last executing test programs: 11m34.404892798s ago: executing program 0 (id=1081): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000800f000057051d0028"], 0x50) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) recvmsg(r1, &(0x7f0000000600)={&(0x7f0000000280)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000480)=""/159, 0x9f}, {&(0x7f0000000540)=""/108, 0x6c}], 0x3}, 0x2) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000280)="39000000140081ae0000dc676f97daf01effffff0521018701546fabca1b4e8a06a6580e88370200c5090000009c40ebb3734b49bbc51245e7", 0x39}], 0x1}, 0x0) recvmsg$kcm(r2, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x40010220) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000c40)=""/4096) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r7}, &(0x7f0000000280), &(0x7f0000000240)=r4}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000200)=r8, 0x4) sendmsg$inet(r6, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000640)={'pim6reg1\x00', 0x2}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0xffffffff, 0xd, 0xc6f, 0x10041, r1, 0x9, '\x00', r9, r1, 0x4, 0x5, 0x1, 0x3, @void, @value, @value=r1}, 0x50) r10 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r10, &(0x7f0000001280)={&(0x7f00000010c0)=@l2tp6={0xa, 0x0, 0x4, @mcast1, 0x5, 0x4}, 0x80, 0x0}, 0xc810) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0xbd, 0x0, 0x0, 0x3, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0x5}, 0x10, 0x0, 0x10000, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) syz_clone(0x111, 0x0, 0x9, 0x0, 0x0, 0x0) r11 = socket$kcm(0x21, 0x2, 0xa) sendmsg$kcm(r11, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e23, 0x4, @mcast1, 0x8000000}}, 0x80, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000100100000100000000000000000000001000000000000000100100000b"], 0x28}, 0x400fc40) r12 = socket$kcm(0x21, 0x2, 0xa) sendmsg$kcm(r12, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x0, 0x4, @dev, 0x8000000}}, 0x80, 0x0, 0x0, &(0x7f00000002c0)=ANY=[], 0x28}, 0xfc40) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x8, 0x9, 0x0, 0x240, r0, 0x10001, '\x00', r9, 0xffffffffffffffff, 0x5, 0x3, 0x4, 0x4}, 0x50) 11m33.161665901s ago: executing program 0 (id=1093): sendmsg$inet(0xffffffffffffffff, 0x0, 0x600) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x24008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x6, 0x0, 0xc00}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000005, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x11540}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) syz_open_procfs$namespace(0x0, 0x0) socket$kcm(0xa, 0x5, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x3, 0x2) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f0000000100)=r1, 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_int(r1, 0x0, 0x2, 0x0) r3 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000ac0)="4c000000140097f87059ae08060c040002ff0f020000000000001a350182fa73a69d35a21429b17cd02941601d60ffc0cca84708f7abca1b4e7d06a60300000072f750375ed08a5604000000", 0x4c}], 0x1}, 0x0) 11m32.743908766s ago: executing program 0 (id=1096): sendmsg$inet(0xffffffffffffffff, 0x0, 0x600) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x24008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x6, 0x0, 0xc00}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000005, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x11540}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) syz_open_procfs$namespace(0x0, 0x0) 11m32.233186114s ago: executing program 0 (id=1102): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) r1 = syz_clone(0x80150100, &(0x7f0000000140)="e7bc30", 0x3, &(0x7f0000000180), &(0x7f0000000200), &(0x7f0000000240)="d3d6de72223b228a84f3") socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000000)={&(0x7f00000002c0)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000040)="f4001100022b2c25a6d5b02f3af865fe8007000000007afefff5000009000000000000000000ff003b00000011cd4540", 0x30}], 0x1}, 0x0) socket$kcm(0xa, 0x1, 0x106) socket$kcm(0x10, 0x2, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00'}) write$cgroup_subtree(r3, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea032c00fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x1, 0xa, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x240, 0x2, 0x7, 0x5, 0x5, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7b}, r1, 0x9, r3, 0x2) recvmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003140)=""/237, 0xed}, {&(0x7f0000003f80)=""/4080, 0xff0}, {&(0x7f0000000b00)=""/4114, 0x1012}, {&(0x7f0000001d80)=""/38, 0x26}], 0x4}, 0x20) gettid() recvmsg$kcm(r0, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x80) 11m31.47534571s ago: executing program 0 (id=1108): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x1, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xb, 0xc, &(0x7f0000000200)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x800001ff}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000100000000000000000000850000007500000095"], 0x0}, 0xeb) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x1, 0xff, 0x0, 0x4, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x2}, 0x11000, 0xfffffffffffffffc, 0x0, 0x5, 0x43cd, 0x7fffffff, 0x2, 0x0, 0x0, 0x0, 0xf7ffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xfffffffffffbffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6123, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0xa084, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x2) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) syz_clone(0x62005000, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x4004743d, 0x7f7c2739efff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = socket$kcm(0xa, 0x3, 0x3a) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x82d7) sendmsg$sock(r6, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r8, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r9}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r10, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x6, 0x3, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000080000000000000006000000950000000000000028"], &(0x7f0000000bc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r11, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 11m29.971006652s ago: executing program 0 (id=1114): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x4, 0x8}, 0x50) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, @perf_config_ext={0xc8e6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3, 0xfffffffc}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x10001) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_lookup=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x1000000000000, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001ac0)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6494d614dcc6fab5335ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9b24be41a9169b740ac03d7c64cee49ee1c6eee84309e7a23c19a39484809539fca4e0b6eab1aa7d54f45a24effa077faa56d59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afd8cc2e59a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d0faab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab8b4b380a00d72bc0480f949c479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad9433269af3be5fa6a9a5c24e392955f4e979ea13201bafe4f0f6ea508000000a0c548552b571bed5647223c78a992810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526890aa7fe5e68949a3b30567e54d3504723177d356c4604bca492ede62fc28839b5301160ecec37e83efceefd7ca2533659edc8be05cc85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d35a142a9ec9a7a3755e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e561a9845e4ff29e2bdb1d0b923b272341c5e093fd66a2946501559335781092cf8ce3c7c56cd31121624d76517fd3666276c3c0e812b28e2f30d035cee5d0e77a3c70008ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856cf24f370030be3b5f79f030b8d3ebce68663ef5af469abe753314fae31651e0ecea5ece8fb11a4ee288eb149f1fa33669cc8d901fa8e46354c9c3a041a1e7b55c4e81dba1e12289ee34463baf28345bde0c195bc9f021da8f3025ee9c8e3168b4177ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262fa3f1dabeb4fc4bda345360200000001fbddeacd3adaa4d2715e21c7724e9e7e7babf61fe358ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a4601adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cc50feeb7bfad9b7be3283b6450d014e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5671820420bf5b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff2418a18217747ae442e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa6623920dacc107f532348cc21164efe794874eac73381e961f3d9c8c21578fe3245097c280abe51427a7f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d17eb0000000000000000000000fa08ad0731c4b839688b22c4da2a6b00008a1949a6ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282bffff2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae05334d5a44a020000001c0d882a564d74a7c72bf9a2152b261ed1d4515f46290d5c6579b63358fea6d2f93589cfe261dc0410b5ccc92a5a0eab327a33431d62d2b7c75ce654d556c9e1817c1abca762ab53d40da51560351b673363652e1ecb56cfe4a746a45ab13c6014e9f361ab687d1cd1795ce9e05c817b83d76046bdb3709de5df7499a02d2f636a454b85b987580ada025d83bd7b8df28a540d5ec5537942e79f2f1ab25ea5f563bc77e4f9468bd309469880c7e34150ca886d1f13dff7e82dbe296c877d925c38c54cc8137b29028854b6bd57ca893927c331300e16aba792289e135589d93302fc37c73c303e383cdf8ef3f6d6265fe5ee01759d24027475c8901039a898582022bc95992b86dce0710887c8a625d9cbb897bdbfaf49a3f642a169827a9bae4fcfa5212461db000000000000e6ed75ca8fcda7ef3ee336189fef3b3ffb9f38fefc5ff39c4e69e3fa1f8b10ee97123e99b61eba065b1ad67530e7c4f11f9da7ae000002000000610101ad7f79cb9bbf64a0fc109f49fe8799fe266e2ccac80fefe750151f5ddfe51833ec65ece70e07ce8ab5d97db47da8f80000664dc0b86ae2b3ff9d4e220752a6b2f3ea9f793612386496dca5af7b8952aafa796ea7b156d19612297c63e774e940bfeb0de83f42fd565a299f741f9b00be4e8fcaf4ec85daceb16d9e8a438e3eb2556570e381b03d9e3c245728648ed9ff22dc963ed105c851c3481125b4c0c8a08a0c9930190902af109fc56b64cc952f298ebe73d7b18052e0147356228ca171b06274a871e2cf9609e0b4cdad36c3250bc8f56f95a6ed"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000005, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x1122}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x6a4c40, 0x0) r5 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r5, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="80", 0x1}], 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000840000000500"], 0x18}, 0x41) ioctl$TUNSETCARRIER(r4, 0x400454e2, &(0x7f0000000380)=0x1) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000d54eb514ac605585a13000000000000000000000000000000000000000000065ccd90f"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xf, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r6, 0xfffffffffffffffd, &(0x7f0000000040)=""/122}, 0x20) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0xa010, 0x0, 0x0, 0x1, 0x8, 0x40000000, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x400000002, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000640)={&(0x7f0000000440)="8856093902cf97ddba17fc77451b82b84af34cf350e5d2920afa3f28b6e7efc33867e2967126d1318803c7241cfa2f20b424f2c55bbb8ad915bd0d1f1966dbf2b9e1feb985e7ccec8eeef094678c84e74dc519e441c87e8c6a76d1bb4c1e90a5", &(0x7f00000004c0)=""/170, &(0x7f0000000580)="a68b4e8c2076f690122ebd2f55be713f5b608fab1ffdb0d144dad5d1b85d60c27c099c7b2a0ba9357d8f51d279f59060ef61c8be5755439542b035496fe336ceeb54b6cc6e106dc59ebd62324511162216fbc6da1b774cc5327087f874f16ac2f347b057cfbe806e9672fc7943f7bc65119b1e1dbc50ed4ed5b843957f181097164cafbb78b5", 0x0, 0x9, r2, 0x4}, 0x38) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) close(0x3) 11m23.197174437s ago: executing program 2 (id=1137): openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x14000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x9, '\x00', 0x0, @sock_ops}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x44000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000"], 0x0, 0x37, 0x0, 0x1}, 0x28) r3 = bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000004440)=ANY=[@ANYBLOB="1400000004000000040000000800000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000d800000000000000", @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="020000000100"/28], 0x50) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000000000000000000000000005", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000200)=0x1) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22fff2) ioctl$TUNGETVNETLE(r6, 0x40047452, &(0x7f0000001200)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r4}, &(0x7f0000000880), &(0x7f00000008c0)}, 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r3, &(0x7f0000001600), 0x0}, 0x20) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xf) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8b06, &(0x7f0000000080)={'wlan1\x00', @random="02000000000a"}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r8 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r8, &(0x7f00000005c0)={&(0x7f0000000380)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ba", 0x1}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x84, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x800021000000}, 0x8000, 0x8002, 0x0, 0x6, 0xd21c, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) 11m21.638778381s ago: executing program 2 (id=1139): socket$kcm(0x2, 0x5, 0x84) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x6}, 0x4000, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000400)={0x5, 0x80, 0x9a, 0x8, 0x10, 0x2d, 0x0, 0x3, 0x40, 0x9, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f0000000300)}, 0x100000, 0x0, 0x5, 0x8, 0x1, 0x9, 0x7f7, 0x0, 0x4, 0x0, 0x401}, 0xffffffffffffffff, 0x6, r0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000480)=ANY=[@ANYBLOB="08000000000000000000000000000000000000000000d16f3901b09800000000000000000000ff04"]) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x21) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="06000000040000000800000008000000000000", @ANYRES32=0x0], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000008000000850000001500000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x0, 0xe, 0xfeff, &(0x7f0000000100)="e0857f9f582f0300000000000000", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = socket$kcm(0xa, 0x2, 0x73) bpf$ENABLE_STATS(0x20, &(0x7f00000010c0), 0x4) sendmsg$inet(r5, &(0x7f0000001180)={&(0x7f0000000000)={0xa, 0x0, @empty}, 0x10, &(0x7f0000001080)=[{&(0x7f0000000040)="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", 0x1000}, {&(0x7f0000001040)="9d7fcf3efc63f4a6a555ba8b4726d7ccaf8a207100e69cfac4377876021d7131b838059f96bd206d4776368ed2a92432e5af71", 0x33}], 0x2, &(0x7f00000017c0)=ANY=[@ANYBLOB="6b000000000000002900000002000000ffffff8d00000000000000007f000001080000000700000000000034366567f221978756640000001c000000000000000000000008000000", @ANYRESOCT=r4, @ANYBLOB="000000007f00000100000000f7b45c69942ba1665aa7336840e2e0283289314997d68c5392cd14f1b3d048245422c8692b48fcd2b28770db3644e34130099b657b1465a0ed4c0b6e3421adea46055c4d7e5910348b678f933c528ca11aaac652bf9d805b96e518528397"], 0x6b}, 0x0) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x1, 0x2, &(0x7f00000018c0)=ANY=[@ANYBLOB="61dfb46f6f480bc66207258cca09000000ffffffff007a1bb7054aaf504a9b0632b73f2577e30a4e8306e91f0b6fa13e5b576e97336081b4b6e8a9ac842ecd9a944c2b584408a0ad66686b4c0401740e00000022d62e0e257614446b57dc5203ab30d2f431089cf0b694199ddccba26554792f81588eca69e714499fe46e4098f10c6a12bdd69689c489db8bc5b1a3ed4c15504188e91832782c448309eb6d6c32108fa9ad7a3a207cbd549fef70a13a5cab40a8529f0d55efebefca139bd2270bb015e373112e062f639fda3aadbfeb4fa9e97bf7b0d597cf2e34ab58616e5b2e27266a3894ff"], &(0x7f0000000200)='GPL\x00', 0x4, 0x8d, &(0x7f0000000240)=""/141}, 0x80) socket$kcm(0x11, 0x200000000000003, 0x300) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpu.stat\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000061120c00000000519e000000627c0000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000002cf5741000"/19], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x27, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) close(r7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000a300)) ioctl$SIOCSIFHWADDR(r7, 0x8b19, &(0x7f0000000000)={'wlan0\x00', @random="7cf1e97c9e4f"}) r8 = openat$cgroup_ro(r7, &(0x7f0000001100)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) r9 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000001580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x35, &(0x7f0000000300), 0x0, 0x10, &(0x7f0000000440), 0x0, 0x0, 0x6b, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000940)=@bpf_tracing={0x1a, 0x1d, &(0x7f00000015c0)=ANY=[@ANYBLOB="180000000400000000000000feffffffbd1001040002000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082000000185100000a000000000000000000000095000000000000001855000004000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082000000c9a6140010000000ec1502000800000095000000000000007c6e0677fe268847e7ed14fb7bfc6609f3de9a171be490f47f115c84fc2a6940a5875235d25f5da83afada851e8d503a97eb15355ebcb06ff661103613a431c4b720f854069479e7456aaf"], &(0x7f0000000040)='GPL\x00', 0xffffab2a, 0x34, &(0x7f0000000080)=""/52, 0x40f00, 0x2, '\x00', r10, 0x18, r11, 0x8, &(0x7f0000000800)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xce74, 0xffffffffffffffff, 0x4, &(0x7f0000000880)=[r9, r9], &(0x7f00000008c0)=[{0x4, 0x3, 0x10, 0x1}, {0xfffffff0, 0x3, 0x1, 0x2}, {0x2, 0x3, 0xb, 0x4}, {0x1, 0x5, 0xc, 0x9}], 0x10, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x18, 0x25, &(0x7f00000019c0)=ANY=[@ANYBLOB="18000000ff0300000000000005000000b7080000000000007b8af8ff00000000b7080000ff0300007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70500000800000085000000a5000000950000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70300000000000085009d00000c000000b700000000000000852000000300000095000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000020000850000000600000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000009500000000000000"], &(0x7f0000001140)='syzkaller\x00', 0x5, 0x32, &(0x7f00000011c0)=""/50, 0x41100, 0x0, '\x00', r10, @fallback=0x30, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001200)={0x0, 0xe, 0x5, 0x4}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000001240)=[r7], &(0x7f0000001440)=[{0x2, 0x2, 0x5, 0x2}, {0x2, 0x4, 0xc, 0x3}], 0x10, 0x2}, 0x94) socketpair(0xf, 0x0, 0x0, &(0x7f0000000040)) socket$kcm(0x2, 0x3, 0x106) 11m19.103031029s ago: executing program 2 (id=1148): bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x0, 0xa, 0x0, 0x11) 11m18.556258038s ago: executing program 2 (id=1149): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x8000000000, 0xda}, 0x101000, 0x7, 0x0, 0x0, 0x0, 0x7, 0x200, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000040)="e03f03002a000b27c105d25a806c8c6f94f90424fc", 0x15}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000720000001801"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe35, 0x0, 0x0, 0x0}, 0xffffffffffffff88) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="33fe0000180091c8b14a0778a8123d181d"], 0xfe33) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) write$cgroup_subtree(r1, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB="ffffffff00"/15, @ANYBLOB], 0x50) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x91c, 0x4156, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc, 0x1}, 0x18404, 0x0, 0xfffffffe, 0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r2, 0x10, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000711008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x24000000) 11m17.861297522s ago: executing program 2 (id=1154): bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000007c0)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB='&'], 0x10) sendmsg$inet(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000780)='}', 0x1}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f00000002c0)=r0}, 0x20) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x22fe0}], 0x1}, 0x0) recvmsg$unix(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000340)=""/229, 0xec1}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="33fe00004a00530c8e5eb88edc5a9c0e0a"], 0xfe33) 11m17.309788131s ago: executing program 2 (id=1156): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x6, 0x5, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0000000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_clone(0x2000100, &(0x7f0000000000)="a1d12fbc2320931007fc3674e71fc63f5897a5311148fafd9d01714aef9a1ad9f0159351da7ffe40097a057f77caa67da9859a1bc35beb7d133e2966e5c61d58300676c3576fee999814010da1b2ccbd71b25ae4dbb7bbcfe3e399aafe6db2db2f12017c678fc8f3f4d9417b3a0206e3c41d051a7a12ef87b9b7bed8811995b51db611e855aa7e7bf30443d6c1d98df13276823b9eaf917263bcc04a3c0061757b018f6474190dda8d8524b8ef53d3035aa6ebdcd93bd0066c957591dbc4133815f5b1803e2942961e0f6d5bf94bda4ec201ba8de3d3663ea635fe8412fc7c1c0357767441a06eda5b6f7398fb", 