unexpected len 60 expected 8 [ 1394.558448][T22803] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1394.578864][T22803] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1394.646831][T22803] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1394.654316][T22803] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1394.893273][T22803] bridge0: port 3(batadv0) entered disabled state [ 1395.299768][T22821] lo: left promiscuous mode [ 1395.304500][T22821] lo: entered allmulticast mode [ 1395.387853][T22821] lo: entered promiscuous mode [ 1395.392770][T22821] lo: left allmulticast mode [ 1396.557623][T22848] FAULT_INJECTION: forcing a failure. [ 1396.557623][T22848] name failslab, interval 1, probability 0, space 0, times 0 [ 1396.585358][T22848] CPU: 1 PID: 22848 Comm: syz.8.4511 Not tainted syzkaller #0 [ 1396.593008][T22848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1396.603105][T22848] Call Trace: [ 1396.606403][T22848] [ 1396.609354][T22848] dump_stack_lvl+0x18c/0x250 [ 1396.614063][T22848] ? show_regs_print_info+0x20/0x20 [ 1396.619297][T22848] ? load_image+0x420/0x420 [ 1396.623826][T22848] ? __might_sleep+0xe0/0xe0 [ 1396.628444][T22848] ? __lock_acquire+0x7d40/0x7d40 [ 1396.633492][T22848] should_fail_ex+0x39d/0x4d0 [ 1396.638195][T22848] should_failslab+0x9/0x20 [ 1396.642723][T22848] slab_pre_alloc_hook+0x59/0x310 [ 1396.647770][T22848] ? __get_vm_area_node+0x125/0x370 [ 1396.653001][T22848] __kmem_cache_alloc_node+0x53/0x250 [ 1396.658397][T22848] ? __get_vm_area_node+0x125/0x370 [ 1396.663612][T22848] kmalloc_node_trace+0x26/0xe0 [ 1396.668493][T22848] __get_vm_area_node+0x125/0x370 [ 1396.673580][T22848] __vmalloc_node_range+0x36e/0x1330 [ 1396.678894][T22848] ? copy_process+0x586/0x3d80 [ 1396.683698][T22848] ? free_vm_area+0x50/0x50 [ 1396.688224][T22848] ? arch_dup_task_struct+0x57/0xd0 [ 1396.693438][T22848] ? __asan_memcpy+0x40/0x70 [ 1396.698051][T22848] dup_task_struct+0x3d0/0x7c0 [ 1396.702829][T22848] ? copy_process+0x586/0x3d80 [ 1396.707609][T22848] ? lockdep_hardirqs_on+0x98/0x150 [ 1396.712826][T22848] copy_process+0x586/0x3d80 [ 1396.717429][T22848] ? __might_fault+0xaa/0x120 [ 1396.722137][T22848] ? get_pid_task+0x20/0x1e0 [ 1396.726749][T22848] ? __pidfd_prepare+0x140/0x140 [ 1396.731712][T22848] kernel_clone+0x24b/0x8a0 [ 1396.736261][T22848] ? create_io_thread+0x190/0x190 [ 1396.741319][T22848] __x64_sys_clone+0x1b7/0x230 [ 1396.746097][T22848] ? __fget_files+0x43d/0x4b0 [ 1396.750794][T22848] ? __ia32_sys_vfork+0x140/0x140 [ 1396.755935][T22848] ? lock_chain_count+0x20/0x20 [ 1396.760804][T22848] ? lockdep_hardirqs_on+0x98/0x150 [ 1396.766020][T22848] do_syscall_64+0x55/0xa0 [ 1396.770444][T22848] ? clear_bhb_loop+0x40/0x90 [ 1396.775136][T22848] ? clear_bhb_loop+0x40/0x90 [ 1396.779837][T22848] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1396.785751][T22848] RIP: 0033:0x7f19b2f9c819 [ 1396.790182][T22848] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1396.809805][T22848] RSP: 002b:00007f19b3e9ffd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1396.818233][T22848] RAX: ffffffffffffffda RBX: 00007f19b3215fa0 RCX: 00007f19b2f9c819 [ 1396.826223][T22848] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001000000 [ 1396.834209][T22848] RBP: 00007f19b3ea0090 R08: 0000000000000000 R09: 0000000000000000 [ 1396.842194][T22848] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1396.850179][T22848] R13: 00007f19b3216038 R14: 00007f19b3215fa0 R15: 00007ffd33ad88e8 [ 1396.858182][T22848] [ 1396.863535][T22835] netlink: 'syz.9.4507': attribute type 10 has an invalid length. [ 1396.903906][T22848] syz.8.4511: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz8,mems_allowed=0-1 [ 1396.906055][T22835] netlink: 2 bytes leftover after parsing attributes in process `syz.9.4507'. [ 1396.927952][T22848] CPU: 0 PID: 22848 Comm: syz.8.4511 Not tainted syzkaller #0 [ 1396.934053][T22835] hsr0: entered promiscuous mode [ 1396.935867][T22848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1396.935883][T22848] Call Trace: [ 1396.935893][T22848] [ 1396.935903][T22848] dump_stack_lvl+0x18c/0x250 [ 1396.935944][T22848] ? show_regs_print_info+0x20/0x20 [ 1396.935976][T22848] ? load_image+0x420/0x420 [ 1396.936007][T22848] ? cpuset_print_current_mems_allowed+0x1f/0x360 [ 1396.936033][T22848] ? cpuset_print_current_mems_allowed+0x2e7/0x360 [ 1396.936060][T22848] warn_alloc+0x246/0x340 [ 1396.936089][T22848] ? __get_vm_area_node+0x125/0x370 [ 1396.936119][T22848] ? zone_watermark_ok_safe+0x230/0x230 [ 1396.936148][T22848] ? rcu_is_watching+0x15/0xb0 [ 1396.936181][T22848] ? __get_vm_area_node+0x356/0x370 [ 1396.945024][T22835] bridge0: port 3(hsr0) entered blocking state [ 1396.951223][T22848] __vmalloc_node_range+0x393/0x1330 [ 1396.951290][T22848] ? free_vm_area+0x50/0x50 [ 1396.951318][T22848] ? arch_dup_task_struct+0x57/0xd0 [ 1396.951344][T22848] ? __asan_memcpy+0x40/0x70 [ 1396.951373][T22848] dup_task_struct+0x3d0/0x7c0 [ 1396.951396][T22848] ? copy_process+0x586/0x3d80 [ 1396.951416][T22848] ? lockdep_hardirqs_on+0x98/0x150 [ 1396.957267][T22835] bridge0: port 3(hsr0) entered disabled state [ 1396.957657][T22848] copy_process+0x586/0x3d80 [ 1396.957684][T22848] ? __might_fault+0xaa/0x120 [ 1396.957728][T22848] ? get_pid_task+0x20/0x1e0 [ 1396.957758][T22848] ? __pidfd_prepare+0x140/0x140 [ 1396.968294][T22835] hsr0: entered allmulticast mode [ 1396.972365][T22848] kernel_clone+0x24b/0x8a0 [ 1396.972400][T22848] ? create_io_thread+0x190/0x190 [ 1396.972445][T22848] __x64_sys_clone+0x1b7/0x230 [ 1396.981708][T22835] hsr_slave_0: entered allmulticast mode [ 1396.985361][T22848] ? __fget_files+0x43d/0x4b0 [ 1396.985397][T22848] ? __ia32_sys_vfork+0x140/0x140 [ 1396.985435][T22848] ? lock_chain_count+0x20/0x20 [ 1396.985465][T22848] ? lockdep_hardirqs_on+0x98/0x150 [ 1396.985493][T22848] do_syscall_64+0x55/0xa0 [ 1396.985511][T22848] ? clear_bhb_loop+0x40/0x90 [ 1396.985535][T22848] ? clear_bhb_loop+0x40/0x90 [ 1397.004942][T22854] netlink: 121460 bytes leftover after parsing attributes in process `syz.4.4513'. [ 1397.005412][T22848] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1397.010846][T22835] hsr_slave_1: entered allmulticast mode [ 1397.016945][T22848] RIP: 0033:0x7f19b2f9c819 [ 1397.016971][T22848] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1397.016989][T22848] RSP: 002b:00007f19b3e9ffd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1397.017013][T22848] RAX: ffffffffffffffda RBX: 00007f19b3215fa0 RCX: 00007f19b2f9c819 [ 1397.017029][T22848] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001000000 [ 1397.017043][T22848] RBP: 00007f19b3ea0090 R08: 0000000000000000 