last executing test programs: 6m53.312240035s ago: executing program 1 (id=2594): socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000002cc0)={&(0x7f00000007c0), 0x6e, &(0x7f0000002c40)=[{&(0x7f0000000ac0)=""/253, 0xfd}, {&(0x7f0000000bc0)=""/46, 0x2e}, {&(0x7f0000000c00)=""/72, 0x48}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/234, 0xea}], 0x5}, 0x21) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}], 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x7, 0x2, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000300)="d8000000190081054e81f782db4cb9040a1d080006007c02e8fe55a10a0015000900142603600e1208000f4f1b000401a8001600200005400400027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000200"], 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x890b, &(0x7f0000000100)) 6m53.072182972s ago: executing program 1 (id=2596): r0 = perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640bd, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={&(0x7f0000000240), 0x2}, 0x8000, 0x5, 0x43a1bd74, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$kcm(0x2b, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0xfa, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x0, @perf_config_ext={0x7, 0x3fff8000}, 0x0, 0x4, 0x43a1bd79, 0x1, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x7, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) close(r3) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff7) r4 = perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0xa, 0x7f, 0x12, 0xb, 0x0, 0x1, 0x42068, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xb, 0x4, @perf_bp={&(0x7f00000002c0), 0x9}, 0x10c540, 0x8d, 0x16e, 0x6, 0x1, 0x83, 0x5, 0x0, 0x5, 0x0, 0xc68}, 0xffffffffffffffff, 0x3, r2, 0x4) r5 = socket$kcm(0x10, 0x2, 0x10) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x9, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="1400000035000b63d25a80648c2594f90424", 0x12}], 0x1}, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x2, 0x8, 0x1, 0xe, 0x0, 0x5, 0x29004, 0xe, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={0x0}, 0x104001, 0x80, 0x4, 0x6, 0x74, 0x466abfd7, 0x8000, 0x0, 0x8, 0x0, 0x56da}, 0x0, 0x10, r4, 0x9) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)=ANY=[], 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r8, &(0x7f0000000940), 0x0}, 0x20) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x6, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r9 = socket$kcm(0x10, 0x2, 0x4) close(r9) r10 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r10, 0x0, 0x20000004) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffdf1) recvmsg$kcm(r10, 0x0, 0x0) ioctl$TUNGETVNETLE(r3, 0x40047451, 0x0) close(r3) socket$kcm(0x22, 0x2, 0x26) 6m53.031422705s ago: executing program 2 (id=2598): r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0x0, @empty}, 0x80, 0x0}, 0x20000001) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0x2, 0x922000000001, 0x106) socket$kcm(0x2, 0x200000000000001, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000400)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180), 0x10) 6m52.908414063s ago: executing program 2 (id=2600): bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0), 0x8) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000040)=ANY=[@ANYRES64=0x0], 0x0, 0x34}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0xc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000000c0)={0x0, 0x1}, 0x8}, 0x94) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8040, 0x0, 0x0, 0x8, 0x8000, 0x0, 0xffff, 0x0, 0x802, 0x0, 0xffffffffffffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x4, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x10420, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x200, 0x2}, 0x8000, 0x5, 0x43a1bd76, 0x0, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x22, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x60, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x11, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0xa, 0x3, 0xff, &(0x7f0000000000)) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000001000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000006"], 0x0, 0x26, 0x0, 0x1}, 0x28) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) close(r5) socket$kcm(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(r5, 0x8b14, &(0x7f0000000000)={'wlan1\x00', @random="0100008d8dff"}) 6m52.676423498s ago: executing program 3 (id=2602): perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffff, 0x81}, 0x100c, 0x7, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0x1, 0x2b4}, 0x0, 0x10000, 0x0, 0x0, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x11}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0xc, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001500)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/31], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) r3 = socket$kcm(0x10, 0x100000000002, 0x4) sendmsg$kcm(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000e00)="39000000140081ae00002c0005002d5601618575e285af01800000000d1300883795c04a31ba377a1b2cc37fffffffffffffffffffffffffff", 0x39}], 0x1, 0x0, 0x0, 0xc00e}, 0x2000c814) 6m52.253315828s ago: executing program 2 (id=2603): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x10, 0x10, &(0x7f00000002c0)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r0 = socket$kcm(0x2, 0x200000000000001, 0x106) ioctl$SIOCSIFHWADDR(r0, 0x8b1b, &(0x7f0000000000)={'wlan1\x00', @broadcast}) 6m52.252288268s ago: executing program 0 (id=2604): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f00000000c0)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x42}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xa1, 0xe, 0x0, 0x0, 0x0, 0x5, 0x200, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xe, 0x10}, 0x226, 0xb, 0x1, 0x3, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x23, 0x5, 0x0) socket$kcm(0x10, 0x3, 0x10) socket$kcm(0x10, 0x400000002, 0x0) socket$kcm(0xa, 0x5, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socket$kcm(0xa, 0x2, 0x0) r0 = socket$kcm(0x23, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000940)={r1, r1}) 6m52.189780173s ago: executing program 2 (id=2605): socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000002cc0)={&(0x7f00000007c0), 0x6e, &(0x7f0000002c40)=[{&(0x7f0000000ac0)=""/253, 0xfd}, {&(0x7f0000000bc0)=""/46, 0x2e}, {&(0x7f0000000c00)=""/72, 0x48}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/234, 0xea}], 0x5}, 0x21) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0}, 0x24000000) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}], 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x7, 0x2, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000300)="d8000000190081054e81f782db4cb9040a1d080006007c02e8fe55a10a0015000900142603600e1208000f4f1b000401a8001600200005400400027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000200"], 0x48) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x890b, &(0x7f0000000100)) 6m52.014656934s ago: executing program 1 (id=2606): socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_bp={0x0}, 0x110444, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES32], 0x20) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x16, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000640)="1400000028000b6394f90509a16dd8e50000cc577836970686eb8790519b82b4aa31cc3ce90019982fe75ad84b9a26f3b7b685", 0x33}], 0x1}, 0x4000000) 6m51.78615633s ago: executing program 3 (id=2607): r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0x0, @empty}, 0x80, 0x0}, 0x20000001) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0x2, 0x922000000001, 0x106) socket$kcm(0x2, 0x200000000000001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x920, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8, 0x4}, 0x24, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000400)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180), 0x10) 6m51.737309543s ago: executing program 0 (id=2608): r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0x0, @empty}, 0x80, 0x0}, 0x20000001) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0x2, 0x922000000001, 0x106) socket$kcm(0x2, 0x200000000000001, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000400)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180), 0x10) 6m51.63487425s ago: executing program 2 (id=2609): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x4a0f0000}, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000380)=ANY=[@ANYBLOB='1'], 0x31) 6m51.610983672s ago: executing program 2 (id=2610): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000d80)=[{0x0}], 0x1}, 0x20040000) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB], 0x0, 0x29, 0x0, 0x1, 0xfffffffa}, 0x28) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x5, 0x90, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x0, 0x0, &(0x7f0000000580)='GPL\x00', 0xd, 0x0, 0x0, 0x41000, 0x20, '\x00', 0x0, @sched_cls=0x2f, r1, 0x8, &(0x7f0000000640)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x9, 0x3, 0x1f}, 0x10, 0x0, 0xffffffffffffffff, 0x2, &(0x7f00000006c0), &(0x7f0000000700)=[{0x2, 0x1, 0xc, 0xc}, {0x2, 0x5, 0xa, 0xa}], 0x10, 0x58586df}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000500)=r4) r6 = socket$kcm(0xa, 0x2, 0x3a) sendmsg$kcm(r6, &(0x7f0000000440)={&(0x7f0000000800)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000c00)=[{0x0}], 0x1, 0x0, 0x0, 0x900}, 0x0) recvmsg(r6, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000040)=""/155, 0x1000000, 0x9b, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000feffffff0000000000040000851000000200000085000000230000009500000000000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 6m51.602809803s ago: executing program 1 (id=2611): bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0), 0x8) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000040)=ANY=[@ANYRES64=0x0], 0x0, 0x34}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0xc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000000c0)={0x0, 0x1}, 0x8}, 0x94) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8040, 0x0, 0x0, 0x8, 0x8000, 0x0, 0xffff, 0x0, 0x802, 0x0, 0xffffffffffffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x4, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x10420, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x200, 0x2}, 0x8000, 0x5, 0x43a1bd76, 0x0, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x22, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x60, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x11, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0xa, 0x3, 0xff, &(0x7f0000000000)) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000001000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000006"], 0x0, 0x26, 0x0, 0x1}, 0x28) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) close(r5) socket$kcm(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(r5, 0x8b14, &(0x7f0000000000)={'wlan1\x00', @random="0100008d8dff"}) 6m51.582433804s ago: executing program 3 (id=2612): r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0xd, &(0x7f0000000040), 0x8) (async) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x20000014) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, &(0x7f0000000ac0)=ANY=[@ANYBLOB="b7050000000000006110be00000000000fa000000000000095000000000000001f495ff727520cccddfad6fab92a770b445d050000006edc1b5613c5e35079725d19e88b662c2596b2f0b40aa9de45cf931a7ddaae7bdd97a9787684a5a6bbe879d6561715a194eb15d509b1837f6d317d12dd2c98f05e43aa14b3655a78009367bac65148a671b0ffd1c946b31202b7c73e0f1c5df29d57ed708602599a04fde318753c358d42ba7c52b4e20bc5c0e91fbc96da558c38891cd5bc38b6db9863a1273811976d15ba39fe2700"/218], &(0x7f00000002c0)='GPL\x00', 0x5, 0x9e, &(0x7f0000000300)=""/188, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f3, 0x10, &(0x7f0000000080), 0xfffffffffffffc79, 0x0, 0xffffffffffffffff, 0xfffffffffffffe21}, 0x2a) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0x5b, 0x63, &(0x7f00000000c0)="7eeaba00cbde0b52a32929e016313cd817bdd65ae86e22ed6b4ae57d1b9f0397aa68af5700720303f962c372bff7a4969950333401c7c89b400dd0bc5f3980befe9460a2ae8cffa468e74837e1b6989b3928e4fb9ceb58b16b7d68", &(0x7f0000000140)=""/99, 0x9da, 0x0, 0x1, 0xd, &(0x7f00000001c0)="02", &(0x7f0000000200)="fcc23b78fcc3956653f07dc620", 0x1, 0x0, 0x2}, 0x50) (async, rerun: 32) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440), 0x101, 0x0) (rerun: 32) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x8847, &(0x7f0000000140)=[{&(0x7f0000000180)="d8000000180081064e81f782db4cb904021d0800fd007c05e8fe55a10a0007000140020203600e4109000800ac00060311000000160012000a00f6000000035c3b61c1d67f6f94007134cf6efb8000a007a290457f01a7cee4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5ae24e25ccca9e00360db79826835d3a71d95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9000000008af26c8b7b55f4d2a6823a45f28fcb1d", 0xd8}], 0x1}, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) 6m51.518042358s ago: executing program 0 (id=2613): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x10, 0x10, &(0x7f00000002c0)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r0 = socket$kcm(0x2, 0x200000000000001, 0x106) ioctl$SIOCSIFHWADDR(r0, 0x8b1b, &(0x7f0000000000)={'wlan1\x00', @broadcast}) 6m51.368262779s ago: executing program 3 (id=2614): r0 = perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') 6m51.366929899s ago: executing program 1 (id=2615): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0700000004000000800100000400000028000000", @ANYRES32, @ANYBLOB="8100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000c2014c7343f2c67cbdda"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000100000000000000000000007112bd000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/63}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_type(r1, 0x0, 0x2, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r2, 0x0, 0xb, 0x0, 0x11) openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x10, 0x400000002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) 6m51.329526601s ago: executing program 0 (id=2616): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f00000000c0)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x42}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xa1, 0xe, 0x0, 0x0, 0x0, 0x5, 0x200, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xe, 0x10}, 0x226, 0xb, 0x1, 0x3, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x23, 0x5, 0x0) socket$kcm(0x10, 0x3, 0x10) socket$kcm(0x10, 0x400000002, 0x0) socket$kcm(0xa, 0x5, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socket$kcm(0xa, 0x2, 0x0) r0 = socket$kcm(0x23, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000000c0)=r1, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000940)={r1, r1}) 6m51.238413608s ago: executing program 3 (id=2617): socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000002cc0)={&(0x7f00000007c0), 0x6e, &(0x7f0000002c40)=[{&(0x7f0000000ac0)=""/253, 0xfd}, {&(0x7f0000000bc0)=""/46, 0x2e}, {&(0x7f0000000c00)=""/72, 0x48}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/234, 0xea}], 0x5}, 0x21) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0}, 0x24000000) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}], 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x7, 0x2, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000300)="d8000000190081054e81f782db4cb9040a1d080006007c02e8fe55a10a0015000900142603600e1208000f4f1b000401a8001600200005400400027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000200"], 0x48) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x890b, &(0x7f0000000100)) 6m51.152309563s ago: executing program 0 (id=2618): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x4a0f0000}, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000380)=ANY=[@ANYBLOB='1'], 0x31) 6m50.787666648s ago: executing program 3 (id=2619): socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_bp={0x0}, 0x110444, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES32], 0x20) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x16, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000640)="1400000028000b6394f90509a16dd8e50000cc577836970686eb8790519b82b4aa31cc3ce90019982fe75ad84b9a26f3b7b685", 0x33}], 0x1}, 0x4000000) 6m50.786416939s ago: executing program 0 (id=2627): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x3, &(0x7f0000001080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff, 0x700}, 0x10) socketpair$unix(0x1, 0xf, 0x0, &(0x7f00000006c0)) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="180200000100000000000000000000008500000053000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70600000000000085000000070000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x81) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000005c0)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="c1b9545dd30a1d31677b2d0bfa91", 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socket$kcm(0x22, 0x2, 0x21) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x50) perf_event_open(&(0x7f0000000e80)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x5, 0x9}, 0x8000, 0xcdd, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{}, &(0x7f0000000180)=0x20000, 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x1f, 0x11, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b708000000000000dbaaf8fff1000000b5080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000008000000850000006a000000850000005000000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r2, r1}, 0xc) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd63"], 0xcfa4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 6m50.786060159s ago: executing program 1 (id=2620): socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80100, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x100904, 0x401, 0x25, 0x0, 0x1, 0x200, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x6, &(0x7f0000000040), 0x4) sendmsg$kcm(r1, &(0x7f00000000c0)={&(0x7f0000003a40)=@l2tp6={0xa, 0x0, 0x3, @remote, 0x5, 0x4}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000080)='n', 0x1}], 0x1}, 0x2600c055) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8003}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x8, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x1d, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x37}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00', 0x800}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x94) close(0xffffffffffffffff) r5 = socket$kcm(0xa, 0x922000000003, 0x11) socket$kcm(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x922000000001, 0x106) setsockopt$sock_attach_bpf(r6, 0x6, 0x8, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2040) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000040)={r5, r4}) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x21, &(0x7f0000000440)=[{&(0x7f0000000000)="2e00000010008188040f46ecdb4cb9cca7480ef421000000e3bd6efb440013030e000a000d000908ba8000001201", 0x2e}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000001540)={&(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x3, @empty, 'nicvf0\x00'}}, 0x80, &(0x7f0000000140), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x1010}, 0x40050) 6m22.368318979s ago: executing program 32 (id=2627): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x3, &(0x7f0000001080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff, 0x700}, 0x10) socketpair$unix(0x1, 0xf, 0x0, &(0x7f00000006c0)) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="180200000100000000000000000000008500000053000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70600000000000085000000070000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x81) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000005c0)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="c1b9545dd30a1d31677b2d0bfa91", 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socket$kcm(0x22, 0x2, 0x21) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x50) perf_event_open(&(0x7f0000000e80)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x5, 0x9}, 0x8000, 0xcdd, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{}, &(0x7f0000000180)=0x20000, 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x1f, 0x11, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b708000000000000dbaaf8fff1000000b5080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000008000000850000006a000000850000005000000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r2, r1}, 0xc) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd63"], 0xcfa4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 6m21.582756053s ago: executing program 33 (id=2620): socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80100, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x100904, 0x401, 0x25, 0x0, 0x1, 0x200, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x6, &(0x7f0000000040), 0x4) sendmsg$kcm(r1, &(0x7f00000000c0)={&(0x7f0000003a40)=@l2tp6={0xa, 0x0, 0x3, @remote, 0x5, 0x4}, 0x80, &(0x7f0000003640)=[{&(0x7f0000000080)='n', 0x1}], 0x1}, 0x2600c055) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8003}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x8, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x1d, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x37}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00', 0x800}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x94) close(0xffffffffffffffff) r5 = socket$kcm(0xa, 0x922000000003, 0x11) socket$kcm(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x922000000001, 0x106) setsockopt$sock_attach_bpf(r6, 0x6, 0x8, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2040) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000040)={r5, r4}) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x21, &(0x7f0000000440)=[{&(0x7f0000000000)="2e00000010008188040f46ecdb4cb9cca7480ef421000000e3bd6efb440013030e000a000d000908ba8000001201", 0x2e}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000001540)={&(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x3, @empty, 'nicvf0\x00'}}, 0x80, &(0x7f0000000140), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x1010}, 0x40050) 6m21.438389573s ago: executing program 34 (id=2610): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000d80)=[{0x0}], 0x1}, 0x20040000) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB], 0x0, 0x29, 0x0, 0x1, 0xfffffffa}, 0x28) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x5, 0x90, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x0, 0x0, &(0x7f0000000580)='GPL\x00', 0xd, 0x0, 0x0, 0x41000, 0x20, '\x00', 0x0, @sched_cls=0x2f, r1, 0x8, &(0x7f0000000640)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0x9, 0x3, 0x1f}, 0x10, 0x0, 0xffffffffffffffff, 0x2, &(0x7f00000006c0), &(0x7f0000000700)=[{0x2, 0x1, 0xc, 0xc}, {0x2, 0x5, 0xa, 0xa}], 0x10, 0x58586df}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000500)=r4) r6 = socket$kcm(0xa, 0x2, 0x3a) sendmsg$kcm(r6, &(0x7f0000000440)={&(0x7f0000000800)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000c00)=[{0x0}], 0x1, 0x0, 0x0, 0x900}, 0x0) recvmsg(r6, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000040)=""/155, 0x1000000, 0x9b, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000feffffff0000000000040000851000000200000085000000230000009500000000000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 6m21.234137327s ago: executing program 35 (id=2619): socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_bp={0x0}, 0x110444, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES32], 0x20) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x16, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000640)="1400000028000b6394f90509a16dd8e50000cc577836970686eb8790519b82b4aa31cc3ce90019982fe75ad84b9a26f3b7b685", 0x33}], 0x1}, 0x4000000) 1m53.31334837s ago: executing program 6 (id=3699): r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000040)="3c00000033000b1229ae3f7f03b261130124fc60100c034008410000002000189215a2681cf6e50400003d490d20b735b16b6a44799406db26a57b35", 