0xed, &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)="9cc4a2354f39a5b1e2c136b7645c7cf93ecf8034d7d9bdd0d6a83b301ba13a1c11b3a259abd8833a0880926c2366cf3bdd72432751099c8cd02746cd8a93ba08d26f938d67ba15a3e07126bf768787eec85f7cb809bac68018ecd10eb505f8671179dc20924c8f") syz_open_procfs$namespace(r0, &(0x7f00000003c0)='ns/net\x00') r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="1200000009000000040000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000001000000000000000000000000000000000000f1e81b1632ea8facd88b43d629a8cb1949ca6eb795a278d4683a23e1311d447108102321e2d2326e9f03252c6ebecf8b9f13a0f421ac191c8937c9bae1f1e06218853eb18c7a6a295b2500df25fd6df06b37beca652374a13307c519aea32d2713600e36de41b7dd6637f83469e905bdbe0fe8838f5f75910330644ba30c6f1a485a306a5761f89add7d8515e318a20c4beda20adfbc4c415c704cc7b769642e5cfa31da550930abdc05ed8744ffd04419fdf01251fd6831c3dbcf6de28b76cfb812275fcbab27d3bdcad7260ae9c7cb14097555e6ea246f376a768d72a58d49249b005b91141a751065a8dd013b718cdcb39b0c23da644cbb73fb9c5acfbcdba442cf38b43deb6a16cc5c8f60a8615aa5b9cabf68dd"], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r1, &(0x7f00000001c0), 0x0}, 0x20) 11m14.767445169s ago: executing program 32 (id=1114): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x4, 0x8}, 0x50) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, @perf_config_ext={0xc8e6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3, 0xfffffffc}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x10001) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_lookup=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x1000000000000, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000005, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x1122}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x6a4c40, 0x0) r5 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r5, &(0x7f0000000600)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="80", 0x1}], 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000840000000500"], 0x18}, 0x41) ioctl$TUNSETCARRIER(r4, 0x400454e2, &(0x7f0000000380)=0x1) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000d54eb514ac605585a13000000000000000000000000000000000000000000065ccd90f"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xf, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r6, 0xfffffffffffffffd, &(0x7f0000000040)=""/122}, 0x20) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={0x0}, 0xa010, 0x0, 0x0, 0x1, 0x8, 0x40000000, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x400000002, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000640)={&(0x7f0000000440)="8856093902cf97ddba17fc77451b82b84af34cf350e5d2920afa3f28b6e7efc33867e2967126d1318803c7241cfa2f20b424f2c55bbb8ad915bd0d1f1966dbf2b9e1feb985e7ccec8eeef094678c84e74dc519e441c87e8c6a76d1bb4c1e90a5", &(0x7f00000004c0)=""/170, &(0x7f0000000580)="a68b4e8c2076f690122ebd2f55be713f5b608fab1ffdb0d144dad5d1b85d60c27c099c7b2a0ba9357d8f51d279f59060ef61c8be5755439542b035496fe336ceeb54b6cc6e106dc59ebd62324511162216fbc6da1b774cc5327087f874f16ac2f347b057cfbe806e9672fc7943f7bc65119b1e1dbc50ed4ed5b843957f181097164cafbb78b5", 0x0, 0x9, r2, 0x4}, 0x38) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) close(0x3) 11m1.513279509s ago: executing program 33 (id=1156): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x6, 0x5, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0000000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_clone(0x2000100, &(0x7f0000000000)="a1d12fbc2320931007fc3674e71fc63f5897a5311148fafd9d01714aef9a1ad9f0159351da7ffe40097a057f77caa67da9859a1bc35beb7d133e2966e5c61d58300676c3576fee999814010da1b2ccbd71b25ae4dbb7bbcfe3e399aafe6db2db2f12017c678fc8f3f4d9417b3a0206e3c41d051a7a12ef87b9b7bed8811995b51db611e855aa7e7bf30443d6c1d98df13276823b9eaf917263bcc04a3c0061757b018f6474190dda8d8524b8ef53d3035aa6ebdcd93bd0066c957591dbc4133815f5b1803e2942961e0f6d5bf94bda4ec201ba8de3d3663ea635fe8412fc7c1c0357767441a06eda5b6f7398fb", 0xed, &(0x7f0000000100), &(0x7f0000000300), &(0x7f0000000340)="9cc4a2354f39a5b1e2c136b7645c7cf93ecf8034d7d9bdd0d6a83b301ba13a1c11b3a259abd8833a0880926c2366cf3bdd72432751099c8cd02746cd8a93ba08d26f938d67ba15a3e07126bf768787eec85f7cb809bac68018ecd10eb505f8671179dc20924c8f") syz_open_procfs$namespace(r0, &(0x7f00000003c0)='ns/net\x00') r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="1200000009000000040000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r1, &(0x7f00000001c0), 0x0}, 0x20) 9.02966745s ago: executing program 3 (id=5625): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x15, 0x17, &(0x7f00000007c0)=ANY=[@ANYBLOB="1807000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020702500000000002020207b1af8ff00000000bda1000000000000a7010000f8ffffffb702000008000000b70300000000000072090000060000009f91000000000000b5020000000000008500000085000000b70000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0xbf, &(0x7f0000000300)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x25, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x1, &(0x7f0000000000)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000000080)='GPL\x00', 0x7, 0x38, &(0x7f00000000c0)=""/56, 0x41000, 0x8, '\x00', r2, @fallback=0x19, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x2, 0x9, 0x4}, 0x10, r3, r1, 0x3, 0x0, &(0x7f0000000540)=[{0x4, 0x3, 0x1, 0x7}, {0x2, 0x5, 0x8, 0xb}, {0x5, 0x5, 0x9, 0x2}], 0x10, 0x1}, 0x94) 8.925972744s ago: executing program 3 (id=5628): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x9, '\x00', 0x0, @sock_ops}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, 0x0, 0x37, 0x0, 0x1}, 0x28) r1 = bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000004440)=@base={0x11, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x2, 0x1}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000000a40)={&(0x7f0000000800)=@abs={0x1, 0x0, 0x4e22}, 0x6e, 0x0, 0x0, &(0x7f0000000a00)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18, 0x810}, 0x800) close(r3) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNGETVNETLE(r3, 0x40047452, &(0x7f0000001200)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r2}, &(0x7f0000000880), &(0x7f00000008c0)}, 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r1, &(0x7f0000001600), 0x0}, 0x20) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xf) 8.581861846s ago: executing program 3 (id=5632): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) recvmsg$unix(r0, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x7, 0x4, 0x900, 0x5, 0x28}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x9, &(0x7f0000000a00)=ANY=[@ANYBLOB="18000000ffffffff000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000050000850000001b000000b700000018000000850000005000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r3}, 0xc) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000f80)={r3}, 0xc) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x4000084) 8.571804656s ago: executing program 4 (id=5633): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x10, 0x4, &(0x7f0000001740)=ANY=[@ANYBLOB="b40000000000000079a4480000000000c300000000100000950074000000000099d3e687947164dca1ab1b2840eac7dbfd7fed9ee0475f75c3cc6c3cd76ff9637cebf8ab503ca848f2dc8af4aeb89e68c2cd"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f0000000400)=""/198, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffff52}, 0x37) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d00)={r0, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x9c}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001000)={r0, 0xe0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000d40)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000dc0)=[0x0], 0x0, 0x1c, &(0x7f0000000080), 0x0, 0x10, &(0x7f0000000e40), &(0x7f0000000e80), 0x8, 0x4d, 0x8, 0x8, &(0x7f0000000ec0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001380)={0x6, 0xc, &(0x7f00000011c0)=@raw=[@ringbuf_query, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}], &(0x7f0000001240)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000012c0)={0x3, 0xe, 0x2, 0x10000}, 0x10, r1, r0, 0x0, &(0x7f0000001300)=[0x1, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r1, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000007319455299a904b116a7e0adbd3c97eaa984e8d3089fcacb1882c901c5874ad40c7c9374b2ed3b85e5614a070fbb151bd2b0de664c2e2672f671f36b61e056de4d48cfc06b0f773a832bbeffe2256d1678f2617e0588f7331a580bf49a199ef07bdc89c5b7393614d41b19b339e1c78f540dec3a79641dc59f722b608a2b4ee5d335678e15afa11b4170fc951e4d1db6799ce26488d800af45b4f176ebb2ed6eec3cf6d36d63347b0ad2fb876119bfc3a936e38868"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x1c000, r2, 0x4}, 0x38) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x4010744d, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$kcm(0x2, 0x5, 0x84) sendmsg$kcm(r5, &(0x7f0000000300)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x25}, 'nr0\x00'}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000e40)="727340374079b47f2270a007d6bfed800e5dbfb1ff10f9ee846428ca3979fd9f3e1c5256eeebf10bf179f98ad3ff11b74d854f89f6a25599e8c8be34cd3549852aebfd5568e805d257a2abc39a119a46590d3bdcc67d967d4b39b435543a1a5bed559dde96f81cac8f0e8382e3517d066ca64747ccc97557b0d70fc25f355138a8aa4122ff44cb2e116ed8e596ed7ab6ad689a432ea9a982865b72c69a4af406948cd34596cb700a9e99cdd4dc6e033453a028ea6d54c8d6903dbf02bd8a91c56b4d6ade7d077b21764a187377351901a040de1a0da2c25374d5f9b72c70e395a5e8aa06e48a0a59bf2a7f226e0541d22464e696ea615ea54bb9aea040c7f32cc7f09752c16c04c58f389edcc641e6c4d974bc337fac94c6f9027e5a6a1af67ffbf190ea4ad9c14a14f943ed9bc744db7460e5550da48ccc5737341a3dbc1faf5e4c5b02c85467cbb93daebdfb0dd54342a90b021c62e4eb13e65cd9e4c60d8dc31120b9a8faf208f75d4bd773a4a1c09ac82bf6be527984f44f366c17b7638729c63e69849a02acd945462ae716843638f1efea335abe65957a5c70daf434cb8eec1e27c984da7651f5177e9df7d24a7b10793e7ca4092f425b530d45b6daa6222feb6ffca983e7cdba6f66444600744a1d391e55200cdc5c5d0632fbc77e72ca6cbc19929da10cb701050c5009592bbfa5e966ba2f516218d7b150b0c4523cd81351a19e16ca29c7e4274ed4c1aa11fd917ea4e1d72b05853b24d716c23f76909c7eeecdf083467f54b2003941d92017b2c23054790fa9050d50a45e9e19d84f40e5b1993d9b6da17e44209b80aa637dfc733b17b5a6ce48b53061483a6347b783e04c7bd0e2075bb3ed3298d2471cea83c21fc9a1e9776c1f2885507044e0dded1f1ae2b05e6afdeeda0a6b286eb10d784f350bd934eb759879145f319cae22364658d3392d1507413ef782743b8dd8cac8e4a45f0225af062a6cb9b853bf9f19ef0f379850993dc6dd375fc2bc474c6977b739720034bedd7dcf9c957fa81f8c403863214f1d4a35429d1f767e2bda64b0eac23b20286829c8a056450fedb893eb7f322a39f0fce6ab8dbeb4f8a6dd01fdbef666ed5a6786e7e4d86687155e686ffbac5cf8a24f9eaf9b0c30c3dfb76fb78c909043f71c780bde701cd77f08c2b8a6ba5ed2ced38430bfa9a0713e3c35d6d013f8e2e7274f1e84e88fad7253144f34a71c7b3607e791f7a32eff3cbc74b65ff80f97dc09d90e574c8f51430d7b6d0cf98aebfd71b00dc34d954bb840c2422cbf6f7cb5a2320817c68bd7cdfe687b178972a5ed28235574213575de572e3862bbb82441fb641b23be8f02fe9ef98371df9767f983fbdd9e105a79ee88cb10ae62b01d45e97432f4eec34ae50d8bd2fb523b1fda79050764e520cbb7990f7673932186e597a7a61d9154410d17f98c796f9db1711d7fa86697288f8bfe31d167233c597b4b4ff4f143995a1bd6c870fa68794ebb15d7ed2b2bd9dbd1339786c51bb83855ff56d0aa638aa28e4c74884a2a329dfbf921855ce8c9489624f22972d60bc1eba685d5e184fcdd49528ed774e6dd22aacc4e9ef24692a0ab03d2b9300cd22201712cbea8b9e3a58fd93b6284507c561730bbda479926af69f6d0abc2860933f00bc2546c62666e9bf82674dc695adc1e33e752a49871ef54c971a492cc2f41eda259859eae857d2c61387ab4339dbf80f5e897b3f506abed8161194c12c80ed419ab812e0e553b56dba7e6f25ec11b1a33c37e9d1c5d75575e5dc0ddd487279572f219679582cfedeee0674aacc1378e26d69f2892cce11ad7e0de30d971c2617748eb611febe82fa4ee41080074d69741288753b300e1a7844d80a96c69ad0d9892a789c0aa81fa5d73d0eae66bd5838b42f3f020e2b67df3fd5f4a864a5b0525c1c1dca1f7b7002910715b9d0ffbbdd1521393957da2ba4b504dcedbd3388931b3337759cda8ff1373cd658c0575729f20c7cad87dc35dfe91c7f315947373903c9a4a6470a5b82bae76662059d707753c81fe0dd3a5aad0cff688d44c41046e526b3b3346e3426918a64baf476648d4345029cdadc139a1189773c3ca79c95a0440e4434749b968ef6e12d7fec67f85266fcec45a0e7c191dd3a561da76be4d3cdb4529f42a73c0d97449507a744fb8c8663a9c0a60271b26422202d10332f342f95db794cb80135b52bdc8416b465d55e6fcbc98da70fbb49ca4b91db9bf0b741c7516fee6ef325648d2e58c432712a0f78daa8c621b09d4e7640c6d516d2b315f854562efce767f77cfe838bc7985cd2859053182b632fb789598f68b470dc643562def987982bc4ab5472a8e4e601ede5e50349fdb969a38e91dc55a74c870cb2b557b0b10d287dbf126b28f6d9416998214ad07caaa55214c72e1447d8c4a1d06faea1df838a844dc65f6f60d520c45b2cdd4f1e7152249b31ed148d77493dc090c723d9b74049de7ef1ae1aa85344bd90af2b03f8914b1f41b0aefd141d993d13532f507a28efa3dff3ef9aaa5a0e074b71849f4e5646c4179916817a83e6615c01937c15f96da76c0c252f81b8af5ef6363814de22da86585d61684f2df83f552f7efb518e1a6fb65d538ed838a1239d28c55444cf2341d590d21b6192c078c0f7a7950fb711e942543fc7844ca59f251267dc7af54b05141aa9a33c2712f4745ee6026a4730478096e8ecd6f9419f7560e961cc60366b71ef53727e007a89f09d12efc4e67841f54f349e6b6bb61ec0d0bf8fe0d31d1623b81b7b42e56f23a7acbad31db1cb1be5c6e9f16cfa0deb3839da56848867620b09e8028c186839e8076d3045ae288d6b89343e8f83c5eb587cfd03c2c3bf8b27c628d72e71f7fb04ab0aadcee007ad24ef312650ec3d7a0a4dbddc6d69816cf8a414267fd11db14ba9a5bb30d8cb01c89dfda3d4bf96733c38152d9daf7099e403a8badfc5c6e3936ad1cea3c513f7f634b569bab62ad4750607308d3eb8607d6dc9386295ed03b2efdff161ec13c8497ce5cda7e8067a4976fa195763d9321652876efba3e2711861da7912301127892acf1f789a86eebdf1f5e5bdb4117bd96c32e99418b0930f53cfdc9730ed54b43611d4ac7d894532b6bec38d136cb918da56174171640a64ffcd96f7d8500ba9af7fa3d8257b0f86cfd81df2c53b149b4e7b5acdc13f60ba31b162724923bbe4a3fece146a0e4d4d21f516a9f93cba59b13080c58c467b33092dfa2c3082d1e640bd0228880a2935d517a55320f4cecb492719faf2cc9d28bc1d3166f1a747cc6804f957342c3a9e9ac8170d5563fceeed2b74fd0280373a6001dc7dd77dff8b922e410e24836792be7eda5feee465b8a531d97753e33e27a46671597cd298645cf8738260ad3875377f2e47a8b02b61600e60518e59627bdcf31012b51b454e3b821927aaf2d8b74086a8abecb66974ea930e3d70c9ec0e3ced5763c813c7d93cfb0b12453c4dcbc4b8149bca82c2f5865183776ce65a4cda5bce8a9f0caf1d4891da53e710892ccccc489c42dd64164342bbcaeb29ef5e6cd24265331ccbbb842b52440f60a4d1a3a38dc2b8a4a59b48266cde9ef3feea6011ca0d224b32099e5f9bfc7b9b074bf2990edd4956a699f1cc0ff787bbb1d5e0b835571e3cda95a53a9403f8edf4d6f302a1b9ce53a251a46a8101bf7e1441fbdb1db525d2cf86231bbaf8b2ede8a43773d4902d5295b5b4694cb3061f9802ad6c4dba578c1944e9cb82b5b4cded8bd570c3eadad9db3c788368449011f8e22ae2bff712aa78c96f03d31ff801959a910a90cf834f0f48e6f651deee8e8643891f2a7dbfd4bc9e3a544db458454ee2156d7a862c38912592655da10f58ef2dabc61a00bf92cc4feb53f97b7dd73fd136e3a33263d122f1a4b78d7e366838faf745de78ad6a569ed562cb4651c9d7d154528ff676bef627ee6dcf6b04a26ff8a1803abeb00d68ebbd1cc2ea57e426a5a9339edd69eb540c6fa5911d60860007199990d72d44f05619a5942562873271ae0ebafa9232c829110008554369a826886584eaed7a485640628efb000cbb4637027506f1d03c80c6b3d1374f3e20f1c2219015230f38e662b681d4cd2f557d2a52cf6eaf2657526bf3c6758251f6a9a916d7c5822296334161da9c70dab083aa31e0056b0f9955e4d3f0e5a02f4c05ac6d88683d72da917727f48662562144b2537f1962159d51c003db91a7967ce34896b6e768b49cfe1e15e7be4e37ce16acca1db2b0daf43c4e4bb587c4e0431cc456f6684da91f6e83cddf38710f1f8981afe1cb3f06df4121e3a03c104dd804ceabc6581a4e882322e97014a7526e34b0c61c05317302ff3d30843fc0a220f0f167be3dea08f8ac9e49f9882df9b2dcc36225d3b4916b43a8d5607f4f41e5af43e063fe175dee4c54634407c5e83b4bda16383d8f8305807cbd311dff0ee71b58011fa74223e9dad062a05cd2568a139ac0fee97bd9993aa262ae19807f0546255fb9dd9b89cc0c9cf007bf637728f9ac5ac0961934743aadd2739a1a851cac5ec7f715e83a95bc719fdcb3c398c37379810db5cad3288efac3eafaa5fa68deb1001dc6a57b5a772d52c9806f952252641c7191b133e11571765a87d04719e9095cc1206d39a45330116bad996a7ae417551689b74ce1f654e59ccdb70752a898bc1d91afeba519957fa808816f3fed723921f290ab642a88708a7f6d867009facac6db980dc2ee4336bc0207007367e4a49a120f0d0aad642bc83fe056f4aa12a1dac33e0b3040b6642bc249272349f1d3d6eaad0d85dcaa23ce48ba35e0eccc04c4e84ae87ec2ad3f97990215a4804ef6ee7982a6204970717010e2d25d93ad2ba82c2e7c2fb2d0369800a0c2f0a344e05a4c0063a2dd0c95554b190badb15f2135be10618ac49d2ccd8396d5db53bed3dee8e624cb5c7052d71be1f48a95a5199620b503b99b358c98a829fb678321706ebcfcfccdb67af3c84bd2563edb693bd203c4577722874c12db6280dac42ae9623c3ff69f892730f70bccd56027419fcd53fc81ee692e496c0f13e85c050c07c58fa73d4d751d61114faf0e42887439209aa72d998240702ed8a73bad2cd4088d77a68c3a012a08be80e25a1d47ceeb1ce7bb1e6b8e6b3354494f0fd0765a046d09da1d5c622456a03c00113be1e5c83be1293520a8b62a38659b186a91a2e80a066b4de7abf3316f683b2316a5f80d24c8828b52ce8379f9ae0a95bf1105d2ff5ccd89bfc88840b5e74296623483a8de61a9febff73050ad1b33544777c7875ec54125e20771de4abc828de12354ce8b211cdfff9bbf10bfb9627c081556a3f3020a5e3e6c0de39629272f319ce2db4e0a46b8f96ab682a32bc30b4fdb2639d1fb4838822504fad62d608f2d398c11ff5a66c5a3012903f4caa49058e9a84f4598271500d92d194401f98cb70d0519de6afaf1a46ac7e6f170e4c150b694f5dad1ce98331b08ab07ff2fc114b6899538eaa14aef7a2295b657eb6d3e24acd564c434ad14b07408011b4091a8793277a60cf58f26e1d1dc5f319b300ebe2b17bacc9c9d6fb9194099a5fc1b22656c69b3a2142e3c3ae2af337668be9b0b5a821f23c58d28b6fa4bb9ea04ff4fc1b2d0963d680dda763ca412ff0e75d064186a838b7f2fcb6a2b0ea957411431038c9c7f99bdbfe89f3709674cd2371e301a33380dc73d19701d2f21929bb01fb5310ed0218e2a011ea295e446ec17d2868d3d175e7de99605f01bcdcc2770bcaefc6be7f", 0x1000}], 0x1, &(0x7f0000000500)=[{0xd8, 0x111, 0x0, "d6b0ae58f22222364001fe6cf2f25fdf34e700a9be0b04665c5c17dfd610fd88d73d6cb67c8b82f6e9032d3d713acc9f276f99f3945caba572b766a8ffa853faffbc168d130d416bb29a1732d5b948fc47a39514613064309d0072503aca6a47107f74d3a32f44452e32bfe3fedc882e74ba261fa361fa039482940d1a947f67de9e16a3e4e3f5633913025d0760659e66779da42311b83fa5e84f8e9d57599d62fea705ab46ffeccdcd023104a57b62c445bbcb0afd871845364447fbba5e3fb9"}], 0xd8}, 0x4000080) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r5, 0x84, 0x22, &(0x7f0000000000)=r6, 0x10) ioctl$TUNSETNOCSUM(r6, 0x400454c8, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x3, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01002f00000000000000180000001800002bfe4caccb35745300000001000000005f005f61000000000000100000000000004cb5c6"], &(0x7f00000003c0)=""/173, 0x36, 0xad, 0x1}, 0x28) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x57) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r7, 0x702, 0x28, 0x0, &(0x7f0000000580)="e460334470d8d400eb00c15286dd4b3547f2cbfad47001bd34d04351caf1f9a07be047c25d7670ea", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x480, 0x0) 8.391765633s ago: executing program 3 (id=5635): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x8, &(0x7f0000000680)=ANY=[@ANYBLOB="18110000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b70200000000000085000000860000007f44c0fffcffffff950000000000000003a005000100000085526b100000f8ffffff"], 0x0, 0xf, 0x1c, &(0x7f0000000300)=""/28, 0x41100, 0xf, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x6, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, 0x1], 0x0, 0x10, 0x3}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000001c80)=ANY=[@ANYBLOB="9feb0100180000000000000044000000440000000a000000080000000100000f0500010002000000050000000a000000000000000400000d0000000802000000030000000a004f58681200000700000005000000070000000000000000300000cf0000002e00"], &(0x7f00000001c0)=""/257, 0x66, 0x101, 0x6}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@fallback=r0, 0x5, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000140)=[0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0]}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d35, 0x1c092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x4}, 0x840, 0x0, 0x6, 0xeebdffaf00d5e3e9, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1d, 0x2, 0x6, &(0x7f0000000300)) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x3, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x840, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0xe, 0x0, 0x0) r4 = socket$kcm(0x2, 0x5, 0x84) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) setsockopt$sock_attach_bpf(r4, 0x84, 0x10, &(0x7f0000000000), 0x8) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xbd, 0x5, 0x80, 0x7, 0x0, 0x7fffffff, 0x7a5d4, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xdfffffff, 0x0, @perf_bp={0x0, 0xe}, 0x2, 0x1, 0x7, 0x4, 0x81, 0x8, 0x9, 0x0, 0x20002, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f0, &(0x7f0000000080)) 7.810859403s ago: executing program 6 (id=5637): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000d00)={0x2, 0x80, 0x6d, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) r3 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r3, 0x107, 0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2703020001f3ff500600002fb96dbcf706e105000000884700001144ee1632d4b8bf4a31accbe1ba0777cfbf6ae77256da82f6184b8a34f9015cc99e570000003c21880b000000000000721a5dbb56a3d9e16e7c2179c9b5b24722944820e624fc5b17d0822ca4232c98a9936ba722475ca5", 0xfffffffffffffcf2}, {&(0x7f0000000440)="63f805d7649496db72959832930469edc7b700c9e37eed5653ecb716cdb8981cd819af0b33254465cc904b7b31789d65c0e0d33330e2ef36205dd154e363bcadf8f2ea93f45503c6d9fd8dfe5a638cfeb9f79c930a4d18260e5a08ffd35ed8371cff78119319b2b62c7cd9378c73ae90c801681f55ef26", 0x77}, {&(0x7f0000001400)="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", 0x76f}], 0x3}, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b06, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x1}, 0x50) bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0)={0x0, r2}, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x2, 0x4, 0x8, 0x75}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x2, 0x3a) sendmsg$kcm(r4, &(0x7f0000000440)={&(0x7f0000000180)=@in6={0xa, 0xffff, 0x0, @mcast1, 0x6}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000780)="80005b020eaa4da2", 0x8}], 0x1, 0x0, 0x0, 