R09: 0000000000000000 [ 1397.017058][T22848] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1397.017071][T22848] R13: 00007f19b3216038 R14: 00007f19b3215fa0 R15: 00007ffd33ad88e8 [ 1397.017106][T22848] [ 1397.207333][T22848] Mem-Info: [ 1397.287113][T22835] bridge0: port 3(hsr0) entered blocking state [ 1397.287433][T22848] active_anon:10501 inactive_anon:0 isolated_anon:0 [ 1397.287433][T22848] active_file:22786 inactive_file:40441 isolated_file:0 [ 1397.287433][T22848] unevictable:768 dirty:392 writeback:0 [ 1397.287433][T22848] slab_reclaimable:11067 slab_unreclaimable:96619 [ 1397.287433][T22848] mapped:25149 shmem:1433 pagetables:1064 [ 1397.287433][T22848] sec_pagetables:0 bounce:0 [ 1397.287433][T22848] kernel_misc_reclaimable:0 [ 1397.287433][T22848] free:1328385 free_pcp:12378 free_cma:0 [ 1397.293440][T22835] bridge0: port 3(hsr0) entered forwarding state [ 1397.350458][T22848] Node 0 active_anon:42004kB inactive_anon:0kB active_file:91144kB inactive_file:161564kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:100596kB dirty:1568kB writeback:0kB shmem:4196kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:11992kB pagetables:4256kB sec_pagetables:0kB all_unreclaimable? no [ 1397.385032][T22854] netlink: 21096 bytes leftover after parsing attributes in process `syz.4.4513'. [ 1397.407374][T22848] Node 1 active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:200kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:1536kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:16kB pagetables:0kB sec_pagetables:0kB all_unreclaimable? no [ 1397.407728][T22854] tipc: Started in network mode [ 1397.446864][T22848] Node 0 DMA free:15360kB boost:0kB min:204kB low:252kB high:300kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1397.475689][T22854] tipc: Node identity 1a, cluster identity 4711 [ 1397.483133][T22854] tipc: Node number set to 26 [ 1397.500961][T22840] netlink: 'syz.7.4508': attribute type 10 has an invalid length. [ 1397.520079][T22848] lowmem_reserve[]: 0 2521 2522 2522 2522 [ 1397.526137][T22848] Node 0 DMA32 free:1404876kB boost:0kB min:34644kB low:43304kB high:51964kB reserved_highatomic:0KB active_anon:41860kB inactive_anon:0kB active_file:91144kB inactive_file:160744kB unevictable:1536kB writepending:1568kB present:3129332kB managed:2586952kB mlocked:0kB bounce:0kB free_pcp:28452kB local_pcp:15232kB free_cma:0kB [ 1397.572748][T22848] lowmem_reserve[]: 0 0 0 0 0 [ 1397.578025][T22840] batman_adv: batadv0: Adding interface: netdevsim0 [ 1397.580406][T22848] Node 0 Normal free:0kB boost:0kB min:8kB low:8kB high:8kB reserved_highatomic:0KB active_anon:44kB inactive_anon:0kB active_file:0kB inactive_file:820kB unevictable:0kB writepending:0kB present:1048576kB managed:872kB mlocked:0kB bounce:0kB free_pcp:8kB local_pcp:0kB free_cma:0kB [ 1397.585870][T22840] batman_adv: batadv0: The MTU of interface netdevsim0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1397.656617][T22848] lowmem_reserve[]: 0 0 0 0 0 [ 1397.661526][T22848] Node 1 Normal free:3893048kB boost:0kB min:55244kB low:69052kB high:82860kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:200kB unevictable:1536kB writepending:0kB present:4194304kB managed:4117312kB mlocked:0kB bounce:0kB free_pcp:20840kB local_pcp:9216kB free_cma:0kB [ 1397.686013][T22840] batman_adv: batadv0: Not using interface netdevsim0 (retrying later): interface not active [ 1397.725859][T22848] lowmem_reserve[]: 0 0 0 0 0 [ 1397.766099][T22848] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 1397.859735][T22848] Node 0 DMA32: 2047*4kB (UM) 3092*8kB (UME) 1279*16kB (UME) 1124*32kB (UME) 569*64kB (UME) 285*128kB (UME) 135*256kB (UME) 52*512kB (UME) 24*1024kB (UME) 9*2048kB (UME) 278*4096kB (UM) = 1405132kB [ 1397.880132][T22848] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 1397.893493][T22848] Node 1 Normal: 274*4kB (UME) 60*8kB (UME) 41*16kB (UME) 46*32kB (UME) 15*64kB (UE) 6*128kB (UME) 2*256kB (E) 2*512kB (ME) 1*1024kB (U) 1*2048kB (E) 948*4096kB (M) = 3893048kB [ 1397.917408][T22848] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1397.928018][T22848] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 1397.938030][T22848] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1397.950494][T22848] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 1397.960992][T22848] 64660 total pagecache pages [ 1397.965710][T22848] 0 pages in swap cache [ 1397.971693][T22848] Free swap = 124996kB [ 1397.976213][T22848] Total swap = 124996kB [ 1397.980414][T22848] 2097051 pages RAM [ 1397.984244][T22848] 0 pages HighMem/MovableOnly [ 1397.989850][T22848] 416927 pages reserved [ 1397.994052][T22848] 0 pages cma reserved [ 1398.062732][T22861] IPv6: Can't replace route, no match found [ 1398.247868][T22868] netlink: 'syz.7.4519': attribute type 10 has an invalid length. [ 1398.304808][T22868] batadv0: left allmulticast mode [ 1398.339973][T22868] batadv0: left promiscuous mode [ 1398.345617][T22868] bridge0: port 3(batadv0) entered disabled state [ 1399.057148][T22868] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1399.070085][T22868] batadv0: entered promiscuous mode [ 1399.105217][T22868] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 1399.126249][T22870] netlink: 144 bytes leftover after parsing attributes in process `syz.7.4519'. [ 1399.176649][T22873] netlink: 'syz.7.4519': attribute type 10 has an invalid length. [ 1399.184714][T22873] netlink: 40 bytes leftover after parsing attributes in process `syz.7.4519'. [ 1399.193930][T22873] batadv0: entered allmulticast mode [ 1399.209130][T22873] bond0: (slave batadv0): Releasing backup interface [ 1399.226366][T22873] bridge0: port 3(batadv0) entered blocking state [ 1399.233138][T22873] bridge0: port 3(batadv0) entered disabled state [ 1399.284275][T22879] netlink: 'syz.8.4523': attribute type 10 has an invalid length. [ 1399.303208][T22879] netlink: 40 bytes leftover after parsing attributes in process `syz.8.4523'. [ 1399.312564][T22879] team0: entered promiscuous mode [ 1399.318215][T22879] C: entered promiscuous mode [ 1399.323417][T22879] team_slave_1: entered promiscuous mode [ 1399.331850][T22879] team0: entered allmulticast mode [ 1399.337656][T22879] C: entered allmulticast mode [ 1399.342501][T22879] team_slave_1: entered allmulticast mode [ 1399.350896][T22879] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 1399.466300][T22882] lo: left promiscuous mode [ 1399.471614][T22882] lo: entered allmulticast mode [ 1399.646394][ T1128] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 1399.655712][ T1128] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 1399.697031][T22882] lo: entered promiscuous mode [ 1399.701887][T22882] lo: left allmulticast mode [ 1400.007536][T22891] netlink: 'syz.8.4527': attribute type 3 has an invalid length. [ 1400.047441][T22891] netlink: 132 bytes leftover after parsing attributes in process `syz.8.4527'. [ 1400.304163][T22902] IPv6: Can't replace route, no match found [ 1400.907024][T22900] netlink: 'syz.9.4531': attribute type 5 has an invalid length. [ 1401.326589][T22912] netlink: 'syz.4.4528': attribute type 10 has an invalid length. [ 1401.373155][T22912] batman_adv: batadv0: Adding interface: netdevsim0 [ 1401.392514][T22912] batman_adv: batadv0: The MTU of interface netdevsim0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1401.428236][T22912] batman_adv: batadv0: Not using interface netdevsim0 (retrying later): interface not active [ 1401.603464][T22918] netlink: 'syz.7.4535': attribute type 10 has an invalid length. [ 1401.646366][T22918] netlink: 40 bytes leftover after parsing attributes in process `syz.7.4535'. [ 1401.655528][T22918] team0: entered promiscuous mode [ 1401.662070][T22918] team_slave_0: entered promiscuous mode [ 1401.699496][T22918] team_slave_1: entered promiscuous mode [ 1401.713059][T22922] delete_channel: no stack [ 1401.719035][T22918] team0: entered allmulticast mode [ 1401.736394][T22918] team_slave_0: entered allmulticast mode [ 1401.766267][T22918] team_slave_1: entered allmulticast mode [ 1401.777102][T22918] bridge0: port 4(team0) entered blocking state [ 1401.799975][T22918] bridge0: port 4(team0) entered disabled state [ 1401.965814][T22931] netlink: 'syz.4.4541': attribute type 21 has an invalid length. [ 1402.001172][T22931] netlink: 128 bytes leftover after parsing attributes in process `syz.4.4541'. [ 1402.011374][T22931] netlink: 'syz.4.4541': attribute type 4 has an invalid length. [ 1402.801910][T22957] netlink: 'syz.4.4551': attribute type 10 has an invalid length. [ 1402.810789][T22957] netlink: 40 bytes leftover after parsing attributes in process `syz.4.4551'. [ 1402.819944][T22957] team0: entered allmulticast mode [ 1402.825228][T22957] C: entered allmulticast mode [ 1402.830680][T22957] team_slave_1: entered allmulticast mode [ 1402.841152][T22957] bond0: (slave team0): Releasing backup interface [ 1402.852561][T22957] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 1402.953099][T22960] FAULT_INJECTION: forcing a failure. [ 1402.953099][T22960] name failslab, interval 1, probability 0, space 0, times 0 [ 1402.965846][T22960] CPU: 0 PID: 22960 Comm: syz.8.4550 Not tainted syzkaller #0 [ 1402.973353][T22960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1402.983453][T22960] Call Trace: [ 1402.986774][T22960] [ 1402.989750][T22960] dump_stack_lvl+0x18c/0x250 [ 1402.994481][T22960] ? show_regs_print_info+0x20/0x20 [ 1402.999736][T22960] ? load_image+0x420/0x420 [ 1403.004286][T22960] ? skb_network_protocol+0x51f/0x780 [ 1403.009712][T22960] should_fail_ex+0x39d/0x4d0 [ 1403.014440][T22960] should_failslab+0x9/0x20 [ 1403.018981][T22960] slab_pre_alloc_hook+0x59/0x310 [ 1403.024053][T22960] kmem_cache_alloc+0x5a/0x2d0 [ 1403.028851][T22960] ? skb_clone+0x1eb/0x370 [ 1403.033436][T22960] skb_clone+0x1eb/0x370 [ 1403.037710][T22960] ? dev_queue_xmit_nit+0x212/0xbb0 [ 1403.042946][T22960] dev_queue_xmit_nit+0x24d/0xbb0 [ 1403.048003][T22960] ? dev_queue_xmit_nit+0x2d/0xbb0 [ 1403.053147][T22960] ? validate_xmit_skb+0x949/0xf60 [ 1403.058303][T22960] dev_hard_start_xmit+0x148/0x740 [ 1403.063462][T22960] __dev_queue_xmit+0x19a3/0x3660 [ 1403.068622][T22960] ? __dev_queue_xmit+0x265/0x3660 [ 1403.073783][T22960] ? netdev_core_pick_tx+0x340/0x340 [ 1403.079108][T22960] ? __copy_skb_header+0xa3/0x4a0 [ 1403.084162][T22960] ? __asan_memcpy+0x40/0x70 [ 1403.088789][T22960] ? __skb_clone+0x63/0x790 [ 1403.093328][T22960] ? __skb_clone+0x480/0x790 [ 1403.097954][T22960] ? skb_clone+0x21f/0x370 [ 1403.102403][T22960] __netlink_deliver_tap+0x5ab/0x830 [ 1403.107745][T22960] ? netlink_deliver_tap+0x2e/0x1b0 [ 1403.112989][T22960] netlink_deliver_tap+0x19c/0x1b0 [ 1403.118143][T22960] netlink_unicast+0x72c/0x8d0 [ 1403.122968][T22960] netlink_sendmsg+0x8d0/0xbf0 [ 1403.127783][T22960] ? netlink_getsockopt+0x590/0x590 [ 1403.133019][T22960] ? aa_sock_msg_perm+0x94/0x150 [ 1403.138004][T22960] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 1403.143362][T22960] ? security_socket_sendmsg+0x80/0xa0 [ 1403.148864][T22960] ? netlink_getsockopt+0x590/0x590 [ 1403.154209][T22960] ____sys_sendmsg+0x5ba/0x960 [ 1403.159023][T22960] ? __asan_memset+0x22/0x40 [ 1403.163660][T22960] ? __sys_sendmsg_sock+0x30/0x30 [ 1403.168769][T22960] ? __import_iovec+0x5f2/0x850 [ 1403.173929][T22960] ? import_iovec+0x73/0xa0 [ 1403.178469][T22960] ___sys_sendmsg+0x2a6/0x360 [ 1403.183179][T22960] ? get_pid_task+0x20/0x1e0 [ 1403.187810][T22960] ? __sys_sendmsg+0x2a0/0x2a0 [ 1403.192642][T22960] ? __lock_acquire+0x7d40/0x7d40 [ 1403.197731][T22960] __se_sys_sendmsg+0x1c2/0x2b0 [ 1403.202619][T22960] ? __x64_sys_sendmsg+0x80/0x80 [ 1403.207621][T22960] ? lockdep_hardirqs_on+0x98/0x150 [ 1403.212855][T22960] do_syscall_64+0x55/0xa0 [ 1403.217297][T22960] ? clear_bhb_loop+0x40/0x90 [ 1403.222004][T22960] ? clear_bhb_loop+0x40/0x90 [ 1403.226718][T22960] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1403.232648][T22960] RIP: 0033:0x7f19b2f9c819 [ 1403.237096][T22960] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1403.256836][T22960] RSP: 002b:00007f19b3ea0028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1403.265294][T22960] RAX: ffffffffffffffda RBX: 00007f19b3215fa0 RCX: 00007f19b2f9c819 [ 1403.273299][T22960] RDX: 0000000000000000 RSI: 00002000000002c0 RDI: 0000000000000003 [ 1403.281305][T22960] RBP: 00007f19b3ea0090 R08: 0000000000000000 R09: 0000000000000000 [ 1403.289306][T22960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1403.297303][T22960] R13: 00007f19b3216038 R14: 00007f19b3215fa0 R15: 00007ffd33ad88e8 [ 1403.305319][T22960] [ 1403.378079][T22965] netlink: 'syz.9.4548': attribute type 10 has an invalid length. [ 1403.459138][T22960] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1403.476213][T22960] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1403.511434][T22960] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1403.522277][T22960] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1403.542800][T22960] batman_adv: batadv0: Removing interface: netdevsim0 [ 1403.770838][T22968] lo: left promiscuous mode [ 1403.808290][T22968] lo: entered allmulticast mode [ 1403.845036][T22969] lo: entered promiscuous mode [ 1403.856618][T22969] lo: left allmulticast mode [ 1404.176301][T22978] netlink: 