0x3c}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c2000000c000000050000000200005f00b99bb995197bfae5ed681964e4f5b07daad75570b898a70dd350ba582e3b0f18b6c9dacb2376aa81d8675e15fa66c1e309a3b56838ff7435b3ad6072b4c6b0121952957076437f32c0dd7c0801848d54672bc26b7c8a4e274dccba2e4da9c48ea02ad104f53fda710285ed919bff04daa9784d16f739631fb77c30af44895753dfc424b9a65dee40726f6a7b4509d3c6a5c31d573dd52fca5021b7ff06"], &(0x7f0000000bc0)=""/205, 0x29, 0xcd, 0x1}, 0x28) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x10c002, 0xac5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b06, &(0x7f0000000080)={'wlan1\x00', @random="02000000000a"}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) close(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40500000000000061104e000000000063012c000000000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110a0000000000063090000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x85}, 0x52) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2663}, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r2, 0x8010743f, 0xf0ff1f00000000) ioctl$SIOCSIFHWADDR(r1, 0x8b1a, &(0x7f0000000000)={'wlan1\x00', @random="0000230c1100"}) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000002040)={&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000001ec0)=[{&(0x7f0000000540)=""/229, 0xe5}, {0x0}, {&(0x7f0000000cc0)=""/4096, 0x1000}, {&(0x7f0000001cc0)=""/211, 0xd3}, {&(0x7f0000001dc0)=""/223, 0xdf}], 0x5, &(0x7f0000001f40)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xf0}, 0x22) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x5411, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000b40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8b04, &(0x7f0000000000)={'wlan1\x00', @random="0200"}) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000002940)="2000000020008107090f9becdb4cb96b0200000000fbff01", 0x18}], 0x1, 0x0, 0x0, 0x81000000}, 0x4) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000035c0)="5c00000013006bcd9e3fe3dc4e48aa31086b8703340000001f00000000000000040014000d000a00140000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}, {&(0x7f0000000000)="ac2ce416fe7bdea4b2e45ba1c5a18046fa6e1ccf7d89969d0206c6bc44fefd77ff5d35f98aa8ad3798f1e4b7a8c72be462c1973e4b927164649bceaf6bfa1d37a5461b17e100a7d40eeffa9a65300b23eb8f9499787c3851af0b78a8572f0b0bbefacfa21b0ef947cb0bf2334c2b4c9248faf0a8ef5057c6f396c9612b21964d8c09503e60ac030b9ec98609682d8abc283922455a8b76814ee7eff000a103644f17cfb755dcfc5dfa31df5b1376c1e5bfce", 0xb2}], 0x2, 0x0, 0x0, 0x1f000801}, 0x240000c0) 1m52.895931599s ago: executing program 4 (id=3701): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f00000012c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) bpf$BPF_PROG_DETACH(0x1c, &(0x7f0000000040)={@cgroup=r0, r0, 0x2f}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa1000000000000070100"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x7b}]}, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_clone(0x126400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d00)={0x0, 0x0}, 0x8) r4 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080)=r3, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000b40)={r4, 0x0, 0x0}, 0x10) 1m52.74310075s ago: executing program 6 (id=3704): bpf$MAP_CREATE(0x0, 0x0, 0x50) syz_clone(0x45004400, 0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x48283, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="1700000014008104", 0x8}], 0x1, 0x0, 0x0, 0x7400}, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x88, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x518, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1d00000004000000b658cb66a63fb76c7d020000000200000001020000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="010000000200"/28], 0x48) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'\x00', 0x52d35ce30131f272}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0xb) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r3, 0x0, 0x2, 0x0) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) socket$kcm(0x10, 0x400000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000008000000000050005"], 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e0000000400000008"], 0x48) (fail_nth: 1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000085000000a000000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)) 1m52.514662765s ago: executing program 4 (id=3705): bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = syz_clone(0x45004400, 0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x48283, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="1700000014008104", 0x8}], 0x1, 0x0, 0x0, 0x7400}, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r2, 0x10f, 0x88, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x518, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1d00000004000000b658cb66a63fb76c7d020000000200000001020000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="010000000200"/28], 0x48) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'\x00', 0x52d35ce30131f272}) ioctl$TUNSETOFFLOAD(r1, 0x400454c9, 0xb) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r5, 0x0, 0x2, 0x0) r6 = perf_event_open(&(0x7f00000012c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0xf0, 0x0, 0x200, 0x30921, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x10}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5}, r0, 0x4, r4, 0x9) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) socket$kcm(0x10, 0x400000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000008000000000050005"], 0x50) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e0000000400000008"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000085000000a000000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x5, 0xf, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xea, 0x0, 0x0, 0x0, 0x2000007}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000005c0)='GPL\x00', 0x9, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x100ff}, 0x94) r10 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, @perf_bp={0x0, 0xf}, 0x11009, 0x4, 0x0, 0x8, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r9) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000005c0)={@ifindex, r6, 0x15, 0x2, r8, @void, @value=r9}, 0x20) 1m50.255125941s ago: executing program 4 (id=3710): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x80141, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETLINK(r1, 0x400454cc, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x1c1440, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETOFFLOAD(r2, 0x400454ce, 0xa) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) bpf$TOKEN_CREATE(0x24, &(0x7f0000000140)={0x0, r0}, 0x8) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1c, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="18027a0000000000200000003b0000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r6, r5}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xc, 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="850000002200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0xe, &(0x7f0000002300)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xc463f262, 0x10, &(0x7f0000000040)}, 0x48) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/ipc\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r8, 0x1, 0x14, &(0x7f00000000c0), 0x43) recvmsg$unix(r8, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) close(r9) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000f0cd000000000000044e690085000000c400000095"], &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=r6, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r7, 0x0, 0xcc0, 0xfffffffffffffde6, &(0x7f00000001c0)="348b0d151f8218e3c73697e4080049c416b90900000093291cfc5e8b99005e8b9900", 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$TUNGETFILTER(r0, 0x801054db, 0x0) 1m49.656942662s ago: executing program 5 (id=3714): socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1800000066006bcd", 0x8}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) (async, rerun: 64) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) (async, rerun: 64) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000180081064e81f782db44b904021d080006007c09e8fe55a10a0015400100142603600e12080006000000040104001600400001", 0x37}], 0x1}, 0x0) (async) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="d800000018009d064e81060000000000000036660730e70d12c9dd97021d080006007cfce7fe55a10a0015000200142603600e1208000f", 0x37}], 0x1}, 0x0) (async) r1 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="563f00001a00599c6d0e000091d028ef80"], 0xfe33) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="8c38f0ff10"], 0x0, 0x1, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffe40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ff}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0xa, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000c9"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1d38}, 0x94) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa067707"], 0xfdef) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) (async, rerun: 64) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0xc, &(0x7f0000000100)=ANY=[@ANYBLOB="18020000feffffff0000000000000000850000004100000018010000756c6c2500000000003c20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x1ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x16, 0x3, &(0x7f0000001280)=ANY=[@ANYBLOB="620ac4ff00000000711051000000000095"], &(0x7f0000000480)='GPL\x00'}, 0x94) r3 = socket$kcm(0xa, 0x1, 0x0) recvmsg(r3, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x2140) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000073117600000000008510000002000000c50000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) (async) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000280)='hugetlb.2MB.rsvd.failcnt\x00', 0x2, 0x0) 1m49.366632802s ago: executing program 5 (id=3715): perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640bd, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x98, 0x2}, 0x8000, 0x5, 0x43a1bd74, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$kcm(0x2b, 0x0, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x7, 0x3fff8000}, 0x0, 0x4, 0x43a1bd79, 0x1, 0x9, 0x2006, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x240a, 0x0, 0x310c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = socket$kcm(0x22, 0x2, 0x21) socket$kcm(0x22, 0x2, 0x26) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x114905, 0x2004, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x2, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f00000006c0)={&(0x7f0000000340)=@l2tp={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000000640)=[{&(0x7f00000003c0)=""/22, 0x16}, {0x0}, {&(0x7f00000005c0)=""/88, 0x58}], 0x3}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r5, 0x4) r6 = socket$kcm(0x10, 0x3, 0x10) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000033000b3387dad256094bc7c308920fd2", 0x14}], 0x1}, 0x0) 1m48.891015784s ago: executing program 5 (id=3716): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\v\x00\x00\x00\b\x00\x00\x00\f\x00\x00\x00\x00'], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 1m45.74676524s ago: executing program 7 (id=3720): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7a, 0x9c}, [@call={0x25, 0x0, 0x0, 0x98000000}], {0x95, 0x0, 0xd00}}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x8, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x8000000, 0x10, 0x0, 0xffffffffffffff6c}, 0x3f) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x7, 0x3d, 0x7, 0x0, 0x0, 0x28040, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x4}, 0x180a2, 0x7ff, 0x6, 0x0, 0xb, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f0000000080)=ANY=[@ANYBLOB="180300000000000000000000000000008510000006000000180000002000000000000000000000007f00000000000000180000000000002000000000000000009500000000000000540300000400000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x45}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x2}, {}, {0xffff, 0x0, 0x6}, {}, {0x5}, {}, {0x0, 0x0, 0x0, 0x420008}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0d0000000a000000040000000100"], 0x48) r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x2, 0x0, 0xfffffffffffffcfb}, 0x30040805) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 1m44.838647123s ago: executing program 7 (id=3721): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7a, 0x9c}, [@call={0x25, 0x0, 0x0, 0x98000000}], {0x95, 0x0, 0xd00}}, 0x0, 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x8, '\x00', 0x0, @sock_ops}, 0x94) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x7, 0x3d, 0x7, 0x0, 0x0, 0x28040, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x4}, 0x180a2, 0x7ff, 0x6, 0x0, 0xb, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f0000000080)=ANY=[@ANYBLOB="180300000000000000000000000000008510000006000000180000002000000000000000000000007f"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x45}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000691226000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x2}, {}, {0xffff, 0x0, 0x6}, {}, {0x5}, {}, {0x0, 0x0, 0x0, 0x420008}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0d0000000a000000040000000100"], 0x48) r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 1m44.770041627s ago: executing program 5 (id=3722): r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000040)="3c00000033000b1229ae3f7f03b261130124fc60100c034008410000002000189215a2681cf6e50400003d490d20b735b16b6a44799406db26a57b35", 0x3c}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c2000000c000000050000000200005f00b99bb995197bfae5ed681964e4f5b07daad75570b898a70dd350ba582e3b0f18b6c9dacb2376aa81d8675e15fa66c1e309a3b56838ff7435b3ad6072b4c6b0121952957076437f32c0dd7c0801848d54672bc26b7c8a4e274dccba2e4da9c48ea02ad104f53fda710285ed919bff04daa9784d16f739631fb77c30af44895753dfc424b9a65dee40726f6a7b4509d3c6a5c31d573dd52fca5021b7ff06"], &(0x7f0000000bc0)=""/205, 0x29, 0xcd, 0x1}, 0x28) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x10c002, 0xac5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b06, &(0x7f0000000080)={'wlan1\x00', @random="02000000000a"}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) close(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40500000000000061104e000000000063012c000000000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110a0000000000063090000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x85}, 0x52) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2663}, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r2, 0x8010743f, 0xf0ff1f00000000) ioctl$SIOCSIFHWADDR(r1, 0x8b1a, &(0x7f0000000000)={'wlan1\x00', @random="0000230c1100"}) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000002040)={&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000001ec0)=[{&(0x7f0000000640)=""/57, 0x39}, {&(0x7f0000000cc0)=""/4096, 0x1000}, {&(0x7f0000001cc0)=""/211, 0xd3}, {&(0x7f0000001dc0)=""/223, 0xdf}], 0x4, &(0x7f0000001f40)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xf0}, 0x22) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x5411, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000b40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8b04, &(0x7f0000000000)={'wlan1\x00', @random="0200"}) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000002940)="2000000020008107090f9becdb4cb96b0200000000fbff01", 0x18}], 0x1, 0x0, 0x0, 0x81000000}, 0x4) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000035c0)="5c00000013006bcd9e3fe3dc4e48aa31086b8703340000001f00000000000000040014000d000a00140000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}, {&(0x7f0000000000)="ac2ce416fe7bdea4b2e45ba1c5a18046fa6e1ccf7d89969d0206c6bc44fefd77ff5d35f98aa8ad3798f1e4b7a8c72be462c1973e4b927164649bceaf6bfa1d37a5461b17e100a7d40eeffa9a65300b23eb8f9499787c3851af0b78a8572f0b0bbefacfa21b0ef947cb0bf2334c2b4c9248faf0a8ef5057c6f396c9612b21964d8c09503e60ac030b9ec98609682d8abc283922455a8b76814ee7eff000a103644f17cfb755dcfc5dfa31df5b1376c1e5bfce", 0xb2}], 0x2, 0x0, 0x0, 0x1f000801}, 0x240000c0) 1m44.618657627s ago: executing program 4 (id=3723): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x1, 0x4}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000bc00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000400850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0xe, 0x0, &(0x7f0000000000)="43227504000000b32415f73227b2", 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001001f000404000001007d60b7030000000000006a0a00fe00000100850000000d000000b7000000000000009500000000000000c74396c8e3ebbadc20e5a7ef8c9ac1465cbf188ef10871b81ac7553358380b3a1f59916ffc9bf0bdf81524f07fb2819bf5774fedda52e39c90af27db5b56024df96b4673b4e8d5467e114604ea09b290a248a120c9c6cd87cef9000000a39c15a7ef365cc27dfeac7b9b0e9048517354b0ca4f9cf8b59ee6fa003fe1f2c4c15f20a07db4583a462d8be6602186fd68ee14a19ea2eb42122b8635a66ce6b5b92356081bc0f18a0ca83dbc089a9813c1efa26001b3f486ebfaae85c4d0b96778478ae5355e6f923b11056969f486f80a35f7f2339704fa93fa915ab8e1e0d7f31ebd19455e6827cd493907bf9d0000000000000000000000004e1fa60acabcf0553910ca2e5ea499fd5889dde9261f0848a5b8af657bfc96049308e8953431b269053627a1523551c160c813969925a892d266792352ec0204596a37ce8d6d260b32239bddbce2e79f93cb5a0ad897adb53b397d07c50f84b74f2605a565ee149016aa75ea31c0087dcd821b47c8b36efc6da4fb2ea7f1f36c85856b73ac9872babc62149699b6b8c796a79d833eb4b5ca668d430db5653a2b3c5b87e17ca1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0xc}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffd, 0x5}, 0x2400, 0x0, 0x0, 0x0, 0x1000000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0x1b, 0x0, &(0x7f0000000040)="b90103606989068c3c270040f0832f9e0ff008001fffffe1ffff81", 0x0, 0x104, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 1m44.572114561s ago: executing program 7 (id=3724): perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640bd, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x98, 0x2}, 0x8000, 0x5, 0x43a1bd74, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$kcm(0x2b, 0x0, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x7, 0x3fff8000}, 0x0, 0x4, 0x43a1bd79, 0x1, 0x9, 0x2006, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x240a, 0x0, 0x310c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = socket$kcm(0x22, 0x2, 0x21) socket$kcm(0x22, 0x2, 0x26) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x114905, 0x2004, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x2, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f00000006c0)={&(0x7f0000000340)=@l2tp={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000000640)=[{&(0x7f00000003c0)=""/22, 0x16}, {0x0}, {&(0x7f00000005c0)=""/88, 0x58}], 0x3, &(0x7f0000000680)=""/13, 0xd}, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r5, 0x4) r6 = socket$kcm(0x10, 0x3, 0x10) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000033000b3387dad256094bc7c308920fd2", 0x14}], 0x1}, 0x0) 1m44.334693037s ago: executing program 5 (id=3725): socket$kcm(0xa, 0x2, 0x3a) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x100020, 0xfffe, 0x9e6, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd, 0x590f}, 0x2920, 0x0, 0x6, 0x8, 0x80000000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f00000003c0)='%pS \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000800)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) close(0x3) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r3, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000ffff0b867b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0xe, 0x48000000, &(0x7f0000000300)="40f0538ef047b21fb60068305500", 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r5 = perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, r5, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100000000, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x0, 0xcc05, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_bp={&(0x7f0000000080)}, 0x208, 0x0, 0xfffffffe, 0x0, 0x0, 0x800}, 0x0, 0x800000000000000, 0xffffffffffffffff, 0x0) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r8 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r8, 0x1, 0x41, &(0x7f0000000040)=r7, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r0, 0x58, &(0x7f0000000240)}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@decl_tag={0x2, 0x0, 0x0, 0x11, 0x4, 0x9}]}, {0x0, [0x30]}}, &(0x7f0000000400)=""/101, 0x2b, 0x65}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000700)={0x2}, 0x8) r9 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r9, 0xffff0000, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0, 0xffff0000}, 0x48) 1m44.30033124s ago: executing program 7 (id=3726): socket$kcm(0xa, 0x2, 0x3a) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x100020, 0xfffe, 0x9e6, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd, 0x590f}, 0x2920, 0x0, 0x6, 0x8, 0x80000000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f00000003c0)='%pS \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000800)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) close(0x3) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r3, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000ffff0b867b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0xe, 0x48000000, &(0x7f0000000300)="40f0538ef047b21fb60068305500", 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r5 = perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, r5, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100000000, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x0, 0xcc05, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_bp={&(0x7f0000000080)}, 0x208, 0x0, 0xfffffffe, 0x0, 0x0, 0x800}, 0x0, 0x800000000000000, 0xffffffffffffffff, 0x0) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000700)={0x2}, 0x8) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0xa, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x98) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r6, 0xffff0000, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0, 0xffff0000}, 0x48) 1m44.250827553s ago: executing program 6 (id=3727): r0 = socket$kcm(0x10, 0x3, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000014c0)={0xb, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000ddffffff00000000000000008500000027000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r1, 0x0, 0xe, 0x0, &(0x7f0000000340)="348b4d157b8ab1d21f8218e3c736", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f00000002c0)="1400000029000b92d25a80080000000000000047", 0x14}], 0x1}, 0x4000000) 1m44.117108722s ago: executing program 4 (id=3728): socket$kcm(0xa, 0x2, 0x3a) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x100020, 0xfffe, 0x9e6, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd, 0x590f}, 0x2920, 0x0, 0x6, 0x8, 0x80000000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f00000003c0)='%pS \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000800)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) close(0x3) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r3, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000ffff0b867b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0xe, 0x48000000, &(0x7f0000000300)="40f0538ef047b21fb60068305500", 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r5 = perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, r5, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100000000, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x0, 0xcc05, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_bp={&(0x7f0000000080)}, 0x208, 0x0, 0xfffffffe, 0x0, 0x0, 0x800}, 0x0, 0x800000000000000, 0xffffffffffffffff, 0x0) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socket$kcm(0xa, 0x2, 0x88) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000700)={0x2}, 0x8) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0xa, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x98) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r7, 0xffff0000, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0, 0xffff0000}, 0x48) 1m43.905035846s ago: executing program 6 (id=3729): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7a, 0x9c}, [@call={0x25, 0x0, 0x0, 0x98000000}], {0x95, 0x0, 0xd00}}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x8, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x8000000, 0x10, 0x0, 0xffffffffffffff6c}, 0x3f) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x7, 0x3d, 0x7, 0x0, 0x0, 0x28040, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x4}, 0x180a2, 0x7ff, 0x6, 0x0, 0xb, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f0000000080)=ANY=[@ANYBLOB="180300000000000000000000000000008510000006000000180000002000000000000000000000007f00000000000000180000000000002000000000000000009500000000000000540300000400000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x45}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x2}, {}, {0xffff, 0x0, 0x6}, {}, {0x5}, {}, {0x0, 0x0, 0x0, 0x420008}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0d0000000a000000040000000100"], 0x48) r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000), 0x2, 0x0, 0xfffffffffffffcfb}, 0x30040805) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 1m42.334273204s ago: executing program 6 (id=3730): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\v\x00\x00\x00\b\x00\x00\x00\f\x00\x00\x00\x00'], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x80000001, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 1m41.969866059s ago: executing program 5 (id=3731): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000bc0)="d80000001a0081044e81f782db4cb9041c1d0800fe007c05e8fe55a1080001000002000000000000080005007a010401a80016002000034004020000035c0461c9d67f4f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee501534eedba07d6e239b7a1ca16854695d1f79064485e75106300fa125f3d4ece1a0fa80983a3f1fdb3fefe626503fd22d1cc58463d0346a61fde641561ee9c851dc0c1cd706ff2f41398d8e7429039e7ff837d3150d78569e4243b96f7e5080199891344de62a210156a7b0a", 0xd8}], 0x1}, 0x4) r1 = getpid() perf_event_open(&(0x7f0000001100)={0x5, 0x80, 0x9, 0x8, 0xb, 0xfb, 0x0, 0x3c, 0xc002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x18842, 0x0, 0x7fffffff, 0x2, 0x3cd, 0x3, 0x7, 0x0, 0x0, 0x0, 0x7}, r1, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'tunl0\x00', 0x20}) perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0xec, 0x7, 0x40, 0xe5, 0x0, 0x0, 0xd000, 0x6, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={0x0, 0x2}, 0x40, 0xfc, 0x4, 0x0, 0x81, 0x9, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x100, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000300), 0x45) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'gretap0\x00', 0x112}) r5 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r7 = openat$cgroup_devices(r6, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x520, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0xa99, 0x3}, 0x8500, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}}, &(0x7f0000000040)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r8, 0x8, 0x0, 0x0, 0x30, &(0x7f0000000140), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0xd, &(0x7f0000000800)=ANY=[@ANYBLOB="85100000020000dd17200000fbdf07654337ba4df8da0263edce34f9cdccb1b6c0a485a1da", @ANYRES32=r2, @ANYBLOB="000000000300000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000003c0)='GPL\x00', 0xb60, 0x74, &(0x7f0000000400)=""/116, 0x41000, 0x46, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0xf, 0x80000001, 0x7}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[r2, r2, r2, 0x1, r2], &(0x7f00000006c0)=[{0x5, 0x5, 0x3, 0x3}, {0x3, 0x4, 0x9, 0x9}, {0x3, 0x3, 0x5, 0x6}, {0x2, 0x1, 0x3, 0x9}, {0x1, 0x2, 0x6, 0xb}], 0x10, 0xd}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r9) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x8000000001, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x7, 0x2}, 0x8386, 0x0, 0x100000, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r11}, &(0x7f0000000180), &(0x7f00000001c0)=r10}, 0x20) write$cgroup_devices(r7, &(0x7f0000000000)=ANY=[@ANYBLOB='c *:4\tw', @ANYRESHEX=r7], 0xa) socket$kcm(0xa, 0x1, 0x106) 1m41.919681223s ago: executing program 7 (id=3732): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7a, 0x9c}, [@call={0x25, 0x0, 0x0, 0x98000000}], {0x95, 0x0, 0xd00}}, 0x0, 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x8, '\x00', 0x0, @sock_ops}, 0x94) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x7, 0x3d, 0x7, 0x0, 0x0, 0x28040, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x4}, 0x180a2, 0x7ff, 0x6, 0x0, 0xb, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f0000000080)=ANY=[@ANYBLOB="180300000000000000000000000000008510000006000000180000002000000000000000000000007f"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x45}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000691226000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x2}, {}, {0xffff, 0x0, 0x6}, {}, {0x5}, {}, {0x0, 0x0, 0x0, 0x420008}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0d0000000a000000040000000100"], 0x48) r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) 1m41.818520449s ago: executing program 6 (id=3733): r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000040)="3c00000033000b1229ae3f7f03b261130124fc60100c034008410000002000189215a2681cf6e50400003d490d20b735b16b6a44799406db26a57b35", 0x3c}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c2000000c000000050000000200005f00b99bb995197bfae5ed681964e4f5b07daad75570b898a70dd350ba582e3b0f18b6c9dacb2376aa81d8675e15fa66c1e309a3b56838ff7435b3ad6072b4c6b0121952957076437f32c0dd7c0801848d54672bc26b7c8a4e274dccba2e4da9c48ea02ad104f53fda710285ed919bff04daa9784d16f739631fb77c30af44895753dfc424b9a65dee40726f6a7b4509d3c6a5c31d573dd52fca5021b7ff06"], &(0x7f0000000bc0)=""/205, 0x29, 0xcd, 0x1}, 0x28) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x10c002, 0xac5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b06, &(0x7f0000000080)={'wlan1\x00', @random="02000000000a"}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) close(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40500000000000061104e000000000063012c000000000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110a0000000000063090000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x85}, 0x52) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2663}, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r2, 0x8010743f, 0xf0ff1f00000000) ioctl$SIOCSIFHWADDR(r1, 0x8b1a, &(0x7f0000000000)={'wlan1\x00', @random="0000230c1100"}) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000002040)={&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000001ec0)=[{&(0x7f0000000640)=""/57, 0x39}, {&(0x7f0000000cc0)=""/4096, 0x1000}, {&(0x7f0000001cc0)=""/211, 0xd3}, {&(0x7f0000001dc0)=""/223, 0xdf}], 0x4, &(0x7f0000001f40)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xf0}, 0x22) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x5411, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000b40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8b04, &(0x7f0000000000)={'wlan1\x00', @random="0200"}) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000002940)="2000000020008107090f9becdb4cb96b0200000000fbff01", 0x18}], 0x1, 0x0, 0x0, 0x81000000}, 0x4) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000035c0)="5c00000013006bcd9e3fe3dc4e48aa31086b8703340000001f00000000000000040014000d000a00140000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}, {&(0x7f0000000000)="ac2ce416fe7bdea4b2e45ba1c5a18046fa6e1ccf7d89969d0206c6bc44fefd77ff5d35f98aa8ad3798f1e4b7a8c72be462c1973e4b927164649bceaf6bfa1d37a5461b17e100a7d40eeffa9a65300b23eb8f9499787c3851af0b78a8572f0b0bbefacfa21b0ef947cb0bf2334c2b4c9248faf0a8ef5057c6f396c9612b21964d8c09503e60ac030b9ec98609682d8abc283922455a8b76814ee7eff000a103644f17cfb755dcfc5dfa31df5b1376c1e5bfce", 0xb2}], 0x2, 0x0, 0x0, 0x1f000801}, 0x240000c0) 1m41.604947194s ago: executing program 7 (id=3734): perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640bd, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x98, 0x2}, 0x8000, 0x5, 0x43a1bd74, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$kcm(0x2b, 0x0, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x7, 0x3fff8000}, 0x0, 0x4, 0x43a1bd79, 0x1, 0x9, 0x2006, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x240a, 0x0, 0x310c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = socket$kcm(0x22, 0x2, 0x21) socket$kcm(0x22, 0x2, 0x26) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x114905, 0x2004, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x6}, 0x0, 0x2, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f00000006c0)={&(0x7f0000000340)=@l2tp={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000000640)=[{&(0x7f00000003c0)=""/22, 0x16}, {0x0}, {&(0x7f00000005c0)=""/88, 0x58}], 0x3, &(0x7f0000000680)=""/13, 0xd}, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r5, 0x4) r6 = socket$kcm(0x10, 0x3, 0x10) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000033000b3387dad256094bc7c308920fd2", 0x14}], 0x1}, 0x0) 0s ago: executing program 4 (id=3735): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\t\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC, @ANYRES32=0x0, @ANYRESOCT=0x0], 0x48) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) close(0x3) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000000c0)={0x3, 0x80, 0x1, 0x0, 0x4, 0x3, 0x0, 0x6, 0x6000, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x576}, 0x40, 0x8, 0x0, 0x9, 0x80000000, 0xc0000000, 0x0, 0x0, 0x401, 0x0, 0x100000001}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000000c0)='`\x00\x00\x00N', 0x5}], 0x1}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB='8-N:'], 0x6a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904, 0x0, 0x0, 0x5}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="1800"/16], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1100000004000000040000000200000000000000", @ANYRES32, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80100, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x100904, 0x401, 0x25, 0x0, 0x1, 0x200, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffc}, 0x104101, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x40009, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0xffffffffffffffff, 0x3fff8000}, 0x0, 0xff, 0x43a1bd76, 0x7, 0x9, 0x3, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext={0x0, 0x1000000}, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r6, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x3, 0x13, &(0x7f00000001c0)=ANY=[@ANYBLOB="18020000057700000000000000000000182ec0002020702500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb70200000800c309b703000024000000850000000600000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007b00000095000000"], 0x0, 0x5, 0x0, 0x0, 0x41000, 0xc}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8b06, &(0x7f0000000080)={'wlan1\x00', @random="02000000000a"}) socket$kcm(0xa, 0x5, 0x0) kernel console output (not intermixed with test programs): 549630][T17211] netlink: 4595 bytes leftover after parsing attributes in process `syz.6.3056'. [ 908.576194][T17212] delete_channel: no stack [ 908.808213][T17222] netlink: 'syz.5.3061': attribute type 21 has an invalid length. [ 908.816710][T17222] netlink: 'syz.5.3061': attribute type 6 has an invalid length. [ 908.872399][T17222] netlink: 132 bytes leftover after parsing attributes in process `syz.5.3061'. [ 908.975172][T17224] netlink: 'syz.5.3061': attribute type 10 has an invalid length. [ 911.848769][T17224] team0: Device wg1 is of different type [ 912.189762][T17242] delete_channel: no stack [ 912.243771][T17242] delete_channel: no stack [ 912.503717][T17257] netlink: 'syz.4.3076': attribute type 21 has an invalid length. [ 912.755713][T17266] delete_channel: no stack [ 912.825835][T17265] delete_channel: no stack [ 913.221554][T17276] netlink: 'syz.7.3074': attribute type 2 has an invalid length. [ 914.524059][T17296] netlink: 'syz.6.3078': attribute type 2 has an invalid length. [ 914.583109][T17296] netlink: 'syz.6.3078': attribute type 1 has an invalid length. [ 914.635242][T17287] delete_channel: no stack [ 914.646220][T17296] netlink: 198800 bytes leftover after parsing attributes in process `syz.6.3078'. [ 914.651132][T17287] delete_channel: no stack [ 915.108169][T17305] delete_channel: no stack [ 915.112852][T17305] delete_channel: no stack [ 915.870084][T17327] delete_channel: no stack [ 915.893145][T17323] netlink: 'syz.7.3082': attribute type 21 has an invalid length. [ 915.963451][T17316] netlink: 'syz.6.3081': attribute type 10 has an invalid length. [ 915.980026][T17326] delete_channel: no stack [ 915.987980][T17316] netlink: 40 bytes leftover after parsing attributes in process `syz.6.3081'. [ 917.687823][T17363] netlink: 'syz.4.3091': attribute type 21 has an invalid length. [ 917.837817][T17363] netlink: 156 bytes leftover after parsing attributes in process `syz.4.3091'. [ 918.189198][ T12] wlan1: Trigger new scan to find an IBSS to join [ 919.475796][T17386] FAULT_INJECTION: forcing a failure. [ 919.475796][T17386] name failslab, interval 1, probability 0, space 0, times 0 [ 919.495670][T17386] CPU: 0 PID: 17386 Comm: syz.4.3093 Not tainted syzkaller #0 [ 919.503199][T17386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 919.513285][T17386] Call Trace: [ 919.516586][T17386] [ 919.519548][T17386] dump_stack_lvl+0x18c/0x250 [ 919.524277][T17386] ? show_regs_print_info+0x20/0x20 [ 919.529506][T17386] ? load_image+0x420/0x420 [ 919.534039][T17386] ? __might_sleep+0xe0/0xe0 [ 919.538653][T17386] ? __lock_acquire+0x7d40/0x7d40 [ 919.543708][T17386] should_fail_ex+0x39d/0x4d0 [ 919.548511][T17386] should_failslab+0x9/0x20 [ 919.553042][T17386] slab_pre_alloc_hook+0x59/0x310 [ 919.558086][T17386] ? lockdep_hardirqs_on+0x98/0x150 [ 919.563305][T17386] kmem_cache_alloc_node+0x60/0x320 [ 919.568698][T17386] ? __alloc_skb+0x103/0x2c0 [ 919.573307][T17386] __alloc_skb+0x103/0x2c0 [ 919.577737][T17386] netlink_ack+0x376/0x1180 [ 919.582274][T17386] ? __dev_queue_xmit+0x265/0x3660 [ 919.587413][T17386] ? netlink_dump+0xe50/0xe50 [ 919.592164][T17386] ? ref_tracker_free+0x690/0x840 [ 919.597219][T17386] netlink_rcv_skb+0x2c5/0x4d0 [ 919.602099][T17386] ? rtnetlink_bind+0x80/0x80 [ 919.606820][T17386] ? netlink_ack+0x1180/0x1180 [ 919.611618][T17386] ? __lock_acquire+0x7d40/0x7d40 [ 919.616671][T17386] ? netlink_deliver_tap+0x2e/0x1b0 [ 919.621900][T17386] netlink_unicast+0x751/0x8d0 [ 919.626690][T17386] netlink_sendmsg+0x8d0/0xbf0 [ 919.631486][T17386] ? netlink_getsockopt+0x590/0x590 [ 919.636716][T17386] ? aa_sock_msg_perm+0x94/0x150 [ 919.641775][T17386] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 919.647077][T17386] ? security_socket_sendmsg+0x80/0xa0 [ 919.652548][T17386] ? netlink_getsockopt+0x590/0x590 [ 919.657784][T17386] ____sys_sendmsg+0x5ba/0x960 [ 919.662660][T17386] ? __asan_memset+0x22/0x40 [ 919.667274][T17386] ? __sys_sendmsg_sock+0x30/0x30 [ 919.672428][T17386] ? __import_iovec+0x5f2/0x850 [ 919.677305][T17386] ? import_iovec+0x73/0xa0 [ 919.681825][T17386] ___sys_sendmsg+0x2a6/0x360 [ 919.686608][T17386] ? get_pid_task+0x20/0x1e0 [ 919.691374][T17386] ? __sys_sendmsg+0x2a0/0x2a0 [ 919.696305][T17386] ? __lock_acquire+0x7d40/0x7d40 [ 919.701378][T17386] __se_sys_sendmsg+0x1c2/0x2b0 [ 919.706518][T17386] ? __x64_sys_sendmsg+0x80/0x80 [ 919.711485][T17386] ? lockdep_hardirqs_on+0x98/0x150 [ 919.716703][T17386] do_syscall_64+0x55/0xa0 [ 919.721218][T17386] ? clear_bhb_loop+0x40/0x90 [ 919.726009][T17386] ? clear_bhb_loop+0x40/0x90 [ 919.730725][T17386] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 919.736661][T17386] RIP: 0033:0x7f21e379c819 [ 919.741125][T17386] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 919.760750][T17386] RSP: 002b:00007f21e46b8028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 919.769183][T17386] RAX: ffffffffffffffda RBX: 00007f21e3a15fa0 RCX: 00007f21e379c819 [ 919.777163][T17386] RDX: 000000002000c090 RSI: 0000200000000040 RDI: 0000000000000003 [ 919.785159][T17386] RBP: 00007f21e46b8090 R08: 0000000000000000 R09: 0000000000000000 [ 919.793148][T17386] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 919.801500][T17386] R13: 00007f21e3a16038 R14: 00007f21e3a15fa0 R15: 00007ffe20394d48 [ 919.809603][T17386] [ 919.945087][T17389] delete_channel: no stack [ 920.051410][T17387] delete_channel: no stack [ 920.259519][T17394] netlink: 'syz.6.3095': attribute type 21 has an invalid length. [ 920.295057][T17397] mac80211_hwsim hwsim116 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 920.364547][T17384] netlink: 'syz.5.3092': attribute type 10 has an invalid length. [ 920.392976][T17384] netlink: 40 bytes leftover after parsing attributes in process `syz.5.3092'. [ 920.678939][T17409] netlink: 'syz.4.3104': attribute type 21 has an invalid length. [ 921.277405][ T1127] wlan1: Trigger new scan to find an IBSS to join [ 922.032780][T17451] FAULT_INJECTION: forcing a failure. [ 922.032780][T17451] name failslab, interval 1, probability 0, space 0, times 0 [ 922.087407][T17451] CPU: 1 PID: 17451 Comm: syz.7.3107 Not tainted syzkaller #0 [ 922.094961][T17451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 922.105157][T17451] Call Trace: [ 922.108474][T17451] [ 922.111446][T17451] dump_stack_lvl+0x18c/0x250 [ 922.116220][T17451] ? show_regs_print_info+0x20/0x20 [ 922.121564][T17451] ? load_image+0x420/0x420 [ 922.126208][T17451] ? __might_sleep+0xe0/0xe0 [ 922.130849][T17451] ? __lock_acquire+0x7d40/0x7d40 [ 922.136022][T17451] should_fail_ex+0x39d/0x4d0 [ 922.140759][T17451] should_failslab+0x9/0x20 [ 922.145495][T17451] slab_pre_alloc_hook+0x59/0x310 [ 922.150665][T17451] ? __lock_acquire+0x7d40/0x7d40 [ 922.155749][T17451] kmem_cache_alloc_node+0x60/0x320 [ 922.161051][T17451] ? __alloc_skb+0x103/0x2c0 [ 922.165872][T17451] __alloc_skb+0x103/0x2c0 [ 922.170425][T17451] netlink_sendmsg+0x66a/0xbf0 [ 922.175255][T17451] ? netlink_getsockopt+0x590/0x590 [ 922.180510][T17451] ? aa_sock_msg_perm+0x94/0x150 [ 922.185497][T17451] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 922.190918][T17451] ? security_socket_sendmsg+0x80/0xa0 [ 922.196427][T17451] ? netlink_getsockopt+0x590/0x590 [ 922.201683][T17451] ____sys_sendmsg+0x5ba/0x960 [ 922.206502][T17451] ? __asan_memset+0x22/0x40 [ 922.211143][T17451] ? __sys_sendmsg_sock+0x30/0x30 [ 922.216332][T17451] ? __import_iovec+0x5f2/0x850 [ 922.221239][T17451] ? import_iovec+0x73/0xa0 [ 922.225793][T17451] ___sys_sendmsg+0x2a6/0x360 [ 922.230521][T17451] ? __sys_sendmsg+0x2a0/0x2a0 [ 922.235351][T17451] ? trace_call_bpf+0xc3/0x6c0 [ 922.240200][T17451] __se_sys_sendmsg+0x1c2/0x2b0 [ 922.245121][T17451] ? __x64_sys_sendmsg+0x80/0x80 [ 922.250129][T17451] ? lockdep_hardirqs_on+0x98/0x150 [ 922.255380][T17451] do_syscall_64+0x55/0xa0 [ 922.259844][T17451] ? clear_bhb_loop+0x40/0x90 [ 922.264566][T17451] ? clear_bhb_loop+0x40/0x90 [ 922.269291][T17451] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 922.275229][T17451] RIP: 0033:0x7feae159c819 [ 922.279680][T17451] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 922.299375][T17451] RSP: 002b:00007feae2371028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 922.300101][ T5779] Bluetooth: hci6: unexpected subevent 0x0a length: 150 > 30 [ 922.307832][T17451] RAX: ffffffffffffffda RBX: 00007feae1815fa0 RCX: 00007feae159c819 [ 922.307853][T17451] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 922.307868][T17451] RBP: 00007feae2371090 R08: 0000000000000000 R09: 0000000000000000 [ 922.307881][T17451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 922.307893][T17451] R13: 00007feae1816038 R14: 00007feae1815fa0 R15: 00007ffc206c8368 [ 922.307925][T17451] [ 923.006647][T17472] netlink: 'syz.5.3111': attribute type 21 has an invalid length. [ 923.211249][T17477] netlink: 'syz.7.3112': attribute type 2 has an invalid length. [ 923.227955][ T1127] wlan1: Creating new IBSS network, BSSID 0e:fd:b2:f5:2f:a0 [ 923.237541][T17477] netlink: 'syz.7.3112': attribute type 1 has an invalid length. [ 923.245371][T17477] netlink: 198800 bytes leftover after parsing attributes in process `syz.7.3112'. [ 923.523179][T17466] netlink: 4595 bytes leftover after parsing attributes in process `syz.6.3110'. [ 923.545793][T17466] netlink: 4595 bytes leftover after parsing attributes in process `syz.6.3110'. [ 923.658082][T17473] netlink: 4595 bytes leftover after parsing attributes in process `syz.6.3110'. [ 923.937742][T17488] netlink: 'syz.5.3122': attribute type 21 has an invalid length. [ 923.977685][T17484] delete_channel: no stack [ 923.982378][T17484] delete_channel: no stack [ 924.200915][ T12] wlan1: Trigger new scan to find an IBSS to join [ 924.502399][T17501] delete_channel: no stack [ 924.903128][T17497] delete_channel: no stack [ 925.389414][T17522] mac80211_hwsim hwsim117 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 925.405380][T17519] FAULT_INJECTION: forcing a failure. [ 925.405380][T17519] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 925.446071][T17515] netlink: 'syz.7.3118': attribute type 10 has an invalid length. [ 925.480441][T17519] CPU: 1 PID: 17519 Comm: syz.6.3119 Not tainted syzkaller #0 [ 925.488010][T17519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 925.498101][T17519] Call Trace: [ 925.501418][T17519] [ 925.504381][T17519] dump_stack_lvl+0x18c/0x250 [ 925.509115][T17519] ? show_regs_print_info+0x20/0x20 [ 925.514455][T17519] ? load_image+0x420/0x420 [ 925.519005][T17519] ? __might_fault+0xaa/0x120 [ 925.523721][T17519] ? __lock_acquire+0x7d40/0x7d40 [ 925.528800][T17519] should_fail_ex+0x39d/0x4d0 [ 925.533540][T17519] _copy_from_user+0x2f/0xe0 [ 925.538167][T17519] ___sys_sendmsg+0x1c7/0x360 [ 925.542892][T17519] ? get_pid_task+0x20/0x1e0 [ 925.547535][T17519] ? __sys_sendmsg+0x2a0/0x2a0 [ 925.552392][T17519] ? __lock_acquire+0x7d40/0x7d40 [ 925.557547][T17519] __se_sys_sendmsg+0x1c2/0x2b0 [ 925.562526][T17519] ? __x64_sys_sendmsg+0x80/0x80 [ 925.567540][T17519] ? lockdep_hardirqs_on+0x98/0x150 [ 925.572842][T17519] do_syscall_64+0x55/0xa0 [ 925.577298][T17519] ? clear_bhb_loop+0x40/0x90 [ 925.582041][T17519] ? clear_bhb_loop+0x40/0x90 [ 925.586762][T17519] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 925.592698][T17519] RIP: 0033:0x7f429eb9c819 [ 925.597148][T17519] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 925.616890][T17519] RSP: 002b:00007f429f9e9028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 925.625344][T17519] RAX: ffffffffffffffda RBX: 00007f429ee15fa0 RCX: 00007f429eb9c819 [ 925.633370][T17519] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000000000000010 [ 925.641374][T17519] RBP: 00007f429f9e9090 R08: 0000000000000000 R09: 0000000000000000 [ 925.649372][T17519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 925.657372][T17519] R13: 00007f429ee16038 R14: 00007f429ee15fa0 R15: 00007ffd0497aa38 [ 925.665412][T17519] [ 925.757792][T17515] netlink: 40 bytes leftover after parsing attributes in process `syz.7.3118'. [ 925.845211][T17523] netlink: 4595 bytes leftover after parsing attributes in process `syz.6.3119'. [ 925.944320][T17523] netlink: 4595 bytes leftover after parsing attributes in process `syz.6.3119'. [ 926.018415][T17527] netlink: 4595 bytes leftover after parsing attributes in process `syz.6.3119'. [ 926.685161][T17536] netlink: 209852 bytes leftover after parsing attributes in process `syz.7.3121'. [ 926.725781][T17536] openvswitch: netlink: IP tunnel attribute has 3052 unknown bytes. [ 927.147686][ T1127] wlan1: Trigger new scan to find an IBSS to join [ 927.167882][T17552] netlink: 10 bytes leftover after parsing attributes in process `syz.5.3124'. [ 927.238333][T17548] netlink: 126588 bytes leftover after parsing attributes in process `syz.5.3124'. [ 927.305777][ T12] wlan1: Creating new IBSS network, BSSID de:b2:3f:c8:66:d5 [ 927.427487][T17559] netlink: 'syz.4.3126': attribute type 21 has an invalid length. [ 927.578759][T17566] FAULT_INJECTION: forcing a failure. [ 927.578759][T17566] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 927.616895][T17566] CPU: 0 PID: 17566 Comm: syz.6.3129 Not tainted syzkaller #0 [ 927.624448][T17566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 