0x900}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000009c0)="d80000001c0081064e81f782db44b9040a1d080404000000000081a1180002000600142603600e1208000f000000000100001605200001400200000803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e40ae8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccc29e00360db70100000d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e7834", 0xd8}], 0x1, 0x0, 0x0, 0x7400}, 0x8000800) sendmsg$inet(r2, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x240048c1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="189000000000000000000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00'}, 0x80) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="043900002000ef029dd2b97576b11d210a"], 0x33fe0) r5 = socket$kcm(0x1e, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f00000008c0), 0x43) socket$kcm(0x1e, 0x4, 0x0) 1.72158541s ago: executing program 4 (id=5639): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x111be0, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$inet(0xffffffffffffffff, 0x0, 0x24044851) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000940)={&(0x7f0000000340)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x3000c085) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000100)=r2, 0x4) sendmsg$kcm(r1, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20282, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x9000, 0x0, 0x2, 0x4, 0x1000000, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x12, &(0x7f0000000380)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @initr0, @ldst={0x1, 0x0, 0x4, 0x1, 0x9, 0xfffffffffffffff4, 0x4}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xc}], &(0x7f0000000080)='GPL\x00', 0xbe50, 0x2c, &(0x7f00000001c0)=""/44, 0x41000, 0x60, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x4, 0x2, 0xa6f24ac, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r2, r2, r2, r2, r2, r2, r2, r2, r2, r2], 0x0, 0x10, 0x742a}, 0x94) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000440)={r1, r3}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpu.stat\x00', 0x26e1, 0x0) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000a300)) ioctl$SIOCSIFHWADDR(r4, 0x8b19, &(0x7f0000000000)={'wlan0\x00', @random="7cf1e97c9e4f"}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) socket$kcm(0x29, 0x7, 0x0) socket$kcm(0xa, 0x2, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000ff0100007b8af8ff00000000bfa200000000000007020000f8ffffffb703000004000000b7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r7, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f0000002800)=[{&(0x7f0000000c00)="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", 0x1ec}, {0x0}, {&(0x7f00000015c0)="6b75b597d05d969a191023", 0xb}, {&(0x7f0000001740)="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", 0x22e}], 0x4, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x10}, @multicast1}}}, @ip_retopts={{0x38, 0x0, 0x7, {[@timestamp_addr={0x44, 0x14, 0x75, 0x1, 0x8, [{@loopback, 0x6}, {@multicast1, 0x7}]}, @end, @ra={0x94, 0x4}, @generic={0x82, 0xc, "3a047e2aae56e4b9eab8"}]}}}], 0x58}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0857f9f582f0300000000000500", 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.692566821s ago: executing program 3 (id=5640): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000340)="d8000000240081064e81f782db44b9040a0208000300000001000100f1ffffff020014260360160cac08da30399d11540e120800280024000000a80009001100014003000000036010fab94dcf5c0461c1ff7f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dc81ed0bffece0b42a9ecbee5de6ccd40dd60100ef3d93452a92954b43370e97011d65966a41", 0xd8}], 0x1}, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x200fff}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x400000, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x0, 0x0}) r4 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80a59, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x4000, 0x2, 0x0, 0x5, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, r1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r6, &(0x7f00000003c0)=ANY=[@ANYBLOB="0007000042009103"], 0xfe33) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1000}, 0x0, 0x20000e, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYRESOCT=r1, @ANYRESDEC=r1, @ANYRESOCT=r6], 0x48) socket$kcm(0x29, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_int(r7, &(0x7f0000000800)='cpuset.mems\x00', 0x2, 0x0) r9 = openat$cgroup_procs(r7, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000380), 0x12) write$cgroup_int(r8, &(0x7f0000000040), 0x1) recvmsg$unix(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000500)=""/184}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0300000004000000040000000a000000000000006fdde073664c06f918b6d71f09971f50f133e633c8336da713a776dd6c2d96f3f002b7e531b7d848520f95cd2f17f05ee61c5b4126ea4a01", @ANYRES32=0x1, @ANYBLOB="0200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8946, &(0x7f0000000080)) 1.689188602s ago: executing program 6 (id=5641): bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x2, 0x4, 0x2, 0xc, 0x1400, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x50) (async) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x36}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x7, 0x4, 0x900, 0x5, 0x28}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x10, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x3}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}, {}, {0x85, 0x0, 0x0, 0x1b}}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r2}, 0xc) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000f80)={r2}, 0xc) (async) r3 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x29, 0x4d, 0x0, 0x0) (async, rerun: 64) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030033000b63d25a80648c2594f91224fc60100c214002000003050582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) (rerun: 64) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000050000000000000001000004080000000000000003000000100000000000000000000002000000000300000000000004040000000000002e"], 0x0, 0x4d}, 0x20) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000017c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, r4, 0x0, 0x1}, 0x50) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000003c0)={&(0x7f0000000100)="c7f3816f210344992d6dcd69088a369ca8acd7ec3a1d3fd1c07b5f77967740c85053f200dd7a4e374e97922c78a6828f119f542a37df727202a4055812d602897141cb842f3d550876ff66e5944c5383c8e9cdf1a06db35d65a7a4187d04b8342e2e6710d01a0aa03df18a2e539afbb4ac3e6049a0312235bd618ebe9bbb7e9187c0d52399a033c333231b4d11d79721654b753e624e00628c6866b5b2d5af3da06a83222771d2f7122fb25e89f076d49664b03708fcd7d8c69e6c4d44349ff56c883b92f1500dd471286e98d5c0e9eca666881c28e4fcede82ca05eba78", &(0x7f00000002c0)=""/234, &(0x7f0000000200)="7a51351e09266422f1cc03b2", &(0x7f0000000240)="807bf29010e5c9c1ec0148e9cb85c2b775e65de802b30ebc935c4d799cf90d54cba68222b1df710f7e8ddbf722ec5161", 0xa, r5, 0x4}, 0x38) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)={0x2, 0x4, 0x8, 0x1, 0x80, r5, 0x7, '\x00', 0x0, r4, 0x5, 0x3, 0x4}, 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000580)={0x2, 0x4, 0x8, 0x1, 0x80, r6, 0x4, '\x00', 0x0, r4, 0x0, 0x4, 0x3}, 0x50) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) 1.651915903s ago: executing program 1 (id=5642): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d2d, 0xf7008, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x17414, 0x2, 0x0, 0x1, 0x1, 0x400000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x55, 0x1, 0x3, 0x9, 0x0, 0x40000007feb, 0x4a893, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b73, 0x1, @perf_bp={0x0, 0xc}, 0x14105, 0x32, 0xfffffbff, 0x6, 0xffff, 0x6, 0x5, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) recvmsg$unix(r1, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r4 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r4, 0x1, 0x41, &(0x7f0000000040)=r3, 0x4) sendmsg$kcm(r4, &(0x7f0000000580)={&(0x7f00000001c0)=@in6={0xa, 0x4e21, 0x4, @mcast2, 0x9}, 0x18, 0x0}, 0x4000084) recvmsg$kcm(r4, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x2100) 1.476596619s ago: executing program 5 (id=5643): socket$kcm(0x11, 0x2, 0x300) r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000012c0)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000100)=@hci={0x1f, 0x0, 0x5}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000040)="2703022b590200c90000002f1eafbcf706e105000300894f000f1102ee1680ca82973d2bd4b8bf4a8291a14b8a34f90186cee844000000080000000019b0fb0bba", 0x41}, {&(0x7f0000000440)="63f805d7649496db72959832930469edc7b7d050139bf7ada32bc9e37eed1153ecb716cdb8981cd819af0b33254465cc904b7b31789d65c0e0d3333ce2ef36205dd154e363bcadf8f2ea93f45503c6d9fd8dfe5a638cfeb9f79c930a4d18260e5a08ffd35ed8371cff78119319b2b62c7cd9378c73ae90c801681f55ef26cb0000000000000000", 0x87}, {&(0x7f0000000280)="fe112162c63e6da8bc8432294ef18af53cc330a62a2c7035246635093ba4d30fcf19a90804f04a10939db8f4e13069cda6d167bf1b68c94d8d694d6ad1a4d51a715975560ad48770706eb1b88d021e1119f2eb75275cfe77f862368649be0f7aff5e7826729816e3d3e7986d9434f891c71ca6e4210c6757083cfd8e732048c504f28b6d309fc129ed8eb5a82e224eb648f90134d1d315977c6ea360a7fece4baa3dd7dcc970759f29df0e86469e954e2b050e87b203ca27a2a519b7555c3b73f2681d49442d9647ff5ea64110cc5020fdeafe53a7d8be70f3260816bc376bcdc5352771fa55d9733e27730ec7103520e8359c78edd21ee6c68feb3685a55722f5da09ffe8ba9f05081a8d214156376f99906245f2f390ad717979d98f0574f8c5b52dcc2fa494f461be6c2560ddbaafb80c5b4583cbe56d24f14ab78fd718947077ea736251c7b8eee267267534c84daa6f095e94bfb85986a03ddea362cc7e6682884e710727c1163cd4f336c13b844605b7a815fe39e43bd0d2e414410a82958455b8a6bd9194c631d66295675fed64c04107a595c421111a3af6e9fadab5c9", 0x1a1}, {&(0x7f0000000180)="6fe4dd9eeba3271dc700b581440284", 0xfe69}], 0x4}, 0x0) 1.476285619s ago: executing program 1 (id=5644): socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) 1.396000912s ago: executing program 1 (id=5645): bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c40)={0x0, 0x0, 0x105, 0x0, 0x0, 0x5, 0x10000}, 0x28) socket$kcm(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001b40)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) 1.276425036s ago: executing program 6 (id=5646): r0 = socket$kcm(0x10, 0x3, 0x10) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000b80)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca^\xf9\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x96\x86\xdb\xa9\xd3\x01\xb2\xc7\xf8G\x069\x90,\xda\xf6\xc5\xcd\xec\xa3B\xc3\"4\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\x7f\xec\xb2\xc5E\x00\xdd\xf2e\xa8\xf1<\xb2\xc82\xbf=o\x00`\xc1A\'\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x92\xbb\xe3Y\x97\xc2') (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/20, @ANYRES32=0x1], 0x48) (async) r2 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x8916, &(0x7f0000000000)={r2}) (async) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000001000)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed@n\x00\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xf3\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x9c\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xf, 0x4}, {0x6, 0x2}]}, @func_proto, @typedef={0x2, 0x0, 0x0, 0x8, 0x3}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/45, 0x4f, 0x2d, 0x0, 0xe}, 0x28) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x24000008) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x4e27, 0x0, @mcast1}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x10, 0x29, 0x3e}], 0x10}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000c00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x50, 0x50, 0x3, [@var={0x9, 0x0, 0x0, 0xe, 0x3, 0x1}, @ptr={0xa, 0x0, 0x0, 0x2, 0x3}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x6, 0x1}, {}, {}, {0x9, 0x1}, {0x3, 0x100003}]}]}, {0x0, [0x0]}}, 0x0, 0x6b, 0x0, 0x0, 0x7fffffff}, 0x28) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000010040), 0x0, 0xffffffffffffffff, 0x4}, 0x38) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) close(r4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r4, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000680)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0xa, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x4b, &(0x7f0000000780)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0x53, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="85000000af000000851000000100000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000ddb65000669f589f182b0000", @ANYRES32=r2, @ANYBLOB="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"], &(0x7f0000000540)='GPL\x00', 0x0, 0x60, &(0x7f0000000580)=""/96, 0x40f00, 0x10, '\x00', r1, 0x1b, r4, 0x8, &(0x7f0000000600)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x2, 0x5, 0x5, 0x62}, 0x10, r5, 0x0, 0x7, 0x0, &(0x7f0000000ac0)=[{0x3, 0x2, 0xc}, {0x0, 0x2, 0x7, 0xb}, {0x0, 0x2, 0x6, 0xb}, {0x4, 0x1, 0x1, 0x8}, {0x0, 0x1, 0xd, 0x9}, {0x1, 0x4, 0x9, 0x9}, {0x4, 0x1, 0x5, 0x5}], 0x10, 0x2}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x20, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8e, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x40000000}, 0x94) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000440)=@caif=@util={0x25, "a2a8a5222ff1140b1db69ccc6131b57f"}, 0x80, &(0x7f0000000300)}, 0x448c0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r4, 0x8b34, &(0x7f0000000000)={'wlan1\x00', @random="000500000020"}) 1.237368477s ago: executing program 5 (id=5648): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r0, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000240)='%pi6 \x00'}, 0x20) (async) r2 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r2, &(0x7f0000000180)={&(0x7f00000002c0)=@sco={0x1f, @none}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="9cc2269a84dc41dfb65605c31695ee8d108e2e26478237cd", 0x18}, {&(0x7f0000000480)="44df06bb1fe6bad7f365e2908692c8704235ef87d4bd7bc42b7a4babcd1dd39131bbded1a0b0d1df874ff1d94f816dabc1d0e7584b7dfbbccd6223e66d13d551b897870158f05c1f99f36626d49b7f391f025f69f49251305c2dd77d172f781019d8e15ecb727f5dcad6c53580b9e854488a15a2dc74ed25408d5419b82ff199d0ab62bab2f2d88e9358df75f733c69a3ec79af1f7aa14bfb4733d1e93ffbc4b0e7861a8d05809484c42af9342d3c86b676e52689aceae8f", 0xb8}, {&(0x7f0000000640)="47bc4ab6d20565a30d053b95157786b69b1e1b9c70cec6ae879e87a722349562e5ff26704d801c2b62e5c7d1bbcbd3d65de78c2f0dd1df5f88fe918d16ba5891153256edf91229954c6fa9348427028c9d87785b788a6d7d49324eaabf1c3b9b4746511c1ef661f79d5c7a39dc425e636de466bbe49e642e4f73a59da45fc051f7750945f5bd4029ca88db148fcd2091b893cc019f06ef5ba61b9bbc62285fec1345be5a92d7ab82333d0b50e48cc8f5f4d7f202c19a3b1f8fa23828df5063cf938957f30ff200"/209, 0xd1}, {&(0x7f0000000740)="c066665e738a25dd432826fdbf06e8c95c4ddbffb43169e2cb886f22b981cf59b441ed9f6c8dd285a101c57ada56045bb2064b204a4b20355502a360c0b8412a089c3d42b1d191e8ab6b229226d48ddd698700a4a66c37ca72b2a54079d7b0913d33046ebf3ec99bf8ca295b05d0963e06dcf2f185ed4627d5", 0x79}], 0x4, &(0x7f0000002300)=ANY=[@ANYBLOB="d0000000000000000100000008000000ebe3bde64df1fb1dae9028a984ee49d5f3d408f8a916971418bf1bd8d2714323081c41c006a5da22db3e9253374f5bfb26937feb98267d1b845536bb3392edd1df269b51c72d8aa4fb83cdba1b4aed074b8f8731e3308d8224175ed0aceafc1d67d77139a53da5c956c46fc72eb52c79c6d45e42f49beabc8d3b640810389be1ca5056ba17f55f13b1193258ed67b763e64476378f4dd25b8622e85fad45f347829a3ff960ed39e8fadf728c224c6bdf0d304f78c7fbfa933e58a4000000000030000000000000000801000000020000efaadafab3fff7f5a4a91f7b034a9889599a271b3121f29c500000000000000010010000000000000401000007000000a0b594ad3f174712e73b79bc9ed99802a6742e5a8b539cd5322b98644290b6fb030bfd473a3c51005b449de81016ba1e5fee580c8dd17d16099d5b8e16bd842effd367d853c98c65238f4123d03c08a3104e1f0a26b9e2b2c38cbc7785061916e24d768c23030335149564f1c2d613a5b751e11ed78a8ec4eb00bc50add6b472c21dece8854463b9f48f2f07354225d0fe4b098c199a5d2d8f43e158c93a2f32d90868d0899256d4954c77571e299c8c2dc1250ef86ff7b245163d7fa9797721df4b870c31078c40f4d1d00b6f6c26052f5618eb415fb6ff331112031a8a367781848d7fbe9148903985d55798e1696b40601273811a81ed48a1010a0000000018000000000000001001000000000000334c7fee07a80000480000000000000085000000060000004b09f29579a5ab89f1d7d58c591d84bbbe98404eae18cc24fd6c7dd7c3bd9df324a55f93fe78c59befc8aeded466c74fc161044127000000101000000000000088000000010001007f023fa5f86ce1b779e0120377ae04bf6f1c8277480fe7c11c61865f0f70663c4f3c3f2bf4ca5f97bd95165365c695d04b948f300b8d60a579fa34092a1181b824359a64883f2ddc1828695e744e8f66ee0c9a56a169b9f2255d7902fc1aad6a46490c131544ff7fe42947cb01cd90d5f28b35832999dffd799a0f76d5c53195cc5e0c45640833154227acfdbfa8c59a8091bc286088e19f4b507b346b49fa9cc32ec7c9d6675ff824d7efd36525940b56223c241da5a07345dfdb41913f8345d460dac0e04842ed61dba8b0e751fbd98825e19238def1ffd42e92a549c75fb57197384352c2eb9f01b616611d57c40f55c7512f4ef9bb19d5b772b24ef9c3f077f6b1803e5f2f4cc1a90988208c6a2283ae5dcaf9944213e3124455932eaa08cb6c63bdb39a104206b94a9675c98fc52ba748cdfc71e0683418242d11e9f495a3b26de3f998f38434bb1d044633b492064440c11d6af2f168d4a0ef658d6472b36599bd5aa49fcd88894f3bd810c065bb2867e39da309ea7fa07af4a2b64053f2df74bac78d52d38da9a145b9fb9630e0d5eb26dfc135c358237f7537efdb9fa3e96146bab75c77ebc3a89a5e08d6285ee93cc038ce1aa40e6257984cdc477356dd2f6e2ba9e6954416eb4aaeb744b39cec4c1b20974875fe74dec33a1ec87c5d15a59f24806e2b85a9852a87b3329f15840ab95dd4b0344102c1b5d3404f3906869d743582453b07dc60b7562141017eccf7ec92dc4843f976fd1b2a55d8731518280276828519e8706b62d94fec4249191a7c8ad8977cc0dd7c073469ee3525bfa5c1929861a91613ed8af460ab5699e4da85005d1e22d11f02116cc242349545e9382efe226cd17bd7189e6a4cd38f36dce1cc4166bb2f0ee95eac3f4c0fa1fb535baefc3bc68096f4dfba38868be8820f80482733cccdc1b3cb563bb3bb657b3973650d9e4eecc282f3c4c755c9ab3d3f02af74aa82d465c5a4b40b721c726afc5105384dffce552e5865ddb239ff8b6159080aa76030548cc010df4c1111a931b02354ad8a9cab719e6b00b9490d1a3d0528051fb97c00ddf173824ff6cedd4de121bcccd50c30d626da684ba65c43abba1ad6f58b1ae31ef2f6d9661662588dd834d4c9aa1fa226e56c262e6099f6ab60e068825a487a16b52938045ed9815c6d3f75779832d63e9a5ff87944fc76eef4bb4eb2366189c63b84b750234c4b6419e430a9dfcbdaa7229ed6e5c5e3f210e2cc7011067f16d06b464872183ff2f4907bdd836c7579a55f283b0578b6eac84fcd8e656fdea4c306c9afcd293e566508183bac6887ebc6faff0acdba00a53c56de58fe07228cb1e8812839092f44fb99a74e41320c24a19eb474702d44d94e9af50e22cda0484ad00ea631a418734629e75bdd3409d19a45bba70f2ce6fccf1172591805ad1c21a98d479f5c336f60f8bd857d0b7c249b3bf94aaaade00a9e86b03c61da3763c9230322dca2848cb1d664006c3aa1052ecca93b8d0202ae74ad707d49c81ffd65610335a38c763e96cfe04f930703cea59d685cd819e2e43bba41efaab99bf48b12daaf327fca99eb24760189ba13c1401c5cc6b9cfef4438f6f52d74a355c8f5d277764afade0bf58765528afa76eb78aaba328abb315a6e7e681259434af281d9c816702a375cac5be82f387c83cb2eb7677405670e18db6565365d7d8789fc32bd413f6300eade6b5501c4cf82faa54f52cefbc83f0b26c8db0d097041f5824ede018411299835fc9730d4a263942705099531192727f48e511a27aaf6bd9df0806e6375a8206f341f10a704c83010e570e3114b9972710f6c6707517142c94f476b661c18dc5ca3befd3b2f3065bb2e00b55bdb2ee5e5b9e10c609c8f2ec53facf64c9eab345f97021d07e674919bd162bd7fb0a6b444bed500090f08e1bf191fb753a7f730c65d770ec4b6ea721a667a26558fc3755405fb6c8ca39d31b437f6c2dc1b277d1d6dcbbfd893457cae62f8a6d7e3f18a6bd6efedacd3748ca0a1e3bf91643d8ec8aef4e0ab8c19898ce1d2415a6da1255067a99a6599054906b26fb89852b37331bf950f1529572eab9b08a207225610cdaadc660743e65366eb98c4e63abb349ba1a55e7a7feae654aa89e3793afcf2e7038bfca0b347269bf0b4d7be706f8c300dc9fd82af96bcb79cfb4e29631be4774d8d1d17ca917918910daaed408f950c195dad9a137612e07dc4b799abf6677752b1e1cbdb787b36cad4325a744f740ecc14be416a6e297480e6bc23339a7a45d1f11a23b502953a29180119b22006ad0243520b8534a31db863ca6533b195b67699d9e8fc19b3951d8856c9d91b744cb90567a62ea9cbfe5d7383c5dfca9b2b8dea1488f790abdeb2989b324e21885a4c2583efb0a1192a08febcd8744878480a9e9e994780a59b679105c125078d4ac7693254795b4665637928878796eb6927ed0ab26bf24d012312529de52d4b9832fd66607e2e5efd211e228017952ab204b4fea2c5716cc01dc0fa0eb097a84dcf32c379237e75de0265ba3ecc894bf19643277a093992ef74de3ab2294df950cc4e51ed9ac536c96a5f08732d4bb65de726671edb09f860be7e49c9c2442c630e8286832e709f803f5f064b819c430360e73c6937270c19f5ef4a31cb540aaf64e2981eebe5127aab0c294cb3259116196a4ba47cc8fdf36423cae77e0f0e387474d5081962d5e296d3e332f7bf002d2dc56604355d6e0aaa54c021711329332dabf2fbfc892c7d406f184cd90266472f4c2e92f891603349c05163d0a40fd6c018625583b99a0b168ee794849a5b934533f6d6f1ab0f7e5c265543af05b45935e6c59df8e8a0b0fac9e9358e709922871aa939d50bce00e1e0af87bea55dd8a6e45f8abc4efd4d935f1b67b0d6e810f66a985c7f6c85284dbafd0cf23fba0a87a55950d138e52df717e55c083a1aa42c335695d3ed2b22612f46432f61e7570246a1e608c25da2eaa2f884c5b42b30ef0b2339cb550b9035161e76bb0dcc50cd5d6aebfff4dfa8144419ae4db0cb583d82fa62b065fda48856fa6adc4832ab73c7045f1a8fa87bb81bbc76dde58660ea553fb0819498a0b7c82d58826ccecd42ec06d0725ed1eff16677f3bcec59fb2447cfa7fd91c455954289ca6de0b0688b8258b4c79cae199614258415655a856f99015f6e374eb8936d57c1aff9e71499adda257fbda96df1dfeb340d4b3042444a6fbd2ea3c7524896fc385717cae5470a0a5adbef35d6fe9db923cf36ee6776457da70a61ea65df9821406f3e20af7929be12b8c5d2e8a1764185a3dda9e2f89158c5421e3908404ab4cb8a53d24da19393d5c332eb4c4084b05ed95913ec0b01e9665874827a63e5b1a81b6e01fb63b28447b840330df6f055ebff06ff6294f4d7732492e353874ef642fc470097a68e709427e72e670491c927b692a619d1dbe6df6813f067fa01e47fba0a4995e271d96d202015d800bd14aef4c66f2eb47e553df87e78c6df3b984347c69cbeddbd66bb8c100c6f62bf8e3df0fff6c9d2d627d47cc490123d60fba494239ecef944a21ac14419e48b77a04e80af2714daffb11082eec753c1b1015