'syz.9.4557': attribute type 11 has an invalid length. [ 1404.184191][T22978] netlink: 212788 bytes leftover after parsing attributes in process `syz.9.4557'. [ 1404.255531][T22978] netlink: 'syz.9.4557': attribute type 10 has an invalid length. [ 1404.293098][T22978] netlink: 40 bytes leftover after parsing attributes in process `syz.9.4557'. [ 1404.314037][T22978] team0: entered promiscuous mode [ 1404.324700][T22978] team_slave_0: entered promiscuous mode [ 1404.332369][T22978] team_slave_1: entered promiscuous mode [ 1404.340858][T22978] team0: entered allmulticast mode [ 1404.386104][T22978] team_slave_0: entered allmulticast mode [ 1404.406076][T22978] team_slave_1: entered allmulticast mode [ 1404.426779][T22978] bridge0: port 5(team0) entered blocking state [ 1404.448101][T22978] bridge0: port 5(team0) entered disabled state [ 1404.471735][T22978] bridge0: port 5(team0) entered blocking state [ 1404.478236][T22978] bridge0: port 5(team0) entered forwarding state [ 1404.586069][T22989] netlink: 830 bytes leftover after parsing attributes in process `syz.7.4558'. [ 1405.714510][T23008] lo: left promiscuous mode [ 1405.852741][T23008] lo: entered allmulticast mode [ 1406.006329][T23010] lo: entered promiscuous mode [ 1406.168130][T23010] lo: left allmulticast mode [ 1406.727818][T23024] netlink: 9286 bytes leftover after parsing attributes in process `syz.8.4569'. [ 1412.946580][T23072] netlink: 209852 bytes leftover after parsing attributes in process `syz.8.4582'. [ 1413.045593][T23072] netlink: 180 bytes leftover after parsing attributes in process `syz.8.4582'. [ 1413.060978][T23072] netlink: 'syz.8.4582': attribute type 39 has an invalid length. [ 1413.640384][T23079] netlink: 209588 bytes leftover after parsing attributes in process `syz.9.4583'. [ 1413.971193][T23092] netlink: 'syz.9.4587': attribute type 10 has an invalid length. [ 1414.010613][T23092] netlink: 144 bytes leftover after parsing attributes in process `syz.9.4587'. [ 1414.024846][T23092] netlink: 'syz.9.4587': attribute type 10 has an invalid length. [ 1414.065817][T23092] netlink: 40 bytes leftover after parsing attributes in process `syz.9.4587'. [ 1414.068158][T23091] delete_channel: no stack [ 1416.717246][T23132] netlink: 152 bytes leftover after parsing attributes in process `syz.9.4599'. [ 1416.865626][T23133] netlink: 10 bytes leftover after parsing attributes in process `syz.9.4599'. [ 1416.930524][T23132] netlink: 'syz.9.4599': attribute type 10 has an invalid length. [ 1417.039147][T23132] team0: Device hsr_slave_0 failed to register rx_handler [ 1417.554706][T23138] netlink: 132 bytes leftover after parsing attributes in process `syz.8.4601'. [ 1418.260552][T23155] IPv6: Can't replace route, no match found [ 1418.477267][T23155] netlink: 'syz.7.4606': attribute type 2 has an invalid length. [ 1418.532152][T23155] netlink: 'syz.7.4606': attribute type 8 has an invalid length. [ 1418.606488][T23155] netlink: 132 bytes leftover after parsing attributes in process `syz.7.4606'. [ 1418.693457][T23151] netlink: 'syz.7.4606': attribute type 11 has an invalid length. [ 1419.236239][T23169] netlink: 132 bytes leftover after parsing attributes in process `syz.9.4610'. [ 1419.317728][T23174] netlink: 144 bytes leftover after parsing attributes in process `syz.7.4611'. [ 1419.347751][T23174] netlink: 'syz.7.4611': attribute type 10 has an invalid length. [ 1419.355665][T23174] netlink: 40 bytes leftover after parsing attributes in process `syz.7.4611'. [ 1420.539760][T23197] netlink: 'syz.4.4617': attribute type 29 has an invalid length. [ 1420.558610][T23197] netlink: 'syz.4.4617': attribute type 29 has an invalid length. [ 1420.581636][T23196] netlink: 144 bytes leftover after parsing attributes in process `syz.7.4626'. [ 1420.613989][T23192] netlink: 'syz.4.4617': attribute type 29 has an invalid length. [ 1420.716931][T23196] netlink: 'syz.7.4626': attribute type 10 has an invalid length. [ 1420.767094][T23196] netlink: 40 bytes leftover after parsing attributes in process `syz.7.4626'. [ 1420.891264][T23198] lo: left promiscuous mode [ 1420.913569][T23198] lo: entered allmulticast mode [ 1420.960898][T23197] netlink: 'syz.4.4617': attribute type 3 has an invalid length. [ 1420.969441][T23197] netlink: 201372 bytes leftover after parsing attributes in process `syz.4.4617'. [ 1421.128318][T23199] lo: entered promiscuous mode [ 1421.133300][T23199] lo: left allmulticast mode [ 1421.218299][T23192] netlink: 'syz.4.4617': attribute type 29 has an invalid length. [ 1421.526571][T23209] netlink: 152 bytes leftover after parsing attributes in process `syz.7.4621'. [ 1421.712830][T23207] netlink: 10 bytes leftover after parsing attributes in process `syz.7.4621'. [ 1422.013047][T23209] team0: Device hsr_slave_0 failed to register rx_handler [ 1422.098752][T23213] mac80211_hwsim hwsim39 wlan0: entered promiscuous mode [ 1422.106294][T23213] mac80211_hwsim hwsim39 wlan0: entered allmulticast mode [ 1422.582233][T23231] netlink: 132 bytes leftover after parsing attributes in process `syz.4.4629'. [ 1423.415349][ T1291] ieee802154 phy0 wpan0: encryption failed: -22 [ 1423.423591][ T1291] ieee802154 phy1 wpan1: encryption failed: -22 [ 1423.637154][T23249] netlink: 152 bytes leftover after parsing attributes in process `syz.4.4635'. [ 1423.661768][T23249] netlink: 10 bytes leftover after parsing attributes in process `syz.4.4635'. [ 1423.692188][T23249] validate_nla: 3 callbacks suppressed [ 1423.692206][T23249] netlink: 'syz.4.4635': attribute type 10 has an invalid length. [ 1423.764431][T23249] team0: Device hsr_slave_0 failed to register rx_handler [ 1424.245097][T23259] netlink: 'syz.8.4639': attribute type 3 has an invalid length. [ 1424.256758][T23259] netlink: 'syz.8.4639': attribute type 4 has an invalid length. [ 1424.292423][T23259] netlink: 9067 bytes leftover after parsing attributes in process `syz.8.4639'. [ 1424.638192][T23267] netlink: 'syz.9.4650': attribute type 29 has an invalid length. [ 1424.680438][T23267] netlink: 'syz.9.4650': attribute type 29 has an invalid length. [ 1424.692284][T23271] netlink: 'syz.9.4650': attribute type 29 has an invalid length. [ 1424.916892][T23271] netlink: 'syz.9.4650': attribute type 29 has an invalid length. [ 1424.930739][T23267] netlink: 'syz.9.4650': attribute type 3 has an invalid length. [ 1424.939920][T23267] netlink: 201372 bytes leftover after parsing attributes in process `syz.9.4650'. [ 1424.970783][T23277] netlink: 144 bytes leftover after parsing attributes in process `syz.7.4644'. [ 1424.984978][T23277] netlink: 'syz.7.4644': attribute type 10 has an invalid length. [ 1425.005145][T23277] netlink: 40 