927.631022][T17561] delete_channel: no stack [ 927.634528][T17566] Call Trace: [ 927.634566][T17566] [ 927.634576][T17566] dump_stack_lvl+0x18c/0x250 [ 927.645886][T17561] delete_channel: no stack [ 927.650023][T17566] ? show_regs_print_info+0x20/0x20 [ 927.650062][T17566] ? load_image+0x420/0x420 [ 927.650091][T17566] ? __lock_acquire+0x7d40/0x7d40 [ 927.650115][T17566] ? snprintf+0xe9/0x140 [ 927.650142][T17566] should_fail_ex+0x39d/0x4d0 [ 927.656329][T17570] delete_channel: no stack [ 927.659782][T17566] _copy_to_user+0x2f/0xa0 [ 927.659814][T17566] simple_read_from_buffer+0xe7/0x150 [ 927.659848][T17566] proc_fail_nth_read+0x1e8/0x260 [ 927.659880][T17566] ? proc_fault_inject_write+0x360/0x360 [ 927.659911][T17566] ? fsnotify_perm+0x271/0x5e0 [ 927.659939][T17566] ? proc_fault_inject_write+0x360/0x360 [ 927.659966][T17566] vfs_read+0x28b/0x970 [ 927.659997][T17566] ? kernel_read+0x1e0/0x1e0 [ 927.660025][T17566] ? __fget_files+0x28/0x4b0 [ 927.660048][T17566] ? __fget_files+0x28/0x4b0 [ 927.660073][T17566] ? __fget_files+0x43d/0x4b0 [ 927.660107][T17566] ? __fdget_pos+0x2a3/0x330 [ 927.742303][T17566] ? ksys_read+0x75/0x260 [ 927.746779][T17566] ksys_read+0x150/0x260 [ 927.751143][T17566] ? vfs_write+0x990/0x990 [ 927.755624][T17566] ? lockdep_hardirqs_on+0x98/0x150 [ 927.760880][T17566] do_syscall_64+0x55/0xa0 [ 927.765340][T17566] ? clear_bhb_loop+0x40/0x90 [ 927.770063][T17566] ? clear_bhb_loop+0x40/0x90 [ 927.774793][T17566] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 927.780740][T17566] RIP: 0033:0x7f429eb5d04e [ 927.785286][T17566] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 927.805120][T17566] RSP: 002b:00007f429f9e8fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 927.813687][T17566] RAX: ffffffffffffffda RBX: 00007f429f9e96c0 RCX: 00007f429eb5d04e [ 927.821799][T17566] RDX: 000000000000000f RSI: 00007f429f9e90a0 RDI: 0000000000000007 [ 927.829819][T17566] RBP: 00007f429f9e9090 R08: 0000000000000000 R09: 0000000000000000 [ 927.837838][T17566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 927.845852][T17566] R13: 00007f429ee16038 R14: 00007f429ee15fa0 R15: 00007ffd0497aa38 [ 927.854323][T17566] [ 927.861883][T17567] delete_channel: no stack [ 928.200189][T17582] netlink: 126588 bytes leftover after parsing attributes in process `syz.5.3131'. [ 928.218571][ T1127] wlan1: Trigger new scan to find an IBSS to join [ 928.689046][T17588] mac80211_hwsim hwsim119 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 928.709871][T17589] netlink: 176 bytes leftover after parsing attributes in process `syz.4.3133'. [ 928.788531][T17595] netlink: 'syz.6.3130': attribute type 10 has an invalid length. [ 928.796439][T17595] netlink: 40 bytes leftover after parsing attributes in process `syz.6.3130'. [ 928.835326][T17538] Bluetooth: hci7: command 0x0406 tx timeout [ 928.841575][T17538] Bluetooth: hci5: command 0x0406 tx timeout [ 928.848390][T17538] Bluetooth: hci3: command 0x0406 tx timeout [ 928.854453][T17538] Bluetooth: hci6: command 0x0406 tx timeout [ 929.282025][T17618] netlink: 'syz.4.3141': attribute type 21 has an invalid length. [ 929.373466][T17615] delete_channel: no stack [ 929.411334][T17614] delete_channel: no stack [ 929.586115][T17623] delete_channel: no stack [ 929.605980][T17623] delete_channel: no stack [ 930.437686][T17651] mac80211_hwsim hwsim116 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 930.583414][T17641] netlink: 'syz.5.3148': attribute type 10 has an invalid length. [ 930.629262][T17659] delete_channel: no stack [ 930.682306][T17658] delete_channel: no stack [ 930.888528][T17664] netlink: 'syz.4.3154': attribute type 21 has an invalid length. [ 930.915172][T17665] FAULT_INJECTION: forcing a failure. [ 930.915172][T17665] name failslab, interval 1, probability 0, space 0, times 0 [ 930.947814][T17665] CPU: 0 PID: 17665 Comm: syz.7.3155 Not tainted syzkaller #0 [ 930.955391][T17665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 930.965596][T17665] Call Trace: [ 930.969015][T17665] [ 930.972000][T17665] dump_stack_lvl+0x18c/0x250 [ 930.976834][T17665] ? show_regs_print_info+0x20/0x20 [ 930.982079][T17665] ? load_image+0x420/0x420 [ 930.986698][T17665] ? __might_sleep+0xe0/0xe0 [ 930.991313][T17665] ? __lock_acquire+0x7d40/0x7d40 [ 930.996360][T17665] should_fail_ex+0x39d/0x4d0 [ 931.001068][T17665] should_failslab+0x9/0x20 [ 931.005590][T17665] slab_pre_alloc_hook+0x59/0x310 [ 931.010641][T17665] ? ftrace_profile_set_filter+0x10e/0x200 [ 931.016471][T17665] __kmem_cache_alloc_node+0x53/0x250 [ 931.021871][T17665] ? ftrace_profile_set_filter+0x10e/0x200 [ 931.027788][T17665] kmalloc_trace+0x2a/0xe0 [ 931.032230][T17665] ftrace_profile_set_filter+0x10e/0x200 [ 931.037886][T17665] perf_ioctl+0xa9a/0x24a0 [ 931.042348][T17665] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 931.047836][T17665] ? perf_poll+0x1b0/0x1b0 [ 931.052304][T17665] ? __fget_files+0x28/0x4b0 [ 931.056921][T17665] ? __fget_files+0x28/0x4b0 [ 931.061550][T17665] ? bpf_lsm_file_ioctl+0x9/0x10 [ 931.066501][T17665] ? security_file_ioctl+0x80/0xa0 [ 931.071630][T17665] ? perf_poll+0x1b0/0x1b0 [ 931.076071][T17665] __se_sys_ioctl+0xfd/0x170 [ 931.080687][T17665] do_syscall_64+0x55/0xa0 [ 931.085131][T17665] ? clear_bhb_loop+0x40/0x90 [ 931.089827][T17665] ? clear_bhb_loop+0x40/0x90 [ 931.094525][T17665] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 931.100435][T17665] RIP: 0033:0x7feae159c819 [ 931.104870][T17665] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 931.124508][T17665] RSP: 002b:00007feae2371028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 931.133031][T17665] RAX: ffffffffffffffda RBX: 00007feae1815fa0 RCX: 00007feae159c819 [ 931.141030][T17665] RDX: 0000200000000180 RSI: 0000000040082406 RDI: 0000000000000005 [ 931.149016][T17665] RBP: 00007feae2371090 R08: 0000000000000000 R09: 0000000000000000 [ 931.157026][T17665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 931.165096][T17665] R13: 00007feae1816038 R14: 00007feae1815fa0 R15: 00007ffc206c8368 [ 931.173104][T17665] [ 931.185330][ T12] wlan1: Trigger new scan to find an IBSS to join [ 931.880701][ T1289] ieee802154 phy0 wpan0: encryption failed: -22 [ 931.887236][ T1289] ieee802154 phy1 wpan1: encryption failed: -22 [ 932.006971][T17693] netlink: 'syz.4.3163': attribute type 10 has an invalid length. [ 932.027816][T17693] netlink: 'syz.4.3163': attribute type 10 has an invalid length. [ 932.061143][T17693] __nla_validate_parse: 2 callbacks suppressed [ 932.061161][T17693] netlink: 209216 bytes leftover after parsing attributes in process `syz.4.3163'. [ 932.068005][T17695] delete_channel: no stack [ 932.137348][T17694] delete_channel: no stack [ 932.163579][T17693] openvswitch: netlink: Message has 4 unknown bytes. [ 932.194726][ T59] wlan1: Trigger new scan to find an IBSS to join [ 933.208541][ T2961] wlan1: Trigger new scan to find an IBSS to join [ 933.678274][T17734] netlink: 'syz.5.3169': attribute type 21 has an invalid length. [ 935.102409][ T1127] wlan1: Trigger new scan to find an IBSS to join [ 935.675377][ T2961] wlan1: Trigger new scan to find an IBSS to join [ 936.571090][ T1127] wlan1: Trigger new scan to find an IBSS to join [ 936.783423][ T144] wlan1: Creating new IBSS network, BSSID 56:88:c6:50:37:fb [ 938.733481][ T12] wlan1: Creating new IBSS network, BSSID 6e:1a:b0:1e:d7:2b [ 939.381477][ T1140] wlan1: Creating new IBSS network, BSSID b6:06:bd:b2:ec:08 [ 940.447550][T17759] syzkaller0: entered promiscuous mode [ 940.453183][T17759] syzkaller0: entered allmulticast mode [ 940.678575][T17771] netlink: 132 bytes leftover after parsing attributes in process `syz.7.3175'. [ 941.299932][T17778] delete_channel: no stack [ 941.451366][T17776] delete_channel: no stack [ 942.558032][T17789] delete_channel: no stack [ 942.573237][T17789] delete_channel: no stack [ 947.377552][T17803] mac80211_hwsim hwsim117 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 947.409260][T17806] netlink: 'syz.7.3180': attribute type 10 has an invalid length. [ 947.430766][T17806] netlink: 40 bytes leftover after parsing attributes in process `syz.7.3180'. [ 947.513557][T17823] netlink: 'syz.5.3181': attribute type 33 has an invalid length. [ 947.547486][T17823] netlink: 152 bytes leftover after parsing attributes in process `syz.5.3181'. [ 947.701906][T17825] mac80211_hwsim hwsim119 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 947.805903][T17825] netlink: 'syz.6.3182': attribute type 10 has an invalid length. [ 947.847248][T17825] netlink: 40 bytes leftover after parsing attributes in process `syz.6.3182'. [ 948.080321][T17839] delete_channel: no stack [ 948.122726][T17838] delete_channel: no stack [ 948.343715][T17845] delete_channel: no stack [ 948.379851][T17845] delete_channel: no stack [ 948.412188][T17844] netlink: 132 bytes leftover after parsing attributes in process `syz.6.3187'. [ 950.209801][ T59] wlan1: Trigger new scan to find an IBSS to join [ 950.578790][T17885] mac80211_hwsim hwsim116 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 950.644788][T17886] netlink: 'syz.6.3195': attribute type 33 has an invalid length. [ 950.658395][T17886] netlink: 152 bytes leftover after parsing attributes in process `syz.6.3195'. [ 950.697097][T17877] netlink: 'syz.5.3194': attribute type 10 has an invalid length. [ 950.742958][T17877] netlink: 40 bytes leftover after parsing attributes in process `syz.5.3194'. [ 950.960142][T17898] mac80211_hwsim hwsim121 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 950.973790][T17904] delete_channel: no stack [ 950.996136][T17900] delete_channel: no stack [ 951.041864][T17893] netlink: 'syz.4.3196': attribute type 10 has an invalid length. [ 951.087370][T17893] netlink: 40 bytes leftover after parsing attributes in process `syz.4.3196'. [ 951.240030][ T1140] wlan1: Trigger new scan to find an IBSS to join [ 951.271921][T17908] delete_channel: no stack [ 951.276601][T17908] delete_channel: no stack [ 951.799167][T17924] netlink: 132 bytes leftover after parsing attributes in process `syz.6.3203'. [ 952.797793][T17941] netlink: 132 bytes leftover after parsing attributes in process `syz.7.3213'. [ 953.148012][ T12] wlan1: Trigger new scan to find an IBSS to join [ 953.155708][T17951] delete_channel: no stack [ 953.245040][ T1140] wlan1: Trigger new scan to find an IBSS to join [ 953.309944][T17948] delete_channel: no stack [ 954.187625][ T12] wlan1: Trigger new scan to find an IBSS to join [ 954.269158][T17966] mac80211_hwsim hwsim119 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 954.394061][T17962] netlink: 'syz.6.3208': attribute type 10 has an invalid length. [ 954.426565][T17962] netlink: 40 bytes leftover after parsing attributes in process `syz.6.3208'. [ 954.789074][T17967] syzkaller0: entered promiscuous mode [ 954.827323][T17967] syzkaller0: entered allmulticast mode [ 955.060216][T17981] netlink: 'syz.7.3210': attribute type 33 has an invalid length. [ 955.151501][ T59] wlan1: Trigger new scan to find an IBSS to join [ 955.159046][T17981] netlink: 152 bytes leftover after parsing attributes in process `syz.7.3210'. [ 955.277899][ T12] wlan1: Creating new IBSS network, BSSID 0a:0a:09:bb:37:5f [ 956.422004][T17990] delete_channel: no stack [ 956.426834][T17990] delete_channel: no stack [ 957.229059][ T59] wlan1: Trigger new scan to find an IBSS to join [ 957.235934][ T59] wlan1: Trigger new scan to find an IBSS to join [ 958.193033][ T59] wlan1: Trigger new scan to find an IBSS to join [ 959.237518][ T59] wlan1: Creating new IBSS network, BSSID be:ee:b7:46:23:5f [ 959.243600][ T1140] wlan1: Creating new IBSS network, BSSID 8a:c2:36:24:f1:05 [ 960.028021][T18010] netlink: 132 bytes leftover after parsing attributes in process `syz.6.3215'. [ 960.119001][T18009] mac80211_hwsim hwsim117 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 960.194990][T18008] mac80211_hwsim hwsim121 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 960.282219][T18020] netlink: 'syz.4.3224': attribute type 10 has an invalid length. [ 960.290428][T18020] netlink: 40 bytes leftover after parsing attributes in process `syz.4.3224'. [ 960.301014][T18009] netlink: 'syz.7.3214': attribute type 10 has an invalid length. [ 960.313823][T18009] netlink: 40 bytes leftover after parsing attributes in process `syz.7.3214'. [ 961.111455][T18043] FAULT_INJECTION: forcing a failure. [ 961.111455][T18043] name failslab, interval 1, probability 0, space 0, times 0 [ 961.155960][T18043] CPU: 1 PID: 18043 Comm: syz.4.3222 Not tainted syzkaller #0 [ 961.163506][T18043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 961.173805][T18043] Call Trace: [ 961.177100][T18043] [ 961.180046][T18043] dump_stack_lvl+0x18c/0x250 [ 961.184796][T18043] ? show_regs_print_info+0x20/0x20 [ 961.190014][T18043] ? load_image+0x420/0x420 [ 961.194620][T18043] ? __might_sleep+0xe0/0xe0 [ 961.199227][T18043] ? __lock_acquire+0x7d40/0x7d40 [ 961.204284][T18043] should_fail_ex+0x39d/0x4d0 [ 961.208988][T18043] should_failslab+0x9/0x20 [ 961.213509][T18043] slab_pre_alloc_hook+0x59/0x310 [ 961.218552][T18043] ? fib_insert_alias+0xa53/0x1280 [ 961.223676][T18043] __kmem_cache_alloc_node+0x53/0x250 [ 961.229164][T18043] ? fib_insert_alias+0xa53/0x1280 [ 961.234290][T18043] kmalloc_trace+0x2a/0xe0 [ 961.239248][T18043] fib_insert_alias+0xa53/0x1280 [ 961.244210][T18043] fib_trie_unmerge+0x30a/0xcd0 [ 961.249093][T18043] fib_unmerge+0xc0/0x350 [ 961.253478][T18043] ? fib_nl_newrule+0x1dc0/0x1dc0 [ 961.258534][T18043] fib4_rule_delete+0x45/0x3f0 [ 961.263330][T18043] fib_nl_delrule+0x152f/0x1da0 [ 961.268233][T18043] ? notify_rule_change+0x210/0x210 [ 961.273541][T18043] ? rcu_is_watching+0x15/0xb0 [ 961.278325][T18043] ? trace_contention_end+0x39/0xe0 [ 961.283563][T18043] ? notify_rule_change+0x210/0x210 [ 961.288864][T18043] rtnetlink_rcv_msg+0x869/0xfa0 [ 961.293814][T18043] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 961.298943][T18043] ? lockdep_hardirqs_on+0x98/0x150 [ 961.304162][T18043] ? rtnetlink_bind+0x80/0x80 [ 961.308851][T18043] ? preempt_schedule_common+0x82/0xc0 [ 961.314332][T18043] ? preempt_schedule+0xc0/0xd0 [ 961.319204][T18043] ? schedule_preempt_disabled+0x20/0x20 [ 961.324949][T18043] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 961.330972][T18043] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 961.336971][T18043] ? lock_chain_count+0x20/0x20 [ 961.341843][T18043] ? _raw_spin_unlock_irqrestore+0x86/0x120 [ 961.347810][T18043] ? lockdep_hardirqs_on+0x98/0x150 [ 961.353022][T18043] ? _raw_spin_unlock_irqrestore+0xc5/0x120 [ 961.358931][T18043] ? _raw_spin_unlock+0x40/0x40 [ 961.363807][T18043] ? rcu_preempt_deferred_qs_irqrestore+0x88e/0xce0 [ 961.370434][T18043] netlink_rcv_skb+0x241/0x4d0 [ 961.375304][T18043] ? rtnetlink_bind+0x80/0x80 [ 961.379993][T18043] ? netlink_ack+0x1180/0x1180 [ 961.384783][T18043] ? __lock_acquire+0x7d40/0x7d40 [ 961.389828][T18043] ? __rcu_read_unlock+0x7c/0xd0 [ 961.394780][T18043] ? netlink_deliver_tap+0x2e/0x1b0 [ 961.400091][T18043] netlink_unicast+0x751/0x8d0 [ 961.404948][T18043] netlink_sendmsg+0x8d0/0xbf0 [ 961.409826][T18043] ? netlink_getsockopt+0x590/0x590 [ 961.415045][T18043] ? aa_sock_msg_perm+0x94/0x150 [ 961.420018][T18043] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 961.425320][T18043] ? security_socket_sendmsg+0x80/0xa0 [ 961.430796][T18043] ? netlink_getsockopt+0x590/0x590 [ 961.436011][T18043] ____sys_sendmsg+0x5ba/0x960 [ 961.440881][T18043] ? __asan_memset+0x22/0x40 [ 961.445486][T18043] ? __sys_sendmsg_sock+0x30/0x30 [ 961.450519][T18043] ? __import_iovec+0x5f2/0x850 [ 961.455393][T18043] ? import_iovec+0x73/0xa0 [ 961.459909][T18043] ___sys_sendmsg+0x2a6/0x360 [ 961.464596][T18043] ? get_pid_task+0x20/0x1e0 [ 961.469380][T18043] ? __sys_sendmsg+0x2a0/0x2a0 [ 961.474177][T18043] ? __lock_acquire+0x7d40/0x7d40 [ 961.479329][T18043] __se_sys_sendmsg+0x1c2/0x2b0 [ 961.484197][T18043] ? __x64_sys_sendmsg+0x80/0x80 [ 961.489162][T18043] ? lockdep_hardirqs_on+0x98/0x150 [ 961.494389][T18043] do_syscall_64+0x55/0xa0 [ 961.498864][T18043] ? clear_bhb_loop+0x40/0x90 [ 961.503557][T18043] ? clear_bhb_loop+0x40/0x90 [ 961.508256][T18043] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 961.514164][T18043] RIP: 0033:0x7f21e379c819 [ 961.518596][T18043] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 961.538476][T18043] RSP: 002b:00007f21e46b8028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 961.546995][T18043] RAX: ffffffffffffffda RBX: 00007f21e3a15fa0 RCX: 00007f21e379c819 [ 961.554980][T18043] RDX: 0000000000000000 RSI: 0000200000000940 RDI: 0000000000000003 [ 961.562974][T18043] RBP: 00007f21e46b8090 R08: 0000000000000000 R09: 0000000000000000 [ 961.571048][T18043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 961.579038][T18043] R13: 00007f21e3a16038 R14: 00007f21e3a15fa0 R15: 00007ffe20394d48 [ 961.587035][T18043] [ 962.219680][ T1127] wlan1: Trigger new scan to find an IBSS to join [ 962.226551][ T1127] wlan1: Trigger new scan to find an IBSS to join [ 962.233167][ T59] wlan1: Trigger new scan to find an IBSS to join [ 962.350241][ T1127] wlan1: Creating new IBSS network, BSSID ba:77:45:0f:5f:1f [ 962.405833][T18066] netlink: 'syz.7.3227': attribute type 10 has an invalid length. [ 963.038243][T18070] netlink: 'syz.7.3227': attribute type 10 has an invalid length. [ 963.070343][T18070] netlink: 40 bytes leftover after parsing attributes in process `syz.7.3227'. [ 963.121436][T18070] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 965.893367][T18099] syzkaller0: entered promiscuous mode [ 965.924977][T18099] syzkaller0: entered allmulticast mode [ 966.207041][ T144] wlan1: Trigger new scan to find an IBSS to join [ 966.217400][ T12] wlan1: Trigger new scan to find an IBSS to join [ 966.273084][T18107] mac80211_hwsim hwsim116 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 966.391072][T18107] netlink: 'syz.5.3230': attribute type 10 has an invalid length. [ 966.437696][T18107] netlink: 40 bytes leftover after parsing attributes in process `syz.5.3230'. [ 967.172489][T18119] netlink: 'syz.4.3231': attribute type 5 has an invalid length. [ 968.188636][ T2961] wlan1: Creating new IBSS network, BSSID aa:e5:81:bb:fc:86 [ 968.196434][ T1127] wlan1: Creating new IBSS network, BSSID 0e:e3:cb:f6:fe:3e [ 970.194284][ T2966] wlan1: Trigger new scan to find an IBSS to join [ 970.936236][T18121] netlink: 63503 bytes leftover after parsing attributes in process `syz.5.3232'. [ 970.960193][T18134] veth1_to_bond: entered allmulticast mode [ 972.245229][T18147] IPv6: pim6reg1: Disabled Multicast RS [ 972.682476][T18175] mac80211_hwsim hwsim117 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 972.733781][T18173] veth1_to_bond: entered allmulticast mode [ 973.269653][T18183] netlink: 'syz.7.3242': attribute type 10 has an invalid length. [ 973.277739][T18183] netlink: 40 bytes leftover after parsing attributes in process `syz.7.3242'. [ 973.601279][T18197] netlink: 180 bytes leftover after parsing attributes in process `syz.7.3246'. [ 974.212483][ T1127] wlan1: Trigger new scan to find an IBSS to join [ 974.483997][ T1127] wlan1: Creating new IBSS network, BSSID 16:f9:80:c2:9a:8e [ 975.561681][ T2961] wlan1: Trigger new scan to find an IBSS to join [ 977.368990][T18244] FAULT_INJECTION: forcing a failure. [ 977.368990][T18244] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 977.447400][T18244] CPU: 1 PID: 18244 Comm: syz.5.3254 Not tainted syzkaller #0 [ 977.454953][T18244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 977.465051][T18244] Call Trace: [ 977.468363][T18244] [ 977.471330][T18244] dump_stack_lvl+0x18c/0x250 [ 977.476069][T18244] ? show_regs_print_info+0x20/0x20 [ 977.481434][T18244] ? load_image+0x420/0x420 [ 977.485991][T18244] ? __might_fault+0xaa/0x120 [ 977.490797][T18244] ? __lock_acquire+0x7d40/0x7d40 [ 977.495963][T18244] should_fail_ex+0x39d/0x4d0 [ 977.500700][T18244] _copy_from_iter+0x1d9/0x12e0 [ 977.505601][T18244] ? rep_movs_alternative+0x4a/0x90 [ 977.510842][T18244] ? _copy_from_iter+0x24e/0x12e0 [ 977.515912][T18244] ? __virt_addr_valid+0x18c/0x540 [ 977.521172][T18244] ? __lock_acquire+0x7d40/0x7d40 [ 977.526242][T18244] ? copyout_mc+0x70/0x70 [ 977.530630][T18244] ? copyout_mc+0x70/0x70 [ 977.535007][T18244] ? __virt_addr_valid+0x18c/0x540 [ 977.540184][T18244] ? page_copy_sane+0x16a/0x270 [ 977.545092][T18244] copy_page_from_iter+0x7b/0x100 [ 977.550168][T18244] skb_copy_datagram_from_iter+0x2e4/0x6e0 [ 977.556015][T18244] tun_get_user+0x15db/0x3ca0 [ 977.560724][T18244] ? aa_file_perm+0x11b/0xee0 [ 977.565547][T18244] ? rcu_read_unlock+0xa0/0xa0 [ 977.570511][T18244] ? tun_get+0x1c/0x2e0 [ 977.574811][T18244] ? __lock_acquire+0x7d40/0x7d40 [ 977.579894][T18244] ? tun_get+0x1c/0x2e0 [ 977.584107][T18244] tun_chr_write_iter+0x119/0x200 [ 977.588854][T18238] delete_channel: no stack [ 977.589249][T18244] vfs_write+0x46c/0x990 [ 977.593822][T18238] delete_channel: no stack [ 977.597913][T18244] ? file_end_write+0x250/0x250 [ 977.597946][T18244] ? __fget_files+0x43d/0x4b0 [ 977.597982][T18244] ? __fdget_pos+0x1d8/0x330 [ 977.616703][T18244] ? ksys_write+0x75/0x260 [ 977.621179][T18244] ksys_write+0x150/0x260 [ 977.625573][T18244] ? __ia32_sys_read+0x90/0x90 [ 977.630398][T18244] ? lockdep_hardirqs_on+0x98/0x150 [ 977.635648][T18244] do_syscall_64+0x55/0xa0 [ 977.640199][T18244] ? clear_bhb_loop+0x40/0x90 [ 977.645014][T18244] ? clear_bhb_loop+0x40/0x90 [ 977.649747][T18244] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 977.655870][T18244] RIP: 0033:0x7fb87379c819 [ 977.660321][T18244] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 977.679981][T18244] RSP: 002b:00007fb874705028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 977.688451][T18244] RAX: ffffffffffffffda RBX: 00007fb873a15fa0 RCX: 00007fb87379c819 [ 977.696470][T18244] RDX: 000000000000fdef RSI: 0000200000000640 RDI: 00000000000000c8 [ 977.704498][T18244] RBP: 00007fb874705090 R08: 0000000000000000 R09: 0000000000000000 [ 977.712563][T18244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 977.720577][T18244] R13: 00007fb873a16038 R14: 00007fb873a15fa0 R15: 00007ffc6de0e7c8 [ 977.728631][T18244] [ 978.121141][T18256] netlink: 'syz.7.3258': attribute type 10 has an invalid length. [ 978.211332][ T2966] wlan1: Trigger new scan to find an IBSS to join [ 978.227905][T18256] netlink: 40 bytes leftover after parsing attributes in process `syz.7.3258'. [ 979.369030][T18274] netlink: 180 bytes leftover after parsing attributes in process `syz.5.3261'. [ 980.192717][ T1127] wlan1: Creating new IBSS network, BSSID 52:c0:7e:81:dd:79 [ 980.398006][T18276] veth1_to_bond: entered allmulticast mode [ 982.095770][T18311] delete_channel: no stack [ 982.113227][T18311] delete_channel: no stack [ 985.056593][T18377] netlink: 180 bytes leftover after parsing attributes in process `syz.7.3279'. [ 985.144728][T18379] netlink: 'syz.5.3280': attribute type 10 has an invalid length. [ 985.306136][T18379] netlink: 40 bytes leftover after parsing attributes in process `syz.5.3280'. [ 985.392253][T18379] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 988.331018][T18407] netlink: 'syz.7.3285': attribute type 10 has an invalid length. [ 989.694369][T18427] netlink: 132 bytes leftover after parsing attributes in process `syz.5.3290'. [ 990.993937][T18444] netlink: 132 bytes leftover after parsing attributes in process `syz.6.3293'. [ 991.126029][T18440] netlink: 132 bytes leftover after parsing attributes in process `syz.4.3300'. [ 993.156986][T18466] netlink: 132 bytes leftover after parsing attributes in process `syz.5.3296'. [ 993.315172][ T1289] ieee802154 phy0 wpan0: encryption failed: -22 [ 993.321778][ T1289] ieee802154 phy1 wpan1: encryption failed: -22 [ 993.358670][T18468] mac80211_hwsim hwsim117 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 993.397131][T18468] netlink: 'syz.7.3297': attribute type 10 has an invalid length. [ 993.414290][T18468] netlink: 40 bytes leftover after parsing attributes in process `syz.7.3297'. [ 994.150504][T18484] netlink: 132 bytes leftover after parsing attributes in process `syz.5.3305'. [ 995.068849][T18492] delete_channel: no stack [ 