c47377e5ded36456b475a2107c260e3d63bbe5efa32769d03ec3c227f974f0189c7de0dae7fd99a0160a56d01f3c62ca5dacad166e36fffb0bdc7432e0ff7baf18a5837dfc9bd2f51aee3ce33d22a80433b237559684bcc69e09232cc2df00b6e033632bad06b8ba5b555c215da7e4d617e037ef866fb0f03b43e6981c7f4fc472bba118608ee45a9ac09c0db6b6cabfe7d17eb2dcbfd234381530990964ad5f8889eeaa96073c1eea2c5b6db09f285aa33e63a38a006aba4c22bb14bef1e34d0bcc1173c8c1e6a5531d7278c0af8eae5f3131ed941d71f172089b494c65c2a6b8622aa6991d6354264253f492efad6d8891b83892439f523af5ae5d0adb9d022bb4f7c6901e0d0236e53deb8b939a5be49a132a3a5bddd42fd0bafb7494b2b50b6eb26e97c8a2b64a09b55b893bcd416ef22647c4781380939af5e006f4a87db9fc2df6b13be947e6d6635340efa2bc73cba9a7b29387b5df5753617c9ce62d85a0609bd6472a6a8591669306ae614dba5f29ea8004d129607a0bba1adfbbebc9f9fb3f821240dc7c986270af70979a025d49d0a1861b488c8e61200251f3835524f658dc05ed2e7756da04a1446a8ae529c8af5aa4ada1a63244019c0ba9aa01835e29deb254d63e5f639a83b450934d7bb24ac3163928ee8152baedb003be62cf4abc567b16c47fe4ff0b8258f83e0fe2c3c7c4577b69d5554a3eb50fad48a976cf9214f8c394a137990e2d3b066fafea61544c433e58ec167c5e92b7e31e8571ec8a2e71abdf4517ced84e55f0f610c786952097b1177d8881b4facb5f9c0a45fa82830ad93198e6068398df15ec1e99bfa4e5293ea781099088ac6d7b96bc4ce176c35b9f6e6105773ffbb1888b16ea4c2b7167df878aca49d96b9003b34017692e47b9600806b6fdcbab2a01e829b4f733c74a2ae68d9a199877105976821d5cb8f0cb53601b1fa04f85db366c847b2626c9619e42aa5637359c8a9cdd98dc8b37aa839cd3a20b5ace584575a6136f09070253a1a980e1c19a4972e4899fb2801a24e77019c388d34efe9422c9b770c3f98a8f0961b86ffb9fd182176c38bf5ee9a07df8703fa880b7ee8d59cef076658630b2f962bd0bdad761d0c516ca5a36941f5102203c392248600680a4f52ac509fc97325b6de376f00a3bea1e7802399f2079d416da1440e3df91647d0f5e6c3cd6879dc8def67ea84bd161597b60c4b55332341a3483354580730d89a3be83c6b4bed72308bcea015315ebe458eb1a1cd66cdc744a3fd5b89bda27dc66065162d39342abd55815efe1e2ee89fbba488229a7511f9f0b5405c66dd1855fd9f4331c441c4312d7937be92d8dd9f43a4a7d8a2aee3b38d7dbe7a63850e407f3521cae3d8a3b34efb5a9e842c57a874cdf7302bc7e81557cabcb8578f4f6da7c3f288c9596f0a15d8b2098cf35a8e4f00d425aba915b653bc510963a6e2d595736a5b3b52f4ceaba9daa808de80e6ca21c97da425f051c671d6e359baf876ba0988607b9d4b680df869dfabac996de2e19465cb784f25f2c56464ab69265254c822e8e3bfc3d0f081433b79755bbf87933b185aa1c4ef07804abe342311143ecc51108819b2030b0d1c80d638182fb8048a238508e2c4ac7853867541bfcabef804aa497844a0ccbf4c073eb6622125088e46dbcd4db91ebebbecef7cf0d23bb5f3dbb684ee2192f93f06332048dd23140c78eabb28d488a178f2d71b8a4b43065cbd559a2690582b14777a9eba0fb611199d60e4590e232ab50c3fa2aef2f7e7096cd2d930c2b7f1522ebdeef770427252ff3eff5b210519d110bdf3bba140b26c6b3f8fd3bb19c71619b2307f6f9d49ed1294088c1483588e5e006240b7d75a91efb8bebdff6de0156d11a154f39fbbabd7d87c3983f542e75221d747117a217a3d566193d625abc37c86222cb14742632ac86ac3be59fc002b1016656225dff74648f1cd94adb5f767ca8690b6b7a70e4720aa1c76952f941de8e0886adc09a45497aabfc1fc1c79f744162940ee57ea0b488ae5e5e4dbfc451e85875807e8d6f6c0b75b3d20094278030513a7df860a26fff7273654e75146360bba83c5607f57665debb4a229b6aa51956019fde5d4c38b1cdeca8db3b4d11af8651b75cd3e53d18ba1ae908229d43b284269978009a4e2e4d32077f74db828000000000000000000000003000000400231889b3cd864e89a93fe46e88a0e1a22436039d84100d0000000000000001701000081000000db10ddf7128b570bb484ce8bbcb6a0d415c92a986dfc610efbb79144743047874f5ca74b74457b6597114f4625e66b17e69276b4262368f7c225b29e9e7cbd396f6733a5080a91fd2f83ef5d9b6b3842940583985022c3fc4abf3f0789e46b122a6efe0e3fca824d6a4c706e6fcce7d0b186608025606a687d091040cdcb0c5bd667271676bb79440eec4200319885a762be6bc7779c141951743096923fb1fa32447067277f4f3b7388508404604822982cf5af2beb11601e11018f00000000a00000000000000010010000d70700002303141a211f44c06c4c6f19502bfa7d1f8a5bbf28d0056619b7fd80d953b467081dfe8ed369d7b929142faf7f73e6d605a2a5dfa941b39b8b4d4fbb185ad0270fbf5c74b64547e006c5ea37b5394a039c8e3b5d96e6638c061b58565bf4d2516e099083748c698c692eb80968011da6497ebb85b4ba2731ada9906656a2d8950b13c532a708d2bcc7f5000000000000280000000000000084000000050000005a2937b0741bf1aaf177b69b066b17e0051eef086c000000"], 0x1440}, 0x8000) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r1, 0xffffffffffffffff}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000400008500000061000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYRES64=r2], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x52, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r4, 0x18000000000002a0, 0x48, 0x62, &(0x7f0000000600)="b9ff03075fe9008cb89e08e086dd", 0x0, 0xfe6, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x28) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001280)=@base={0x4, 0x4, 0x4, 0x1}, 0x50) (async) r6 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x1, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r5}, &(0x7f0000000400), &(0x7f00000004c0)=r6}, 0x20) r7 = socket$kcm(0x15, 0x5, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e24, @remote}}, 0x80, 0x0}, 0x0) (async) close(r5) r8 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x14, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffa}, {0x85, 0x0, 0x0, 0x2d}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{0x1, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f0000000440)=r4}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002180)={r4, 0xe0, &(0x7f0000002080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000001ec0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, &(0x7f0000001f00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001f40)=[0x0, 0x0], 0x0, 0x1b, &(0x7f0000001f80)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001fc0), &(0x7f0000002000), 0x8, 0x65, 0x8, 0x8, &(0x7f0000002040)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002240)={0x6, 0x35, &(0x7f0000001c00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x2}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x633}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x5, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x5}, @generic={0x7, 0x6, 0x9, 0x5, 0x3}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r8}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r9}}, @call={0x85, 0x0, 0x0, 0x80}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x200, 0xbe, &(0x7f0000001e00)=""/190, 0x40f00, 0x1, '\x00', r10, 0x25, r0, 0x8, &(0x7f00000021c0)={0x3, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000002200)=[{0x1, 0x4, 0xc, 0xb}, {0x0, 0x2, 0x4, 0xb}, {0x2, 0x1, 0x8, 0x8}], 0x10, 0x55}, 0x94) 1.119628711s ago: executing program 6 (id=5649): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x43, &(0x7f0000000040), 0x2a) 1.068782073s ago: executing program 5 (id=5650): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x200, 0x80220, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x411, 0x1, 0xb, 0x0, 0x81}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext, 0x10c002, 0x89}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018"], 0x0, 0x32}, 0x20) perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x100, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400001c008102e00f80ecdb4cb9f207c804a00d00000088081afb0a0002000a0ada1b40d80800c500c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) r1 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r1, 0x84, 0x76, &(0x7f0000000000), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[], 0x50) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x14, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) write$cgroup_subtree(r2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x3e43) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000100)="1400000037000b0fed5a806cb07163990cc47e28", 0x14}], 0x1, 0x0, 0x0, 0x20000000}, 0x200000c0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0xc, 0x0, 0x0) syz_clone(0x108300000, 0x0, 0x0, 0x0, 0x0, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) 1.025795075s ago: executing program 3 (id=5659): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_config_ext, 0x101000, 0x9, 0x8, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x3, &(0x7f00000001c0)=[{0x5}, {}, {0x6}]}) 961.653426ms ago: executing program 4 (id=5651): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x8, &(0x7f0000000680)=ANY=[@ANYBLOB="18110000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b70200000000000085000000860000007f44c0fffcffffff950000000000000003a005000100000085526b100000f8ffffff"], 0x0, 0xf, 0x1c, &(0x7f0000000300)=""/28, 0x41100, 0xf, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x6, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff, 0x1], 0x0, 0x10, 0x3}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000001c80)=ANY=[@ANYBLOB="9feb0100180000000000000044000000440000000a000000080000000100000f0500010002000000050000000a000000000000000400000d0000000802000000030000000a004f58681200000700000005000000070000000000000000300000cf0000002e00"], &(0x7f00000001c0)=""/257, 0x66, 0x101, 0x6}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={@fallback=r0, 0x5, 0x0, 0x8, &(0x7f0000000040)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000140)=[0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0]}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d35, 0x1c092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x4}, 0x840, 0x0, 0x6, 0xeebdffaf00d5e3e9, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1d, 0x2, 0x6, &(0x7f0000000300)) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x3, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000ff070000000000000000000018090000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000720000009500000000000000fd506495b390b8e762060f4eea553fba05b0350dadcab6ec1d8a2b6c98f2337dadb976933cc207e61ec64867d18cef88465661221918ed3df43c5178b7efb7e7c5feff85b669d7e4d7d806382c30c8e8ebb9049bfaf0ae0f8fb31dea9b0556da84599a468fcc66fa5241c5240835ae5890c1cda405ca39d35c472223d574e438fdc90b17f97a734142c3df2112dd065006ac55477b7ccb8c12ae5a159cbb5b6b61e9c4b094e8ec9040cbe722ba9f3506de9401ef79457721f9bd7af204d34078fa8db763c7884a17f7dfb77486470b0dba784e06b2dca21886371a8ebb18dabacbdc9818e97f1cd32e7068d02377929a1d"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x840, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0xe, 0x0, 0x0) r4 = socket$kcm(0x2, 0x5, 0x84) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) setsockopt$sock_attach_bpf(r4, 0x84, 0x10, &(0x7f0000000000), 0x8) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xbd, 0x5, 0x80, 0x7, 0x0, 0x7fffffff, 0x7a5d4, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xdfffffff, 0x0, @perf_bp={0x0, 0xe}, 0x2, 0x1, 0x7, 0x4, 0x81, 0x8, 0x9, 0x0, 0x20002, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f0, &(0x7f0000000080)) 910.171968ms ago: executing program 6 (id=5652): socket$kcm(0x2, 0x1, 0x84) r0 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x46, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x82, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x112c0a, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) r2 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r2, 0x107, 0xd, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x91c, 0x4156, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc, 0x1}, 0x18404, 0x0, 0xfffffffe, 0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_bp={0x0, 0x1}, 0x100410, 0x200, 0x2, 0x1, 0x9, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x2, 0x2, 0x2, 0x1, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) r5 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f00000006c0)={0x0, r3}, 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000018000000180100002020642500000000002020207b1a"], &(0x7f0000000080)='GPL\x00'}, 0x94) socket$kcm(0x2a, 0x2, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000140)=""/103, 0x67}, {&(0x7f00000001c0)=""/12, 0xc}, {&(0x7f0000000200)=""/49, 0x31}], 0x3}, 0x22) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000011008108090f9becdb4cb92e264831371600000069bd6efb2502eaf60d002700020400bf050005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 909.964588ms ago: executing program 1 (id=5653): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000d00)={0x2, 0x80, 0x6d, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) r3 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r3, 0x107, 0xf, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2703020001f3ff500600002fb96dbcf706e105000000884700001144ee1632d4b8bf4a31accbe1ba0777cfbf6ae77256da82f6184b8a34f9015cc99e570000003c21880b000000000000721a5dbb56a3d9e16e7c2179c9b5b24722944820e624fc5b17d0822ca4232c98a9936ba722475ca5", 0xfffffffffffffcf2}, {&(0x7f0000000440)="63f805d7649496db72959832930469edc7b700c9e37eed5653ecb716cdb8981cd819af0b33254465cc904b7b31789d65c0e0d33330e2ef36205dd154e363bcadf8f2ea93f45503c6d9fd8dfe5a638cfeb9f79c930a4d18260e5a08ffd35ed8371cff78119319b2b62c7cd9378c73ae90c801681f55ef26", 0x77}, {&(0x7f0000001400)="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", 0x76f}], 0x3}, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b06, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x1}, 0x50) bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0)={0x0, r2}, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x2, 0x4, 0x8, 0x75}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x2, 0x3a) sendmsg$kcm(r4, &(0x7f0000000440)={&(0x7f0000000180)=@in6={0xa, 0xffff, 0x0, @mcast1, 0x6}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000780)="80005b020eaa4da2", 0x8}], 0x1, 0x0, 0x0, 0x900}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000009c0)="d80000001c0081064e81f782db44b9040a1d080404000000000081a1180002000600142603600e1208000f000000000100001605200001400200000803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e40ae8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccc29e00360db70100000d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e7834", 0xd8}], 0x1, 0x0, 0x0, 0x7400}, 0x8000800) sendmsg$inet(r2, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x240048c1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="189000000000000000000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00'}, 0x80) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="043900002000ef029dd2b97576b11d210a"], 0x33fe0) r5 = socket$kcm(0x1e, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f00000008c0), 0x43) socket$kcm(0x1e, 0x4, 0x0) 534.046991ms ago: executing program 4 (id=5654): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x81, 0x8}, 0x0, 0x2, 0xfffffffd, 0x8, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000880)="1a", 0x100000}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) (async) close(r0) 420.690586ms ago: executing program 5 (id=5655): socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) 254.615501ms ago: executing program 5 (id=5656): r0 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="1400000010003507d25a806f8c6394f90324fc60", 0x14}], 0x1}, 0x40810) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x2}]}, {0x0, [0x5f, 0x2e]}}, 0x0, 0x28}, 0x28) recvmsg$kcm(r1, &(0x7f0000000380)={0x0, 0x61, &(0x7f00000027c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1}, 0x10100) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f020033000b35d25a806c8c6f94f90f24fc60100007000c000300053582c137153e37000c0980fc0b10070300", 0x33fe0}], 0x1}, 0x0) 205.466443ms ago: executing program 6 (id=5657): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x111be0, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$inet(0xffffffffffffffff, 0x0, 0x24044851) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000940)={&(0x7f0000000340)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x3000c085) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000100)=r2, 0x4) sendmsg$kcm(r1, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20282, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x9000, 0x0, 0x2, 0x4, 0x1000000, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x12, &(0x7f0000000380)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @initr0, @ldst={0x1, 0x0, 0x4, 0x1, 0x9, 0xfffffffffffffff4, 0x4}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xc}], &(0x7f0000000080)='GPL\x00', 0xbe50, 0x2c, &(0x7f00000001c0)=""/44, 0x41000, 0x60, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x4, 0x2, 0xa6f24ac, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r2, r2, r2, r2, r2, r2, r2, r2, r2, r2], 0x0, 0x10, 0x742a}, 0x94) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000440)={r1, r3}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpu.stat\x00', 0x26e1, 0x0) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000a300)) ioctl$SIOCSIFHWADDR(r4, 0x8b19, &(0x7f0000000000)={'wlan0\x00', @random="7cf1e97c9e4f"}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) socket$kcm(0x29, 0x7, 0x0) socket$kcm(0xa, 0x2, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000ff0100007b8af8ff00000000bfa200000000000007020000f8ffffffb703000004000000b7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r7, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f0000002800)=[{&(0x7f0000000c00)="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", 0x1ec}, {0x0}, {&(0x7f00000015c0)="6b75b597d05d969a191023", 0xb}, {&(0x7f0000001740)="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", 0x22e}], 0x4, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x10}, @multicast1}}}, @ip_retopts={{0x38, 0x0, 0x7, {[@timestamp_addr={0x44, 0x14, 0x75, 0x1, 0x8, [{@loopback, 0x6}, {@multicast1, 0x7}]}, @end, @ra={0x94, 0x4}, @generic={0x82, 0xc, "3a047e2aae56e4b9eab8"}]}}}], 0x58}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0857f9f582f0300000000000500", 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 177.114504ms ago: executing program 1 (id=5658): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfe80, &(0x7f00000005c0)=[{&(0x7f0000000940)="2e00000010008188e6b62aa73772cc9f1ba1f8482e0000005e14060280fe00000e000a001000000002800000128c", 0x2e}], 0x1}, 0x0) 78.393097ms ago: executing program 4 (id=5660): socket$kcm(0x2a, 0x2, 0x0) socket$kcm(0x29, 0x0, 0x0) 31.354778ms ago: executing program 1 (id=5661): perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) close(r0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000080)="1c00000013006bcc9e3be35c6e17aa31076b876c1d0000007ea60864", 0x1c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x4040844) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1000000004000000080000000800000000000000", @ANYRES32=0x1, @ANYBLOB="00000000f5533588000000000052d0cebab03f91313f69fcf1d07e33b4843e8255568749ab7f99e878706f74b0678c1eff2fc2ede8aaa8f0ed26acd72543df193038b667d1e6eddf06be192e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x14, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000000000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x4044}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000feffffff0000000000040000851000000200000085000000230000009500000000000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r3, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xb}, 0x0, 0x360, 0x0, 0x9, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = socket$kcm(0x2, 0x2, 0x73) sendmsg$inet(r6, &(0x7f0000000500)={&(0x7f0000000300)={0x2, 0x0, @empty}, 0x10, 0x0}, 0x900000000000000) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') getpid() r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000004000000000000000a000000000000"], 0x0, 0x26}, 0x20) r8 = socket$kcm(0x2b, 0x1, 0x0) close(r8) socket$kcm(0x2, 0x2, 0x88) setsockopt$sock_attach_bpf(r8, 0x1, 0xd, &(0x7f00000001c0), 0x45) close(r8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x6, 0x2, &(0x7f0000000200)=@raw=[@call, @exit], &(0x7f0000000280)='GPL\x00', 0x5, 0x81, &(0x7f00000002c0)=""/123, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x90, 0x0, 0x100000}, 0x80) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 0s ago: executing program 5 (id=5662): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$kcm(0x11, 0x3, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{}, &(0x7f0000000080), &(0x7f0000000100)='%pB \x00'}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xf, 0x4}, {0x6, 0x2}]}, @func_proto, @typedef={0x2, 0x0, 0x0, 0x8, 0x3}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/45, 0x4f, 0x2d, 0x0, 0xe}, 0x28) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x24000008) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x4e27, 0x0, @mcast1}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x10, 0x29, 0x3e}], 0x10}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000c00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x50, 0x50, 0x3, [@var={0x9, 0x0, 0x0, 0xe, 0x3, 0x1}, @ptr={0xa, 0x0, 0x0, 0x2, 0x3}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x6, 0x1}, {}, {}, {0x9, 0x1}, {0x3, 0x100003}]}]}, {0x0, [0x0]}}, 0x0, 0x6b, 0x0, 0x0, 0x7fffffff}, 0x28) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000010040), 0x0, 0xffffffffffffffff, 0x4}, 0x38) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) close(r4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r4, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000680)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0xa, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x4b, &(0x7f0000000780)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0x53, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_lsm={0x1d, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="85000000af000000851000000100000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000ddb65000669f589f182b0000", @ANYRES32=r2, @ANYBLOB="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"], &(0x7f0000000540)='GPL\x00', 