bytes leftover after parsing attributes in process `syz.7.4644'. [ 1425.172226][T23270] netlink: 'syz.4.4641': attribute type 2 has an invalid length. [ 1425.189305][T23270] netlink: 132 bytes leftover after parsing attributes in process `syz.4.4641'. [ 1425.692152][T23283] lo: left promiscuous mode [ 1425.707554][T23283] lo: entered allmulticast mode [ 1425.801644][T23283] lo: entered promiscuous mode [ 1425.826062][T23283] lo: left allmulticast mode [ 1425.919150][ T11] tipc: Subscription rejected, illegal request [ 1426.043506][T23290] netlink: 4595 bytes leftover after parsing attributes in process `syz.7.4649'. [ 1426.565682][T23294] mac80211_hwsim hwsim59 wlan0: entered promiscuous mode [ 1426.615157][T23294] mac80211_hwsim hwsim59 wlan0: entered allmulticast mode [ 1426.998926][T23305] netlink: 4595 bytes leftover after parsing attributes in process `syz.7.4656'. [ 1427.183708][T23312] netlink: 144 bytes leftover after parsing attributes in process `syz.9.4658'. [ 1427.651560][T23319] FAULT_INJECTION: forcing a failure. [ 1427.651560][T23319] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1427.695198][T23319] CPU: 1 PID: 23319 Comm: syz.4.4660 Not tainted syzkaller #0 [ 1427.702780][T23319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1427.712912][T23319] Call Trace: [ 1427.716254][T23319] [ 1427.719252][T23319] dump_stack_lvl+0x18c/0x250 [ 1427.724034][T23319] ? show_regs_print_info+0x20/0x20 [ 1427.729319][T23319] ? load_image+0x420/0x420 [ 1427.733925][T23319] ? __lock_acquire+0x7d40/0x7d40 [ 1427.739038][T23319] ? snprintf+0xe9/0x140 [ 1427.743384][T23319] should_fail_ex+0x39d/0x4d0 [ 1427.748167][T23319] _copy_to_user+0x2f/0xa0 [ 1427.752678][T23319] simple_read_from_buffer+0xe7/0x150 [ 1427.758156][T23319] proc_fail_nth_read+0x1e8/0x260 [ 1427.763275][T23319] ? proc_fault_inject_write+0x360/0x360 [ 1427.769005][T23319] ? fsnotify_perm+0x271/0x5e0 [ 1427.773853][T23319] ? proc_fault_inject_write+0x360/0x360 [ 1427.779579][T23319] vfs_read+0x28b/0x970 [ 1427.783851][T23319] ? kernel_read+0x1e0/0x1e0 [ 1427.788523][T23319] ? __fget_files+0x28/0x4b0 [ 1427.793187][T23319] ? __fget_files+0x28/0x4b0 [ 1427.797859][T23319] ? __fget_files+0x43d/0x4b0 [ 1427.802659][T23319] ? __fdget_pos+0x2a3/0x330 [ 1427.807322][T23319] ? ksys_read+0x75/0x260 [ 1427.811741][T23319] ksys_read+0x150/0x260 [ 1427.816077][T23319] ? vfs_write+0x990/0x990 [ 1427.820591][T23319] ? lockdep_hardirqs_on+0x98/0x150 [ 1427.825883][T23319] do_syscall_64+0x55/0xa0 [ 1427.830365][T23319] ? clear_bhb_loop+0x40/0x90 [ 1427.835111][T23319] ? clear_bhb_loop+0x40/0x90 [ 1427.839873][T23319] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1427.845840][T23319] RIP: 0033:0x7f991615d04e [ 1427.850332][T23319] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1427.870023][T23319] RSP: 002b:00007f99170b4fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1427.878521][T23319] RAX: ffffffffffffffda RBX: 00007f99170b56c0 RCX: 00007f991615d04e [ 1427.886565][T23319] RDX: 000000000000000f RSI: 00007f99170b50a0 RDI: 0000000000000007 [ 1427.894607][T23319] RBP: 00007f99170b5090 R08: 0000000000000000 R09: 0000000000000000 [ 1427.902649][T23319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1427.910689][T23319] R13: 00007f9916416128 R14: 00007f9916416090 R15: 00007ffdaf3333d8 [ 1427.918791][T23319] [ 1428.112244][T23324] lo: left promiscuous mode [ 1428.125477][T23324] lo: entered allmulticast mode [ 1428.538324][T23328] geneve1: entered promiscuous mode [ 1428.550089][T23328] geneve1: entered allmulticast mode [ 1428.558639][T23328] team0: Port device geneve1 added [ 1428.564812][T23324] lo: entered promiscuous mode [ 1428.574888][T23324] lo: left allmulticast mode [ 1429.137265][T23345] validate_nla: 6 callbacks suppressed [ 1429.137285][T23345] netlink: 'syz.4.4670': attribute type 21 has an invalid length. [ 1429.163613][T23345] netlink: 'syz.4.4670': attribute type 1 has an invalid length. [ 1429.185471][T23345] __nla_validate_parse: 6 callbacks suppressed [ 1429.185490][T23345] netlink: 15998 bytes leftover after parsing attributes in process `syz.4.4670'. [ 1429.583944][T23357] netlink: 144 bytes leftover after parsing attributes in process `syz.8.4672'. [ 1429.599277][T23357] netlink: 'syz.8.4672': attribute type 10 has an invalid length. [ 1429.609970][T23357] netlink: 40 bytes leftover after parsing attributes in process `syz.8.4672'. [ 1431.659184][T23359] netlink: 4595 bytes leftover after parsing attributes in process `syz.4.4674'. [ 1432.159734][T23363] sock: sock_set_timeout: `syz.8.4676' (pid 23363) tries to set negative timeout [ 1432.662146][T23372] netlink: 'syz.7.4678': attribute type 10 has an invalid length. [ 1432.722584][T23372] geneve1: entered promiscuous mode [ 1432.772675][T23375] FAULT_INJECTION: forcing a failure. [ 1432.772675][T23375] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1432.791889][T23375] CPU: 1 PID: 23375 Comm: syz.9.4679 Not tainted syzkaller #0 [ 1432.799426][T23375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1432.800409][T23372] geneve1: entered allmulticast mode [ 1432.809507][T23375] Call Trace: [ 1432.809522][T23375] [ 1432.809532][T23375] dump_stack_lvl+0x18c/0x250 [ 1432.809581][T23375] ? show_regs_print_info+0x20/0x20 [ 1432.809610][T23375] ? load_image+0x420/0x420 [ 1432.809640][T23375] ? __might_fault+0xaa/0x120 [ 1432.809662][T23375] ? __lock_acquire+0x7d40/0x7d40 [ 1432.809692][T23375] should_fail_ex+0x39d/0x4d0 [ 1432.831209][T23372] team0: Port device geneve1 added [ 1432.835656][T23375] _copy_to_user+0x2f/0xa0 [ 1432.835693][T23375] generic_map_lookup_batch+0x860/0xc60 [ 1432.851028][T23384] netlink: 61211 bytes leftover after parsing attributes in process `syz.8.4681'. [ 1432.855248][T23375] ? bpf_map_update_value+0x720/0x720 [ 1432.855287][T23375] ? __fdget+0x180/0x210 [ 1432.884172][T23375] ? bpf_map_update_value+0x720/0x720 [ 1432.889584][T23375] bpf_map_do_batch+0x2cb/0x610 [ 1432.894475][T23375] ? bpf_lsm_bpf+0x9/0x10 [ 1432.898847][T23375] ? security_bpf+0x7e/0xa0 [ 1432.903391][T23375] __sys_bpf+0x7d7/0x890 [ 1432.907685][T23375] ? bpf_link_show_fdinfo+0x390/0x390 [ 1432.913111][T23375] ? lock_chain_count+0x20/0x20 [ 1432.918001][T23375] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 1432.924036][T23375] __x64_sys_bpf+0x7c/0x90 [ 1432.928494][T23375] do_syscall_64+0x55/0xa0 [ 1432.932953][T23375] ? clear_bhb_loop+0x40/0x90 [ 1432.937663][T23375] ? clear_bhb_loop+0x40/0x90 [ 1432.942466][T23375] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1432.948391][T23375] RIP: 0033:0x7f7c6739c819 [ 1432.952839][T23375] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1432.972654][T23375] RSP: 