995.073589][T18492] delete_channel: no stack [ 995.869344][T18508] netlink: 132 bytes leftover after parsing attributes in process `syz.5.3309'. [ 996.203182][ T1127] wlan1: Trigger new scan to find an IBSS to join [ 996.317105][T18511] FAULT_INJECTION: forcing a failure. [ 996.317105][T18511] name failslab, interval 1, probability 0, space 0, times 0 [ 996.341016][T18511] CPU: 1 PID: 18511 Comm: syz.6.3310 Not tainted syzkaller #0 [ 996.348649][T18511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 996.358763][T18511] Call Trace: [ 996.362082][T18511] [ 996.365046][T18511] dump_stack_lvl+0x18c/0x250 [ 996.369776][T18511] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 996.376073][T18511] ? show_regs_print_info+0x20/0x20 [ 996.381320][T18511] ? load_image+0x420/0x420 [ 996.385903][T18511] should_fail_ex+0x39d/0x4d0 [ 996.390649][T18511] should_failslab+0x9/0x20 [ 996.395208][T18511] slab_pre_alloc_hook+0x59/0x310 [ 996.400284][T18511] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 996.406398][T18511] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 996.412170][T18511] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 996.417934][T18511] __kmem_cache_alloc_node+0x53/0x250 [ 996.423359][T18511] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 996.429138][T18511] __kmalloc+0xa4/0x230 [ 996.433370][T18511] tomoyo_realpath_from_path+0xe3/0x5d0 [ 996.438990][T18511] tomoyo_path_number_perm+0x248/0x620 [ 996.444557][T18511] ? tomoyo_path_number_perm+0x217/0x620 [ 996.450251][T18511] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 996.455772][T18511] ? trace_call_bpf+0xc3/0x6c0 [ 996.460585][T18511] ? trace_call_bpf+0xc3/0x6c0 [ 996.465391][T18511] ? trace_call_bpf+0x5e9/0x6c0 [ 996.470388][T18511] ? __fget_files+0x28/0x4b0 [ 996.475002][T18511] ? __fget_files+0x28/0x4b0 [ 996.479620][T18511] security_file_ioctl+0x70/0xa0 [ 996.484590][T18511] __se_sys_ioctl+0x48/0x170 [ 996.489233][T18511] do_syscall_64+0x55/0xa0 [ 996.493664][T18511] ? clear_bhb_loop+0x40/0x90 [ 996.498357][T18511] ? clear_bhb_loop+0x40/0x90 [ 996.503060][T18511] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 996.508965][T18511] RIP: 0033:0x7f429eb9c819 [ 996.513392][T18511] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 996.533218][T18511] RSP: 002b:00007f429f9e9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 996.541917][T18511] RAX: ffffffffffffffda RBX: 00007f429ee15fa0 RCX: 00007f429eb9c819 [ 996.549903][T18511] RDX: 0000200000000000 RSI: 0000000000008937 RDI: 0000000000000008 [ 996.558063][T18511] RBP: 00007f429f9e9090 R08: 0000000000000000 R09: 0000000000000000 [ 996.566042][T18511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 996.574110][T18511] R13: 00007f429ee16038 R14: 00007f429ee15fa0 R15: 00007ffd0497aa38 [ 996.582199][T18511] [ 996.615491][T18511] ERROR: Out of memory at tomoyo_realpath_from_path. [ 996.966705][T18516] mac80211_hwsim hwsim119 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 997.012061][T18516] netlink: 'syz.6.3312': attribute type 10 has an invalid length. [ 997.046478][T18516] netlink: 40 bytes leftover after parsing attributes in process `syz.6.3312'. [ 997.618814][T18527] delete_channel: no stack [ 997.623544][T18527] delete_channel: no stack [ 998.363188][ T12] wlan1: Trigger new scan to find an IBSS to join [ 998.458868][T18538] netlink: 132 bytes leftover after parsing attributes in process `syz.7.3321'. [ 999.227548][ T59] wlan1: Trigger new scan to find an IBSS to join [ 1000.252898][T18563] netlink: 132 bytes leftover after parsing attributes in process `syz.7.3323'. [ 1000.514860][T18574] mac80211_hwsim hwsim119 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1000.601023][T18574] netlink: 'syz.6.3327': attribute type 10 has an invalid length. [ 1000.604887][T18576] FAULT_INJECTION: forcing a failure. [ 1000.604887][T18576] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1000.638924][T18574] netlink: 40 bytes leftover after parsing attributes in process `syz.6.3327'. [ 1000.657129][T18576] CPU: 1 PID: 18576 Comm: syz.5.3328 Not tainted syzkaller #0 [ 1000.664807][T18576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1000.674909][T18576] Call Trace: [ 1000.678247][T18576] [ 1000.681224][T18576] dump_stack_lvl+0x18c/0x250 [ 1000.685959][T18576] ? show_regs_print_info+0x20/0x20 [ 1000.691251][T18576] ? load_image+0x420/0x420 [ 1000.695806][T18576] ? __might_fault+0xaa/0x120 [ 1000.700523][T18576] ? __lock_acquire+0x7d40/0x7d40 [ 1000.705568][T18576] should_fail_ex+0x39d/0x4d0 [ 1000.710705][T18576] _copy_from_user+0x2f/0xe0 [ 1000.715336][T18576] ___sys_recvmsg+0x176/0x590 [ 1000.720052][T18576] ? __sys_recvmsg+0x2a0/0x2a0 [ 1000.725371][T18576] ? ktime_get+0x7f/0x280 [ 1000.729784][T18576] ? __fget_files+0x43d/0x4b0 [ 1000.734510][T18576] __x64_sys_recvmsg+0x20c/0x2e0 [ 1000.739475][T18576] ? perf_trace_preemptirq_template+0x269/0x330 [ 1000.745738][T18576] ? ___sys_recvmsg+0x590/0x590 [ 1000.750616][T18576] ? lockdep_hardirqs_on+0x98/0x150 [ 1000.755934][T18576] do_syscall_64+0x55/0xa0 [ 1000.760477][T18576] ? clear_bhb_loop+0x40/0x90 [ 1000.765178][T18576] ? clear_bhb_loop+0x40/0x90 [ 1000.769872][T18576] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1000.775786][T18576] RIP: 0033:0x7fb87379c819 [ 1000.780300][T18576] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1000.800015][T18576] RSP: 002b:00007fb874705028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1000.808445][T18576] RAX: ffffffffffffffda RBX: 00007fb873a15fa0 RCX: 00007fb87379c819 [ 1000.816424][T18576] RDX: 0000000000000020 RSI: 0000200000000d40 RDI: 000000000000000a [ 1000.824586][T18576] RBP: 00007fb874705090 R08: 0000000000000000 R09: 0000000000000000 [ 1000.832572][T18576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1000.840554][T18576] R13: 00007fb873a16038 R14: 00007fb873a15fa0 R15: 00007ffc6de0e7c8 [ 1000.848552][T18576] [ 1001.100932][T18581] delete_channel: no stack [ 1001.105626][T18581] delete_channel: no stack [ 1001.319321][ T144] wlan1: Trigger new scan to find an IBSS to join [ 1001.446584][ T144] wlan1: Creating new IBSS network, BSSID 62:25:54:bf:6a:63 [ 1002.747902][T18608] netlink: 132 bytes leftover after parsing attributes in process `syz.5.3332'. [ 1002.829334][T18607] netlink: 132 bytes leftover after parsing attributes in process `syz.4.3341'. [ 1003.189919][ T144] wlan1: Trigger new scan to find an IBSS to join [ 1004.143922][T18626] netlink: 4595 bytes leftover after parsing attributes in process `syz.7.3335'. [ 1004.747970][T18630] netlink: 132 bytes leftover after parsing attributes in process `syz.4.3337'. [ 1004.853383][T18637] mac80211_hwsim hwsim117 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1004.913777][T18637] netlink: 'syz.7.3340': attribute type 10 has an invalid length. [ 1004.931879][T18637] netlink: 40 bytes leftover after parsing attributes in process `syz.7.3340'. [ 1005.693441][T18648] FAULT_INJECTION: forcing a failure. [ 1005.693441][T18648] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1005.726967][T18648] CPU: 0 PID: 18648 Comm: syz.5.3344 Not tainted syzkaller #0 [ 1005.734542][T18648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1005.744741][T18648] Call Trace: [ 1005.748063][T18648] [ 1005.751030][T18648] dump_stack_lvl+0x18c/0x250 [ 1005.755747][T18648] ? show_regs_print_info+0x20/0x20 [ 1005.761118][T18648] ? load_image+0x420/0x420 [ 1005.765663][T18648] ? __lock_acquire+0x7d40/0x7d40 [ 1005.770707][T18648] ? snprintf+0xe9/0x140 [ 1005.775057][T18648] should_fail_ex+0x39d/0x4d0 [ 1005.779846][T18648] _copy_to_user+0x2f/0xa0 [ 1005.784276][T18648] simple_read_from_buffer+0xe7/0x150 [ 1005.789692][T18648] proc_fail_nth_read+0x1e8/0x260 [ 1005.794743][T18648] ? proc_fault_inject_write+0x360/0x360 [ 1005.800407][T18648] ? fsnotify_perm+0x271/0x5e0 [ 1005.805197][T18648] ? proc_fault_inject_write+0x360/0x360 [ 1005.810851][T18648] vfs_read+0x28b/0x970 [ 1005.815031][T18648] ? kernel_read+0x1e0/0x1e0 [ 1005.819725][T18648] ? __fget_files+0x28/0x4b0 [ 1005.824507][T18648] ? __fget_files+0x28/0x4b0 [ 1005.829116][T18648] ? __fget_files+0x43d/0x4b0 [ 1005.833821][T18648] ? __fdget_pos+0x2a3/0x330 [ 1005.838431][T18648] ? ksys_read+0x75/0x260 [ 1005.842781][T18648] ksys_read+0x150/0x260 [ 1005.847041][T18648] ? vfs_write+0x990/0x990 [ 1005.851570][T18648] ? lockdep_hardirqs_on+0x98/0x150 [ 1005.856826][T18648] do_syscall_64+0x55/0xa0 [ 1005.861260][T18648] ? clear_bhb_loop+0x40/0x90 [ 1005.865950][T18648] ? clear_bhb_loop+0x40/0x90 [ 1005.870646][T18648] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1005.876574][T18648] RIP: 0033:0x7fb87375d04e [ 1005.881024][T18648] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1005.900752][T18648] RSP: 002b:00007fb874704fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1005.909195][T18648] RAX: ffffffffffffffda RBX: 00007fb8747056c0 RCX: 00007fb87375d04e [ 1005.917199][T18648] RDX: 000000000000000f RSI: 00007fb8747050a0 RDI: 0000000000000005 [ 1005.925269][T18648] RBP: 00007fb874705090 R08: 0000000000000000 R09: 0000000000000000 [ 1005.933249][T18648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1005.941233][T18648] R13: 00007fb873a16038 R14: 00007fb873a15fa0 R15: 00007ffc6de0e7c8 [ 1005.949234][T18648] [ 1006.140724][T18651] delete_channel: no stack [ 1006.199297][T18649] delete_channel: no stack [ 1006.885903][T18668] netlink: 132 bytes leftover after parsing attributes in process `syz.6.3348'. [ 1007.205022][ T11] wlan1: Trigger new scan to find an IBSS to join [ 1007.215374][ T144] wlan1: Trigger new scan to find an IBSS to join [ 1007.435869][T18671] mac80211_hwsim hwsim116 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1007.478000][T18671] netlink: 'syz.5.3351': attribute type 10 has an invalid length. [ 1007.485998][T18671] netlink: 40 bytes leftover after parsing attributes in process `syz.5.3351'. [ 1008.729306][T18688] FAULT_INJECTION: forcing a failure. [ 1008.729306][T18688] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1008.777432][T18688] CPU: 0 PID: 18688 Comm: syz.5.3357 Not tainted syzkaller #0 [ 1008.785060][T18688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1008.795335][T18688] Call Trace: [ 1008.798649][T18688] [ 1008.801733][T18688] dump_stack_lvl+0x18c/0x250 [ 1008.806454][T18688] ? show_regs_print_info+0x20/0x20 [ 1008.811681][T18688] ? load_image+0x420/0x420 [ 1008.816206][T18688] ? __lock_acquire+0x7d40/0x7d40 [ 1008.821245][T18688] ? snprintf+0xe9/0x140 [ 1008.825508][T18688] should_fail_ex+0x39d/0x4d0 [ 1008.830208][T18688] _copy_to_user+0x2f/0xa0 [ 1008.834727][T18688] simple_read_from_buffer+0xe7/0x150 [ 1008.840154][T18688] proc_fail_nth_read+0x1e8/0x260 [ 1008.845202][T18688] ? proc_fault_inject_write+0x360/0x360 [ 1008.850859][T18688] ? fsnotify_perm+0x271/0x5e0 [ 1008.855643][T18688] ? proc_fault_inject_write+0x360/0x360 [ 1008.861308][T18688] vfs_read+0x28b/0x970 [ 1008.865501][T18688] ? kernel_read+0x1e0/0x1e0 [ 1008.870112][T18688] ? __fget_files+0x28/0x4b0 [ 1008.874719][T18688] ? __fget_files+0x28/0x4b0 [ 1008.879328][T18688] ? __fget_files+0x43d/0x4b0 [ 1008.884207][T18688] ? __fdget_pos+0x2a3/0x330 [ 1008.888821][T18688] ? ksys_read+0x75/0x260 [ 1008.893285][T18688] ksys_read+0x150/0x260 [ 1008.897636][T18688] ? vfs_write+0x990/0x990 [ 1008.902157][T18688] ? lockdep_hardirqs_on+0x98/0x150 [ 1008.907469][T18688] do_syscall_64+0x55/0xa0 [ 1008.911983][T18688] ? clear_bhb_loop+0x40/0x90 [ 1008.916673][T18688] ? clear_bhb_loop+0x40/0x90 [ 1008.921373][T18688] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1008.927280][T18688] RIP: 0033:0x7fb87375d04e [ 1008.931714][T18688] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1008.951512][T18688] RSP: 002b:00007fb874704fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1008.960208][T18688] RAX: ffffffffffffffda RBX: 00007fb8747056c0 RCX: 00007fb87375d04e [ 1008.968191][T18688] RDX: 000000000000000f RSI: 00007fb8747050a0 RDI: 0000000000000004 [ 1008.976173][T18688] RBP: 00007fb874705090 R08: 0000000000000000 R09: 0000000000000000 [ 1008.984163][T18688] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1008.992154][T18688] R13: 00007fb873a16038 R14: 00007fb873a15fa0 R15: 00007ffc6de0e7c8 [ 1009.000248][T18688] [ 1009.098374][T18691] delete_channel: no stack [ 1009.140694][T18689] delete_channel: no stack [ 1009.444938][T18699] mac80211_hwsim hwsim119 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1009.522165][T18699] netlink: 'syz.6.3361': attribute type 10 has an invalid length. [ 1009.563465][T18699] netlink: 40 bytes leftover after parsing attributes in process `syz.6.3361'. [ 1010.201639][ T11] wlan1: Trigger new scan to find an IBSS to join [ 1011.175134][ T1127] wlan1: Trigger new scan to find an IBSS to join [ 1011.495862][T18730] delete_channel: no stack [ 1011.568207][T18729] delete_channel: no stack [ 1012.004788][T18737] mac80211_hwsim hwsim119 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1012.081043][T18737] netlink: 'syz.6.3373': attribute type 10 has an invalid length. [ 1012.134114][T18737] netlink: 40 bytes leftover after parsing attributes in process `syz.6.3373'. [ 1013.149260][ T1127] wlan1: Creating new IBSS network, BSSID 72:22:1c:85:09:7b [ 1013.162121][T18762] netlink: 156 bytes leftover after parsing attributes in process `syz.7.3381'. [ 1013.386082][T18769] netlink: 'syz.6.3384': attribute type 21 has an invalid length. [ 1013.408200][T18769] netlink: 164 bytes leftover after parsing attributes in process `syz.6.3384'. [ 1013.478250][T18765] delete_channel: no stack [ 1013.493785][T18765] delete_channel: no stack [ 1013.817699][T18778] mac80211_hwsim hwsim117 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1013.846243][T18778] netlink: 'syz.7.3385': attribute type 10 has an invalid length. [ 1013.862086][T18778] netlink: 40 bytes leftover after parsing attributes in process `syz.7.3385'. [ 1014.056805][T18787] netlink: 65051 bytes leftover after parsing attributes in process `syz.6.3387'. [ 1014.194451][ T2957] wlan1: Trigger new scan to find an IBSS to join [ 1014.216112][ T1140] wlan1: Trigger new scan to find an IBSS to join [ 1014.395998][T18793] netlink: 'syz.7.3389': attribute type 28 has an invalid length. [ 1014.429544][T18793] netlink: 'syz.7.3389': attribute type 29 has an invalid length. [ 1014.464927][T18793] netlink: 132 bytes leftover after parsing attributes in process `syz.7.3389'. [ 1014.876482][T18804] FAULT_INJECTION: forcing a failure. [ 1014.876482][T18804] name failslab, interval 1, probability 0, space 0, times 0 [ 1014.956644][T18804] CPU: 0 PID: 18804 Comm: syz.6.3393 Not tainted syzkaller #0 [ 1014.964547][T18804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1014.974825][T18804] Call Trace: [ 1014.978169][T18804] [ 1014.981127][T18804] dump_stack_lvl+0x18c/0x250 [ 1014.985940][T18804] ? show_regs_print_info+0x20/0x20 [ 1014.991185][T18804] ? load_image+0x420/0x420 [ 1014.995820][T18804] ? __lock_acquire+0x7d40/0x7d40 [ 1015.001059][T18804] should_fail_ex+0x39d/0x4d0 [ 1015.005870][T18804] should_failslab+0x9/0x20 [ 1015.010501][T18804] slab_pre_alloc_hook+0x59/0x310 [ 1015.015592][T18804] ? __lock_acquire+0x7d40/0x7d40 [ 1015.020749][T18804] kmem_cache_alloc+0x5a/0x2d0 [ 1015.025559][T18804] ? security_file_alloc+0x34/0x120 [ 1015.030819][T18804] security_file_alloc+0x34/0x120 [ 1015.035887][T18804] init_file+0x94/0x1f0 [ 1015.040093][T18804] alloc_empty_file+0xb7/0x1d0 [ 1015.044904][T18804] alloc_file+0x5c/0x600 [ 1015.049185][T18804] alloc_file_pseudo+0x184/0x210 [ 1015.054174][T18804] ? alloc_empty_backing_file+0xe0/0xe0 [ 1015.059770][T18804] ? alloc_fd+0x58f/0x630 [ 1015.064269][T18804] anon_inode_getfd+0xca/0x1c0 [ 1015.069115][T18804] btf_new_fd+0x856/0x9f0 [ 1015.073686][T18804] ? bpf_btf_show_fdinfo+0x80/0x80 [ 1015.078853][T18804] ? capable+0x88/0xe0 [ 1015.083087][T18804] __sys_bpf+0x670/0x890 [ 1015.087391][T18804] ? bpf_link_show_fdinfo+0x390/0x390 [ 1015.092931][T18804] ? lock_chain_count+0x20/0x20 [ 1015.097859][T18804] __x64_sys_bpf+0x7c/0x90 [ 1015.102343][T18804] do_syscall_64+0x55/0xa0 [ 1015.106827][T18804] ? clear_bhb_loop+0x40/0x90 [ 1015.111562][T18804] ? clear_bhb_loop+0x40/0x90 [ 1015.116294][T18804] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1015.122236][T18804] RIP: 0033:0x7f429eb9c819 [ 1015.126692][T18804] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1015.146436][T18804] RSP: 002b:00007f429f9e9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1015.154899][T18804] RAX: ffffffffffffffda RBX: 00007f429ee15fa0 RCX: 00007f429eb9c819 [ 1015.162914][T18804] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000012 [ 1015.170940][T18804] RBP: 00007f429f9e9090 R08: 0000000000000000 R09: 0000000000000000 [ 1015.179131][T18804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1015.187493][T18804] R13: 00007f429ee16038 R14: 00007f429ee15fa0 R15: 00007ffd0497aa38 [ 1015.195531][T18804] [ 1016.116401][T18811] delete_channel: no stack [ 1016.122329][T18811] delete_channel: no stack [ 1017.150617][ T1127] wlan1: Trigger new scan to find an IBSS to join [ 1017.240910][T18828] mac80211_hwsim hwsim119 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1017.269967][ T1140] wlan1: Creating new IBSS network, BSSID 86:be:4e:9e:03:59 [ 1017.284927][T18832] netlink: 'syz.6.3397': attribute type 10 has an invalid length. [ 1017.297354][T18832] netlink: 40 bytes leftover after parsing attributes in process `syz.6.3397'. [ 1017.410063][T18836] netlink: 'syz.7.3398': attribute type 3 has an invalid length. [ 1017.427911][T18836] netlink: 201372 bytes leftover after parsing attributes in process `syz.7.3398'. [ 1017.809111][T18849] netlink: 'syz.7.3402': attribute type 21 has an invalid length. [ 1018.317364][T18857] netlink: 180 bytes leftover after parsing attributes in process `syz.5.3405'. [ 1018.749112][T18858] delete_channel: no stack [ 1018.780036][T18858] delete_channel: no stack [ 1019.864738][T18877] netlink: 'syz.7.3408': attribute type 29 has an invalid length. [ 1019.898228][T18877] netlink: 'syz.7.3408': attribute type 29 has an invalid length. [ 1019.990788][T18880] mac80211_hwsim hwsim119 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1020.017020][T18871] netlink: 'syz.7.3408': attribute type 29 has an invalid length. [ 1020.066087][T18880] netlink: 'syz.6.3409': attribute type 10 has an invalid length. [ 1020.076657][T18880] netlink: 40 bytes leftover after parsing attributes in process `syz.6.3409'. [ 1021.436887][T18888] sit0: entered allmulticast mode [ 1022.193909][ T2961] wlan1: Trigger new scan to find an IBSS to join [ 1022.358869][T18903] netlink: 'syz.4.3416': attribute type 21 has an invalid length. [ 1022.718305][T18912] FAULT_INJECTION: forcing a failure. [ 1022.718305][T18912] name failslab, interval 1, probability 0, space 0, times 0 [ 1022.747642][T18912] CPU: 0 PID: 18912 Comm: syz.6.3419 Not tainted syzkaller #0 [ 1022.755202][T18912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1022.765397][T18912] Call Trace: [ 1022.768725][T18912] [ 1022.771686][T18912] dump_stack_lvl+0x18c/0x250 [ 1022.776421][T18912] ? show_regs_print_info+0x20/0x20 [ 1022.781743][T18912] ? load_image+0x420/0x420 [ 1022.786273][T18912] ? __might_sleep+0xe0/0xe0 [ 1022.791843][T18912] ? __lock_acquire+0x7d40/0x7d40 [ 1022.797096][T18912] should_fail_ex+0x39d/0x4d0 [ 1022.801993][T18912] should_failslab+0x9/0x20 [ 1022.806555][T18912] slab_pre_alloc_hook+0x59/0x310 [ 1022.811631][T18912] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 1022.817388][T18912] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 1022.823148][T18912] __kmem_cache_alloc_node+0x53/0x250 [ 1022.828661][T18912] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 1022.834422][T18912] __kmalloc+0xa4/0x230 [ 1022.838713][T18912] tomoyo_realpath_from_path+0xe3/0x5d0 [ 1022.844315][T18912] tomoyo_path_number_perm+0x248/0x620 [ 1022.849829][T18912] ? tomoyo_path_number_perm+0x217/0x620 [ 1022.855695][T18912] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 1022.861206][T18912] ? trace_call_bpf+0xc3/0x6c0 [ 1022.866109][T18912] ? trace_call_bpf+0xc3/0x6c0 [ 1022.870929][T18912] ? trace_call_bpf+0x5e9/0x6c0 [ 1022.875952][T18912] ? __fget_files+0x28/0x4b0 [ 1022.880585][T18912] ? __fget_files+0x28/0x4b0 [ 1022.885248][T18912] security_file_ioctl+0x70/0xa0 [ 1022.890228][T18912] __se_sys_ioctl+0x48/0x170 [ 1022.894954][T18912] do_syscall_64+0x55/0xa0 [ 1022.899486][T18912] ? clear_bhb_loop+0x40/0x90 [ 1022.904342][T18912] ? clear_bhb_loop+0x40/0x90 [ 1022.909140][T18912] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1022.915074][T18912] RIP: 0033:0x7f429eb9c819 [ 1022.919541][T18912] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1022.939211][T18912] RSP: 002b:00007f429f9e9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1022.947706][T18912] RAX: ffffffffffffffda RBX: 00007f429ee15fa0 RCX: 00007f429eb9c819 [ 1022.955818][T18912] RDX: 00002000000002c0 RSI: 0000000000008924 RDI: 0000000000000009 [ 1022.963838][T18912] RBP: 00007f429f9e9090 R08: 0000000000000000 R09: 0000000000000000 [ 1022.971853][T18912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1022.979862][T18912] R13: 00007f429ee16038 R14: 00007f429ee15fa0 R15: 00007ffd0497aa38 [ 1022.988212][T18912] [ 1022.997377][T18912] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1023.304179][T18914] mac80211_hwsim hwsim116 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1023.343456][T18914] netlink: 'syz.5.3420': attribute type 10 has an invalid length. [ 1023.374799][T18914] netlink: 40 bytes leftover after parsing attributes in process `syz.5.3420'. [ 1023.948080][T18934] netlink: 'syz.6.3427': attribute type 3 has an invalid length. [ 1023.977363][T18934] netlink: 132 bytes leftover after parsing attributes in process `syz.6.3427'. [ 1024.077446][T18938] netlink: 180 bytes leftover after parsing attributes in process `syz.4.3429'. [ 1024.172676][T18940] netlink: 'syz.5.3430': attribute type 21 has an invalid length. [ 1024.960411][T18954] mac80211_hwsim hwsim119 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1024.974209][T18954] netlink: 'syz.6.3434': attribute type 10 has an invalid length. [ 1024.982568][T18954] netlink: 40 bytes leftover after parsing attributes in process `syz.6.3434'. [ 1025.017080][T18959] FAULT_INJECTION: forcing a failure. [ 1025.017080][T18959] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1025.063383][T18959] CPU: 1 PID: 18959 Comm: syz.5.3435 Not tainted syzkaller #0 [ 1025.070917][T18959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1025.081014][T18959] Call Trace: [ 1025.084348][T18959] [ 1025.087335][T18959] dump_stack_lvl+0x18c/0x250 [ 1025.092072][T18959] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1025.098367][T18959] ? show_regs_print_info+0x20/0x20 [ 1025.103611][T18959] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1025.109812][T18959] ? dump_stack+0x9/0x20 [ 1025.114112][T18959] should_fail_ex+0x39d/0x4d0 [ 1025.118878][T18959] _copy_from_user+0x2f/0xe0 [ 1025.123498][T18959] __sys_bpf+0x23e/0x890 [ 1025.127791][T18959] ? bpf_link_show_fdinfo+0x390/0x390 [ 1025.133218][T18959] ? lock_chain_count+0x20/0x20 [ 1025.138100][T18959] __x64_sys_bpf+0x7c/0x90 [ 1025.142540][T18959] do_syscall_64+0x55/0xa0 [ 1025.146969][T18959] ? clear_bhb_loop+0x40/0x90 [ 1025.151753][T18959] ? clear_bhb_loop+0x40/0x90 [ 1025.156539][T18959] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1025.162458][T18959] RIP: 0033:0x7fb87379c819 [ 1025.166990][T18959] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1025.186781][T18959] RSP: 002b:00007fb874705028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1025.195218][T18959] RAX: ffffffffffffffda RBX: 00007fb873a15fa0 RCX: 00007fb87379c819 [ 1025.203497][T18959] RDX: 0000000000000094 RSI: 0000200000000180 RDI: 0000000000000005 [ 1025.211484][T18959] RBP: 00007fb874705090 R08: 0000000000000000 R09: 0000000000000000 [ 1025.219482][T18959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1025.227557][T18959] R13: 00007fb873a16038 R14: 00007fb873a15fa0 R15: 00007ffc6de0e7c8 [ 1025.235557][T18959] [ 1025.814519][T18969] FAULT_INJECTION: forcing a failure. [ 