0x0, 0x60, &(0x7f0000000580)=""/96, 0x40f00, 0x10, '\x00', r1, 0x1b, r4, 0x8, &(0x7f0000000600)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x2, 0x5, 0x5, 0x62}, 0x10, r5, 0x0, 0x7, 0x0, &(0x7f0000000ac0)=[{0x3, 0x2, 0xc}, {0x0, 0x2, 0x7, 0xb}, {0x0, 0x2, 0x6, 0xb}, {0x4, 0x1, 0x1, 0x8}, {0x0, 0x1, 0xd, 0x9}, {0x1, 0x4, 0x9, 0x9}, {0x4, 0x1, 0x5, 0x5}], 0x10, 0x2}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x20, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8e, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x40000000}, 0x94) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000440)=@caif=@util={0x25, "a2a8a5222ff1140b1db69ccc6131b57f"}, 0x80, &(0x7f0000000300)}, 0x448c0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r4, 0x8b34, &(0x7f0000000000)={'wlan1\x00', @random="000500000020"}) kernel console output (not intermixed with test programs): ceived packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 731.514188][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 731.524835][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 731.536717][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 731.548723][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 731.562191][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 732.133107][T19243] netlink: 'syz.1.4739': attribute type 21 has an invalid length. [ 732.171755][T19243] netlink: 132 bytes leftover after parsing attributes in process `syz.1.4739'. [ 732.572645][T19255] netlink: 56 bytes leftover after parsing attributes in process `syz.5.4745'. [ 733.776043][T19282] mac80211_hwsim hwsim119 »»»»»»: renamed from wlan0 [ 734.255668][T19114] Bluetooth: hci3: command 0x0406 tx timeout [ 734.255967][T19280] FAULT_INJECTION: forcing a failure. [ 734.255967][T19280] name failslab, interval 1, probability 0, space 0, times 0 [ 734.315428][T19280] CPU: 0 PID: 19280 Comm: syz.4.4753 Not tainted syzkaller #0 [ 734.322952][T19280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 734.333030][T19280] Call Trace: [ 734.336330][T19280] [ 734.339281][T19280] dump_stack_lvl+0x188/0x250 [ 734.344017][T19280] ? rcu_is_watching+0x11/0xa0 [ 734.348818][T19280] ? show_regs_print_info+0x20/0x20 [ 734.354143][T19280] ? load_image+0x400/0x400 [ 734.358690][T19280] ? lockdep_hardirqs_on+0x94/0x140 [ 734.363943][T19280] should_fail+0x38c/0x4c0 [ 734.368401][T19280] should_failslab+0x5/0x20 [ 734.372930][T19280] slab_pre_alloc_hook+0x51/0xc0 [ 734.377985][T19280] ? __alloc_file+0x25/0x240 [ 734.382603][T19280] kmem_cache_alloc+0x3d/0x290 [ 734.387396][T19280] __alloc_file+0x25/0x240 [ 734.391840][T19280] alloc_empty_file+0x90/0x180 [ 734.396627][T19280] path_openat+0x10f/0x2fa0 [ 734.401164][T19280] ? mark_lock+0x94/0x320 [ 734.405526][T19280] ? lock_chain_count+0x20/0x20 [ 734.410398][T19280] ? rcu_is_watching+0x11/0xa0 [ 734.415190][T19280] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 734.421387][T19280] ? lockdep_hardirqs_on+0x94/0x140 [ 734.426623][T19280] ? do_filp_open+0x410/0x410 [ 734.431338][T19280] ? lock_is_held_type+0x13a/0x190 [ 734.436603][T19280] do_filp_open+0x1e2/0x410 [ 734.441236][T19280] ? vfs_tmpfile+0x300/0x300 [ 734.445856][T19280] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 734.451922][T19280] ? do_sys_openat2+0x13b/0x4b0 [ 734.456811][T19280] do_sys_openat2+0x150/0x4b0 [ 734.461516][T19280] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 734.467696][T19280] ? lockdep_hardirqs_on+0x94/0x140 [ 734.472925][T19280] ? do_sys_open+0xe0/0xe0 [ 734.477381][T19280] ? __x64_sys_openat+0x11f/0x160 [ 734.482442][T19280] __x64_sys_openat+0x135/0x160 [ 734.487328][T19280] do_syscall_64+0x4c/0xa0 [ 734.491780][T19280] ? clear_bhb_loop+0x30/0x80 [ 734.496484][T19280] ? clear_bhb_loop+0x30/0x80 [ 734.501187][T19280] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 734.507107][T19280] RIP: 0033:0x7f2b00f5d04e [ 734.511546][T19280] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 734.531176][T19280] RSP: 002b:00007f2aff1f5ec8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 734.539606][T19280] RAX: ffffffffffffffda RBX: 00007f2aff1f66c0 RCX: 00007f2b00f5d04e [ 734.547597][T19280] RDX: 0000000000000002 RSI: 00007f2aff1f5f90 RDI: ffffffffffffff9c [ 734.555572][T19280] RBP: 00007f2aff1f6090 R08: 0000000000000000 R09: 0000000000000000 [ 734.563547][T19280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 734.571631][T19280] R13: 00007f2b01216038 R14: 00007f2b01215fa0 R15: 00007ffc484303e8 [ 734.579626][T19280] [ 736.480470][ C0] net_ratelimit: 5718 callbacks suppressed [ 736.480489][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 736.498770][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 736.500520][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 736.512235][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 736.523039][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 736.535071][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 736.546987][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 736.560105][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 736.570893][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 736.582955][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 736.802697][T19331] netlink: 'syz.3.4768': attribute type 21 has an invalid length. [ 736.826280][T19331] netlink: 132 bytes leftover after parsing attributes in process `syz.3.4768'. [ 737.799191][T19354] netlink: 'syz.1.4786': attribute type 21 has an invalid length. [ 737.885362][T19354] netlink: 128 bytes leftover after parsing attributes in process `syz.1.4786'. [ 737.976264][T19354] netlink: 'syz.1.4786': attribute type 4 has an invalid length. [ 738.065855][T19354] netlink: 'syz.1.4786': attribute type 5 has an invalid length. [ 738.074124][T19354] netlink: 3 bytes leftover after parsing attributes in process `syz.1.4786'. [ 738.199730][T19356] FAULT_INJECTION: forcing a failure. [ 738.199730][T19356] name failslab, interval 1, probability 0, space 0, times 0 [ 738.236538][T19356] CPU: 0 PID: 19356 Comm: syz.5.4776 Not tainted syzkaller #0 [ 738.244057][T19356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 738.254147][T19356] Call Trace: [ 738.257546][T19356] [ 738.260497][T19356] dump_stack_lvl+0x188/0x250 [ 738.265211][T19356] ? show_regs_print_info+0x20/0x20 [ 738.270442][T19356] ? load_image+0x400/0x400 [ 738.274981][T19356] ? __might_sleep+0xf0/0xf0 [ 738.279606][T19356] ? __lock_acquire+0x7d10/0x7d10 [ 738.284655][T19356] ? netlink_insert+0xe95/0x11f0 [ 738.289620][T19356] should_fail+0x38c/0x4c0 [ 738.294069][T19356] should_failslab+0x5/0x20 [ 738.298595][T19356] slab_pre_alloc_hook+0x51/0xc0 [ 738.303562][T19356] kmem_cache_alloc_node+0x47/0x2d0 [ 738.308781][T19356] ? __alloc_skb+0xf4/0x750 [ 738.313330][T19356] __alloc_skb+0xf4/0x750 [ 738.317699][T19356] netlink_sendmsg+0x654/0xbe0 [ 738.322498][T19356] ? netlink_getsockopt+0x570/0x570 [ 738.327732][T19356] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 738.333050][T19356] ? security_socket_sendmsg+0x7c/0xa0 [ 738.338542][T19356] ? netlink_getsockopt+0x570/0x570 [ 738.343780][T19356] ____sys_sendmsg+0x5b7/0x8f0 [ 738.348583][T19356] ? __sys_sendmsg_sock+0x30/0x30 [ 738.353648][T19356] ? import_iovec+0x6f/0xa0 [ 738.358182][T19356] ___sys_sendmsg+0x236/0x2e0 [ 738.362983][T19356] ? __sys_sendmsg+0x2a0/0x2a0 [ 738.367786][T19356] ? ktime_get_real_ts64+0x440/0x440 [ 738.373120][T19356] __se_sys_sendmsg+0x1af/0x290 [ 738.377996][T19356] ? __x64_sys_sendmsg+0x80/0x80 [ 738.382956][T19356] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 738.388981][T19356] ? lockdep_hardirqs_on+0x94/0x140 [ 738.394207][T19356] do_syscall_64+0x4c/0xa0 [ 738.398645][T19356] ? clear_bhb_loop+0x30/0x80 [ 738.403352][T19356] ? clear_bhb_loop+0x30/0x80 [ 738.408067][T19356] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 738.413988][T19356] RIP: 0033:0x7f130f644819 [ 738.418428][T19356] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 738.438062][T19356] RSP: 002b:00007f130d89e028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 738.446513][T19356] RAX: ffffffffffffffda RBX: 00007f130f8bdfa0 RCX: 00007f130f644819 [ 738.454514][T19356] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000009 [ 738.462506][T19356] RBP: 00007f130d89e090 R08: 0000000000000000 R09: 0000000000000000 [ 738.470493][T19356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 738.478486][T19356] R13: 00007f130f8be038 R14: 00007f130f8bdfa0 R15: 00007ffdfe1f2388 [ 738.486503][T19356] [ 740.208960][T19397] netlink: 152 bytes leftover after parsing attributes in process `syz.4.4789'. [ 740.401368][T19400] netlink: 'syz.1.4791': attribute type 39 has an invalid length. [ 740.730805][T19412] netlink: 'syz.5.4794': attribute type 2 has an invalid length. [ 740.738683][T19412] netlink: 198692 bytes leftover after parsing attributes in process `syz.5.4794'. [ 741.490546][ C0] net_ratelimit: 6612 callbacks suppressed [ 741.490566][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 741.508935][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 741.521384][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 741.533828][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 741.546388][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 741.557136][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 741.558750][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 741.570757][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 741.582729][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 741.595966][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 741.679052][T19439] netlink: 14 bytes leftover after parsing attributes in process `syz.6.4805'. [ 741.720916][T19439] device hsr_slave_0 left promiscuous mode [ 741.806279][T19439] device hsr_slave_1 left promiscuous mode [ 742.374359][T19437] netlink: 'syz.5.4806': attribute type 39 has an invalid length. [ 742.409160][T19449] netlink: 152 bytes leftover after parsing attributes in process `syz.1.4809'. [ 744.286527][T19482] netlink: 'syz.5.4820': attribute type 39 has an invalid length. [ 744.431974][T19488] netlink: 40 bytes leftover after parsing attributes in process `syz.3.4822'. [ 744.511195][T19488] netlink: 40 bytes leftover after parsing attributes in process `syz.3.4822'. [ 744.556951][T19488] netlink: 13 bytes leftover after parsing attributes in process `syz.3.4822'. [ 745.781365][T19500] netlink: 'syz.5.4826': attribute type 10 has an invalid length. [ 745.806453][T19500] team0: Device hsr_slave_0 is up. Set it down before adding it as a team port [ 745.829434][T19502] FAULT_INJECTION: forcing a failure. [ 745.829434][T19502] name failslab, interval 1, probability 0, space 0, times 0 [ 745.862509][T19502] CPU: 0 PID: 19502 Comm: syz.4.4827 Not tainted syzkaller #0 [ 745.870139][T19502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 745.880243][T19502] Call Trace: [ 745.883557][T19502] [ 745.886681][T19502] dump_stack_lvl+0x188/0x250 [ 745.891426][T19502] ? show_regs_print_info+0x20/0x20 [ 745.896690][T19502] ? load_image+0x400/0x400 [ 745.901239][T19502] ? __might_sleep+0xf0/0xf0 [ 745.905969][T19502] ? __lock_acquire+0x7d10/0x7d10 [ 745.911058][T19502] should_fail+0x38c/0x4c0 [ 745.915543][T19502] should_failslab+0x5/0x20 [ 745.920093][T19502] slab_pre_alloc_hook+0x51/0xc0 [ 745.925086][T19502] kmem_cache_alloc_trace+0x47/0x2a0 [ 745.930422][T19502] ? tcp_sendmsg_fastopen+0x1d5/0x600 [ 745.935857][T19502] tcp_sendmsg_fastopen+0x1d5/0x600 [ 745.941125][T19502] tcp_sendmsg_locked+0x2efa/0x3320 [ 745.946394][T19502] ? trace_event_raw_event_lock_acquire+0x2b0/0x2b0 [ 745.953050][T19502] ? trace_event_raw_event_lock_acquire+0x2b0/0x2b0 [ 745.959913][T19502] ? mark_lock+0x94/0x320 [ 745.964306][T19502] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 745.970337][T19502] ? lock_chain_count+0x20/0x20 [ 745.975245][T19502] ? lockdep_hardirqs_on_prepare+0x770/0x770 [ 745.981316][T19502] ? tcp_free_fastopen_req+0x70/0x70 [ 745.986702][T19502] tcp_sendmsg+0x2b/0x40 [ 745.990989][T19502] ? inet_send_prepare+0x260/0x260 [ 745.996157][T19502] ____sys_sendmsg+0x5b7/0x8f0 [ 746.000983][T19502] ? __sys_sendmsg_sock+0x30/0x30 [ 746.006074][T19502] ? import_iovec+0x6f/0xa0 [ 746.010628][T19502] ___sys_sendmsg+0x236/0x2e0 [ 746.015368][T19502] ? __sys_sendmsg+0x2a0/0x2a0 [ 746.020312][T19502] ? vfs_write+0x8b2/0xd60 [ 746.024920][T19502] __se_sys_sendmsg+0x1af/0x290 [ 746.029906][T19502] ? __x64_sys_sendmsg+0x80/0x80 [ 746.034878][T19502] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 746.040926][T19502] ? lockdep_hardirqs_on+0x94/0x140 [ 746.046165][T19502] do_syscall_64+0x4c/0xa0 [ 746.050613][T19502] ? clear_bhb_loop+0x30/0x80 [ 746.055326][T19502] ? clear_bhb_loop+0x30/0x80 [ 746.060035][T19502] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 746.065952][T19502] RIP: 0033:0x7f2b00f9c819 [ 746.070407][T19502] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 746.090150][T19502] RSP: 002b:00007f2aff1f6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 746.098608][T19502] RAX: ffffffffffffffda RBX: 00007f2b01215fa0 RCX: 00007f2b00f9c819 [ 746.106613][T19502] RDX: 000000003000c0c0 RSI: 0000200000000080 RDI: 0000000000000005 [ 746.114624][T19502] RBP: 00007f2aff1f6090 R08: 0000000000000000 R09: 0000000000000000 [ 746.122629][T19502] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 746.130633][T19502] R13: 00007f2b01216038 R14: 00007f2b01215fa0 R15: 00007ffc484303e8 [ 746.138763][T19502] [ 746.500350][ C1] net_ratelimit: 7059 callbacks suppressed [ 746.500371][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 746.500532][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 746.506505][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 746.519700][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 746.530580][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 746.542616][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 746.554635][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 746.567570][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 746.578575][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 746.590574][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 747.585981][T19522] netlink: 'syz.4.4833': attribute type 39 has an invalid length. [ 747.843697][T19524] netlink: 'syz.4.4835': attribute type 29 has an invalid length. [ 747.880692][T19524] netlink: 'syz.4.4835': attribute type 29 has an invalid length. [ 747.918596][T19524] netlink: 'syz.4.4835': attribute type 29 has an invalid length. [ 747.941373][T19525] netlink: 'syz.4.4835': attribute type 29 has an invalid length. [ 747.981025][T19525] netlink: 'syz.4.4835': attribute type 29 has an invalid length. [ 749.415521][T19539] netlink: 'syz.5.4840': attribute type 9 has an invalid length. [ 749.469050][T19539] netlink: 126588 bytes leftover after parsing attributes in process `syz.5.4840'. [ 749.765057][T19547] netlink: 180 bytes leftover after parsing attributes in process `syz.3.4842'. [ 749.907863][T19548] delete_channel: no stack [ 750.111623][T19554] netlink: 'syz.6.4845': attribute type 39 has an invalid length. [ 751.371405][T19584] netlink: 'syz.3.4855': attribute type 9 has an invalid length. [ 751.379199][T19584] netlink: 126588 bytes leftover after parsing attributes in process `syz.3.4855'. [ 751.510483][ C1] net_ratelimit: 9185 callbacks suppressed [ 751.510501][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 751.511713][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 751.516757][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 751.528686][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 751.540597][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 751.576709][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 751.583705][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 751.588947][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 751.601089][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 751.612969][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 752.226332][T19595] netlink: 'syz.3.4858': attribute type 39 has an invalid length. [ 752.360768][ T1422] ieee802154 phy0 wpan0: encryption failed: -22 [ 752.367119][ T1422] ieee802154 phy1 wpan1: encryption failed: -22 [ 754.618953][T19626] netlink: 14 bytes leftover after parsing attributes in process `syz.3.4865'. [ 754.731730][T19626] device hsr_slave_0 left promiscuous mode [ 754.852322][T19626] device hsr_slave_1 left promiscuous mode [ 756.020600][T19637] netlink: 'syz.6.4869': attribute type 39 has an invalid length. [ 756.531000][ C0] net_ratelimit: 4418 callbacks suppressed [ 756.531021][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 756.547265][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 756.549445][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 756.561547][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 756.575167][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 756.585728][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 756.597671][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 756.609681][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 756.623032][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 756.633826][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 756.820114][T19653] netlink: 'syz.4.4875': attribute type 39 has an invalid length. [ 758.510987][T19682] FAULT_INJECTION: forcing a failure. [ 758.510987][T19682] name failslab, interval 1, probability 0, space 0, times 0 [ 758.609535][T19682] CPU: 1 PID: 19682 Comm: syz.1.4886 Not tainted syzkaller #0 [ 758.617047][T19682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 758.627125][T19682] Call Trace: [ 758.630428][T19682] [ 758.633376][T19682] dump_stack_lvl+0x188/0x250 [ 758.638083][T19682] ? show_regs_print_info+0x20/0x20 [ 758.643304][T19682] ? load_image+0x400/0x400 [ 758.647830][T19682] ? __might_sleep+0xf0/0xf0 [ 758.652443][T19682] ? __lock_acquire+0x7d10/0x7d10 [ 758.657681][T19682] ? copy_from_kernel_nofault_allowed+0xb9/0x130 [ 758.664033][T19682] should_fail+0x38c/0x4c0 [ 758.668561][T19682] should_failslab+0x5/0x20 [ 758.673180][T19682] slab_pre_alloc_hook+0x51/0xc0 [ 758.678157][T19682] __kmalloc+0x6b/0x330 [ 758.682336][T19682] ? tomoyo_encode+0x27e/0x540 [ 758.687132][T19682] tomoyo_encode+0x27e/0x540 [ 758.691751][T19682] tomoyo_realpath_from_path+0x5cd/0x610 [ 758.697434][T19682] tomoyo_path_number_perm+0x242/0x660 [ 758.702922][T19682] ? verify_lock_unused+0x140/0x140 [ 758.708145][T19682] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 758.713625][T19682] ? ksys_write+0x1c6/0x260 [ 758.718216][T19682] security_file_ioctl+0x6c/0xa0 [ 758.723180][T19682] __se_sys_ioctl+0x48/0x170 [ 758.727797][T19682] do_syscall_64+0x4c/0xa0 [ 758.732227][T19682] ? clear_bhb_loop+0x30/0x80 [ 758.736917][T19682] ? clear_bhb_loop+0x30/0x80 [ 758.741613][T19682] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 758.747530][T19682] RIP: 0033:0x7f5b55634819 [ 758.751973][T19682] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 758.771603][T19682] RSP: 002b:00007f5b5388e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 758.780048][T19682] RAX: ffffffffffffffda RBX: 00007f5b558adfa0 RCX: 00007f5b55634819 [ 758.788039][T19682] RDX: 0000200000001200 RSI: 0000000040047452 RDI: 0000000000000004 [ 758.796027][T19682] RBP: 00007f5b5388e090 R08: 0000000000000000 R09: 0000000000000000 [ 758.804028][T19682] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 758.812022][T19682] R13: 00007f5b558ae038 R14: 00007f5b558adfa0 R15: 00007ffd58d24908 [ 758.820032][T19682] [ 759.011176][T19682] ERROR: Out of memory at tomoyo_realpath_from_path. [ 761.540440][ C0] net_ratelimit: 9717 callbacks suppressed [ 761.540463][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 761.547689][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 761.564998][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 761.570561][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 761.582615][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 761.594557][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 761.607536][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 761.618471][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 761.630526][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 761.642460][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 761.845803][ T7692] wlan1: Trigger new scan to find an IBSS to join [ 763.079269][T19737] netlink: 14 bytes leftover after parsing attributes in process `syz.5.4902'. [ 763.161738][T19737] device hsr_slave_0 left promiscuous mode [ 763.223635][T19744] netlink: 'syz.3.4903': attribute type 1 has an invalid length. [ 763.268798][T19744] netlink: 112860 bytes leftover after parsing attributes in process `syz.3.4903'. [ 763.315654][T19744] netlink: 9 bytes leftover after parsing attributes in process `syz.3.4903'. [ 763.323024][T19737] device hsr_slave_1 left promiscuous mode [ 763.698298][T19758] IPv6: Can't replace route, no match found [ 763.851987][T19764] netlink: 'syz.1.4909': attribute type 10 has an invalid length. [ 763.877891][T19764] netlink: 55 bytes leftover after parsing attributes in process `syz.1.4909'. [ 764.433021][T19779] mac80211_hwsim hwsim123 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 764.623610][T19786] netlink: 'syz.6.4916': attribute type 3 has an invalid length. [ 764.647185][T19786] netlink: 199836 bytes leftover after parsing attributes in process `syz.6.4916'. [ 765.859921][ T4903] wlan1: Trigger new scan to find an IBSS to join [ 766.095233][T19805] IPv6: Can't replace route, no match found [ 766.290762][T19805] netlink: 'syz.4.4924': attribute type 4 has an invalid length. [ 766.323313][T19807] netlink: 'syz.4.4924': attribute type 41 has an invalid length. [ 766.353965][T19807] netlink: 40 bytes leftover after parsing attributes in process `syz.4.4924'. [ 766.568688][ C1] net_ratelimit: 7926 callbacks suppressed [ 766.568708][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 766.571045][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 766.574854][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 766.586892][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 766.598852][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 766.612078][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 766.622873][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 766.634930][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 766.647018][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 766.660335][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 766.801769][T19811] netlink: 'syz.6.4925': attribute type 3 has an invalid length. [ 766.848569][ T7688] wlan1: Trigger new scan to find an IBSS to join [ 766.876087][T19811] netlink: 132 bytes leftover after parsing attributes in process `syz.6.4925'. [ 767.520610][ T4903] wlan1: Creating new IBSS network, BSSID 16:8f:c5:6c:67:20 [ 767.773841][T19839] netlink: 209852 bytes leftover after parsing attributes in process `syz.6.4934'. [ 767.869516][T19839] debugfs: Directory '!!