002b:00007f7c68320028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1432.981105][T23375] RAX: ffffffffffffffda RBX: 00007f7c67615fa0 RCX: 00007f7c6739c819 [ 1432.989137][T23375] RDX: 0000000000000038 RSI: 00002000000001c0 RDI: 0000000000000018 [ 1432.997137][T23375] RBP: 00007f7c68320090 R08: 0000000000000000 R09: 0000000000000000 [ 1433.005157][T23375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1433.013160][T23375] R13: 00007f7c67616038 R14: 00007f7c67615fa0 R15: 00007ffdc01c06e8 [ 1433.021187][T23375] [ 1433.080815][T23383] lo: left promiscuous mode [ 1433.085406][T23383] lo: entered allmulticast mode [ 1433.133495][T23377] lo: entered promiscuous mode [ 1433.223856][T23377] lo: left allmulticast mode [ 1433.509949][T23390] netlink: 209852 bytes leftover after parsing attributes in process `syz.8.4682'. [ 1433.520278][T23390] openvswitch: netlink: Key 32 has unexpected len 3064 expected 2 [ 1433.644201][T23397] netlink: 144 bytes leftover after parsing attributes in process `syz.7.4684'. [ 1433.674917][T23397] netlink: 'syz.7.4684': attribute type 10 has an invalid length. [ 1433.684001][T23397] netlink: 40 bytes leftover after parsing attributes in process `syz.7.4684'. [ 1433.714109][T23400] netlink: 4595 bytes leftover after parsing attributes in process `syz.8.4685'. [ 1434.263058][T23407] sit0: entered allmulticast mode [ 1434.353152][T23407] sit0: entered promiscuous mode [ 1435.449577][T23425] netlink: 4595 bytes leftover after parsing attributes in process `syz.4.4693'. [ 1435.464953][T23425] netlink: 4595 bytes leftover after parsing attributes in process `syz.4.4693'. [ 1435.516146][T23425] netlink: 4595 bytes leftover after parsing attributes in process `syz.4.4693'. [ 1435.552988][T23425] netlink: 'syz.4.4693': attribute type 10 has an invalid length. [ 1435.590969][T23427] netlink: 209852 bytes leftover after parsing attributes in process `syz.9.4694'. [ 1435.597563][T23425] geneve1: entered promiscuous mode [ 1435.614289][T23427] openvswitch: netlink: Key 32 has unexpected len 3064 expected 2 [ 1435.624073][T23425] geneve1: entered allmulticast mode [ 1435.641091][T23425] team0: Port device geneve1 added [ 1435.730280][T23431] lo: left promiscuous mode [ 1435.738605][T23431] lo: entered allmulticast mode [ 1435.922961][T23431] lo: entered promiscuous mode [ 1435.977828][T23431] lo: left allmulticast mode [ 1436.652275][T23443] netlink: 144 bytes leftover after parsing attributes in process `syz.9.4699'. [ 1436.708923][T23443] netlink: 'syz.9.4699': attribute type 10 has an invalid length. [ 1436.748638][T23443] netlink: 40 bytes leftover after parsing attributes in process `syz.9.4699'. [ 1437.404411][T23449] sock: sock_set_timeout: `syz.7.4700' (pid 23449) tries to set negative timeout [ 1437.663854][T23457] ================================================================== [ 1437.672006][T23457] BUG: KASAN: slab-out-of-bounds in __bpf_get_stackid+0x6bf/0x900 [ 1437.679953][T23457] Write of size 72 at addr ffff8880268cea10 by task syz.7.4704/23457 [ 1437.688053][T23457] [ 1437.690405][T23457] CPU: 1 PID: 23457 Comm: syz.7.4704 Not tainted syzkaller #0 [ 1437.697979][T23457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1437.708047][T23457] Call Trace: [ 1437.711367][T23457] [ 1437.714309][T23457] dump_stack_lvl+0x18c/0x250 [ 1437.719017][T23457] ? __lock_acquire+0x7d40/0x7d40 [ 1437.724067][T23457] ? show_regs_print_info+0x20/0x20 [ 1437.729285][T23457] ? load_image+0x420/0x420 [ 1437.733804][T23457] ? _raw_spin_lock_irqsave+0xc0/0x100 [ 1437.739292][T23457] ? __virt_addr_valid+0x18c/0x540 [ 1437.744420][T23457] ? __virt_addr_valid+0x469/0x540 [ 1437.749543][T23457] print_report+0xa8/0x210 [ 1437.753973][T23457] ? __bpf_get_stackid+0x6bf/0x900 [ 1437.759182][T23457] kasan_report+0x117/0x150 [ 1437.763706][T23457] ? __bpf_get_stackid+0x6bf/0x900 [ 1437.768840][T23457] kasan_check_range+0x241/0x290 [ 1437.773786][T23457] ? __bpf_get_stackid+0x6bf/0x900 [ 1437.778916][T23457] __asan_memcpy+0x40/0x70 [ 1437.783351][T23457] __bpf_get_stackid+0x6bf/0x900 [ 1437.788306][T23457] bpf_get_stackid_pe+0x343/0x410 [ 1437.793348][T23457] bpf_prog_a448e89f4c9ad9d1+0x30/0x4a [ 1437.798954][T23457] bpf_overflow_handler+0x1fc/0x510 [ 1437.804172][T23457] ? bpf_overflow_handler+0xde/0x510 [ 1437.809479][T23457] ? tp_perf_event_destroy+0x20/0x20 [ 1437.814781][T23457] ? unwind_get_return_address+0x91/0xc0 [ 1437.820427][T23457] ? __perf_event_account_interrupt+0x187/0x280 [ 1437.826682][T23457] __perf_event_overflow+0x447/0x630 [ 1437.831980][T23457] perf_swevent_event+0x319/0x570 [ 1437.837017][T23457] ? perf_tp_event+0x1520/0x1520 [ 1437.841971][T23457] ___perf_sw_event+0x4a7/0x730 [ 1437.846838][T23457] ? ___perf_sw_event+0x199/0x730 [ 1437.851964][T23457] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 1437.858392][T23457] ? __lock_acquire+0x1347/0x7d40 [ 1437.863428][T23457] ? rep_movs_alternative+0x4a/0x90 [ 1437.868641][T23457] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 1437.874633][T23457] ? lock_chain_count+0x20/0x20 [ 1437.879498][T23457] __perf_sw_event+0x139/0x270 [ 1437.884322][T23457] do_user_addr_fault+0x123e/0x12c0 [ 1437.889536][T23457] ? rcu_is_watching+0x15/0xb0 [ 1437.894316][T23457] exc_page_fault+0x64/0x100 [ 1437.898932][T23457] asm_exc_page_fault+0x26/0x30 [ 1437.903794][T23457] RIP: 0010:rep_movs_alternative+0x4a/0x90 [ 1437.909610][T23457] Code: 75 f1 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 df 83 f9 08 73 e8 eb c9 a4 c3 48 8b 06 48 89 07 48 8d 47 08 48 83 e0 f8 48 29 f8 48 01 [ 1437.929365][T23457] RSP: 0018:ffffc9000328f798 EFLAGS: 00050206 [ 1437.935440][T23457] RAX: ffffffff8427e501 RBX: 0000000000033fe0 RCX: 0000000000032020 [ 1437.943419][T23457] RDX: 0000000000000001 RSI: 0000200000002000 RDI: ffffc90003412fc0 [ 1437.951402][T23457] RBP: ffffc9000328f8f0 R08: ffffc90003444fdf R09: 1ffff920006889fb [ 1437.959389][T23457] R10: dffffc0000000000 R11: fffff520006889fc R12: ffffc90003411000 [ 1437.967372][T23457] R13: 0000200000000040 R14: ffffc9000328fe38 R15: 1ffff92000651fc7 [ 1437.975359][T23457] ? _copy_from_iter+0x201/0x12e0 [ 1437.980404][T23457] _copy_from_iter+0x24e/0x12e0 [ 1437.985278][T23457] ? find_vmap_area+0xfc/0x110 [ 1437.990059][T23457] ? __lock_acquire+0x7d40/0x7d40 [ 1437.995095][T23457] ? copyout_mc+0x70/0x70 [ 1437.999441][T23457] ? do_raw_spin_unlock+0x121/0x230 [ 1438.004651][T23457] ? _raw_spin_unlock+0x28/0x40 [ 1438.009523][T23457] ? find_vmap_area+0xfc/0x110 [ 1438.014316][T23457] ? __check_object_size+0x506/0xa20 [ 1438.019611][T23457] netlink_sendmsg+0x76b/0xbf0 [ 1438.024396][T23457] ? netlink_getsockopt+0x590/0x590 [ 1438.029625][T23457] ? aa_sock_msg_perm+0x94/0x150 [ 1438.034672][T23457] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 1438.039969][T23457] ? security_socket_sendmsg+0x80/0xa0 [ 1438.045442][T23457] ? netlink_getsockopt+0x590/0x590 [ 1438.050659][T23457] ____sys_sendmsg+0x5ba/0x960 [ 1438.055446][T23457] ? __asan_memset+0x22/0x40 [ 1438.060055][T23457] ? __sys_sendmsg_sock+0x30/0x30 [ 1438.065095][T23457] ? __import_iovec+0x5f2/0x850 [ 1438.070133][T23457] ? import_iovec+0x73/0xa0 [ 1438.074647][T23457] ___sys_sendmsg+0x2a6/0x360 [ 1438.079360][T23457] ? __sys_sendmsg+0x2a0/0x2a0 [ 1438.084147][T23457] ? debug_mutex_init+0x38/0x70 [ 1438.089022][T23457] __se_sys_sendmsg+0x1c2/0x2b0 [ 1438.093885][T23457] ? __x64_sys_sendmsg+0x80/0x80 [ 1438.098847][T23457] ? lockdep_hardirqs_on+0x98/0x150 [ 1438.104063][T23457] do_syscall_64+0x55/0xa0 [ 1438.108507][T23457] ? clear_bhb_loop+0x40/0x90 [ 1438.113200][T23457] ? clear_bhb_loop+0x40/0x90 [ 1438.117897][T23457] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1438.123824][T23457] RIP: 0033:0x7fd1c0f9c819 [ 1438.128261][T23457] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1438.147878][T23457] RSP: 002b:00007fd1c1eda028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1438.156314][T23457] RAX: ffffffffffffffda RBX: 00007fd1c1215fa0 RCX: 00007fd1c0f9c819 [ 1438.164307][T23457] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 000000000000000f [ 1438.172294][T23457] RBP: 00007fd1c1032c91 R08: 0000000000000000 R09: 0000000000000000 [ 1438.180278][T23457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1438.188269][T23457] R13: 00007fd1c1216038 R14: 00007fd1c1215fa0 R15: 00007ffcd7f58298 [ 1438.196265][T23457] [ 1438.199294][T23457] [ 1438.201623][T23457] Allocated by task 23457: [ 1438.206040][T23457] kasan_set_track+0x4e/0x70 [ 1438.210643][T23457] __kasan_kmalloc+0x8f/0xa0 [ 1438.215244][T23457] __kmalloc_node+0xb4/0x230 [ 1438.219856][T23457] bpf_map_area_alloc+0x5e/0x110 [ 1438.224803][T23457] prealloc_elems_and_freelist+0x86/0x1c0 [ 1438.230533][T23457] stack_map_alloc+0x33a/0x4c0 [ 1438.235309][T23457] map_create+0x877/0x12f0 [ 1438.239733][T23457] __sys_bpf+0x651/0x890 [ 1438.244013][T23457] __x64_sys_bpf+0x7c/0x90 [ 1438.248439][T23457] do_syscall_64+0x55/0xa0 [ 1438.252859][T23457] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1438.258774][T23457] [ 1438.261112][T23457] Last potentially related work creation: [ 1438.266835][T23457] kasan_save_stack+0x3e/0x60 [ 1438.271549][T23457] __kasan_record_aux_stack+0xaf/0xc0 [ 1438.276953][T23457] call_rcu+0x153/0x950 [ 1438.281128][T23457] __nf_register_net_hook+0x788/0x910 [ 1438.286530][T23457] nf_register_net_hook+0xb2/0x190 [ 1438.291650][T23457] nf_register_net_hooks+0x44/0x1b0 [ 1438.296867][T23457] nf_ct_netns_do_get+0x3c0/0x5c0 [ 1438.301902][T23457] nf_ct_netns_inet_get+0x1f/0x150 [ 1438.307035][T23457] nf_conncount_init+0x127/0x380 [ 1438.311996][T23457] ovs_ct_init+0x316/0x490 [ 1438.316430][T23457] ovs_init_net+0x1e6/0x250 [ 1438.320952][T23457] ops_init+0x397/0x640 [ 1438.325222][T23457] setup_net+0x3b6/0xa30 [ 1438.329489][T23457] copy_net_ns+0x36d/0x5e0 [ 1438.333931][T23457] create_new_namespaces+0x3d3/0x6f0 [ 1438.339229][T23457] unshare_nsproxy_namespaces+0x11a/0x160 [ 1438.344963][T23457] ksys_unshare+0x507/0x8c0 [ 1438.349482][T23457] __x64_sys_unshare+0x38/0x40 [ 1438.354257][T23457] do_syscall_64+0x55/0xa0 [ 1438.358684][T23457] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1438.364593][T23457] [ 1438.366923][T23457] Second to last potentially related work creation: [ 1438.373508][T23457] kasan_save_stack+0x3e/0x60 [ 1438.378204][T23457] __kasan_record_aux_stack+0xaf/0xc0 [ 1438.383593][T23457] call_rcu+0x153/0x950 [ 1438.387760][T23457] nf_nat_unregister_fn+0x1f4/0x380 [ 1438.392978][T23457] iptable_nat_net_pre_exit+0x78/0x90 [ 1438.398364][T23457] cleanup_net+0x595/0xbb0 [ 1438.402791][T23457] process_scheduled_works+0xa5d/0x15d0 [ 1438.408352][T23457] worker_thread+0xa55/0xfc0 [ 1438.412952][T23457] kthread+0x2fa/0x390 [ 1438.417026][T23457] ret_from_fork+0x48/0x80 [ 1438.421452][T23457] ret_from_fork_asm+0x11/0x20 [ 1438.426229][T23457] [ 1438.428558][T23457] The buggy address belongs to the object at ffff8880268cea00 [ 1438.428558][T23457] which belongs to the cache kmalloc-cg-64 of size 64 [ 1438.442712][T23457] The buggy address is located 16 bytes inside of [ 1438.442712][T23457] allocated 40-byte region [ffff8880268cea00, ffff8880268cea28) [ 1438.456965][T23457] [ 1438.459301][T23457] The buggy address belongs to the physical page: [ 1438.465719][T23457] page:ffffea00009a3380 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x268ce [ 1438.476491][T23457] memcg:ffff88806990c601 [ 1438.480746][T23457] flags: 0xfff00000000800(slab|node=0|zone=1|lastcpupid=0x7ff) [ 1438.488298][T23457] page_type: 0xffffffff() [ 1438.492636][T23457] raw: 00fff00000000800 ffff888017c4da00 ffffea00017f4940 dead000000000004 [ 1438.501319][T23457] raw: 0000000000000000 0000000080200020 00000001ffffffff ffff88806990c601 [ 1438.509999][T23457] page dumped because: kasan: bad access detected [ 1438.516412][T23457] page_owner tracks the page as allocated [ 1438.522144][T23457] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x16cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_NORETRY), pid 5146, tgid 5146 (udevd), ts 35239789116, free_ts 35238716047 [ 1438.541877][T23457] post_alloc_hook+0x1c1/0x200 [ 1438.546672][T23457] get_page_from_freelist+0x1951/0x19e0 [ 1438.552272][T23457] __alloc_pages+0x1f0/0x460 [ 1438.556876][T23457] alloc_slab_page+0x5d/0x160 [ 1438.561563][T23457] new_slab+0x87/0x2d0 [ 1438.565635][T23457] ___slab_alloc+0xc5d/0x12f0 [ 1438.570326][T23457] __kmem_cache_alloc_node+0x19e/0x250 [ 1438.575799][T23457] __kmalloc+0xa4/0x230 [ 1438.579966][T23457] inotify_handle_inode_event+0x18a/0x560 [ 1438.585697][T23457] fsnotify+0x1353/0x17c0 [ 1438.590033][T23457] __fsnotify_parent+0x655/0x7c0 [ 1438.594979][T23457] notify_change+0xb47/0xe10 [ 1438.599581][T23457] chmod_common+0x252/0x3f0 [ 1438.604182][T23457] do_fchmodat+0x10c/0x1e0 [ 1438.608606][T23457] __x64_sys_chmod+0x62/0x70 [ 1438.613203][T23457] do_syscall_64+0x55/0xa0 [ 1438.617633][T23457] page last free stack trace: [ 1438.622305][T23457] free_unref_page_prepare+0x7b2/0x8c0 [ 1438.627780][T23457] free_unref_page+0x32/0x2e0 [ 1438.632473][T23457] __unfreeze_partials+0x1cf/0x210 [ 1438.637598][T23457] put_cpu_partial+0x17c/0x250 [ 1438.642366][T23457] __slab_free+0x319/0x400 [ 1438.646791][T23457] qlist_free_all+0x75/0xd0 [ 1438.651312][T23457] kasan_quarantine_reduce+0x143/0x160 [ 1438.656783][T23457] __kasan_slab_alloc+0x22/0x80 [ 1438.661641][T23457] slab_post_alloc_hook+0x6e/0x4b0 [ 1438.666766][T23457] kmem_cache_alloc+0x11a/0x2d0 [ 1438.671646][T23457] getname_flags+0xbb/0x500 [ 1438.676159][T23457] vfs_fstatat+0x111/0x1b0 [ 1438.680587][T23457] __x64_sys_newfstatat+0x149/0x1f0 [ 1438.685797][T23457] do_syscall_64+0x55/0xa0 [ 1438.690217][T23457] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1438.696124][T23457] [ 1438.698458][T23457] Memory state around the buggy address: [ 1438.704092][T23457] ffff8880268ce900: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc [ 1438.712157][T23457] ffff8880268ce980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1438.720220][T23457] >ffff8880268cea00: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 1438.728387][T23457] ^ [ 1438.733764][T23457] ffff8880268cea80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1438.741915][T23457] ffff8880268ceb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 1438.749979][T23457] ================================================================== [ 1438.758130][T23457] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 1438.765325][T23457] CPU: 1 PID: 23457 Comm: syz.7.4704 Not tainted syzkaller #0 [ 1438.772791][T23457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1438.782849][T23457] Call Trace: [ 1438.786136][T23457] [ 1438.789085][T23457] dump_stack_lvl+0x18c/0x250 [ 1438.793789][T23457] ? show_regs_print_info+0x20/0x20 [ 1438.799002][T23457] ? load_image+0x420/0x420 [ 1438.803525][T23457] panic+0x2dc/0x730 [ 1438.807441][T23457] ? __lock_acquire+0x7d40/0x7d40 [ 1438.812489][T23457] ? bpf_jit_dump+0xd0/0xd0 [ 1438.817009][T23457] ? _raw_spin_unlock_irqrestore+0xc5/0x120 [ 1438.822917][T23457] ? _raw_spin_unlock+0x40/0x40 [ 1438.827778][T23457] ? __bpf_get_stackid+0x6bf/0x900 [ 1438.832904][T23457] check_panic_on_warn+0x84/0xa0 [ 1438.837853][T23457] ? __bpf_get_stackid+0x6bf/0x900 [ 1438.842977][T23457] end_report+0x6f/0x130 [ 1438.847235][T23457] kasan_report+0x128/0x150 [ 1438.851753][T23457] ? __bpf_get_stackid+0x6bf/0x900 [ 1438.856876][T23457] kasan_check_range+0x241/0x290 [ 1438.861825][T23457] ? __bpf_get_stackid+0x6bf/0x900 [ 1438.866949][T23457] __asan_memcpy+0x40/0x70 [ 1438.871378][T23457] __bpf_get_stackid+0x6bf/0x900 [ 1438.876331][T23457] bpf_get_stackid_pe+0x343/0x410 [ 1438.881370][T23457] bpf_prog_a448e89f4c9ad9d1+0x30/0x4a [ 1438.886842][T23457] bpf_overflow_handler+0x1fc/0x510 [ 1438.892055][T23457] ? bpf_overflow_handler+0xde/0x510 [ 1438.897352][T23457] ? tp_perf_event_destroy+0x20/0x20 [ 1438.902651][T23457] ? unwind_get_return_address+0x91/0xc0 [ 1438.908295][T23457] ? __perf_event_account_interrupt+0x187/0x280 [ 1438.914547][T23457] __perf_event_overflow+0x447/0x630 [ 1438.919847][T23457] perf_swevent_event+0x319/0x570 [ 1438.924883][T23457] ? perf_tp_event+0x1520/0x1520 [ 1438.929923][T23457] ___perf_sw_event+0x4a7/0x730 [ 1438.934785][T23457] ? ___perf_sw_event+0x199/0x730 [ 1438.939827][T23457] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 1438.946339][T23457] ? __lock_acquire+0x1347/0x7d40 [ 1438.951377][T23457] ? rep_movs_alternative+0x4a/0x90 [ 1438.956591][T23457] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 1438.962585][T23457] ? lock_chain_count+0x20/0x20 [ 1438.967447][T23457] __perf_sw_event+0x139/0x270 [ 1438.972227][T23457] do_user_addr_fault+0x123e/0x12c0 [ 1438.977462][T23457] ? rcu_is_watching+0x15/0xb0 [ 1438.982250][T23457] exc_page_fault+0x64/0x100 [ 1438.986855][T23457] asm_exc_page_fault+0x26/0x30 [ 1438.991717][T23457] RIP: 0010:rep_movs_alternative+0x4a/0x90 [ 1438.997530][T23457] Code: 75 f1 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 df 83 f9 08 73 e8 eb c9 a4 c3 48 8b 06 48 89 07 48 8d 47 08 48 83 e0 f8 48 29 f8 48 01 [ 1439.017156][T23457] RSP: 0018:ffffc9000328f798 EFLAGS: 00050206 [ 1439.023236][T23457] RAX: ffffffff8427e501 RBX: 0000000000033fe0 RCX: 0000000000032020 [ 1439.031216][T23457] RDX: 0000000000000001 RSI: 0000200000002000 RDI: ffffc90003412fc0 [ 1439.039197][T23457] RBP: ffffc9000328f8f0 R08: ffffc90003444fdf R09: 1ffff920006889fb [ 1439.047200][T23457] R10: dffffc0000000000 R11: fffff520006889fc R12: ffffc90003411000 [ 1439.055212][T23457] R13: 0000200000000040 R14: ffffc9000328fe38 R15: 1ffff92000651fc7 [ 1439.063198][T23457] ? _copy_from_iter+0x201/0x12e0 [ 1439.068246][T23457] _copy_from_iter+0x24e/0x12e0 [ 1439.073112][T23457] ? find_vmap_area+0xfc/0x110 [ 1439.077887][T23457] ? __lock_acquire+0x7d40/0x7d40 [ 1439.082921][T23457] ? copyout_mc+0x70/0x70 [ 1439.087262][T23457] ? do_raw_spin_unlock+0x121/0x230 [ 1439.092471][T23457] ? _raw_spin_unlock+0x28/0x40 [ 1439.097344][T23457] ? find_vmap_area+0xfc/0x110 [ 1439.102120][T23457] ? __check_object_size+0x506/0xa20 [ 1439.107417][T23457] netlink_sendmsg+0x76b/0xbf0 [ 1439.112202][T23457] ? netlink_getsockopt+0x590/0x590 [ 1439.117418][T23457] ? aa_sock_msg_perm+0x94/0x150 [ 1439.122369][T23457] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 1439.127665][T23457] ? security_socket_sendmsg+0x80/0xa0 [ 1439.133133][T23457] ? netlink_getsockopt+0x590/0x590 [ 1439.138349][T23457] ____sys_sendmsg+0x5ba/0x960 [ 1439.143125][T23457] ? __asan_memset+0x22/0x40 [ 1439.147734][T23457] ? __sys_sendmsg_sock+0x30/0x30 [ 1439.152767][T23457] ? __import_iovec+0x5f2/0x850 [ 1439.157628][T23457] ? import_iovec+0x73/0xa0 [ 1439.162138][T23457] ___sys_sendmsg+0x2a6/0x360 [ 1439.166826][T23457] ? __sys_sendmsg+0x2a0/0x2a0 [ 1439.171608][T23457] ? debug_mutex_init+0x38/0x70 [ 1439.176487][T23457] __se_sys_sendmsg+0x1c2/0x2b0 [ 1439.181350][T23457] ? __x64_sys_sendmsg+0x80/0x80 [ 1439.186302][T23457] ? lockdep_hardirqs_on+0x98/0x150 [ 1439.191517][T23457] do_syscall_64+0x55/0xa0 [ 1439.195942][T23457] ? clear_bhb_loop+0x40/0x90 [ 1439.200629][T23457] ? clear_bhb_loop+0x40/0x90 [ 1439.205318][T23457] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1439.211221][T23457] RIP: 0033:0x7fd1c0f9c819 [ 1439.215645][T23457] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1439.235261][T23457] RSP: 002b:00007fd1c1eda028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1439.243683][T23457] RAX: ffffffffffffffda RBX: 00007fd1c1215fa0 RCX: 00007fd1c0f9c819 [ 1439.251663][T23457] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 000000000000000f [ 1439.259653][T23457] RBP: 00007fd1c1032c91 R08: 0000000000000000 R09: 0000000000000000 [ 1439.267658][T23457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1439.275692][T23457] R13: 00007fd1c1216038 R14: 00007fd1c1215fa0 R15: 00007ffcd7f58298 [ 1439.283711][T23457] [ 1439.287078][T23457] Kernel Offset: disabled [ 1439.291406][T23457] Rebooting in 86400 seconds..