1025.814519][T18969] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1025.870350][T18969] CPU: 1 PID: 18969 Comm: syz.5.3440 Not tainted syzkaller #0 [ 1025.878171][T18969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1025.888356][T18969] Call Trace: [ 1025.891678][T18969] [ 1025.894644][T18969] dump_stack_lvl+0x18c/0x250 [ 1025.899424][T18969] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1025.905713][T18969] ? show_regs_print_info+0x20/0x20 [ 1025.910953][T18969] ? load_image+0x420/0x420 [ 1025.915513][T18969] should_fail_ex+0x39d/0x4d0 [ 1025.920240][T18969] _copy_from_user+0x2f/0xe0 [ 1025.924867][T18969] ___sys_recvmsg+0x176/0x590 [ 1025.929593][T18969] ? __sys_recvmsg+0x2a0/0x2a0 [ 1025.934664][T18969] ? trace_call_bpf+0xc3/0x6c0 [ 1025.939477][T18969] ? trace_call_bpf+0x5e9/0x6c0 [ 1025.944386][T18969] ? __fget_files+0x43d/0x4b0 [ 1025.949132][T18969] __x64_sys_recvmsg+0x20c/0x2e0 [ 1025.954118][T18969] ? perf_trace_preemptirq_template+0x269/0x330 [ 1025.960419][T18969] ? ___sys_recvmsg+0x590/0x590 [ 1025.965339][T18969] ? lockdep_hardirqs_on+0x98/0x150 [ 1025.970592][T18969] do_syscall_64+0x55/0xa0 [ 1025.975057][T18969] ? clear_bhb_loop+0x40/0x90 [ 1025.979789][T18969] ? clear_bhb_loop+0x40/0x90 [ 1025.984598][T18969] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1025.990531][T18969] RIP: 0033:0x7fb87379c819 [ 1025.995052][T18969] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1026.014693][T18969] RSP: 002b:00007fb874705028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1026.023226][T18969] RAX: ffffffffffffffda RBX: 00007fb873a15fa0 RCX: 00007fb87379c819 [ 1026.031301][T18969] RDX: 0000000000000020 RSI: 0000200000000d40 RDI: 000000000000000e [ 1026.039285][T18969] RBP: 00007fb874705090 R08: 0000000000000000 R09: 0000000000000000 [ 1026.047275][T18969] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1026.055347][T18969] R13: 00007fb873a16038 R14: 00007fb873a15fa0 R15: 00007ffc6de0e7c8 [ 1026.063343][T18969] [ 1026.271223][T18967] netlink: 703 bytes leftover after parsing attributes in process `syz.4.3439'. [ 1026.770098][T18990] mac80211_hwsim hwsim119 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1026.813546][T18990] netlink: 'syz.6.3446': attribute type 10 has an invalid length. [ 1026.835171][T18990] netlink: 40 bytes leftover after parsing attributes in process `syz.6.3446'. [ 1026.870248][T18992] netlink: 16098 bytes leftover after parsing attributes in process `syz.4.3445'. [ 1027.056332][T18997] netlink: 180 bytes leftover after parsing attributes in process `syz.7.3448'. [ 1027.240289][ T2961] wlan1: Trigger new scan to find an IBSS to join [ 1027.485661][T19006] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.3451'. [ 1027.585896][T19010] FAULT_INJECTION: forcing a failure. [ 1027.585896][T19010] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1027.604446][T19010] CPU: 0 PID: 19010 Comm: syz.5.3452 Not tainted syzkaller #0 [ 1027.611988][T19010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1027.622095][T19010] Call Trace: [ 1027.625526][T19010] [ 1027.628516][T19010] dump_stack_lvl+0x18c/0x250 [ 1027.633249][T19010] ? show_regs_print_info+0x20/0x20 [ 1027.638586][T19010] ? load_image+0x420/0x420 [ 1027.643147][T19010] ? __might_fault+0xaa/0x120 [ 1027.648003][T19010] ? __lock_acquire+0x7d40/0x7d40 [ 1027.653179][T19010] should_fail_ex+0x39d/0x4d0 [ 1027.657933][T19010] _copy_from_user+0x2f/0xe0 [ 1027.662677][T19010] sk_setsockopt+0x2b2/0x2bc0 [ 1027.667413][T19010] ? sockopt_capable+0x60/0x60 [ 1027.672241][T19010] ? aa_sk_perm+0x83c/0x970 [ 1027.676976][T19010] ? __fget_files+0x28/0x4b0 [ 1027.681810][T19010] ? aa_af_perm+0x330/0x330 [ 1027.686372][T19010] ? __fget_files+0x28/0x4b0 [ 1027.691190][T19010] ? __fget_files+0x28/0x4b0 [ 1027.695907][T19010] ? aa_sock_opt_perm+0x74/0x100 [ 1027.700893][T19010] ? bpf_lsm_socket_setsockopt+0x9/0x10 [ 1027.706518][T19010] ? security_socket_setsockopt+0x7e/0xa0 [ 1027.712284][T19010] do_sock_setsockopt+0x11b/0x1a0 [ 1027.717448][T19010] __x64_sys_setsockopt+0x182/0x200 [ 1027.722707][T19010] do_syscall_64+0x55/0xa0 [ 1027.727173][T19010] ? clear_bhb_loop+0x40/0x90 [ 1027.732124][T19010] ? clear_bhb_loop+0x40/0x90 [ 1027.736873][T19010] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1027.743171][T19010] RIP: 0033:0x7fb87379c819 [ 1027.747820][T19010] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1027.767825][T19010] RSP: 002b:00007fb874705028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1027.776385][T19010] RAX: ffffffffffffffda RBX: 00007fb873a15fa0 RCX: 00007fb87379c819 [ 1027.784669][T19010] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000004 [ 1027.792784][T19010] RBP: 00007fb874705090 R08: 0000000000000010 R09: 0000000000000000 [ 1027.800826][T19010] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000001 [ 1027.808845][T19010] R13: 00007fb873a16038 R14: 00007fb873a15fa0 R15: 00007ffc6de0e7c8 [ 1027.816890][T19010] [ 1028.209977][T19018] FAULT_INJECTION: forcing a failure. [ 1028.209977][T19018] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1028.237268][T19018] CPU: 1 PID: 19018 Comm: syz.5.3455 Not tainted syzkaller #0 [ 1028.245090][T19018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1028.255200][T19018] Call Trace: [ 1028.258620][T19018] [ 1028.261592][T19018] dump_stack_lvl+0x18c/0x250 [ 1028.266338][T19018] ? show_regs_print_info+0x20/0x20 [ 1028.271601][T19018] ? load_image+0x420/0x420 [ 1028.276160][T19018] ? __lock_acquire+0x7d40/0x7d40 [ 1028.281331][T19018] ? snprintf+0xe9/0x140 [ 1028.285727][T19018] should_fail_ex+0x39d/0x4d0 [ 1028.290478][T19018] _copy_to_user+0x2f/0xa0 [ 1028.294950][T19018] simple_read_from_buffer+0xe7/0x150 [ 1028.300391][T19018] proc_fail_nth_read+0x1e8/0x260 [ 1028.305488][T19018] ? proc_fault_inject_write+0x360/0x360 [ 1028.311367][T19018] ? fsnotify_perm+0x271/0x5e0 [ 1028.316188][T19018] ? proc_fault_inject_write+0x360/0x360 [ 1028.321973][T19018] vfs_read+0x28b/0x970 [ 1028.326197][T19018] ? kernel_read+0x1e0/0x1e0 [ 1028.330860][T19018] ? __fget_files+0x28/0x4b0 [ 1028.335593][T19018] ? __fget_files+0x28/0x4b0 [ 1028.340332][T19018] ? __fget_files+0x43d/0x4b0 [ 1028.345074][T19018] ? __fdget_pos+0x2a3/0x330 [ 1028.349887][T19018] ? ksys_read+0x75/0x260 [ 1028.354259][T19018] ksys_read+0x150/0x260 [ 1028.358612][T19018] ? vfs_write+0x990/0x990 [ 1028.363054][T19018] ? lockdep_hardirqs_on+0x98/0x150 [ 1028.368271][T19018] do_syscall_64+0x55/0xa0 [ 1028.372699][T19018] ? clear_bhb_loop+0x40/0x90 [ 1028.377671][T19018] ? clear_bhb_loop+0x40/0x90 [ 1028.382379][T19018] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1028.388339][T19018] RIP: 0033:0x7fb87375d04e [ 1028.392963][T19018] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1028.412673][T19018] RSP: 002b:00007fb874704fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1028.421119][T19018] RAX: ffffffffffffffda RBX: 00007fb8747056c0 RCX: 00007fb87375d04e [ 1028.429212][T19018] RDX: 000000000000000f RSI: 00007fb8747050a0 RDI: 0000000000000004 [ 1028.437330][T19018] RBP: 00007fb874705090 R08: 0000000000000000 R09: 0000000000000000 [ 1028.445322][T19018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1028.453400][T19018] R13: 00007fb873a16038 R14: 00007fb873a15fa0 R15: 00007ffc6de0e7c8 [ 1028.461402][T19018] [ 1028.733018][T19032] mac80211_hwsim hwsim117 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1028.757952][T19032] netlink: 'syz.7.3458': attribute type 10 has an invalid length. [ 1028.766332][T19032] netlink: 40 bytes leftover after parsing attributes in process `syz.7.3458'. [ 1028.838149][T19033] netlink: 61211 bytes leftover after parsing attributes in process `syz.5.3459'. [ 1028.916640][T19034] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1029.153004][ T11] wlan1: Trigger new scan to find an IBSS to join [ 1030.202435][T19049] netlink: 'syz.6.3464': attribute type 10 has an invalid length. [ 1030.226950][T19049] batman_adv: batadv0: Adding interface: netdevsim0 [ 1030.248220][T19049] batman_adv: batadv0: The MTU of interface netdevsim0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1030.283306][T19049] batman_adv: batadv0: Not using interface netdevsim0 (retrying later): interface not active [ 1030.541675][T19059] netlink: 180 bytes leftover after parsing attributes in process `syz.6.3465'. [ 1030.861797][T19066] netlink: 10 bytes leftover after parsing attributes in process `syz.7.3468'. [ 1030.891552][T19070] FAULT_INJECTION: forcing a failure. [ 1030.891552][T19070] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1030.936374][T19070] CPU: 1 PID: 19070 Comm: syz.5.3469 Not tainted syzkaller #0 [ 1030.943940][T19070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1030.954044][T19070] Call Trace: [ 1030.957512][T19070] [ 1030.960486][T19070] dump_stack_lvl+0x18c/0x250 [ 1030.965254][T19070] ? show_regs_print_info+0x20/0x20 [ 1030.970515][T19070] ? load_image+0x420/0x420 [ 1030.975070][T19070] ? __might_fault+0xaa/0x120 [ 1030.979807][T19070] ? __lock_acquire+0x7d40/0x7d40 [ 1030.984994][T19070] should_fail_ex+0x39d/0x4d0 [ 1030.989825][T19070] _copy_from_user+0x2f/0xe0 [ 1030.994484][T19070] ___sys_sendmsg+0x1c7/0x360 [ 1030.999221][T19070] ? get_pid_task+0x20/0x1e0 [ 1031.003869][T19070] ? __sys_sendmsg+0x2a0/0x2a0 [ 1031.008694][T19070] ? __lock_acquire+0x7d40/0x7d40 [ 1031.013850][T19070] __se_sys_sendmsg+0x1c2/0x2b0 [ 1031.018814][T19070] ? __x64_sys_sendmsg+0x80/0x80 [ 1031.023780][T19070] ? lockdep_hardirqs_on+0x98/0x150 [ 1031.029008][T19070] do_syscall_64+0x55/0xa0 [ 1031.033529][T19070] ? clear_bhb_loop+0x40/0x90 [ 1031.038398][T19070] ? clear_bhb_loop+0x40/0x90 [ 1031.043098][T19070] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1031.049074][T19070] RIP: 0033:0x7fb87379c819 [ 1031.053511][T19070] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1031.073131][T19070] RSP: 002b:00007fb874705028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1031.081914][T19070] RAX: ffffffffffffffda RBX: 00007fb873a15fa0 RCX: 00007fb87379c819 [ 1031.090074][T19070] RDX: 00000000000000d0 RSI: 0000200000000600 RDI: 0000000000000003 [ 1031.098064][T19070] RBP: 00007fb874705090 R08: 0000000000000000 R09: 0000000000000000 [ 1031.106050][T19070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1031.114178][T19070] R13: 00007fb873a16038 R14: 00007fb873a15fa0 R15: 00007ffc6de0e7c8 [ 1031.122343][T19070] [ 1031.163744][ T11] wlan1: Trigger new scan to find an IBSS to join [ 1031.256449][ T59] wlan1: Creating new IBSS network, BSSID 46:b1:be:dd:f6:35 [ 1031.256590][T19074] mac80211_hwsim hwsim121 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1031.416689][T19071] netlink: 'syz.4.3470': attribute type 10 has an invalid length. [ 1031.425081][T19083] netlink: 4595 bytes leftover after parsing attributes in process `syz.7.3474'. [ 1031.527840][T19071] netlink: 40 bytes leftover after parsing attributes in process `syz.4.3470'. [ 1031.628366][T19083] netlink: 10 bytes leftover after parsing attributes in process `syz.7.3474'. [ 1032.685834][T19110] mac80211_hwsim hwsim121 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1032.723887][T19110] netlink: 'syz.4.3483': attribute type 10 has an invalid length. [ 1032.748875][T19110] netlink: 40 bytes leftover after parsing attributes in process `syz.4.3483'. [ 1033.147487][ T1127] wlan1: Trigger new scan to find an IBSS to join [ 1033.195387][T19124] netlink: 60 bytes leftover after parsing attributes in process `syz.4.3489'. [ 1033.515764][T19135] netlink: 'syz.6.3493': attribute type 1 has an invalid length. [ 1033.550867][T19135] netlink: 112860 bytes leftover after parsing attributes in process `syz.6.3493'. [ 1033.574167][T19135] netlink: 'syz.6.3493': attribute type 1 has an invalid length. [ 1034.506161][T19150] mac80211_hwsim hwsim119 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1034.550281][T19150] netlink: 'syz.6.3497': attribute type 10 has an invalid length. [ 1034.569012][T19150] netlink: 40 bytes leftover after parsing attributes in process `syz.6.3497'. [ 1035.095849][T19153] netlink: 'syz.4.3498': attribute type 1 has an invalid length. [ 1035.140867][T19153] netlink: 193500 bytes leftover after parsing attributes in process `syz.4.3498'. [ 1035.152457][ T2961] wlan1: Trigger new scan to find an IBSS to join [ 1036.276328][T19185] mac80211_hwsim hwsim121 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1036.299348][T19187] netlink: 'syz.4.3508': attribute type 10 has an invalid length. [ 1036.307837][T19187] netlink: 40 bytes leftover after parsing attributes in process `syz.4.3508'. [ 1036.915212][T19198] netlink: 2 bytes leftover after parsing attributes in process `syz.5.3511'. [ 1036.942986][T19198] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1037.039040][T19198] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1037.050493][T19198] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1037.083254][T19198] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1037.127836][T19198] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1037.146803][T19198] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1037.158812][ T11] wlan1: Trigger new scan to find an IBSS to join [ 1037.175727][T19198] batadv_slave_1: entered promiscuous mode [ 1037.680909][T19206] netlink: 'syz.7.3515': attribute type 10 has an invalid length. [ 1037.690844][T19206] netlink: 'syz.7.3515': attribute type 11 has an invalid length. [ 1037.699885][T19206] netlink: 'syz.7.3515': attribute type 11 has an invalid length. [ 1037.727436][T19206] netlink: 'syz.7.3515': attribute type 11 has an invalid length. [ 1037.736598][T19206] netlink: 'syz.7.3515': attribute type 11 has an invalid length. [ 1037.757608][T19206] netlink: 'syz.7.3515': attribute type 11 has an invalid length. [ 1037.788858][T19206] netlink: 'syz.7.3515': attribute type 11 has an invalid length. [ 1037.804777][T19206] netlink: 'syz.7.3515': attribute type 11 has an invalid length. [ 1037.827903][T19206] netlink: 'syz.7.3515': attribute type 11 has an invalid length. [ 1037.840775][T19206] netlink: 'syz.7.3515': attribute type 11 has an invalid length. [ 1037.851600][T19206] netlink: 'syz.7.3515': attribute type 11 has an invalid length. [ 1037.866914][T19206] netlink: 'syz.7.3515': attribute type 4 has an invalid length. [ 1037.875948][T19206] netlink: 'syz.7.3515': attribute type 5 has an invalid length. [ 1037.885638][T19206] netlink: 208556 bytes leftover after parsing attributes in process `syz.7.3515'. [ 1037.911906][T19219] mac80211_hwsim hwsim116 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1037.941106][T19216] netlink: 'syz.5.3520': attribute type 10 has an invalid length. [ 1037.957338][T19216] netlink: 40 bytes leftover after parsing attributes in process `syz.5.3520'. [ 1038.393173][T19227] netlink: 16186 bytes leftover after parsing attributes in process `syz.5.3523'. [ 1038.882292][T19239] FAULT_INJECTION: forcing a failure. [ 1038.882292][T19239] name failslab, interval 1, probability 0, space 0, times 0 [ 1038.898741][T19239] CPU: 0 PID: 19239 Comm: syz.7.3527 Not tainted syzkaller #0 [ 1038.907593][T19239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1038.917716][T19239] Call Trace: [ 1038.921049][T19239] [ 1038.924016][T19239] dump_stack_lvl+0x18c/0x250 [ 1038.928862][T19239] ? show_regs_print_info+0x20/0x20 [ 1038.934114][T19239] ? load_image+0x420/0x420 [ 1038.938681][T19239] ? __lock_acquire+0x7d40/0x7d40 [ 1038.943829][T19239] should_fail_ex+0x39d/0x4d0 [ 1038.949429][T19239] should_failslab+0x9/0x20 [ 1038.953965][T19239] slab_pre_alloc_hook+0x59/0x310 [ 1038.959123][T19239] ? apparmor_sk_alloc_security+0x77/0x100 [ 1038.965363][T19239] __kmem_cache_alloc_node+0x53/0x250 [ 1038.970826][T19239] ? apparmor_sk_alloc_security+0x77/0x100 [ 1038.976855][T19239] kmalloc_trace+0x2a/0xe0 [ 1038.981495][T19239] apparmor_sk_alloc_security+0x77/0x100 [ 1038.987245][T19239] security_sk_alloc+0x6e/0xa0 [ 1038.992211][T19239] sk_prot_alloc+0x101/0x210 [ 1038.997961][T19239] ? sk_alloc+0x24/0x360 [ 1039.002318][T19239] sk_alloc+0x3a/0x360 [ 1039.006423][T19239] ? _raw_read_unlock+0x40/0x40 [ 1039.011390][T19239] __netlink_create+0x6c/0x290 [ 1039.016344][T19239] ? cn_bind+0x110/0x110 [ 1039.020609][T19239] netlink_create+0x3ee/0x5c0 [ 1039.025392][T19239] ? cn_rx_skb+0x3d0/0x3d0 [ 1039.030962][T19239] __sock_create+0x4a6/0x940 [ 1039.035585][T19239] __sys_socketpair+0x1c1/0x550 [ 1039.040568][T19239] __x64_sys_socketpair+0x9b/0xb0 [ 1039.045935][T19239] do_syscall_64+0x55/0xa0 [ 1039.050558][T19239] ? clear_bhb_loop+0x40/0x90 [ 1039.055362][T19239] ? clear_bhb_loop+0x40/0x90 [ 1039.060119][T19239] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1039.066245][T19239] RIP: 0033:0x7feae159c819 [ 1039.070690][T19239] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1039.091019][T19239] RSP: 002b:00007feae2371028 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 1039.099475][T19239] RAX: ffffffffffffffda RBX: 00007feae1815fa0 RCX: 00007feae159c819 [ 1039.107575][T19239] RDX: 000000000000000b RSI: 0000000000000002 RDI: 0000000000000010 [ 1039.116621][T19239] RBP: 00007feae2371090 R08: 0000000000000000 R09: 0000000000000000 [ 1039.124694][T19239] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1039.133552][T19239] R13: 00007feae1816038 R14: 00007feae1815fa0 R15: 00007ffc206c8368 [ 1039.141641][T19239] [ 1039.407716][T19248] mac80211_hwsim hwsim119 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1039.438287][T19248] netlink: 'syz.6.3531': attribute type 10 has an invalid length. [ 1039.463672][T19248] netlink: 40 bytes leftover after parsing attributes in process `syz.6.3531'. [ 1039.865546][T19262] FAULT_INJECTION: forcing a failure. [ 1039.865546][T19262] name failslab, interval 1, probability 0, space 0, times 0 [ 1039.879352][T19262] CPU: 0 PID: 19262 Comm: syz.6.3535 Not tainted syzkaller #0 [ 1039.887002][T19262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1039.897125][T19262] Call Trace: [ 1039.900467][T19262] [ 1039.903459][T19262] dump_stack_lvl+0x18c/0x250 [ 1039.908302][T19262] ? show_regs_print_info+0x20/0x20 [ 1039.913568][T19262] ? load_image+0x420/0x420 [ 1039.918143][T19262] ? verify_lock_unused+0x140/0x140 [ 1039.923491][T19262] ? perf_trace_lock_acquire+0x34f/0x410 [ 1039.929205][T19262] should_fail_ex+0x39d/0x4d0 [ 1039.933964][T19262] should_failslab+0x9/0x20 [ 1039.938621][T19262] slab_pre_alloc_hook+0x59/0x310 [ 1039.943784][T19262] ? trace_event_raw_event_lock+0x250/0x250 [ 1039.949753][T19262] kmem_cache_alloc_node+0x60/0x320 [ 1039.955007][T19262] ? __alloc_skb+0x103/0x2c0 [ 1039.959684][T19262] __alloc_skb+0x103/0x2c0 [ 1039.964190][T19262] ndisc_alloc_skb+0xa6/0x450 [ 1039.968957][T19262] ndisc_ns_create+0x213/0x640 [ 1039.973793][T19262] ? ndisc_alloc_skb+0x450/0x450 [ 1039.978878][T19262] ? ipv6_get_lladdr+0x2b/0x3e0 [ 1039.983781][T19262] ? ipv6_get_lladdr+0x2b/0x3e0 [ 1039.988699][T19262] ? ipv6_get_lladdr+0x378/0x3e0 [ 1039.993949][T19262] ? ipv6_get_lladdr+0x2b/0x3e0 [ 1039.998874][T19262] ndisc_solicit+0x34b/0x660 [ 1040.003545][T19262] ? ndisc_cleanup+0x40/0x40 [ 1040.008240][T19262] ? ndisc_cleanup+0x40/0x40 [ 1040.012892][T19262] __neigh_event_send+0xed1/0x1440 [ 1040.018083][T19262] ? ___neigh_create+0x1df6/0x2440 [ 1040.023321][T19262] neigh_resolve_output+0x19b/0x730 [ 1040.028678][T19262] ? __ipv6_neigh_lookup_noref+0x5b9/0x7d0 [ 1040.034595][T19262] ip6_finish_output2+0xe3d/0x1630 [ 1040.039787][T19262] ? ip6_finish_output2+0x645/0x1630 [ 1040.045238][T19262] ? ip6_mtu+0x7d/0x3f0 [ 1040.049460][T19262] ? nf_hook+0x390/0x390 [ 1040.053765][T19262] ? ip6_finish_output+0x57b/0x820 [ 1040.058952][T19262] ? ip6_send_skb+0x10f/0x380 [ 1040.063696][T19262] ip6_send_skb+0x1d5/0x380 [ 1040.068360][T19262] icmp6_send+0x142a/0x1b40 [ 1040.072925][T19262] ? icmp6_send+0x233/0x1b40 [ 1040.077645][T19262] ? icmpv6_push_pending_frames+0x400/0x400 [ 1040.083600][T19262] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 1040.089651][T19262] ? lock_chain_count+0x20/0x20 [ 1040.094595][T19262] ? lockdep_hardirqs_on+0x98/0x150 [ 1040.099852][T19262] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1040.106131][T19262] ? ip6_link_failure+0x20/0x4c0 [ 1040.111359][T19262] ip6_link_failure+0x3b/0x4c0 [ 1040.116210][T19262] ip_tunnel_xmit+0x1728/0x2410 [ 1040.121220][T19262] ? __lock_acquire+0x1273/0x7d40 [ 1040.126293][T19262] ? ip_tunnel_xmit+0xc0/0x2410 [ 1040.131227][T19262] ? validate_xmit_xfrm+0xbc/0x12c0 [ 1040.136496][T19262] ? ip4_dst_hoplimit+0x2d0/0x2d0 [ 1040.141672][T19262] ? gre_build_header+0x25b/0x990 [ 1040.146820][T19262] gre_tap_xmit+0x4fe/0x6f0 [ 1040.151417][T19262] dev_hard_start_xmit+0x246/0x740 [ 1040.156660][T19262] sch_direct_xmit+0x25e/0x4c0 [ 1040.161506][T19262] ? mrp_pdu_parse_vecattr_event+0x2a0/0x2a0 [ 1040.167589][T19262] __dev_queue_xmit+0x165d/0x3660 [ 1040.173152][T19262] ? __dev_queue_xmit+0x265/0x3660 [ 1040.178352][T19262] ? lockdep_hardirqs_on+0x98/0x150 [ 1040.183636][T19262] ? read_seqbegin+0x1c8/0x270 [ 1040.188465][T19262] ? lockdep_hardirqs_on+0x98/0x150 [ 1040.193721][T19262] ? neigh_event_send+0x110/0x110 [ 1040.198802][T19262] ? netdev_core_pick_tx+0x340/0x340 [ 1040.204204][T19262] ? __asan_memcpy+0x40/0x70 [ 1040.209205][T19262] ? eth_header+0x11b/0x200 [ 1040.213966][T19262] ? llc_sysctl_exit+0x70/0x70 [ 1040.218780][T19262] ? neigh_resolve_output+0x618/0x730 [ 1040.224402][T19262] ip6_finish_output2+0xe3d/0x1630 [ 1040.229602][T19262] ? ip6_finish_output2+0x645/0x1630 [ 1040.234958][T19262] ? ip6_mtu+0x7d/0x3f0 [ 1040.239267][T19262] ? nf_hook+0x390/0x390 [ 1040.243575][T19262] ? ip6_finish_output+0x57b/0x820 [ 1040.248781][T19262] rawv6_send_hdrinc+0xd9e/0x1640 [ 1040.254021][T19262] ? txopt_get+0x3f0/0x3f0 [ 1040.258657][T19262] ? txopt_get+0x344/0x3f0 [ 1040.263240][T19262] ? rawv6_push_pending_frames+0x8d0/0x8d0 [ 1040.269115][T19262] ? fl6_sock_lookup+0xc0/0xc0 [ 1040.274592][T19262] rawv6_sendmsg+0x12cc/0x1770 [ 1040.279569][T19262] ? compat_rawv6_ioctl+0x70/0x70 [ 1040.284787][T19262] ? aa_sk_perm+0x83c/0x970 [ 1040.289423][T19262] ? tomoyo_socket_sendmsg_permission+0x216/0x2f0 [ 1040.295936][T19262] ? inet_sendmsg+0x7c/0x2f0 [ 1040.300574][T19262] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 1040.305909][T19262] ? security_socket_sendmsg+0x80/0xa0 [ 1040.311442][T19262] ? inet_send_prepare+0x260/0x260 [ 1040.316626][T19262] ____sys_sendmsg+0x5ba/0x960 [ 1040.321450][T19262] ? __lock_acquire+0x7d40/0x7d40 [ 1040.326563][T19262] ? __asan_memset+0x22/0x40 [ 1040.331212][T19262] ? __sys_sendmsg_sock+0x30/0x30 [ 1040.336280][T19262] ? __import_iovec+0x5f2/0x850 [ 1040.341415][T19262] ? import_iovec+0x73/0xa0 [ 1040.345986][T19262] ___sys_sendmsg+0x2a6/0x360 [ 1040.350917][T19262] ? __sys_sendmsg+0x2a0/0x2a0 [ 1040.355826][T19262] ? __lock_acquire+0x7d40/0x7d40 [ 1040.361032][T19262] __se_sys_sendmsg+0x1c2/0x2b0 [ 1040.365983][T19262] ? __x64_sys_sendmsg+0x80/0x80 [ 1040.371049][T19262] ? lockdep_hardirqs_on+0x98/0x150 [ 1040.376320][T19262] do_syscall_64+0x55/0xa0 [ 1040.380899][T19262] ? clear_bhb_loop+0x40/0x90 [ 1040.385646][T19262] ? clear_bhb_loop+0x40/0x90 [ 1040.390408][T19262] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1040.396453][T19262] RIP: 0033:0x7f429eb9c819 [ 1040.400979][T19262] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1040.420674][T19262] RSP: 002b:00007f429f9e9028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1040.429161][T19262] RAX: ffffffffffffffda RBX: 00007f429ee15fa0 RCX: 00007f429eb9c819 [ 1040.437302][T19262] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000006 [ 1040.445427][T19262] RBP: 00007f429f9e9090 R08: 0000000000000000 R09: 0000000000000000 [ 1040.453546][T19262] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1040.461591][T19262] R13: 00007f429ee16038 R14: 00007f429ee15fa0 R15: 00007ffd0497aa38 [ 1040.469726][T19262] [ 1040.501438][ T11] wlan1: Trigger new scan to find an IBSS to join [ 1040.509413][ T59] wlan1: Trigger new scan to find an IBSS to join [ 1041.149317][T19280] netlink: 'syz.7.3542': attribute type 2 has an invalid length. [ 1041.165137][T19280] netlink: 132 bytes leftover after parsing attributes in process `syz.7.3542'. [ 1041.234713][T19280] netlink: 