ô' with parent 'ieee80211' already present! [ 768.523722][T19856] IPv6: Can't replace route, no match found [ 768.883825][T19860] netlink: 'syz.4.4940': attribute type 27 has an invalid length. [ 768.952253][T19856] netlink: 'syz.6.4938': attribute type 4 has an invalid length. [ 769.073481][T19861] netlink: 'syz.6.4938': attribute type 41 has an invalid length. [ 769.100887][T19861] netlink: 40 bytes leftover after parsing attributes in process `syz.6.4938'. [ 769.114312][T19867] netlink: 60 bytes leftover after parsing attributes in process `syz.4.4942'. [ 769.193874][T19867] netlink: 60 bytes leftover after parsing attributes in process `syz.4.4942'. [ 769.298328][ T4941] team0: Port device wlan1 removed [ 769.424335][T19869] netlink: 60 bytes leftover after parsing attributes in process `syz.4.4942'. [ 769.448873][T19870] netlink: 60 bytes leftover after parsing attributes in process `syz.4.4942'. [ 769.856373][ T4235] wlan1: Trigger new scan to find an IBSS to join [ 769.934339][T19890] netlink: 'syz.5.4948': attribute type 1 has an invalid length. [ 770.048611][T19890] netlink: 112860 bytes leftover after parsing attributes in process `syz.5.4948'. [ 770.082912][T19887] netlink: 'syz.3.4949': attribute type 29 has an invalid length. [ 770.130732][T19890] netlink: 9 bytes leftover after parsing attributes in process `syz.5.4948'. [ 770.385753][T19887] netlink: 'syz.3.4949': attribute type 29 has an invalid length. [ 770.505106][T19904] delete_channel: no stack [ 771.365850][T19925] netlink: 65047 bytes leftover after parsing attributes in process `syz.6.4960'. [ 771.572373][ C0] net_ratelimit: 6511 callbacks suppressed [ 771.572392][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 771.590618][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 771.590694][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 771.602922][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 771.616158][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 771.626877][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 771.639124][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 771.651199][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 771.664295][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 771.675139][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 772.162200][T19934] netlink: 10 bytes leftover after parsing attributes in process `syz.5.4965'. [ 772.211935][T19936] netlink: 192436 bytes leftover after parsing attributes in process `syz.6.4966'. [ 772.340028][T19942] netlink: 'syz.1.4964': attribute type 1 has an invalid length. [ 773.862674][ T4235] wlan1: Trigger new scan to find an IBSS to join [ 774.670121][T19980] netlink: 'syz.4.4979': attribute type 1 has an invalid length. [ 774.704232][T19980] __nla_validate_parse: 3 callbacks suppressed [ 774.704251][T19980] netlink: 112860 bytes leftover after parsing attributes in process `syz.4.4979'. [ 774.750313][T19980] netlink: 9 bytes leftover after parsing attributes in process `syz.4.4979'. [ 775.319096][ T7688] wlan1: Creating new IBSS network, BSSID 1e:19:2b:a6:e0:78 [ 775.343622][T19999] mac80211_hwsim hwsim86 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 775.379786][T20003] netlink: 'syz.4.4987': attribute type 21 has an invalid length. [ 775.400991][T20003] netlink: 156 bytes leftover after parsing attributes in process `syz.4.4987'. [ 775.452878][T20004] netlink: 132 bytes leftover after parsing attributes in process `syz.5.4986'. [ 775.553347][T20006] netlink: 763 bytes leftover after parsing attributes in process `syz.5.4986'. [ 775.588978][T20004] netlink: 'syz.5.4986': attribute type 21 has an invalid length. [ 776.502314][T20014] netlink: 'syz.3.4990': attribute type 27 has an invalid length. [ 776.525202][T20014] netlink: 164 bytes leftover after parsing attributes in process `syz.3.4990'. [ 776.580390][ C0] net_ratelimit: 9927 callbacks suppressed [ 776.580410][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 776.600826][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 776.602535][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 776.613456][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 776.625404][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 776.649809][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 776.662524][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 776.675298][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 776.687907][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 776.700699][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 779.832078][T20061] netlink: 'syz.1.5004': attribute type 29 has an invalid length. [ 779.893937][T20061] netlink: 'syz.1.5004': attribute type 29 has an invalid length. [ 779.951867][T20063] netlink: 60 bytes leftover after parsing attributes in process `syz.1.5004'. [ 780.031190][T20065] netlink: 'syz.1.5004': attribute type 29 has an invalid length. [ 781.591628][ C0] net_ratelimit: 3829 callbacks suppressed [ 781.591651][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 781.610473][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 781.625416][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 781.628182][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 781.638111][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 781.650538][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 781.664404][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 781.674502][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 781.686596][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 781.698713][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 781.786507][T20089] netlink: 'syz.6.5014': attribute type 39 has an invalid length. [ 782.250818][T20094] FAULT_INJECTION: forcing a failure. [ 782.250818][T20094] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 782.416076][T20094] CPU: 1 PID: 20094 Comm: syz.1.5017 Not tainted syzkaller #0 [ 782.423610][T20094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 782.433711][T20094] Call Trace: [ 782.437040][T20094] [ 782.440013][T20094] dump_stack_lvl+0x188/0x250 [ 782.444753][T20094] ? show_regs_print_info+0x20/0x20 [ 782.450018][T20094] ? load_image+0x400/0x400 [ 782.454585][T20094] ? __lock_acquire+0x7d10/0x7d10 [ 782.459693][T20094] should_fail+0x38c/0x4c0 [ 782.464194][T20094] _copy_from_user+0x2e/0x170 [ 782.468929][T20094] __copy_msghdr_from_user+0xc9/0x630 [ 782.474353][T20094] ? __schedule+0x11f7/0x43c0 [ 782.479181][T20094] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 782.484584][T20094] ? lock_chain_count+0x20/0x20 [ 782.489520][T20094] ___sys_sendmsg+0x19a/0x2e0 [ 782.494299][T20094] ? __sys_sendmsg+0x2a0/0x2a0 [ 782.499104][T20094] ? preempt_schedule_irq+0xe6/0x160 [ 782.504586][T20094] __se_sys_sendmsg+0x1af/0x290 [ 782.509500][T20094] ? __x64_sys_sendmsg+0x80/0x80 [ 782.514538][T20094] ? syscall_enter_from_user_mode+0x2a/0x70 [ 782.520501][T20094] do_syscall_64+0x4c/0xa0 [ 782.524957][T20094] ? clear_bhb_loop+0x30/0x80 [ 782.529678][T20094] ? clear_bhb_loop+0x30/0x80 [ 782.534407][T20094] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 782.540344][T20094] RIP: 0033:0x7f5b55634819 [ 782.544807][T20094] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 782.564643][T20094] RSP: 002b:00007f5b5388e028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 782.573117][T20094] RAX: ffffffffffffffda RBX: 00007f5b558adfa0 RCX: 00007f5b55634819 [ 782.581142][T20094] RDX: 00000000200000c0 RSI: 0000200000000000 RDI: 0000000000000006 [ 782.589158][T20094] RBP: 00007f5b5388e090 R08: 0000000000000000 R09: 0000000000000000 [ 782.597170][T20094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 782.605182][T20094] R13: 00007f5b558ae038 R14: 00007f5b558adfa0 R15: 00007ffd58d24908 [ 782.613264][T20094] [ 782.810354][ T4941] device hsr_slave_0 left promiscuous mode [ 782.850610][ T4941] device hsr_slave_1 left promiscuous mode [ 782.860801][ T4941] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 782.868304][ T4941] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 782.986336][T20097] netlink: 4595 bytes leftover after parsing attributes in process `syz.3.5018'. [ 783.061479][ T4941] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 783.093327][ T4941] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 783.148321][ T4941] device bridge_slave_1 left promiscuous mode [ 783.167587][ T4941] bridge0: port 2(bridge_slave_1) entered disabled state [ 783.221892][ T4941] device bridge_slave_0 left promiscuous mode [ 783.270657][ T4941] bridge0: port 1(bridge_slave_0) entered disabled state [ 783.425794][ T4941] device hsr_slave_0 left promiscuous mode [ 783.450823][ T4941] device hsr_slave_1 left promiscuous mode [ 783.467600][ T4941] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 783.493419][ T4941] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 783.521910][ T4941] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 783.547746][ T4941] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 783.620765][ T4941] device veth0_macvtap left promiscuous mode [ 783.629317][ T4941] device veth1_vlan left promiscuous mode [ 783.685618][ T4941] device veth0_macvtap left promiscuous mode [ 783.693943][ T4941] device veth1_vlan left promiscuous mode [ 783.713587][ T4941] device veth0_vlan left promiscuous mode [ 784.191346][T20127] netlink: 192436 bytes leftover after parsing attributes in process `syz.6.5027'. [ 786.600449][ C1] net_ratelimit: 7108 callbacks suppressed [ 786.600471][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 786.601443][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 786.606615][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 786.618560][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 786.630511][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 786.643807][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 786.654580][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 786.666472][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 786.678394][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 786.691732][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 788.167610][ T4941] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 788.206600][ T4941] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 788.347689][ T4941] bond0 (unregistering): (slave batadv0): Releasing backup interface [ 788.458461][ T4941] bond0 (unregistering): (slave bridge0): Releasing backup interface [ 788.484536][ T4941] bond0 (unregistering): Released all slaves [ 789.472378][ T4941] team0 (unregistering): Port device geneve1 removed [ 789.801215][ T4941] team0 (unregistering): Port device team_slave_1 removed [ 789.832470][ T4941] team0 (unregistering): Port device team_slave_0 removed [ 789.875165][ T4941] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 789.931104][ T4941] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 790.175767][ T4941] bond0 (unregistering): Released all slaves [ 790.994412][T20127] netlink: 156 bytes leftover after parsing attributes in process `syz.6.5027'. [ 791.263421][T20140] netlink: 'syz.1.5038': attribute type 21 has an invalid length. [ 791.395113][T20140] netlink: 156 bytes leftover after parsing attributes in process `syz.1.5038'. [ 791.610770][ C0] net_ratelimit: 12483 callbacks suppressed [ 791.610792][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 791.629267][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 791.643546][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 791.646293][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 791.656003][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 791.667887][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 791.681466][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 791.691889][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 791.704166][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 791.716046][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 791.792790][T20151] netlink: 1047 bytes leftover after parsing attributes in process `syz.6.5033'. [ 793.175902][T20172] netlink: 209844 bytes leftover after parsing attributes in process `syz.6.5042'. [ 793.196697][T20175] netlink: 14 bytes leftover after parsing attributes in process `syz.5.5043'. [ 793.516584][T20183] netlink: 'syz.1.5046': attribute type 11 has an invalid length. [ 793.572732][T20183] netlink: 184116 bytes leftover after parsing attributes in process `syz.1.5046'. [ 794.128084][T20195] netlink: 60 bytes leftover after parsing attributes in process `syz.6.5052'. [ 794.165206][T20195] netlink: 60 bytes leftover after parsing attributes in process `syz.6.5052'. [ 794.209534][T20196] netlink: 60 bytes leftover after parsing attributes in process `syz.6.5052'. [ 794.258997][T20195] netlink: 60 bytes leftover after parsing attributes in process `syz.6.5052'. [ 795.947382][T20230] netlink: 'syz.5.5065': attribute type 10 has an invalid length. [ 795.991391][T20230] bridge0: port 3(team0) entered blocking state [ 796.011238][T20230] bridge0: port 3(team0) entered disabled state [ 796.066961][T20230] device team0 entered promiscuous mode [ 796.085850][T20230] device team_slave_0 entered promiscuous mode [ 796.092782][T20230] device team_slave_1 entered promiscuous mode [ 796.142374][T20230] bridge0: port 3(team0) entered blocking state [ 796.148742][T20230] bridge0: port 3(team0) entered forwarding state [ 796.223195][T20238] __nla_validate_parse: 5 callbacks suppressed [ 796.223216][T20238] netlink: 192436 bytes leftover after parsing attributes in process `syz.1.5069'. [ 796.391973][T20243] netlink: 192436 bytes leftover after parsing attributes in process `syz.6.5070'. [ 796.462442][T20238] netlink: 156 bytes leftover after parsing attributes in process `syz.1.5069'. [ 796.630443][ C0] net_ratelimit: 6067 callbacks suppressed [ 796.630461][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 796.639347][T20250] ODEBUG: Out of memory. ODEBUG disabled [ 796.648805][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 796.657560][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 796.667470][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 796.678389][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 796.690428][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 796.702429][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 796.715506][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 796.726516][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 796.738495][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 796.791232][T20254] netlink: 60 bytes leftover after parsing attributes in process `syz.6.5074'. [ 796.880418][T20254] netlink: 60 bytes leftover after parsing attributes in process `syz.6.5074'. [ 796.896268][T20256] netlink: 60 bytes leftover after parsing attributes in process `syz.6.5074'. [ 796.927238][T20259] netlink: 60 bytes leftover after parsing attributes in process `syz.6.5074'. [ 797.012145][T20262] netlink: 'syz.3.5075': attribute type 10 has an invalid length. [ 798.639716][T20302] netlink: 'syz.4.5087': attribute type 46 has an invalid length. [ 799.567538][T20311] netlink: 64 bytes leftover after parsing attributes in process `syz.1.5091'. [ 799.570023][T20309] netlink: 192436 bytes leftover after parsing attributes in process `syz.4.5088'. [ 799.613593][T20311] FAULT_INJECTION: forcing a failure. [ 799.613593][T20311] name failslab, interval 1, probability 0, space 0, times 0 [ 799.677168][T20311] CPU: 0 PID: 20311 Comm: syz.1.5091 Not tainted syzkaller #0 [ 799.684789][T20311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 799.694890][T20311] Call Trace: [ 799.698204][T20311] [ 799.701163][T20311] dump_stack_lvl+0x188/0x250 [ 799.705892][T20311] ? show_regs_print_info+0x20/0x20 [ 799.711128][T20311] ? load_image+0x400/0x400 [ 799.715681][T20311] ? __might_sleep+0xf0/0xf0 [ 799.720306][T20311] ? __lock_acquire+0x7d10/0x7d10 [ 799.725362][T20311] should_fail+0x38c/0x4c0 [ 799.729826][T20311] should_failslab+0x5/0x20 [ 799.734354][T20311] slab_pre_alloc_hook+0x51/0xc0 [ 799.739330][T20311] kmem_cache_alloc_trace+0x47/0x2a0 [ 799.744800][T20311] ? apparmor_sk_alloc_security+0x74/0x100 [ 799.750678][T20311] apparmor_sk_alloc_security+0x74/0x100 [ 799.756343][T20311] security_sk_alloc+0x6a/0xa0 [ 799.761144][T20311] sk_prot_alloc+0x101/0x210 [ 799.765750][T20311] ? sk_alloc+0x1d/0x310 [ 799.770023][T20311] sk_alloc+0x2f/0x310 [ 799.774126][T20311] bpf_prog_test_run_skb+0x240/0x1180 [ 799.779528][T20311] ? __fget_files+0x40f/0x480 [ 799.784271][T20311] ? cpu_online+0x60/0x60 [ 799.788637][T20311] bpf_prog_test_run+0x31e/0x390 [ 799.793607][T20311] __sys_bpf+0x5a5/0x6f0 [ 799.797888][T20311] ? perf_trace_preemptirq_template+0x2aa/0x360 [ 799.804154][T20311] ? bpf_link_show_fdinfo+0x380/0x380 [ 799.809551][T20311] ? rcu_nmi_exit+0x6f/0xf0 [ 799.814128][T20311] ? vtime_user_exit+0x2c8/0x3e0 [ 799.819119][T20311] __x64_sys_bpf+0x78/0x90 [ 799.823574][T20311] do_syscall_64+0x4c/0xa0 [ 799.828041][T20311] ? clear_bhb_loop+0x30/0x80 [ 799.832743][T20311] ? clear_bhb_loop+0x30/0x80 [ 799.837450][T20311] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 799.843366][T20311] RIP: 0033:0x7f5b55634819 [ 799.847809][T20311] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 799.867456][T20311] RSP: 002b:00007f5b5388e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 799.875927][T20311] RAX: ffffffffffffffda RBX: 00007f5b558adfa0 RCX: 00007f5b55634819 [ 799.883927][T20311] RDX: 0000000000000048 RSI: 0000200000000080 RDI: 000000000000000a [ 799.891937][T20311] RBP: 00007f5b5388e090 R08: 0000000000000000 R09: 0000000000000000 [ 799.899947][T20311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 799.907944][T20311] R13: 00007f5b558ae038 R14: 00007f5b558adfa0 R15: 00007ffd58d24908 [ 799.915987][T20311] [ 800.145245][T20304] netlink: 156 bytes leftover after parsing attributes in process `syz.4.5088'. [ 800.327211][ T7692] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 801.651151][ C1] net_ratelimit: 11570 callbacks suppressed [ 801.651170][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 801.669497][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 801.681853][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 801.684085][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 801.694157][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 801.706409][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 801.718355][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 801.731442][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 801.742365][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 801.754378][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 801.822501][T20333] netlink: 192436 bytes leftover after parsing attributes in process `syz.4.5100'. [ 802.809224][T20349] netlink: 156 bytes leftover after parsing attributes in process `syz.3.5105'. [ 803.693806][T20366] netlink: 'syz.1.5112': attribute type 16 has an invalid length. [ 803.713292][T20366] netlink: 'syz.1.5112': attribute type 3 has an invalid length. [ 803.731150][T20366] netlink: 132 bytes leftover after parsing attributes in process `syz.1.5112'. [ 803.948666][T20373] netlink: 830 bytes leftover after parsing attributes in process `syz.1.5115'. [ 804.387820][T20383] netlink: 'syz.1.5118': attribute type 39 has an invalid length. [ 804.485416][T20390] netlink: 9286 bytes leftover after parsing attributes in process `syz.5.5120'. [ 804.941280][T20394] netlink: 192436 bytes leftover after parsing attributes in process `syz.4.5121'. [ 805.098421][T20412] netlink: 'syz.1.5127': attribute type 29 has an invalid length. [ 805.141297][T20412] netlink: 'syz.1.5127': attribute type 29 has an invalid length. [ 805.181807][T20415] netlink: 'syz.1.5127': attribute type 29 has an invalid length. [ 806.039509][T20439] netlink: 'syz.1.5141': attribute type 2 has an invalid length. [ 806.075080][T20439] netlink: 'syz.1.5141': attribute type 8 has an invalid length. [ 806.102023][T20439] netlink: 132 bytes leftover after parsing attributes in process `syz.1.5141'. [ 806.192141][T20443] netlink: 192436 bytes leftover after parsing attributes in process `syz.4.5142'. [ 806.288300][T20444] netlink: 'syz.1.5141': attribute type 2 has an invalid length. [ 806.310637][T20444] netlink: 'syz.1.5141': attribute type 8 has an invalid length. [ 806.318694][T20444] netlink: 132 bytes leftover after parsing attributes in process `syz.1.5141'. [ 806.660372][ C1] net_ratelimit: 8567 callbacks suppressed [ 806.660392][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 806.671057][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 806.678762][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 806.690765][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 806.702650][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 806.715876][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 806.726634][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 806.738576][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 806.750559][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 806.763741][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 807.767657][T20469] FAULT_INJECTION: forcing a failure. [ 807.767657][T20469] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 807.820505][T20469] CPU: 0 PID: 20469 Comm: syz.5.5149 Not tainted syzkaller #0 [ 807.828146][T20469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 807.838504][T20469] Call Trace: [ 807.841832][T20469] [ 807.844787][T20469] dump_stack_lvl+0x188/0x250 [ 807.849497][T20469] ? show_regs_print_info+0x20/0x20 [ 807.854723][T20469] ? load_image+0x400/0x400 [ 807.859442][T20469] ? __lock_acquire+0x7d10/0x7d10 [ 807.864500][T20469] should_fail+0x38c/0x4c0 [ 807.868951][T20469] _copy_from_user+0x2e/0x170 [ 807.873654][T20469] iovec_from_user+0x142/0x370 [ 807.878453][T20469] __import_iovec+0x70/0x490 [ 807.883083][T20469] import_iovec+0x6f/0xa0 [ 807.887438][T20469] ___sys_sendmsg+0x1fd/0x2e0 [ 807.892152][T20469] ? __sys_sendmsg+0x2a0/0x2a0 [ 807.896957][T20469] ? ktime_get_real_ts64+0x440/0x440 [ 807.902559][T20469] __se_sys_sendmsg+0x1af/0x290 [ 807.907444][T20469] ? __x64_sys_sendmsg+0x80/0x80 [ 807.912410][T20469] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 807.918435][T20469] ? lockdep_hardirqs_on+0x94/0x140 [ 807.923670][T20469] do_syscall_64+0x4c/0xa0 [ 807.928109][T20469] ? clear_bhb_loop+0x30/0x80 [ 807.932854][T20469] ? clear_bhb_loop+0x30/0x80 [ 807.937565][T20469] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 807.943483][T20469] RIP: 0033:0x7f130f644819 [ 807.947926][T20469] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 807.967650][T20469] RSP: 002b:00007f130d87d028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 807.976103][T20469] RAX: ffffffffffffffda RBX: 00007f130f8be090 RCX: 00007f130f644819 [ 807.984102][T20469] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000007 [ 807.992099][T20469] RBP: 00007f130d87d090 R08: 0000000000000000 R09: 0000000000000000 [ 808.000104][T20469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 808.008115][T20469] R13: 00007f130f8be128 R14: 00007f130f8be090 R15: 00007ffdfe1f2388 [ 808.016146][T20469] [ 808.033382][ T7688] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 809.820040][T20480] netlink: 17279 bytes leftover after parsing attributes in process `syz.6.5153'. [ 810.297896][T20498] netlink: 192436 bytes leftover after parsing attributes in process `syz.6.5157'. [ 810.859258][T20515] netlink: 60 bytes leftover after parsing attributes in process `syz.4.5164'. [ 810.905896][T20515] netlink: 60 bytes leftover after parsing attributes in process `syz.4.5164'. [ 810.995193][T20517] netlink: 60 bytes leftover after parsing attributes in process `syz.4.5164'. [ 810.996704][T20514] netlink: 'syz.6.5165': attribute type 11 has an invalid length. [ 811.035221][T20514] netlink: 184116 bytes leftover after parsing attributes in process `syz.6.5165'. [ 811.098764][T20515] netlink: 60 bytes leftover after parsing attributes in process `syz.4.5164'. [ 811.225739][T20522] netlink: 'syz.3.5166': attribute type 39 has an invalid length. [ 811.360604][T20524] netlink: 'syz.6.5168': attribute type 10 has an invalid length. [ 811.424033][T20524] team0: Device wg1 is of different type [ 811.458379][T20528] netlink: 192436 bytes leftover after parsing attributes in process `syz.1.5170'. [ 811.670482][ C1] net_ratelimit: 9336 callbacks suppressed [ 811.670502][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 811.682395][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 811.701463][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 811.716234][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 811.728869][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 811.739597][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 811.743214][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 811.753514][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 811.765518][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 811.777512][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 812.172738][T20542] netlink: 209852 bytes leftover after parsing attributes in process `syz.6.5174'. [ 812.233085][T20542] sysfs: cannot create duplicate filename '/class/ieee80211/!!ô' [ 812.241588][T20542] CPU: 1 PID: 20542 Comm: syz.6.5174 Not tainted syzkaller #0 [ 812.249088][T20542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 812.259179][T20542] Call Trace: [ 812.262483][T20542] [ 812.265438][T20542] dump_stack_lvl+0x188/0x250 [ 812.270150][T20542] ? show_regs_print_info+0x20/0x20 [ 812.275472][T20542] ? load_image+0x400/0x400 [ 812.280035][T20542] sysfs_warn_dup+0x8a/0xa0 [ 812.284575][T20542] sysfs_do_create_link_sd+0xc0/0x110 [ 812.289982][T20542] device_add+0x7ed/0xfb0 [ 812.294361][T20542] wiphy_register+0x1e81/0x2c30 [ 812.299268][T20542] ? cfg80211_event_work+0x40/0x40 [ 812.304412][T20542] ? minstrel_ht_alloc+0x808/0x980 [ 812.309562][T20542] ? ieee80211_init_rate_ctrl_alg+0x55e/0x5e0 [ 812.315677][T20542] ieee80211_register_hw+0x2aa1/0x3af0 [ 812.321175][T20542] ? lockdep_hardirqs_on+0x94/0x140 [ 812.326430][T20542] ? ieee80211_tasklet_handler+0x20/0x20 [ 812.332107][T20542] ? rcu_is_watching+0x11/0xa0 [ 812.336898][T20542] ? memset+0x1e/0x40 [ 812.340942][T20542] ? hrtimer_init+0x10c/0x220 [ 812.345658][T20542] mac80211_hwsim_new_radio+0x20d3/0x4080 [ 812.351523][T20542] hwsim_new_radio_nl+0xa6f/0xc40 [ 812.356607][T20542] genl_rcv_msg+0xcea/0xf90 [ 812.361161][T20542] ? genl_bind+0x380/0x380 [ 812.365620][T20542] ? perf_trace_run_bpf_submit+0x124/0x1c0 [ 812.371459][T20542] ? verify_lock_unused+0x140/0x140 [ 812.376684][T20542] ? perf_trace_lock_acquire+0x340/0x3e0 [ 812.382359][T20542] ? trace_event_raw_event_lock_acquire+0x2b0/0x2b0 [ 812.388980][T20542] ? perf_trace_lock+0xe4/0x390 [ 812.393864][T20542] ? hwsim_tx_info_frame_received_nl+0x1020/0x1020 [ 812.400432][T20542] netlink_rcv_skb+0x1f5/0x440 [ 812.405227][T20542] ? genl_bind+0x380/0x380 [ 812.409668][T20542] ? netlink_ack+0xb50/0xb50 [ 812.414290][T20542] ? __lock_acquire+0x7d10/0x7d10 [ 812.419355][T20542] ? down_read+0x1aa/0x2e0 [ 812.423808][T20542] genl_rcv+0x24/0x40 [ 812.427815][T20542] netlink_unicast+0x774/0x920 [ 812.432615][T20542] netlink_sendmsg+0x8ba/0xbe0 [ 812.437421][T20542] ? netlink_getsockopt+0x570/0x570 [ 812.442651][T20542] ? aa_sock_msg_perm+0x94/0x150 [ 812.447625][T20542] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 812.452941][T20542] ? security_socket_sendmsg+0x7c/0xa0 [ 812.458430][T20542] ? netlink_getsockopt+0x570/0x570 [ 812.463657][T20542] ____sys_sendmsg+0x5b7/0x8f0 [ 812.468470][T20542] ? __sys_sendmsg_sock+0x30/0x30 [ 812.473533][T20542] ? import_iovec+0x6f/0xa0 [ 812.478073][T20542] ___sys_sendmsg+0x236/0x2e0 [ 812.482789][T20542] ? __sys_sendmsg+0x2a0/0x2a0 [ 812.487607][T20542] ? trace_event_raw_event_lock+0x270/0x270 [ 812.493570][T20542] __se_sys_sendmsg+0x1af/0x290 [ 812.498469][T20542] ? __x64_sys_sendmsg+0x80/0x80 [ 812.503435][T20542] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 812.509469][T20542] ? lockdep_hardirqs_on+0x94/0x140 [ 812.514750][T20542] do_syscall_64+0x4c/0xa0 [ 812.519200][T20542] ? clear_bhb_loop+0x30/0x80 [ 812.523994][T20542] ? clear_bhb_loop+0x30/0x80 [ 812.528704][T20542] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 812.534627][T20542] RIP: 0033:0x7f23e8c35819 [ 812.539071][T20542] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 812.558803][T20542] RSP: 002b:00007f23e6e6e028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 812.567256][T20542] RAX: ffffffffffffffda RBX: 00007f23e8eaf090 RCX: 00007f23e8c35819 [ 812.575476][T20542] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 000000000000000a [ 812.583484][T20542] RBP: 00007f23e8ccbc91 R08: 0000000000000000 R09: 0000000000000000 [ 812.591476][T20542] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 812.599475][T20542] R13: 00007f23e8eaf128 R14: 00007f23e8eaf090 R15: 00007ffdcd3d0e58 [ 812.607503][T20542] [ 813.637525][T20558] netlink: 'syz.6.5180': attribute type 2 has an invalid length. [ 813.658904][T20558] netlink: 'syz.6.5180': attribute type 8 has an invalid length. [ 813.679978][T20558] netlink: 132 bytes leftover after parsing attributes in process `syz.6.5180'. [ 813.717626][T20559] netlink: 'syz.6.5180': attribute type 2 has an invalid length. [ 813.744218][T20559] netlink: 'syz.6.5180': attribute type 8 has an invalid length. [ 813.790822][ T1422] ieee802154 phy0 wpan0: encryption failed: -22 [ 813.797220][ T1422] ieee802154 phy1 wpan1: encryption failed: -22 [ 814.384796][T20563] netlink: 'syz.4.5182': attribute type 39 has an invalid length. [ 816.680451][ C1] net_ratelimit: 9022 callbacks suppressed [ 816.680470][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 816.690414][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 816.698588][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 816.710642][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 816.722560][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 816.735635][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 816.746579][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 816.758647][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 816.770660][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 816.783666][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 816.902755][T20593] netlink: 'syz.4.5193': attribute type 39 has an invalid length. [ 816.981088][T20591] netlink: 'syz.6.5192': attribute type 5 has an invalid length. [ 816.989880][T20591] __nla_validate_parse: 2 callbacks suppressed [ 816.989996][T20591] netlink: 209836 bytes leftover after parsing attributes in process `syz.6.5192'. [ 818.633167][T20628] netlink: 60 bytes leftover after parsing attributes in process `syz.1.5204'. [ 818.659497][T20628] netlink: 60 bytes leftover after parsing attributes in process `syz.1.5204'. [ 818.696982][T20629] netlink: 60 bytes leftover after parsing attributes in process `syz.1.5204'. [ 818.736520][T20628] netlink: 60 bytes leftover after parsing attributes in process `syz.1.5204'. [ 819.093545][T20632] netlink: 'syz.1.5205': attribute type 39 has an invalid length. [ 821.673671][T20686] netlink: 209852 bytes leftover after parsing attributes in process `syz.1.5227'. [ 821.690403][ C1] net_ratelimit: 9594 callbacks suppressed [ 821.690425][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 821.708612][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 821.711418][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 821.720916][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 821.733158][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 821.745268][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 821.758302][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 821.769334][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 821.781296][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 821.793269][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 821.869198][T20679] netlink: 'syz.4.5223': attribute type 29 has an invalid length. [ 821.904410][T20687] netlink: 121460 bytes leftover after parsing attributes in process `syz.1.5227'. [ 821.920423][T20679] netlink: 'syz.4.5223': attribute type 29 has an invalid length. [ 821.944771][T20687] netlink: 22728 bytes leftover after parsing attributes in process `syz.1.5227'. [ 822.062687][T20700] netlink: 60 bytes leftover after parsing attributes in process `syz.4.5232'. [ 822.092755][T20700] netlink: 60 bytes leftover after parsing attributes in process `syz.4.5232'. [ 822.210623][T20704] netlink: 60 bytes leftover after parsing attributes in process `syz.4.5232'. [ 822.289717][T20700] netlink: 60 bytes leftover after parsing attributes in process `syz.4.5232'. [ 822.392172][T20709] netlink: 132 bytes leftover after parsing attributes in process `syz.1.5234'. [ 822.437331][T20709] netlink: 'syz.1.5234': attribute type 12 has an invalid length. [ 822.480185][T20709] netlink: 132 bytes leftover after parsing attributes in process `syz.1.5234'. [ 822.560853][T20716] netlink: 'syz.1.5234': attribute type 10 has an invalid length. [ 822.643206][T20716] team0: Device hsr_slave_0 failed to register rx_handler [ 823.401125][T20738] netlink: 'syz.6.5245': attribute type 13 has an invalid length. [ 823.484906][T20738] netlink: 24643 bytes leftover after parsing attributes in process `syz.6.5245'. [ 823.509418][T20740] netlink: 1047 bytes leftover after parsing attributes in process `syz.3.5246'. [ 823.570325][T20740] bridge_slave_1: default FDB implementation only supports local addresses [ 823.605367][T20742] device syzkaller0 entered promiscuous mode [ 823.708486][T20751] netlink: 64 bytes leftover after parsing attributes in process `syz.5.5250'. [ 823.834646][T20754] netlink: 'syz.6.5251': attribute type 29 has an invalid length. [ 823.860350][T20754] netlink: 'syz.6.5251': attribute type 3 has an invalid length. [ 823.910231][T20754] netlink: 132 bytes leftover after parsing attributes in process `syz.6.5251'. [ 824.230896][T20769] netlink: 'syz.3.5254': attribute type 1 has an invalid length. [ 824.746640][T20787] netlink: 'syz.1.5262': attribute type 29 has an invalid length. [ 824.811456][T20787] netlink: 'syz.1.5262': attribute type 29 has an invalid length. [ 824.846551][T20795] FAULT_INJECTION: forcing a failure. [ 824.846551][T20795] name failslab, interval 1, probability 0, space 0, times 0 [ 824.923033][T20795] CPU: 0 PID: 20795 Comm: syz.6.5265 Not tainted syzkaller #0 [ 824.930650][T20795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 824.940734][T20795] Call Trace: [ 824.944049][T20795] [ 824.947011][T20795] dump_stack_lvl+0x188/0x250 [ 824.951742][T20795] ? show_regs_print_info+0x20/0x20 [ 824.956990][T20795] ? load_image+0x400/0x400 [ 824.961540][T20795] ? __might_sleep+0xf0/0xf0 [ 824.966160][T20795] ? __lock_acquire+0x7d10/0x7d10 [ 824.971226][T20795] should_fail+0x38c/0x4c0 [ 824.975712][T20795] should_failslab+0x5/0x20 [ 824.980342][T20795] slab_pre_alloc_hook+0x51/0xc0 [ 824.985319][T20795] __kmalloc+0x6b/0x330 [ 824.989494][T20795] ? tomoyo_realpath_from_path+0x118/0x610 [ 824.995324][T20795] tomoyo_realpath_from_path+0x118/0x610 [ 825.000964][T20795] ? kmem_cache_free+0x8f/0x210 [ 825.005845][T20795] tomoyo_path_number_perm+0x242/0x660 [ 825.011408][T20795] ? kmem_cache_free+0x8f/0x210 [ 825.016274][T20795] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 825.021743][T20795] ? user_path_create+0x136/0x190 [ 825.026783][T20795] ? bpf_obj_pin_user+0x135/0x300 [ 825.031821][T20795] ? __sys_bpf+0x56e/0x6f0 [ 825.036246][T20795] ? __x64_sys_bpf+0x78/0x90 [ 825.040939][T20795] ? do_syscall_64+0x4c/0xa0 [ 825.045538][T20795] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 825.052031][T20795] ? kasan_quarantine_put+0xd4/0x220 [ 825.057327][T20795] ? lockdep_hardirqs_on+0x94/0x140 [ 825.062544][T20795] tomoyo_path_mknod+0x147/0x190 [ 825.067491][T20795] ? slab_free_freelist_hook+0xea/0x170 [ 825.073049][T20795] ? tomoyo_path_symlink+0xf0/0xf0 [ 825.078169][T20795] ? rcu_is_watching+0x11/0xa0 [ 825.082939][T20795] ? kmem_cache_free+0x14c/0x210 [ 825.087895][T20795] security_path_mknod+0xec/0x140 [ 825.092934][T20795] bpf_obj_pin_user+0x173/0x300 [ 825.097808][T20795] ? bpf_patch_insn_data+0xe60/0xe60 [ 825.103118][T20795] __sys_bpf+0x56e/0x6f0 [ 825.107491][T20795] ? bpf_link_show_fdinfo+0x380/0x380 [ 825.112898][T20795] ? vtime_user_exit+0x2c8/0x3e0 [ 825.117857][T20795] __x64_sys_bpf+0x78/0x90 [ 825.122282][T20795] do_syscall_64+0x4c/0xa0 [ 825.126832][T20795] ? clear_bhb_loop+0x30/0x80 [ 825.131516][T20795] ? clear_bhb_loop+0x30/0x80 [ 825.136212][T20795] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 825.142109][T20795] RIP: 0033:0x7f23e8c35819 [ 825.146533][T20795] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 825.166144][T20795] RSP: 002b:00007f23e6e8f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 825.174578][T20795] RAX: ffffffffffffffda RBX: 00007f23e8eaefa0 RCX: 00007f23e8c35819 [ 825.182558][T20795] RDX: 0000000000000018 RSI: 0000200000000740 RDI: 0000000000000006 [ 825.190535][T20795] RBP: 00007f23e6e8f090 R08: 0000000000000000 R09: 0000000000000000 [ 825.198517][T20795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 825.206493][T20795] R13: 00007f23e8eaf038 R14: 00007f23e8eaefa0 R15: 00007ffdcd3d0e58 [ 825.214498][T20795] [ 825.397916][T20795] ERROR: Out of memory at tomoyo_realpath_from_path. [ 826.019364][T20814] FAULT_INJECTION: forcing a failure. [ 826.019364][T20814] name failslab, interval 1, probability 0, space 0, times 0 [ 826.065528][T20812] netlink: 'syz.5.5270': attribute type 2 has an invalid length. [ 826.122651][T20814] CPU: 1 PID: 20814 Comm: syz.1.5271 Not tainted syzkaller #0 [ 826.130186][T20814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 826.140281][T20814] Call Trace: [ 826.143640][T20814] [ 826.146750][T20814] dump_stack_lvl+0x188/0x250 [ 826.151499][T20814] ? show_regs_print_info+0x20/0x20 [ 826.156840][T20814] ? load_image+0x400/0x400 [ 826.161393][T20814] ? __might_sleep+0xf0/0xf0 [ 826.166038][T20814] ? __lock_acquire+0x7d10/0x7d10 [ 826.171303][T20814] should_fail+0x38c/0x4c0 [ 826.175881][T20814] should_failslab+0x5/0x20 [ 826.180413][T20814] slab_pre_alloc_hook+0x51/0xc0 [ 826.185412][T20814] __kmalloc+0x6b/0x330 [ 826.189690][T20814] ? tomoyo_realpath_from_path+0x118/0x610 [ 826.195565][T20814] tomoyo_realpath_from_path+0x118/0x610 [ 826.201237][T20814] ? kmem_cache_free+0x8f/0x210 [ 826.206157][T20814] tomoyo_path_number_perm+0x242/0x660 [ 826.211660][T20814] ? kmem_cache_free+0x8f/0x210 [ 826.216649][T20814] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 826.222141][T20814] ? user_path_create+0x136/0x190 [ 826.227204][T20814] ? bpf_obj_pin_user+0x135/0x300 [ 826.232368][T20814] ? __sys_bpf+0x56e/0x6f0 [ 826.236803][T20814] ? __x64_sys_bpf+0x78/0x90 [ 826.241440][T20814] ? do_syscall_64+0x4c/0xa0 [ 826.246053][T20814] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 826.252306][T20814] ? kasan_quarantine_put+0xd4/0x220 [ 826.257634][T20814] ? lockdep_hardirqs_on+0x94/0x140 [ 826.262998][T20814] tomoyo_path_mknod+0x147/0x190 [ 826.267984][T20814] ? slab_free_freelist_hook+0xea/0x170 [ 826.273586][T20814] ? tomoyo_path_symlink+0xf0/0xf0 [ 826.278821][T20814] ? rcu_is_watching+0x11/0xa0 [ 826.283612][T20814] ? kmem_cache_free+0x14c/0x210 [ 826.288627][T20814] security_path_mknod+0xec/0x140 [ 826.293724][T20814] bpf_obj_pin_user+0x173/0x300 [ 826.298630][T20814] ? bpf_patch_insn_data+0xe60/0xe60 [ 826.303987][T20814] __sys_bpf+0x56e/0x6f0 [ 826.308264][T20814] ? bpf_link_show_fdinfo+0x380/0x380 [ 826.313724][T20814] ? vtime_user_exit+0x2c8/0x3e0 [ 826.318754][T20814] __x64_sys_bpf+0x78/0x90 [ 826.323221][T20814] do_syscall_64+0x4c/0xa0 [ 826.327664][T20814] ? clear_bhb_loop+0x30/0x80 [ 826.332381][T20814] ? clear_bhb_loop+0x30/0x80 [ 826.337106][T20814] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 826.343024][T20814] RIP: 0033:0x7f5b55634819 [ 826.347474][T20814] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 826.367117][T20814] RSP: 002b:00007f5b5388e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 826.375743][T20814] RAX: ffffffffffffffda RBX: 00007f5b558adfa0 RCX: 00007f5b55634819 [ 826.383749][T20814] RDX: 0000000000000018 RSI: 0000200000000740 RDI: 0000000000000006 [ 826.391852][T20814] RBP: 00007f5b5388e090 R08: 0000000000000000 R09: 0000000000000000 [ 826.399936][T20814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 826.407935][T20814] R13: 00007f5b558ae038 R14: 00007f5b558adfa0 R15: 00007ffd58d24908 [ 826.416014][T20814] [ 