'syz.7.3542': attribute type 6 has an invalid length. [ 1041.243884][T19284] mac80211_hwsim hwsim119 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1041.253402][T19280] netlink: 139796 bytes leftover after parsing attributes in process `syz.7.3542'. [ 1041.266615][T19284] netlink: 'syz.6.3543': attribute type 10 has an invalid length. [ 1041.275476][T19284] netlink: 40 bytes leftover after parsing attributes in process `syz.6.3543'. [ 1041.424320][T19282] sit0: entered promiscuous mode [ 1041.447612][T19282] sit0: entered allmulticast mode [ 1042.306798][T19306] FAULT_INJECTION: forcing a failure. [ 1042.306798][T19306] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1042.327753][T19306] CPU: 0 PID: 19306 Comm: syz.4.3548 Not tainted syzkaller #0 [ 1042.335295][T19306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1042.345381][T19306] Call Trace: [ 1042.348685][T19306] [ 1042.351628][T19306] dump_stack_lvl+0x18c/0x250 [ 1042.356348][T19306] ? show_regs_print_info+0x20/0x20 [ 1042.361573][T19306] ? load_image+0x420/0x420 [ 1042.366104][T19306] ? __might_fault+0xaa/0x120 [ 1042.370796][T19306] ? __lock_acquire+0x7d40/0x7d40 [ 1042.375837][T19306] should_fail_ex+0x39d/0x4d0 [ 1042.380536][T19306] _copy_from_user+0x2f/0xe0 [ 1042.385165][T19306] ___sys_sendmsg+0x1c7/0x360 [ 1042.389860][T19306] ? get_pid_task+0x20/0x1e0 [ 1042.394478][T19306] ? __sys_sendmsg+0x2a0/0x2a0 [ 1042.399275][T19306] ? __lock_acquire+0x7d40/0x7d40 [ 1042.404336][T19306] __se_sys_sendmsg+0x1c2/0x2b0 [ 1042.409211][T19306] ? __x64_sys_sendmsg+0x80/0x80 [ 1042.414177][T19306] ? lockdep_hardirqs_on+0x98/0x150 [ 1042.419394][T19306] do_syscall_64+0x55/0xa0 [ 1042.423822][T19306] ? clear_bhb_loop+0x40/0x90 [ 1042.428540][T19306] ? clear_bhb_loop+0x40/0x90 [ 1042.433231][T19306] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1042.439223][T19306] RIP: 0033:0x7f21e379c819 [ 1042.443692][T19306] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1042.463608][T19306] RSP: 002b:00007f21e4697028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1042.472046][T19306] RAX: ffffffffffffffda RBX: 00007f21e3a16090 RCX: 00007f21e379c819 [ 1042.480220][T19306] RDX: 0000000000000020 RSI: 0000200000000100 RDI: 0000000000000007 [ 1042.488209][T19306] RBP: 00007f21e4697090 R08: 0000000000000000 R09: 0000000000000000 [ 1042.496285][T19306] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1042.504274][T19306] R13: 00007f21e3a16128 R14: 00007f21e3a16090 R15: 00007ffe20394d48 [ 1042.512275][T19306] [ 1042.826969][T19315] mac80211_hwsim hwsim119 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1042.875588][T19315] netlink: 'syz.6.3552': attribute type 10 has an invalid length. [ 1042.895423][T19315] netlink: 40 bytes leftover after parsing attributes in process `syz.6.3552'. [ 1043.231555][ T11] wlan1: Trigger new scan to find an IBSS to join [ 1043.242923][ T1140] wlan1: Trigger new scan to find an IBSS to join [ 1043.368763][T19323] netlink: 121460 bytes leftover after parsing attributes in process `syz.6.3556'. [ 1043.524207][T19323] netlink: 21068 bytes leftover after parsing attributes in process `syz.6.3556'. [ 1043.767345][T19323] tipc: Started in network mode [ 1043.910937][T19323] tipc: Node identity b, cluster identity 73 [ 1044.038651][T19323] tipc: Node number set to 11 [ 1045.238779][ T1140] wlan1: Trigger new scan to find an IBSS to join [ 1045.719327][ T59] wlan1: Creating new IBSS network, BSSID 3e:8e:4e:cd:21:df [ 1045.728715][ T59] wlan1: Creating new IBSS network, BSSID a2:00:ef:23:e5:93 [ 1046.928551][T19356] mac80211_hwsim hwsim121 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1046.985077][T19360] netlink: 'syz.4.3564': attribute type 10 has an invalid length. [ 1046.994753][T19360] netlink: 40 bytes leftover after parsing attributes in process `syz.4.3564'. [ 1047.934812][T19396] netlink: 121460 bytes leftover after parsing attributes in process `syz.7.3572'. [ 1047.957521][T19396] netlink: 22856 bytes leftover after parsing attributes in process `syz.7.3572'. [ 1048.188113][ T2961] wlan1: Trigger new scan to find an IBSS to join [ 1048.643610][T19405] mac80211_hwsim hwsim116 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1048.720845][T19405] netlink: 'syz.5.3577': attribute type 10 has an invalid length. [ 1048.757630][T19405] netlink: 40 bytes leftover after parsing attributes in process `syz.5.3577'. [ 1049.013918][T19418] Q6`Ҙ: renamed from lo (while UP) [ 1049.164582][ T2961] wlan1: Trigger new scan to find an IBSS to join [ 1049.407953][T19421] netlink: 60 bytes leftover after parsing attributes in process `syz.6.3580'. [ 1049.450321][T19421] netlink: 60 bytes leftover after parsing attributes in process `syz.6.3580'. [ 1049.522325][T19418] netlink: 60 bytes leftover after parsing attributes in process `syz.6.3580'. [ 1050.134633][T19440] hsr0: VLAN not yet supported [ 1050.200371][ T2961] wlan1: Creating new IBSS network, BSSID c2:9f:6f:a9:a7:98 [ 1051.147469][ T59] wlan1: Trigger new scan to find an IBSS to join [ 1053.147479][ T59] wlan1: Trigger new scan to find an IBSS to join [ 1053.406893][T19453] mac80211_hwsim hwsim121 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1053.424121][T19455] netlink: 'syz.4.3590': attribute type 10 has an invalid length. [ 1053.458730][T19455] netlink: 40 bytes leftover after parsing attributes in process `syz.4.3590'. [ 1053.539688][T19462] FAULT_INJECTION: forcing a failure. [ 1053.539688][T19462] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1053.575838][T19462] CPU: 1 PID: 19462 Comm: syz.5.3592 Not tainted syzkaller #0 [ 1053.583747][T19462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1053.593852][T19462] Call Trace: [ 1053.597178][T19462] [ 1053.600145][T19462] dump_stack_lvl+0x18c/0x250 [ 1053.604896][T19462] ? show_regs_print_info+0x20/0x20 [ 1053.610212][T19462] ? load_image+0x420/0x420 [ 1053.614783][T19462] ? __might_fault+0xaa/0x120 [ 1053.619511][T19462] ? __lock_acquire+0x7d40/0x7d40 [ 1053.624768][T19462] should_fail_ex+0x39d/0x4d0 [ 1053.629590][T19462] _copy_from_user+0x2f/0xe0 [ 1053.634402][T19462] kstrtouint_from_user+0xde/0x170 [ 1053.639664][T19462] ? kstrtol_from_user+0x190/0x190 [ 1053.644968][T19462] proc_fail_nth_write+0x8f/0x250 [ 1053.650145][T19462] ? proc_fail_nth_read+0x260/0x260 [ 1053.655424][T19462] ? proc_fail_nth_read+0x260/0x260 [ 1053.660777][T19462] vfs_write+0x296/0x990 [ 1053.665166][T19462] ? file_end_write+0x250/0x250 [ 1053.670076][T19462] ? __fget_files+0x28/0x4b0 [ 1053.674910][T19462] ? __fget_files+0x28/0x4b0 [ 1053.679563][T19462] ? __fget_files+0x43d/0x4b0 [ 1053.684276][T19462] ? __fdget_pos+0x2a3/0x330 [ 1053.688921][T19462] ? ksys_write+0x75/0x260 [ 1053.693374][T19462] ksys_write+0x150/0x260 [ 1053.697816][T19462] ? __ia32_sys_read+0x90/0x90 [ 1053.702606][T19462] ? lockdep_hardirqs_on+0x98/0x150 [ 1053.707844][T19462] do_syscall_64+0x55/0xa0 [ 1053.712517][T19462] ? clear_bhb_loop+0x40/0x90 [ 1053.717311][T19462] ? clear_bhb_loop+0x40/0x90 [ 1053.722128][T19462] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1053.728146][T19462] RIP: 0033:0x7fb87375d04e [ 1053.732580][T19462] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1053.752377][T19462] RSP: 002b:00007fb8746e3fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1053.760899][T19462] RAX: ffffffffffffffda RBX: 00007fb8746e46c0 RCX: 00007fb87375d04e [ 1053.769179][T19462] RDX: 0000000000000001 RSI: 00007fb8746e40a0 RDI: 0000000000000004 [ 1053.777349][T19462] RBP: 00007fb8746e4090 R08: 0000000000000000 R09: 0000000000000000 [ 1053.785436][T19462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1053.793421][T19462] R13: 00007fb873a16128 R14: 00007fb873a16090 R15: 00007ffc6de0e7c8 [ 1053.801425][T19462] [ 1054.637459][T19494] netlink: 'syz.7.3603': attribute type 1 has an invalid length. [ 1054.752158][ T1289] ieee802154 phy0 wpan0: encryption failed: -22 [ 1054.758647][ T1289] ieee802154 phy1 wpan1: encryption failed: -22 [ 1054.794109][T19496] netlink: 'syz.4.3602': attribute type 2 has an invalid length. [ 1054.847318][T19496] netlink: 'syz.4.3602': attribute type 8 has an invalid length. [ 1054.948489][T19496] netlink: 132 bytes leftover after parsing attributes in process `syz.4.3602'. [ 1055.147774][ T11] wlan1: Trigger new scan to find an IBSS to join [ 1055.163835][T19503] mac80211_hwsim hwsim116 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1055.176842][T19503] netlink: 'syz.5.3605': attribute type 10 has an invalid length. [ 1055.185739][T19503] netlink: 40 bytes leftover after parsing attributes in process `syz.5.3605'. [ 1055.938993][T19516] netlink: 'syz.7.3607': attribute type 10 has an invalid length. [ 1056.051278][T19516] batman_adv: batadv0: Removing interface: netdevsim0 [ 1056.221482][ T59] wlan1: Trigger new scan to find an IBSS to join [ 1056.299610][T19516] bond0: (slave netdevsim0): Enslaving as an active interface with an up link [ 1056.389576][T19515] netlink: 'syz.7.3607': attribute type 10 has an invalid length. [ 1056.428519][T19515] netlink: 40 bytes leftover after parsing attributes in process `syz.7.3607'. [ 1056.458831][T19515] ipvlan1: entered promiscuous mode [ 1056.508396][T19515] ipvlan1: entered allmulticast mode [ 1056.517965][T19515] veth0_vlan: entered allmulticast mode [ 1056.622269][T19515] bridge0: port 3(ipvlan1) entered blocking state [ 1056.629129][T19515] bridge0: port 3(ipvlan1) entered disabled state [ 1056.639164][T19515] A link change request failed with some changes committed already. Interface ipvlan1 may have been left with an inconsistent configuration, please check. [ 1056.826453][T19531] netlink: 'syz.7.3614': attribute type 10 has an invalid length. [ 1057.047450][T19537] mac80211_hwsim hwsim121 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1057.095825][T19537] netlink: 'syz.4.3617': attribute type 10 has an invalid length. [ 1057.104035][T19537] netlink: 40 bytes leftover after parsing attributes in process `syz.4.3617'. [ 1058.025682][T19565] mac80211_hwsim hwsim121 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1058.040222][T19565] netlink: 'syz.4.3628': attribute type 10 has an invalid length. [ 1058.048511][T19565] netlink: 40 bytes leftover after parsing attributes in process `syz.4.3628'. [ 1058.960477][T19588] FAULT_INJECTION: forcing a failure. [ 1058.960477][T19588] name failslab, interval 1, probability 0, space 0, times 0 [ 1059.023441][T19588] CPU: 1 PID: 19588 Comm: syz.5.3635 Not tainted syzkaller #0 [ 1059.031011][T19588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1059.041252][T19588] Call Trace: [ 1059.044577][T19588] [ 1059.047549][T19588] dump_stack_lvl+0x18c/0x250 [ 1059.052298][T19588] ? show_regs_print_info+0x20/0x20 [ 1059.057552][T19588] ? load_image+0x420/0x420 [ 1059.062110][T19588] ? __might_sleep+0xe0/0xe0 [ 1059.066748][T19588] ? __lock_acquire+0x7d40/0x7d40 [ 1059.071839][T19588] ? unwind_get_return_address+0x91/0xc0 [ 1059.077518][T19588] ? stack_trace_save+0x100/0x100 [ 1059.082603][T19588] should_fail_ex+0x39d/0x4d0 [ 1059.087362][T19588] should_failslab+0x9/0x20 [ 1059.091915][T19588] slab_pre_alloc_hook+0x59/0x310 [ 1059.096972][T19588] ? stack_trace_save+0xaa/0x100 [ 1059.102036][T19588] kmem_cache_alloc_node+0x60/0x320 [ 1059.107277][T19588] ? __alloc_skb+0x103/0x2c0 [ 1059.111894][T19588] __alloc_skb+0x103/0x2c0 [ 1059.116370][T19588] __ip_append_data+0x2b73/0x3d40 [ 1059.121595][T19588] ? do_syscall_64+0x55/0xa0 [ 1059.126380][T19588] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1059.132618][T19588] ? raw_send_hdrinc+0x1170/0x1170 [ 1059.137851][T19588] ? ip_setup_cork+0x860/0x860 [ 1059.142727][T19588] ? ip_setup_cork+0x530/0x860 [ 1059.147521][T19588] ip_append_data+0x10d/0x180 [ 1059.152260][T19588] ? raw_send_hdrinc+0x1170/0x1170 [ 1059.157400][T19588] raw_sendmsg+0x15c1/0x1c00 [ 1059.162128][T19588] ? compat_raw_ioctl+0x70/0x70 [ 1059.167303][T19588] ? tomoyo_socket_sendmsg_permission+0x216/0x2f0 [ 1059.174015][T19588] ? sock_rps_record_flow+0x19/0x3f0 [ 1059.179408][T19588] ? inet_sendmsg+0x7c/0x2f0 [ 1059.184098][T19588] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 1059.189408][T19588] ? security_socket_sendmsg+0x80/0xa0 [ 1059.195074][T19588] ? inet_send_prepare+0x260/0x260 [ 1059.200211][T19588] ____sys_sendmsg+0x5ba/0x960 [ 1059.204996][T19588] ? __lock_acquire+0x7d40/0x7d40 [ 1059.210044][T19588] ? __sys_sendmsg_sock+0x30/0x30 [ 1059.215258][T19588] ? __import_iovec+0x3fa/0x850 [ 1059.220401][T19588] ? import_iovec+0x73/0xa0 [ 1059.225007][T19588] ___sys_sendmsg+0x2a6/0x360 [ 1059.229818][T19588] ? get_pid_task+0x20/0x1e0 [ 1059.234437][T19588] ? __sys_sendmsg+0x2a0/0x2a0 [ 1059.239237][T19588] ? __lock_acquire+0x7d40/0x7d40 [ 1059.244603][T19588] __se_sys_sendmsg+0x1c2/0x2b0 [ 1059.249564][T19588] ? __x64_sys_sendmsg+0x80/0x80 [ 1059.254703][T19588] ? lockdep_hardirqs_on+0x98/0x150 [ 1059.259923][T19588] do_syscall_64+0x55/0xa0 [ 1059.264616][T19588] ? clear_bhb_loop+0x40/0x90 [ 1059.269491][T19588] ? clear_bhb_loop+0x40/0x90 [ 1059.274363][T19588] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1059.280358][T19588] RIP: 0033:0x7fb87379c819 [ 1059.284789][T19588] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1059.305105][T19588] RSP: 002b:00007fb874705028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1059.313536][T19588] RAX: ffffffffffffffda RBX: 00007fb873a15fa0 RCX: 00007fb87379c819 [ 1059.321528][T19588] RDX: 0000000000000000 RSI: 0000200000000700 RDI: 0000000000000003 [ 1059.329603][T19588] RBP: 00007fb874705090 R08: 0000000000000000 R09: 0000000000000000 [ 1059.337679][T19588] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1059.345662][T19588] R13: 00007fb873a16038 R14: 00007fb873a15fa0 R15: 00007ffc6de0e7c8 [ 1059.353757][T19588] [ 1059.380057][ T11] wlan1: Trigger new scan to find an IBSS to join [ 1059.611107][T19599] mac80211_hwsim hwsim116 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1059.639833][T19599] netlink: 'syz.5.3638': attribute type 10 has an invalid length. [ 1059.648033][T19599] netlink: 40 bytes leftover after parsing attributes in process `syz.5.3638'. [ 1060.188479][ T1140] wlan1: Trigger new scan to find an IBSS to join [ 1060.278300][T19616] netlink: 'syz.7.3644': attribute type 21 has an invalid length. [ 1060.298660][T19616] netlink: 'syz.7.3644': attribute type 6 has an invalid length. [ 1060.327239][T19616] netlink: 132 bytes leftover after parsing attributes in process `syz.7.3644'. [ 1060.354359][T19616] FAULT_INJECTION: forcing a failure. [ 1060.354359][T19616] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1060.390412][T19616] CPU: 1 PID: 19616 Comm: syz.7.3644 Not tainted syzkaller #0 [ 1060.397998][T19616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1060.408088][T19616] Call Trace: [ 1060.411388][T19616] [ 1060.414340][T19616] dump_stack_lvl+0x18c/0x250 [ 1060.419054][T19616] ? show_regs_print_info+0x20/0x20 [ 1060.424285][T19616] ? load_image+0x420/0x420 [ 1060.428905][T19616] ? __lock_acquire+0x7d40/0x7d40 [ 1060.433953][T19616] ? snprintf+0xe9/0x140 [ 1060.438222][T19616] should_fail_ex+0x39d/0x4d0 [ 1060.443284][T19616] _copy_to_user+0x2f/0xa0 [ 1060.447736][T19616] simple_read_from_buffer+0xe7/0x150 [ 1060.453245][T19616] proc_fail_nth_read+0x1e8/0x260 [ 1060.458317][T19616] ? proc_fault_inject_write+0x360/0x360 [ 1060.463982][T19616] ? fsnotify_perm+0x271/0x5e0 [ 1060.468863][T19616] ? proc_fault_inject_write+0x360/0x360 [ 1060.474520][T19616] vfs_read+0x28b/0x970 [ 1060.478712][T19616] ? kernel_read+0x1e0/0x1e0 [ 1060.483334][T19616] ? __fget_files+0x28/0x4b0 [ 1060.488036][T19616] ? __fget_files+0x28/0x4b0 [ 1060.492771][T19616] ? __fget_files+0x43d/0x4b0 [ 1060.497484][T19616] ? __fdget_pos+0x2a3/0x330 [ 1060.502095][T19616] ? ksys_read+0x75/0x260 [ 1060.506539][T19616] ksys_read+0x150/0x260 [ 1060.510901][T19616] ? vfs_write+0x990/0x990 [ 1060.515520][T19616] ? lockdep_hardirqs_on+0x98/0x150 [ 1060.521005][T19616] do_syscall_64+0x55/0xa0 [ 1060.525702][T19616] ? clear_bhb_loop+0x40/0x90 [ 1060.530571][T19616] ? clear_bhb_loop+0x40/0x90 [ 1060.535360][T19616] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1060.541282][T19616] RIP: 0033:0x7feae155d04e [ 1060.545721][T19616] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1060.565612][T19616] RSP: 002b:00007feae2370fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1060.574484][T19616] RAX: ffffffffffffffda RBX: 00007feae23716c0 RCX: 00007feae155d04e [ 1060.582569][T19616] RDX: 000000000000000f RSI: 00007feae23710a0 RDI: 0000000000000004 [ 1060.590566][T19616] RBP: 00007feae2371090 R08: 0000000000000000 R09: 0000000000000000 [ 1060.598563][T19616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1060.606552][T19616] R13: 00007feae1816038 R14: 00007feae1815fa0 R15: 00007ffc206c8368 [ 1060.614679][T19616] [ 1061.979522][T19637] netlink: 9402 bytes leftover after parsing attributes in process `syz.7.3649'. [ 1062.188626][ T2957] wlan1: Trigger new scan to find an IBSS to join [ 1062.900073][T19656] netlink: 'syz.4.3650': attribute type 28 has an invalid length. [ 1062.925548][T19656] netlink: 'syz.4.3650': attribute type 29 has an invalid length. [ 1062.956580][T19656] netlink: 132 bytes leftover after parsing attributes in process `syz.4.3650'. [ 1063.229768][T19649] mac80211_hwsim hwsim116 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1063.275476][T19652] netlink: 'syz.5.3651': attribute type 10 has an invalid length. [ 1063.317047][T19652] netlink: 40 bytes leftover after parsing attributes in process `syz.5.3651'. [ 1063.531837][T19662] netlink: 'syz.6.3654': attribute type 29 has an invalid length. [ 1063.593256][T19662] netlink: 'syz.6.3654': attribute type 29 has an invalid length. [ 1063.629680][T19663] netlink: 'syz.6.3654': attribute type 29 has an invalid length. [ 1063.657952][T19662] netlink: 'syz.6.3654': attribute type 29 has an invalid length. [ 1063.671330][T19662] netlink: 'syz.6.3654': attribute type 10 has an invalid length. [ 1063.671439][T19670] netlink: 16410 bytes leftover after parsing attributes in process `syz.4.3656'. [ 1063.770481][T19662] team0: Device veth1_vlan failed to register rx_handler [ 1064.055724][T19677] netlink: 55631 bytes leftover after parsing attributes in process `syz.4.3658'. [ 1064.085449][T19677] netlink: 6324 bytes leftover after parsing attributes in process `syz.4.3658'. [ 1064.101844][T19677] netlink: 2 bytes leftover after parsing attributes in process `syz.4.3658'. [ 1064.327067][T19676] FAULT_INJECTION: forcing a failure. [ 1064.327067][T19676] name failslab, interval 1, probability 0, space 0, times 0 [ 1064.364437][T19682] netlink: 132 bytes leftover after parsing attributes in process `syz.5.3660'. [ 1064.409219][T19676] CPU: 1 PID: 19676 Comm: syz.7.3659 Not tainted syzkaller #0 [ 1064.416856][T19676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1064.427132][T19676] Call Trace: [ 1064.430453][T19676] [ 1064.433419][T19676] dump_stack_lvl+0x18c/0x250 [ 1064.438180][T19676] ? show_regs_print_info+0x20/0x20 [ 1064.443520][T19676] ? load_image+0x420/0x420 [ 1064.448077][T19676] ? __might_sleep+0xe0/0xe0 [ 1064.452717][T19676] ? __lock_acquire+0x7d40/0x7d40 [ 1064.458060][T19676] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 1064.464105][T19676] should_fail_ex+0x39d/0x4d0 [ 1064.468852][T19676] should_failslab+0x9/0x20 [ 1064.473416][T19676] slab_pre_alloc_hook+0x59/0x310 [ 1064.478491][T19676] ? lockdep_hardirqs_on+0x98/0x150 [ 1064.483742][T19676] ? tomoyo_encode+0x28b/0x540 [ 1064.488561][T19676] ? tomoyo_encode+0x28b/0x540 [ 1064.493364][T19676] __kmem_cache_alloc_node+0x53/0x250 [ 1064.498793][T19676] ? tomoyo_encode+0x28b/0x540 [ 1064.503690][T19676] __kmalloc+0xa4/0x230 [ 1064.508119][T19676] tomoyo_encode+0x28b/0x540 [ 1064.512767][T19676] tomoyo_realpath_from_path+0x592/0x5d0 [ 1064.518481][T19676] tomoyo_path_number_perm+0x248/0x620 [ 1064.521114][T19687] FAULT_INJECTION: forcing a failure. [ 1064.521114][T19687] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1064.524001][T19676] ? tomoyo_path_number_perm+0x217/0x620 [ 1064.542921][T19676] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 1064.548509][T19676] ? perf_trace_run_bpf_submit+0xf4/0x1c0 [ 1064.554271][T19676] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 1064.560287][T19676] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1064.566473][T19676] ? tomoyo_file_ioctl+0x11/0x30 [ 1064.571456][T19676] security_file_ioctl+0x70/0xa0 [ 1064.576534][T19676] __se_sys_ioctl+0x48/0x170 [ 1064.581180][T19676] do_syscall_64+0x55/0xa0 [ 1064.585633][T19676] ? clear_bhb_loop+0x40/0x90 [ 1064.590349][T19676] ? clear_bhb_loop+0x40/0x90 [ 1064.595062][T19676] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1064.600998][T19676] RIP: 0033:0x7feae159c819 [ 1064.605465][T19676] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1064.625207][T19676] RSP: 002b:00007feae2371028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1064.633752][T19676] RAX: ffffffffffffffda RBX: 00007feae1815fa0 RCX: 00007feae159c819 [ 1064.641779][T19676] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 000000000000000f [ 1064.649981][T19676] RBP: 00007feae2371090 R08: 0000000000000000 R09: 0000000000000000 [ 1064.658017][T19676] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1064.666122][T19676] R13: 00007feae1816038 R14: 00007feae1815fa0 R15: 00007ffc206c8368 [ 1064.674176][T19676] [ 1064.747306][T19687] CPU: 1 PID: 19687 Comm: syz.6.3662 Not tainted syzkaller #0 [ 1064.753732][T19676] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1064.754830][T19687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1064.754845][T19687] Call Trace: [ 1064.754854][T19687] [ 1064.754864][T19687] dump_stack_lvl+0x18c/0x250 [ 1064.754902][T19687] ? show_regs_print_info+0x20/0x20 [ 1064.754932][T19687] ? load_image+0x420/0x420 [ 1064.754959][T19687] ? __lock_acquire+0x7d40/0x7d40 [ 1064.754991][T19687] should_fail_ex+0x39d/0x4d0 [ 1064.755023][T19687] prepare_alloc_pages+0x1e2/0x5f0 [ 1064.755050][T19687] __alloc_pages+0x134/0x460 [ 1064.755072][T19687] ? zone_statistics+0x170/0x170 [ 1064.755101][T19687] ? alloc_pages+0x4dc/0x740 [ 1064.755121][T19687] ? do_raw_spin_unlock+0x121/0x230 [ 1064.755150][T19687] __get_free_pages+0xc/0x30 [ 1064.755175][T19687] kasan_populate_vmalloc_pte+0x35/0x100 [ 1064.755205][T19687] __apply_to_page_range+0x860/0xdd0 [ 1064.755243][T19687] ? kasan_populate_vmalloc+0x70/0x70 [ 1064.848365][T19687] ? apply_to_page_range+0x50/0x50 [ 1064.853506][T19687] ? do_raw_spin_unlock+0x121/0x230 [ 1064.858820][T19687] alloc_vmap_area+0x1d0c/0x1e30 [ 1064.863836][T19687] ? vm_map_ram+0xcb0/0xcb0 [ 1064.868457][T19687] ? rcu_is_watching+0x15/0xb0 [ 1064.873254][T19687] __get_vm_area_node+0x162/0x370 [ 1064.878298][T19687] ? bpf_map_area_alloc+0x5e/0x110 [ 1064.883429][T19687] __vmalloc_node_range+0x36e/0x1330 [ 1064.888906][T19687] ? dev_map_create_hash+0x24/0x1d0 [ 1064.894177][T19687] ? free_vm_area+0x50/0x50 [ 1064.898812][T19687] ? __kmem_cache_alloc_node+0x13a/0x250 [ 1064.904471][T19687] bpf_map_area_alloc+0xf1/0x110 [ 1064.909515][T19687] ? dev_map_create_hash+0x24/0x1d0 [ 1064.914733][T19687] dev_map_create_hash+0x24/0x1d0 [ 1064.919771][T19687] ? bpf_map_init_from_attr+0x14a/0x340 [ 1064.925355][T19687] dev_map_alloc+0x277/0x4c0 [ 1064.929965][T19687] map_create+0x877/0x12f0 [ 1064.934401][T19687] ? bpf_lsm_bpf+0x9/0x10 [ 1064.938766][T19687] __sys_bpf+0x651/0x890 [ 1064.943026][T19687] ? bpf_link_show_fdinfo+0x390/0x390 [ 1064.948433][T19687] ? lock_chain_count+0x20/0x20 [ 1064.953307][T19687] __x64_sys_bpf+0x7c/0x90 [ 1064.957741][T19687] do_syscall_64+0x55/0xa0 [ 1064.962200][T19687] ? clear_bhb_loop+0x40/0x90 [ 1064.966983][T19687] ? clear_bhb_loop+0x40/0x90 [ 1064.971680][T19687] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1064.977590][T19687] RIP: 0033:0x7f429eb9c819 [ 1064.982025][T19687] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1065.001735][T19687] RSP: 002b:00007f429f9e9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1065.010176][T19687] RAX: ffffffffffffffda RBX: 00007f429ee15fa0 RCX: 00007f429eb9c819 [ 1065.018171][T19687] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0000000000000000 [ 1065.026240][T19687] RBP: 00007f429f9e9090 R08: 0000000000000000 R09: 0000000000000000 [ 1065.034223][T19687] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1065.042203][T19687] R13: 00007f429ee16038 R14: 00007f429ee15fa0 R15: 00007ffd0497aa38 [ 1065.050205][T19687] [ 1065.204010][T19676] bridge0: port 1(bridge_slave_0) entered disabled state [ 1065.332753][T19699] mac80211_hwsim hwsim121 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1065.387818][T19698] validate_nla: 2 callbacks suppressed [ 1065.387840][T19698] netlink: 'syz.6.3665': attribute type 21 has an invalid length. [ 1065.413302][T19698] netlink: 'syz.6.3665': attribute type 6 has an invalid length. [ 1065.444230][T19698] netlink: 132 bytes leftover after parsing attributes in process `syz.6.3665'. [ 1065.485303][T19694] netlink: 'syz.4.3663': attribute type 10 has an invalid length. [ 1065.515808][T19694] netlink: 40 bytes leftover after parsing attributes in process `syz.4.3663'. [ 1065.773913][T19707] FAULT_INJECTION: forcing a failure. [ 1065.773913][T19707] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1065.807750][T19707] CPU: 0 PID: 19707 Comm: syz.6.3668 Not tainted syzkaller #0 [ 1065.815391][T19707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1065.825491][T19707] Call Trace: [ 1065.828991][T19707] [ 1065.831958][T19707] dump_stack_lvl+0x18c/0x250 [ 1065.836708][T19707] ? show_regs_print_info+0x20/0x20 [ 1065.841960][T19707] ? load_image+0x420/0x420 [ 1065.846522][T19707] ? __might_fault+0xaa/0x120 [ 1065.851250][T19707] ? __lock_acquire+0x7d40/0x7d40 [ 1065.856324][T19707] should_fail_ex+0x39d/0x4d0 [ 1065.861065][T19707] _copy_from_iter+0x1d9/0x12e0 [ 1065.865975][T19707] ? slab_post_alloc_hook+0x8a/0x4b0 [ 1065.871313][T19707] ? __virt_addr_valid+0x18c/0x540 [ 1065.876475][T19707] ? __lock_acquire+0x7d40/0x7d40 [ 1065.881546][T19707] ? rcu_is_watching+0x15/0xb0 [ 1065.886360][T19707] ? copyout_mc+0x70/0x70 [ 1065.890738][T19707] ? __virt_addr_valid+0x18c/0x540 [ 1065.895890][T19707] ? __virt_addr_valid+0x18c/0x540 [ 1065.901038][T19707] ? __virt_addr_valid+0x469/0x540 [ 1065.906193][T19707] ? __check_object_size+0x506/0xa20 [ 1065.911518][T19707] netlink_sendmsg+0x76b/0xbf0 [ 1065.916333][T19707] ? netlink_getsockopt+0x590/0x590 [ 1065.921592][T19707] ? aa_sock_msg_perm+0x94/0x150 [ 1065.926585][T19707] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 1065.932242][T19707] ? security_socket_sendmsg+0x80/0xa0 [ 1065.937804][T19707] ? netlink_getsockopt+0x590/0x590 [ 1065.943117][T19707] ____sys_sendmsg+0x5ba/0x960 [ 1065.947902][T19707] ? __asan_memset+0x22/0x40 [ 1065.952514][T19707] ? __sys_sendmsg_sock+0x30/0x30 [ 1065.957657][T19707] ? __import_iovec+0x5f2/0x850 [ 1065.962527][T19707] ? import_iovec+0x73/0xa0 [ 1065.967139][T19707] ___sys_sendmsg+0x2a6/0x360 [ 1065.971842][T19707] ? get_pid_task+0x20/0x1e0 [ 1065.976542][T19707] ? __sys_sendmsg+0x2a0/0x2a0 [ 1065.981335][T19707] ? __lock_acquire+0x7d40/0x7d40 [ 1065.986572][T19707] __se_sys_sendmsg+0x1c2/0x2b0 [ 1065.991790][T19707] ? __x64_sys_sendmsg+0x80/0x80 [ 1065.996928][T19707] ? lockdep_hardirqs_on+0x98/0x150 [ 1066.002235][T19707] do_syscall_64+0x55/0xa0 [ 1066.006675][T19707] ? clear_bhb_loop+0x40/0x90 [ 1066.011398][T19707] ? clear_bhb_loop+0x40/0x90 [ 1066.016196][T19707] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1066.022145][T19707] RIP: 0033:0x7f429eb9c819 [ 1066.026575][T19707] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1066.046368][T19707] RSP: 002b:00007f429f9e9028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1066.054799][T19707] RAX: ffffffffffffffda RBX: 00007f429ee15fa0 RCX: 00007f429eb9c819 [ 1066.062794][T19707] RDX: 0000000040004000 RSI: 0000200000000140 RDI: 0000000000000003 [ 1066.070778][T19707] RBP: 00007f429f9e9090 R08: 0000000000000000 R09: 0000000000000000 [ 1066.078768][T19707] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1066.086840][T19707] R13: 00007f429ee16038 R14: 00007f429ee15fa0 R15: 00007ffd0497aa38 [ 1066.094848][T19707] [ 1066.452242][T19720] FAULT_INJECTION: forcing a failure. [ 1066.452242][T19720] name failslab, interval 1, probability 0, space 0, times 0 [ 1066.485591][T19720] CPU: 1 PID: 19720 Comm: syz.6.3671 Not tainted syzkaller #0 [ 1066.493270][T19720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1066.503362][T19720] Call Trace: [ 1066.506681][T19720] [ 1066.509647][T19720] dump_stack_lvl+0x18c/0x250 [ 1066.514568][T19720] ? show_regs_print_info+0x20/0x20 [ 1066.519817][T19720] ? load_image+0x420/0x420 [ 1066.524358][T19720] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 1066.530389][T19720] ? __asan_memset+0x22/0x40 [ 1066.535052][T19720] should_fail_ex+0x39d/0x4d0 [ 1066.539781][T19720] should_failslab+0x9/0x20 [ 1066.544329][T19720] slab_pre_alloc_hook+0x59/0x310 [ 1066.549414][T19720] ? __debug_object_init+0xec/0x450 [ 1066.554674][T19720] kmem_cache_alloc+0x5a/0x2d0 [ 1066.559495][T19720] ? slab_build_skb+0x2b/0x3f0 [ 1066.564300][T19720] slab_build_skb+0x2b/0x3f0 [ 1066.568951][T19720] bpf_prog_test_run_skb+0x3c8/0x12b0 [ 1066.574359][T19720] ? __fget_files+0x28/0x4b0 [ 1066.579078][T19720] ? __fget_files+0x28/0x4b0 [ 1066.583736][T19720] ? __fget_files+0x43d/0x4b0 [ 1066.588470][T19720] ? cpu_online+0x60/0x60 [ 1066.592835][T19720] bpf_prog_test_run+0x321/0x390 [ 1066.597820][T19720] __sys_bpf+0x49d/0x890 [ 1066.602109][T19720] ? bpf_link_show_fdinfo+0x390/0x390 [ 1066.607543][T19720] ? lock_chain_count+0x20/0x20 [ 1066.612456][T19720] __x64_sys_bpf+0x7c/0x90 [ 1066.616912][T19720] do_syscall_64+0x55/0xa0 [ 1066.621366][T19720] ? clear_bhb_loop+0x40/0x90 [ 1066.626087][T19720] ? clear_bhb_loop+0x40/0x90 [ 1066.630820][T19720] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1066.636780][T19720] RIP: 0033:0x7f429eb9c819 [ 1066.641285][T19720] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1066.661214][T19720] RSP: 002b:00007f429f9e9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1066.669776][T19720] RAX: ffffffffffffffda RBX: 00007f429ee15fa0 RCX: 00007f429eb9c819 [ 1066.677801][T19720] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 1066.685916][T19720] RBP: 00007f429f9e9090 R08: 0000000000000000 R09: 0000000000000000 [ 1066.693939][T19720] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1066.702480][T19720] R13: 00007f429ee16038 R14: 00007f429ee15fa0 R15: 00007ffd0497aa38 [ 1066.710542][T19720] [ 1067.154429][ T59] wlan1: Trigger new scan to find an IBSS to join [ 1067.286652][T19735] mac80211_hwsim hwsim117 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1067.356637][T19735] netlink: 'syz.7.3677': attribute type 10 has an invalid length. [ 1067.364853][T19735] netlink: 40 bytes leftover after parsing attributes in process `syz.7.3677'. [ 1067.612795][T19745] netlink: 'syz.6.3679': attribute type 5 has an invalid length. [ 1067.627261][T19745] netlink: 168 bytes leftover after parsing attributes in process `syz.6.3679'. [ 1067.687224][T15179] Bluetooth: hci6: ISO packet for unknown connection handle 2563 [ 1068.109536][T19759] netlink: 16410 bytes leftover after parsing attributes in process `syz.5.3683'. [ 1068.173397][T19761] mac80211_hwsim hwsim117 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1068.194844][T19761] netlink: 'syz.7.3686': attribute type 10 has an invalid length. [ 1068.214522][T19761] netlink: 40 bytes leftover after parsing attributes in process `syz.7.3686'. [ 1069.274873][ T59] wlan1: Trigger new scan to find an IBSS to join [ 1069.410062][T19776] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1069.782767][T19798] FAULT_INJECTION: forcing a failure. [ 1069.782767][T19798] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1069.827351][T19798] CPU: 0 PID: 19798 Comm: syz.7.3697 Not tainted syzkaller #0 [ 1069.834990][T19798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1069.845185][T19798] Call Trace: [ 1069.848512][T19798] [ 1069.851605][T19798] dump_stack_lvl+0x18c/0x250 [ 1069.856347][T19798] ? show_regs_print_info+0x20/0x20 [ 1069.861678][T19798] ? load_image+0x420/0x420 [ 1069.866223][T19798] ? __might_fault+0xaa/0x120 [ 1069.871017][T19798] ? __lock_acquire+0x7d40/0x7d40 [ 1069.876093][T19798] should_fail_ex+0x39d/0x4d0 [ 1069.880825][T19798] _copy_from_user+0x2f/0xe0 [ 1069.885584][T19798] ____sys_sendmsg+0x2fd/0x960 [ 1069.890419][T19798] ? __sys_sendmsg_sock+0x30/0x30 [ 1069.895491][T19798] ? __import_iovec+0x3fa/0x850 [ 1069.900468][T19798] ? import_iovec+0x73/0xa0 [ 1069.904994][T19798] ___sys_sendmsg+0x2a6/0x360 [ 1069.909698][T19798] ? get_pid_task+0x20/0x1e0 [ 1069.914319][T19798] ? __sys_sendmsg+0x2a0/0x2a0 [ 1069.919199][T19798] ? __lock_acquire+0x7d40/0x7d40 [ 1069.924262][T19798] __se_sys_sendmsg+0x1c2/0x2b0 [ 1069.929131][T19798] ? __x64_sys_sendmsg+0x80/0x80 [ 1069.934183][T19798] ? lockdep_hardirqs_on+0x98/0x150 [ 1069.939491][T19798] do_syscall_64+0x55/0xa0 [ 1069.944182][T19798] ? clear_bhb_loop+0x40/0x90 [ 1069.948969][T19798] ? clear_bhb_loop+0x40/0x90 [ 1069.953748][T19798] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1069.959660][T19798] RIP: 0033:0x7feae159c819 [ 1069.964089][T19798] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1069.983920][T19798] RSP: 002b:00007feae2371028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1069.992627][T19798] RAX: ffffffffffffffda RBX: 00007feae1815fa0 RCX: 00007feae159c819 [ 1070.001417][T19798] RDX: 0000000000044004 RSI: 0000200000000280 RDI: 0000000000000003 [ 1070.009583][T19798] RBP: 00007feae2371090 R08: 0000000000000000 R09: 0000000000000000 [ 1070.017653][T19798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1070.025632][T19798] R13: 00007feae1816038 R14: 00007feae1815fa0 R15: 00007ffc206c8368 [ 1070.034005][T19798] [ 1070.084528][T19802] mac80211_hwsim hwsim119 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1070.243102][T19802] netlink: 'syz.6.3699': attribute type 10 has an invalid length. [ 1070.253875][T19802] netlink: 40 bytes leftover after parsing attributes in process `syz.6.3699'. [ 1070.476865][T19814] netlink: 'syz.7.3703': attribute type 4 has an invalid length. [ 1070.507584][T19814] netlink: 206236 bytes leftover after parsing attributes in process `syz.7.3703'. [ 1071.158050][ T59] wlan1: Trigger new scan to find an IBSS to join [ 1071.275691][ T1140] wlan1: Creating new IBSS network, BSSID aa:6b:50:23:20:70 [ 1072.187500][ T59] wlan1: Trigger new scan to find an IBSS to join [ 1072.188004][ T11] wlan1: Trigger new scan to find an IBSS to join [ 1072.571498][T19847] netlink: 65047 bytes leftover after parsing attributes in process `syz.7.3708'. [ 1073.224357][T19853] syzkaller0: entered promiscuous mode [ 1073.247407][T19853] syzkaller0: entered allmulticast mode [ 1073.313790][T19858] mac80211_hwsim hwsim116 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1073.333696][T19858] netlink: 'syz.5.3712': attribute type 10 has an invalid length. [ 1073.342719][T19858] netlink: 40 bytes leftover after parsing attributes in process `syz.5.3712'. [ 1074.097787][T19868] delete_channel: no stack [ 1074.113509][T19868] delete_channel: no stack [ 1074.188359][ T12] wlan1: Creating new IBSS network, BSSID 06:d6:44:94:5e:91 [ 1076.192789][ T12] wlan1: Trigger new scan to find an IBSS to join [ 1077.237429][ T59] wlan1: Trigger new scan to find an IBSS to join [ 1078.190687][ T2957] wlan1: Creating new IBSS network, BSSID 4e:c6:46:a4:d1:ff [ 1078.429570][T19892] mac80211_hwsim hwsim116 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1078.472785][T19892] netlink: 'syz.5.3722': attribute type 10 has an invalid length. [ 1078.487269][T19892] netlink: 40 bytes leftover after parsing attributes in process `syz.5.3722'. [ 1078.656410][T19895] delete_channel: no stack [ 1078.664206][T19895] delete_channel: no stack [ 1081.230011][ T2961] wlan1: Trigger new scan to find an IBSS to join [ 1081.271577][T19933] netlink: 180 bytes leftover after parsing attributes in process `syz.5.3731'. [ 1081.613688][T19941] delete_channel: no stack [ 1081.627561][T19941] delete_channel: no stack [ 1086.722407][ T11] wlan1: Trigger new scan to find an IBSS to join [ 1116.212379][ T1289] ieee802154 phy0 wpan0: encryption failed: -22 [ 1116.219084][ T1289] ieee802154 phy1 wpan1: encryption failed: -22 [ 1177.656437][ T1289] ieee802154 phy0 wpan0: encryption failed: -22 [ 1177.663302][ T1289] ieee802154 phy1 wpan1: encryption failed: -22 [ 1187.497109][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 1187.504425][ C1] rcu: 1-....: (1 GPs behind) idle=e80c/1/0x4000000000000000 softirq=91189/91195 fqs=4025 [ 1187.515829][ C1] rcu: hardirqs softirqs csw/system [ 1187.522698][ C1] rcu: number: 1314764 0 0 [ 1187.529249][ C1] rcu: cputime: 17014 35475 46 ==> 52490(ms) [ 1187.537210][ C1] rcu: (t=10500 jiffies g=117209 q=1900 ncpus=2) [ 1187.543995][ C1] CPU: 1 PID: 19938 Comm: syz.5.3731 Not tainted syzkaller #0 [ 1187.551568][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1187.561634][ C1] RIP: 0010:unwind_next_frame+0x1ba/0x2970 [ 1187.567660][ C1] Code: 4c 89 74 24 08 75 11 e8 74 e8 4b 00 48 c7 c3 40 4c c8 8a e9 65 04 00 00 49 89 df 48 89 6c 24 10 48 c7 c3 00 00 00 81 4c 89 ff <48> c7 c6 00 00 00 81 e8 5a ea 4b 00 49 81 ff 00 00 00 81 40 0f 92 [ 1187.587313][ C1] RSP: 0018:ffffc900001eeef8 EFLAGS: 00000286 [ 1187.593674][ C1] RAX: ffffffff813b3949 RBX: ffffffff81000000 RCX: ffff888069130000 [ 1187.601832][ C1] RDX: 0000000000000100 RSI: 0000000000000001 RDI: ffffffff81527212 [ 1187.610082][ C1] RBP: ffffc900001ef018 R08: ffffc900001ef090 R09: 000000000000001f [ 1187.618204][ C1] R10: 0000000000000004 R11: 0000000000000100 R12: ffffc900001eefc8 [ 1187.626435][ C1] R13: dffffc0000000000 R14: ffffc900001eeffd R15: ffffffff81527212 [ 1187.634600][ C1] FS: 00007fb8746e46c0(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000 [ 1187.643621][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1187.650236][ C1] CR2: 00007f429f9c8d58 CR3: 000000007a576000 CR4: 00000000003506e0 [ 1187.658578][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1187.666770][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000050602 [ 1187.674767][ C1] Call Trace: [ 1187.678055][ C1] [ 1187.681070][ C1] ? __irq_exit_rcu+0xd3/0x190 [ 1187.685846][ C1] ? __irq_exit_rcu+0xd3/0x190 [ 1187.690694][ C1] ? stack_trace_save+0x100/0x100 [ 1187.695808][ C1] arch_stack_walk+0x144/0x190 [ 1187.700588][ C1] ? __irq_exit_rcu+0xd3/0x190 [ 1187.705362][ C1] stack_trace_save+0xaa/0x100 [ 1187.710140][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 1187.715427][ C1] ? mark_lock+0x94/0x320 [ 1187.719785][ C1] kasan_set_track+0x4e/0x70 [ 1187.724507][ C1] ? kasan_set_track+0x4e/0x70 [ 1187.729583][ C1] ? kasan_save_free_info+0x2e/0x50 [ 1187.734989][ C1] ? ____kasan_slab_free+0x126/0x1e0 [ 1187.740387][ C1] ? slab_free_freelist_hook+0x130/0x1a0 [ 1187.746028][ C1] ? kmem_cache_free+0xf8/0x270 [ 1187.750881][ C1] ? dev_kfree_skb_any_reason+0x120/0x130 [ 1187.756776][ C1] ? free_old_xmit_skbs+0x11a/0x3d0 [ 1187.762098][ C1] ? start_xmit+0x168/0x14a0 [ 1187.766719][ C1] ? dev_hard_start_xmit+0x246/0x740 [ 1187.772039][ C1] ? sch_direct_xmit+0x25e/0x4c0 [ 1187.777033][ C1] ? __dev_queue_xmit+0x165d/0x3660 [ 1187.782247][ C1] ? ip_finish_output2+0xcec/0x11e0 [ 1187.787598][ C1] ? ip_output+0x2a1/0x3b0 [ 1187.792125][ C1] ? __ip_queue_xmit+0x1049/0x1950 [ 1187.797345][ C1] ? __tcp_transmit_skb+0x1d6b/0x33f0 [ 1187.802752][ C1] ? tcp_rcv_established+0xb06/0x1d20 [ 1187.808182][ C1] ? tcp_v4_do_rcv+0x4ed/0xb80 [ 1187.813052][ C1] ? tcp_v4_rcv+0x23bf/0x2af0 [ 1187.817733][ C1] ? ip_protocol_deliver_rcu+0x20e/0x3f0 [ 1187.823628][ C1] ? ip_local_deliver_finish+0x2ca/0x510 [ 1187.829269][ C1] ? NF_HOOK+0x32d/0x3b0 [ 1187.833677][ C1] ? ip_sublist_rcv+0xa4c/0xd70 [ 1187.838541][ C1] ? ip_list_rcv+0x3f2/0x440 [ 1187.843145][ C1] ? __netif_receive_skb_list_core+0x583/0x750 [ 1187.849585][ C1] ? netif_receive_skb_list_internal+0x943/0xca0 [ 1187.855930][ C1] ? napi_gro_receive+0x565/0xb00 [ 1187.860986][ C1] ? receive_buf+0x2203/0x3820 [ 1187.865758][ C1] ? virtnet_poll+0x5dd/0x1280 [ 1187.870708][ C1] ? __napi_poll+0xc0/0x460 [ 1187.875344][ C1] ? net_rx_action+0x616/0xc40 [ 1187.880293][ C1] ? handle_softirqs+0x280/0x820 [ 1187.885270][ C1] ? __irq_exit_rcu+0xd3/0x190 [ 1187.890055][ C1] ? kmem_cache_free+0xf8/0x270 [ 1187.895146][ C1] kasan_save_free_info+0x2e/0x50 [ 1187.900557][ C1] ____kasan_slab_free+0x126/0x1e0 [ 1187.905840][ C1] slab_free_freelist_hook+0x130/0x1a0 [ 1187.911510][ C1] ? dev_kfree_skb_any_reason+0x120/0x130 [ 1187.917432][ C1] kmem_cache_free+0xf8/0x270 [ 1187.922145][ C1] dev_kfree_skb_any_reason+0x120/0x130 [ 1187.927710][ C1] ? refcount_dec_and_test+0x70/0x70 [ 1187.933183][ C1] free_old_xmit_skbs+0x11a/0x3d0 [ 1187.938576][ C1] ? lockdep_hardirqs_on+0x98/0x150 [ 1187.943884][ C1] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1187.950491][ C1] ? virtqueue_napi_schedule+0x40/0x40 [ 1187.956312][ C1] start_xmit+0x168/0x14a0 [ 1187.960726][ C1] ? __lock_acquire+0x7d40/0x7d40 [ 1187.965750][ C1] ? dev_queue_xmit_nit+0xa80/0xbb0 [ 1187.970954][ C1] dev_hard_start_xmit+0x246/0x740 [ 1187.976078][ C1] sch_direct_xmit+0x25e/0x4c0 [ 1187.980860][ C1] ? mrp_pdu_parse_vecattr_event+0x2a0/0x2a0 [ 1187.987216][ C1] __dev_queue_xmit+0x165d/0x3660 [ 1187.992274][ C1] ? lapic_next_event+0x11/0x20 [ 1187.997311][ C1] ? clockevents_program_event+0x230/0x310 [ 1188.003133][ C1] ? __dev_queue_xmit+0x265/0x3660 [ 1188.008597][ C1] ? mark_lock+0x94/0x320 [ 1188.013132][ C1] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 1188.019114][ C1] ? netdev_core_pick_tx+0x340/0x340 [ 1188.024410][ C1] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1188.030579][ C1] ? lockdep_hardirqs_on+0x98/0x150 [ 1188.035957][ C1] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1188.042290][ C1] ? ip_finish_output2+0xb04/0x11e0 [ 1188.047665][ C1] ? ip_finish_output2+0x457/0x11e0 [ 1188.053057][ C1] ip_finish_output2+0xcec/0x11e0 [ 1188.058279][ C1] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1188.065949][ C1] ? ip_finish_output2+0x457/0x11e0 [ 1188.071442][ C1] ? ip_fragment+0x210/0x210 [ 1188.076310][ C1] ? ip_skb_dst_mtu+0x58a/0x9c0 [ 1188.081257][ C1] ? ip_finish_output+0x3ef/0x4c0 [ 1188.086640][ C1] ip_output+0x2a1/0x3b0 [ 1188.091066][ C1] ? ip_output+0x60/0x3b0 [ 1188.095583][ C1] ? __ip_queue_xmit+0x5d/0x1950 [ 1188.100646][ C1] __ip_queue_xmit+0x1049/0x1950 [ 1188.105601][ C1] ? __ip_queue_xmit+0x5d/0x1950 [ 1188.110627][ C1] __tcp_transmit_skb+0x1d6b/0x33f0 [ 1188.116016][ C1] ? __tcp_send_ack+0x5a0/0x5a0 [ 1188.121668][ C1] ? __tcp_send_ack+0xad/0x5a0 [ 1188.126523][ C1] ? __tcp_send_ack+0x176/0x5a0 [ 1188.131551][ C1] tcp_rcv_established+0xb06/0x1d20 [ 1188.137125][ C1] ? rt_is_expired+0x1c/0x2d0 [ 1188.141820][ C1] ? tcp_check_space+0xad0/0xad0 [ 1188.147025][ C1] ? rt_is_expired+0x1c/0x2d0 [ 1188.151816][ C1] ? rt_is_expired+0x250/0x2d0 [ 1188.156783][ C1] tcp_v4_do_rcv+0x4ed/0xb80 [ 1188.161386][ C1] tcp_v4_rcv+0x23bf/0x2af0 [ 1188.166074][ C1] ? __lock_acquire+0x7d40/0x7d40 [ 1188.171247][ C1] ? tcp_filter+0x90/0x90 [ 1188.175714][ C1] ip_protocol_deliver_rcu+0x20e/0x3f0 [ 1188.181209][ C1] ? ip_local_deliver_finish+0x1cb/0x510 [ 1188.186951][ C1] ip_local_deliver_finish+0x2ca/0x510 [ 1188.192515][ C1] NF_HOOK+0x32d/0x3b0 [ 1188.196653][ C1] ? NF_HOOK+0x3b0/0x3b0 [ 1188.201123][ C1] ? NF_HOOK+0x9f/0x3b0 [ 1188.205446][ C1] ? ip_local_deliver+0x1b0/0x1b0 [ 1188.210504][ C1] ? NF_HOOK+0x3b0/0x3b0 [ 1188.215806][ C1] ? ip_local_deliver+0x122/0x1b0 [ 1188.220935][ C1] ip_sublist_rcv+0xa4c/0xd70 [ 1188.226065][ C1] ? lockdep_hardirqs_on+0x98/0x150 [ 1188.231389][ C1] ? ip_list_rcv+0x440/0x440 [ 1188.236104][ C1] ? memset_orig+0x70/0xac [ 1188.240890][ C1] ? ip_rcv_core+0xdb0/0xdb0 [ 1188.246023][ C1] ip_list_rcv+0x3f2/0x440 [ 1188.250929][ C1] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1188.257296][ C1] ? ip_rcv_finish+0x250/0x250 [ 1188.262279][ C1] ? __netif_receive_skb_list_core+0x576/0x750 [ 1188.268710][ C1] ? ip_rcv_finish+0x250/0x250 [ 1188.273931][ C1] __netif_receive_skb_list_core+0x583/0x750 [ 1188.280140][ C1] ? set_rps_cpu+0x6a0/0x6a0 [ 1188.284762][ C1] ? read_tsc+0x9/0x20 [ 1188.289147][ C1] netif_receive_skb_list_internal+0x943/0xca0 [ 1188.295445][ C1] ? netif_receive_skb_list_internal+0x4b1/0xca0 [ 1188.302071][ C1] ? dev_gro_receive+0x10ce/0x22c0 [ 1188.307201][ C1] ? netif_receive_skb_core+0x230/0x230 [ 1188.312910][ C1] napi_gro_receive+0x565/0xb00 [ 1188.318060][ C1] receive_buf+0x2203/0x3820 [ 1188.322766][ C1] ? virtnet_poll_tx+0x530/0x530 [ 1188.327806][ C1] ? virtqueue_get_buf_ctx+0x697/0xd10 [ 1188.333447][ C1] virtnet_poll+0x5dd/0x1280 [ 1188.338114][ C1] ? refill_work+0x220/0x220 [ 1188.342823][ C1] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1188.349013][ C1] ? lockdep_hardirqs_on+0x98/0x150 [ 1188.354341][ C1] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1188.360614][ C1] __napi_poll+0xc0/0x460 [ 1188.364955][ C1] net_rx_action+0x616/0xc40 [ 1188.369667][ C1] ? net_tx_action+0x980/0x980 [ 1188.374622][ C1] ? detach_timer+0x2b0/0x2b0 [ 1188.379395][ C1] ? lock_chain_count+0x20/0x20 [ 1188.384256][ C1] handle_softirqs+0x280/0x820 [ 1188.389230][ C1] ? __irq_exit_rcu+0xd3/0x190 [ 1188.394012][ C1] ? do_softirq+0x1a0/0x1a0 [ 1188.398549][ C1] ? irqtime_account_irq+0xb6/0x1c0 [ 1188.403931][ C1] __irq_exit_rcu+0xd3/0x190 [ 1188.408809][ C1] ? irq_exit_rcu+0x20/0x20 [ 1188.413595][ C1] irq_exit_rcu+0x9/0x20 [ 1188.417855][ C1] sysvec_apic_timer_interrupt+0xa4/0xc0 [ 1188.423606][ C1] [ 1188.426646][ C1] [ 1188.429694][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1188.435801][ C1] RIP: 0010:generic_exec_single+0x481/0x4f0 [ 1188.441904][ C1] Code: 75 11 e8 42 05 0b 00 48 85 db 75 16 e8 38 05 0b 00 eb 15 e8 31 05 0b 00 e8 bc 08 0a 09 48 85 db 74 ea e8 22 05 0b 00 fb 31 c0 <48> c7 44 24 20 0e 36 e0 45 4b c7 04 2c 00 00 00 00 43 c7 44 2c 08 [ 1188.462090][ C1] RSP: 0018:ffffc90003877a00 EFLAGS: 00000246 [ 1188.468362][ C1] RAX: 0000000000000000 RBX: 0000000000000200 RCX: 0000000000080000 [ 1188.476629][ C1] RDX: ffffc90010115000 RSI: 00000000000030ef RDI: 00000000000030f0 [ 1188.485345][ C1] RBP: ffffc90003877ad0 R08: ffffffff911c45ff R09: 1ffffffff22388bf [ 1188.494930][ C1] R10: dffffc0000000000 R11: fffffbfff22388c0 R12: 1ffff9200070ef44 [ 1188.503473][ C1] R13: dffffc0000000000 R14: 0000000000000000 R15: 1ffff9200070ef65 [ 1188.512010][ C1] ? event_function+0x300/0x300 [ 1188.517422][ C1] ? smp_call_function_single+0x5a0/0x5a0 [ 1188.525166][ C1] smp_call_function_single+0x36d/0x5a0 [ 1188.531127][ C1] ? event_function+0x300/0x300 [ 1188.536400][ C1] ? flush_smp_call_function_queue+0x250/0x250 [ 1188.542578][ C1] ? event_function+0x300/0x300 [ 1188.547709][ C1] perf_install_in_context+0x5be/0x920 [ 1188.553350][ C1] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1188.559771][ C1] ? exclusive_event_installable+0x2c0/0x2c0 [ 1188.565939][ C1] ? add_event_to_ctx+0x1180/0x1180 [ 1188.571150][ C1] ? perf_event__header_size+0x5d/0x220 [ 1188.576699][ C1] ? perf_event__header_size+0x165/0x220 [ 1188.582625][ C1] __se_sys_perf_event_open+0x1836/0x1c50 [ 1188.588389][ C1] ? __x64_sys_perf_event_open+0xc0/0xc0 [ 1188.594137][ C1] ? lock_chain_count+0x20/0x20 [ 1188.599009][ C1] ? lockdep_hardirqs_on+0x98/0x150 [ 1188.604319][ C1] ? __x64_sys_perf_event_open+0x20/0xc0 [ 1188.610065][ C1] do_syscall_64+0x55/0xa0 [ 1188.614684][ C1] ? clear_bhb_loop+0x40/0x90 [ 1188.619375][ C1] ? clear_bhb_loop+0x40/0x90 [ 1188.625308][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1188.631582][ C1] RIP: 0033:0x7fb87379c819 [ 1188.636060][ C1] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1188.656130][ C1] RSP: 002b:00007fb8746e4028 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1188.664822][ C1] RAX: ffffffffffffffda RBX: 00007fb873a16090 RCX: 00007fb87379c819 [ 1188.672968][ C1] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000200000000140 [ 1188.681614][ C1] RBP: 00007fb873832c91 R08: 0000000000000002 R09: 0000000000000000 [ 1188.689896][ C1] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 1188.697888][ C1] R13: 00007fb873a16128 R14: 00007fb873a16090 R15: 00007ffc6de0e7c8 [ 1188.706062][ C1]