826.519391][T20814] ERROR: Out of memory at tomoyo_realpath_from_path. [ 826.700452][ C1] net_ratelimit: 5284 callbacks suppressed [ 826.700474][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 826.700608][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 826.706605][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 826.718881][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 826.730871][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 826.744104][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 826.754805][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 826.766964][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 826.779004][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 826.792260][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 829.106845][T20873] __nla_validate_parse: 4 callbacks suppressed [ 829.106868][T20873] netlink: 64 bytes leftover after parsing attributes in process `syz.5.5292'. [ 829.575317][T20879] netlink: 'syz.5.5293': attribute type 10 has an invalid length. [ 829.700565][T20879] device veth0_macvtap left promiscuous mode [ 830.833814][T20899] netlink: 'syz.4.5300': attribute type 39 has an invalid length. [ 831.185666][T20905] netlink: 168 bytes leftover after parsing attributes in process `syz.4.5301'. [ 831.420186][T20908] netlink: 'syz.6.5303': attribute type 10 has an invalid length. [ 831.710822][ C0] net_ratelimit: 10259 callbacks suppressed [ 831.710842][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 831.711037][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 831.717102][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 831.729150][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 831.742494][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 831.753450][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 831.765449][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 831.777395][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 831.790437][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 831.801431][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 832.643711][T20924] netlink: 36 bytes leftover after parsing attributes in process `syz.6.5309'. [ 832.688868][T20924] netlink: 'syz.6.5309': attribute type 1 has an invalid length. [ 832.747245][T20924] netlink: 6 bytes leftover after parsing attributes in process `syz.6.5309'. [ 832.963752][ T4894] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 833.553176][T20930] netlink: 'syz.3.5311': attribute type 39 has an invalid length. [ 834.355459][T20949] netlink: 14975 bytes leftover after parsing attributes in process `syz.6.5320'. [ 834.420374][T20949] netlink: 'syz.6.5320': attribute type 1 has an invalid length. [ 834.452901][T20949] netlink: 161700 bytes leftover after parsing attributes in process `syz.6.5320'. [ 835.249313][T20967] netlink: 'syz.3.5324': attribute type 39 has an invalid length. [ 835.812510][ T4941] tipc: Left network mode [ 835.836286][T20983] netlink: 'syz.4.5332': attribute type 11 has an invalid length. [ 835.943956][T20983] netlink: 176 bytes leftover after parsing attributes in process `syz.4.5332'. [ 836.096258][T20996] netlink: 'syz.6.5336': attribute type 3 has an invalid length. [ 836.104545][T20996] netlink: 105116 bytes leftover after parsing attributes in process `syz.6.5336'. [ 836.149396][T20992] netlink: 60 bytes leftover after parsing attributes in process `syz.4.5332'. [ 836.210664][T20992] netlink: 60 bytes leftover after parsing attributes in process `syz.4.5332'. [ 836.387181][T21002] netlink: 132 bytes leftover after parsing attributes in process `syz.1.5338'. [ 836.720423][ C1] net_ratelimit: 9650 callbacks suppressed [ 836.720441][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 836.738746][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 836.751421][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 836.757291][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 836.763706][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 836.776881][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 836.787853][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 836.800062][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 836.812043][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 836.825071][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 837.460721][T21032] netlink: 60 bytes leftover after parsing attributes in process `syz.4.5351'. [ 837.469846][T21032] netlink: 60 bytes leftover after parsing attributes in process `syz.4.5351'. [ 837.543754][T21036] netlink: 60 bytes leftover after parsing attributes in process `syz.4.5351'. [ 839.255827][T21076] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 839.469135][T21079] netlink: 'syz.6.5366': attribute type 10 has an invalid length. [ 839.522439][T21079] device geneve0 entered promiscuous mode [ 840.003469][ T7688] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 840.662525][T21087] netlink: 'syz.3.5370': attribute type 21 has an invalid length. [ 840.856899][T21096] __nla_validate_parse: 5 callbacks suppressed [ 840.856918][T21096] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5373'. [ 841.334257][T21102] netlink: 'syz.6.5384': attribute type 39 has an invalid length. [ 841.731035][ C0] net_ratelimit: 7397 callbacks suppressed [ 841.731054][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 841.736420][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 841.737158][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 841.754023][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 841.762432][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 841.780922][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 841.786201][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 841.787473][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 841.805030][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 841.811364][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 843.939977][T21122] netlink: 209852 bytes leftover after parsing attributes in process `syz.3.5381'. [ 844.255624][T21122] sysfs: cannot create duplicate filename '/class/ieee80211/!!ô' [ 844.285411][T21122] CPU: 1 PID: 21122 Comm: syz.3.5381 Not tainted syzkaller #0 [ 844.292930][T21122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 844.303104][T21122] Call Trace: [ 844.306412][T21122] [ 844.309369][T21122] dump_stack_lvl+0x188/0x250 [ 844.314181][T21122] ? show_regs_print_info+0x20/0x20 [ 844.319415][T21122] ? load_image+0x400/0x400 [ 844.323956][T21122] sysfs_warn_dup+0x8a/0xa0 [ 844.328487][T21122] sysfs_do_create_link_sd+0xc0/0x110 [ 844.333897][T21122] device_add+0x7ed/0xfb0 [ 844.338357][T21122] wiphy_register+0x1e81/0x2c30 [ 844.343261][T21122] ? cfg80211_event_work+0x40/0x40 [ 844.348409][T21122] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 844.354597][T21122] ? ieee80211_register_hw+0x24b7/0x3af0 [ 844.360292][T21122] ieee80211_register_hw+0x2aa1/0x3af0 [ 844.365799][T21122] ? ieee80211_tasklet_handler+0x20/0x20 [ 844.371455][T21122] ? lockdep_hardirqs_on+0x94/0x140 [ 844.376680][T21122] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 844.382963][T21122] mac80211_hwsim_new_radio+0x20d3/0x4080 [ 844.388737][T21122] hwsim_new_radio_nl+0xa6f/0xc40 [ 844.393807][T21122] genl_rcv_msg+0xcea/0xf90 [ 844.398340][T21122] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 844.404540][T21122] ? genl_bind+0x380/0x380 [ 844.408993][T21122] ? swake_up_one+0x6d/0x130 [ 844.413610][T21122] ? verify_lock_unused+0x140/0x140 [ 844.418840][T21122] ? rcu_preempt_deferred_qs_irqrestore+0x88b/0xc30 [ 844.425475][T21122] ? perf_trace_lock+0xe4/0x390 [ 844.430348][T21122] ? hwsim_tx_info_frame_received_nl+0x1020/0x1020 [ 844.436965][T21122] netlink_rcv_skb+0x1f5/0x440 [ 844.441758][T21122] ? genl_bind+0x380/0x380 [ 844.446181][T21122] ? netlink_ack+0xb50/0xb50 [ 844.450782][T21122] ? __lock_acquire+0x7d10/0x7d10 [ 844.455821][T21122] ? down_read+0x1aa/0x2e0 [ 844.460243][T21122] genl_rcv+0x24/0x40 [ 844.464237][T21122] netlink_unicast+0x774/0x920 [ 844.469006][T21122] netlink_sendmsg+0x8ba/0xbe0 [ 844.473775][T21122] ? netlink_getsockopt+0x570/0x570 [ 844.478978][T21122] ? aa_sock_msg_perm+0x94/0x150 [ 844.483928][T21122] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 844.489216][T21122] ? security_socket_sendmsg+0x7c/0xa0 [ 844.494673][T21122] ? netlink_getsockopt+0x570/0x570 [ 844.499879][T21122] ____sys_sendmsg+0x5b7/0x8f0 [ 844.504751][T21122] ? __sys_sendmsg_sock+0x30/0x30 [ 844.509784][T21122] ? import_iovec+0x6f/0xa0 [ 844.514296][T21122] ___sys_sendmsg+0x236/0x2e0 [ 844.518985][T21122] ? __sys_sendmsg+0x2a0/0x2a0 [ 844.523792][T21122] __se_sys_sendmsg+0x1af/0x290 [ 844.528654][T21122] ? __x64_sys_sendmsg+0x80/0x80 [ 844.533608][T21122] ? syscall_enter_from_user_mode+0x2a/0x70 [ 844.539506][T21122] do_syscall_64+0x4c/0xa0 [ 844.543924][T21122] ? clear_bhb_loop+0x30/0x80 [ 844.548602][T21122] ? clear_bhb_loop+0x30/0x80 [ 844.553277][T21122] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 844.559169][T21122] RIP: 0033:0x7f43675d1819 [ 844.563587][T21122] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 844.583194][T21122] RSP: 002b:00007f436582b028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 844.591611][T21122] RAX: ffffffffffffffda RBX: 00007f436784afa0 RCX: 00007f43675d1819 [ 844.599583][T21122] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000008 [ 844.607815][T21122] RBP: 00007f4367667c91 R08: 0000000000000000 R09: 0000000000000000 [ 844.615797][T21122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 844.623782][T21122] R13: 00007f436784b038 R14: 00007f436784afa0 R15: 00007ffe79167358 [ 844.631783][T21122] [ 845.401129][T21136] netlink: 64803 bytes leftover after parsing attributes in process `syz.4.5386'. [ 846.338861][T21164] netlink: 192436 bytes leftover after parsing attributes in process `syz.5.5397'. [ 846.754669][ C0] net_ratelimit: 7999 callbacks suppressed [ 846.754688][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 846.757403][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 846.760855][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 846.772875][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 846.785940][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 846.796893][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 846.808934][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 846.820946][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 846.833888][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 846.844886][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 847.158663][T21181] netlink: 'syz.1.5404': attribute type 9 has an invalid length. [ 847.185425][T21181] netlink: 135040 bytes leftover after parsing attributes in process `syz.1.5404'. [ 847.203547][T21186] netlink: 192436 bytes leftover after parsing attributes in process `syz.4.5403'. [ 847.456335][T21200] netlink: 64535 bytes leftover after parsing attributes in process `syz.4.5408'. [ 847.671404][T21208] netlink: 192436 bytes leftover after parsing attributes in process `syz.6.5411'. [ 848.759637][T21218] netlink: 132 bytes leftover after parsing attributes in process `syz.1.5416'. [ 849.044515][T21232] netlink: 'syz.4.5420': attribute type 10 has an invalid length. [ 849.188248][T21232] device hsr0 entered promiscuous mode [ 849.272449][T21233] netlink: 'syz.5.5421': attribute type 2 has an invalid length. [ 849.300709][T21233] netlink: 199824 bytes leftover after parsing attributes in process `syz.5.5421'. [ 849.388574][T21236] netlink: 192436 bytes leftover after parsing attributes in process `syz.6.5419'. [ 849.418131][T21235] netlink: 132 bytes leftover after parsing attributes in process `syz.3.5418'. [ 849.902889][T21248] netlink: 40 bytes leftover after parsing attributes in process `syz.6.5425'. [ 850.020545][T21253] netlink: 'syz.6.5425': attribute type 21 has an invalid length. [ 850.895450][T21272] netlink: 'syz.5.5434': attribute type 2 has an invalid length. [ 851.067659][T21279] FAULT_INJECTION: forcing a failure. [ 851.067659][T21279] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 851.113717][T21287] netlink: 'syz.6.5437': attribute type 2 has an invalid length. [ 851.179032][T21279] CPU: 1 PID: 21279 Comm: syz.1.5438 Not tainted syzkaller #0 [ 851.186553][T21279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 851.196731][T21279] Call Trace: [ 851.200036][T21279] [ 851.202987][T21279] dump_stack_lvl+0x188/0x250 [ 851.207697][T21279] ? show_regs_print_info+0x20/0x20 [ 851.212972][T21279] ? load_image+0x400/0x400 [ 851.217510][T21279] ? __lock_acquire+0x7d10/0x7d10 [ 851.222576][T21279] should_fail+0x38c/0x4c0 [ 851.227029][T21279] _copy_from_user+0x2e/0x170 [ 851.231733][T21279] __copy_msghdr_from_user+0xc9/0x630 [ 851.237138][T21279] ? verify_lock_unused+0x140/0x140 [ 851.242375][T21279] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 851.247713][T21279] ___sys_sendmsg+0x19a/0x2e0 [ 851.252436][T21279] ? __sys_sendmsg+0x2a0/0x2a0 [ 851.257252][T21279] ? trace_event_raw_event_lock+0x270/0x270 [ 851.263255][T21279] ? vfs_write+0x8b2/0xd60 [ 851.267726][T21279] __se_sys_sendmsg+0x1af/0x290 [ 851.272618][T21279] ? __x64_sys_sendmsg+0x80/0x80 [ 851.277812][T21279] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 851.283841][T21279] ? lockdep_hardirqs_on+0x94/0x140 [ 851.289085][T21279] do_syscall_64+0x4c/0xa0 [ 851.293524][T21279] ? clear_bhb_loop+0x30/0x80 [ 851.298231][T21279] ? clear_bhb_loop+0x30/0x80 [ 851.302952][T21279] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 851.308877][T21279] RIP: 0033:0x7f5b55634819 [ 851.313323][T21279] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 851.333051][T21279] RSP: 002b:00007f5b5388e028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 851.341600][T21279] RAX: ffffffffffffffda RBX: 00007f5b558adfa0 RCX: 00007f5b55634819 [ 851.349619][T21279] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 851.357616][T21279] RBP: 00007f5b5388e090 R08: 0000000000000000 R09: 0000000000000000 [ 851.365615][T21279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 851.373614][T21279] R13: 00007f5b558ae038 R14: 00007f5b558adfa0 R15: 00007ffd58d24908 [ 851.381635][T21279] [ 851.581279][T21292] __nla_validate_parse: 7 callbacks suppressed [ 851.581316][T21292] netlink: 16178 bytes leftover after parsing attributes in process `syz.3.5440'. [ 851.760816][ C0] net_ratelimit: 6428 callbacks suppressed [ 851.760838][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 851.779661][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 851.793282][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 851.797672][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 851.805689][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 851.817632][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 851.841646][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 851.854059][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 851.866575][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 851.879267][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 852.484052][T21323] netlink: 209852 bytes leftover after parsing attributes in process `syz.6.5449'. [ 852.817025][T21334] netlink: 'syz.5.5453': attribute type 10 has an invalid length. [ 852.857395][T21334] netlink: 65015 bytes leftover after parsing attributes in process `syz.5.5453'. [ 852.885708][T21336] netlink: 192436 bytes leftover after parsing attributes in process `syz.3.5452'. [ 852.942653][T21333] netlink: 'syz.5.5453': attribute type 10 has an invalid length. [ 852.991535][T21333] netlink: 65015 bytes leftover after parsing attributes in process `syz.5.5453'. [ 854.899399][ T4894] wlan1: Trigger new scan to find an IBSS to join [ 855.586023][T21351] netlink: 121460 bytes leftover after parsing attributes in process `syz.6.5456'. [ 855.650889][T21351] netlink: 20624 bytes leftover after parsing attributes in process `syz.6.5456'. [ 855.681210][T21351] tipc: Started in network mode [ 855.715825][T21351] tipc: Node identity d, cluster identity 46 [ 855.730318][T21351] tipc: Node number set to 13 [ 856.337262][T21380] netlink: 2 bytes leftover after parsing attributes in process `syz.6.5464'. [ 856.778445][ C0] net_ratelimit: 8478 callbacks suppressed [ 856.778468][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 856.780949][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 856.785876][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 856.796716][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 856.808718][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 856.820721][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 856.834222][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 856.845027][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 856.857071][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 856.869029][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 856.945711][T21387] netlink: 192436 bytes leftover after parsing attributes in process `syz.1.5467'. [ 857.332903][T21394] netlink: 'syz.6.5470': attribute type 3 has an invalid length. [ 857.360365][T21394] netlink: 132 bytes leftover after parsing attributes in process `syz.6.5470'. [ 857.414475][T21395] netlink: 176 bytes leftover after parsing attributes in process `syz.1.5469'. [ 858.589995][T21400] netlink: 180 bytes leftover after parsing attributes in process `syz.6.5472'. [ 858.813440][ T4894] wlan1: Trigger new scan to find an IBSS to join [ 859.045543][T21406] FAULT_INJECTION: forcing a failure. [ 859.045543][T21406] name failslab, interval 1, probability 0, space 0, times 0 [ 859.090431][T21406] CPU: 1 PID: 21406 Comm: syz.4.5475 Not tainted syzkaller #0 [ 859.098037][T21406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 859.108224][T21406] Call Trace: [ 859.111582][T21406] [ 859.114528][T21406] dump_stack_lvl+0x188/0x250 [ 859.119225][T21406] ? show_regs_print_info+0x20/0x20 [ 859.124438][T21406] ? load_image+0x400/0x400 [ 859.128954][T21406] ? __might_sleep+0xf0/0xf0 [ 859.133554][T21406] ? __lock_acquire+0x7d10/0x7d10 [ 859.138596][T21406] should_fail+0x38c/0x4c0 [ 859.143041][T21406] should_failslab+0x5/0x20 [ 859.147554][T21406] slab_pre_alloc_hook+0x51/0xc0 [ 859.152501][T21406] kmem_cache_alloc_node+0x47/0x2d0 [ 859.157712][T21406] ? __alloc_skb+0xf4/0x750 [ 859.162233][T21406] __alloc_skb+0xf4/0x750 [ 859.166578][T21406] sk_stream_alloc_skb+0x1fa/0xa60 [ 859.171720][T21406] tcp_sendmsg_locked+0xc31/0x3320 [ 859.176867][T21406] ? __lock_acquire+0x12e8/0x7d10 [ 859.181938][T21406] ? tcp_free_fastopen_req+0x70/0x70 [ 859.187249][T21406] tcp_sendmsg+0x2b/0x40 [ 859.191505][T21406] ? inet_send_prepare+0x260/0x260 [ 859.196631][T21406] ____sys_sendmsg+0x5b7/0x8f0 [ 859.201422][T21406] ? __sys_sendmsg_sock+0x30/0x30 [ 859.206467][T21406] ? import_iovec+0x6f/0xa0 [ 859.210991][T21406] ___sys_sendmsg+0x236/0x2e0 [ 859.215694][T21406] ? __sys_sendmsg+0x2a0/0x2a0 [ 859.220488][T21406] ? vfs_write+0x8b2/0xd60 [ 859.224944][T21406] __se_sys_sendmsg+0x1af/0x290 [ 859.229810][T21406] ? __x64_sys_sendmsg+0x80/0x80 [ 859.234759][T21406] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 859.240767][T21406] ? lockdep_hardirqs_on+0x94/0x140 [ 859.245984][T21406] do_syscall_64+0x4c/0xa0 [ 859.250598][T21406] ? clear_bhb_loop+0x30/0x80 [ 859.255286][T21406] ? clear_bhb_loop+0x30/0x80 [ 859.259977][T21406] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 859.265882][T21406] RIP: 0033:0x7f2b00f9c819 [ 859.270308][T21406] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 859.289925][T21406] RSP: 002b:00007f2aff1f6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 859.298360][T21406] RAX: ffffffffffffffda RBX: 00007f2b01215fa0 RCX: 00007f2b00f9c819 [ 859.306514][T21406] RDX: 0000000000000080 RSI: 00002000000002c0 RDI: 0000000000000004 [ 859.314499][T21406] RBP: 00007f2aff1f6090 R08: 0000000000000000 R09: 0000000000000000 [ 859.322481][T21406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 859.330461][T21406] R13: 00007f2b01216038 R14: 00007f2b01215fa0 R15: 00007ffc484303e8 [ 859.338569][T21406] [ 859.576650][T21414] netlink: 2 bytes leftover after parsing attributes in process `syz.4.5478'. [ 859.678632][T21410] netlink: 'syz.3.5477': attribute type 39 has an invalid length. [ 859.983899][T21424] netlink: 192436 bytes leftover after parsing attributes in process `syz.3.5480'. [ 860.540362][T21442] netlink: 132 bytes leftover after parsing attributes in process `syz.3.5484'. [ 860.633285][T21434] netlink: 'syz.3.5484': attribute type 3 has an invalid length. [ 860.644993][T21434] netlink: 105116 bytes leftover after parsing attributes in process `syz.3.5484'. [ 860.787381][ T4903] wlan1: Creating new IBSS network, BSSID 00:00:00:08:00:00 [ 860.840709][T21447] netlink: 'syz.1.5490': attribute type 39 has an invalid length. [ 861.040170][T21457] netlink: 192436 bytes leftover after parsing attributes in process `syz.3.5494'. [ 861.174827][T21458] device pim6reg1 entered promiscuous mode [ 861.610679][T21471] netlink: 'syz.4.5500': attribute type 10 has an invalid length. [ 861.637224][T21473] netlink: 'syz.3.5501': attribute type 3 has an invalid length. [ 861.666886][T21473] netlink: 'syz.3.5501': attribute type 1 has an invalid length. [ 861.675167][T21473] netlink: 193404 bytes leftover after parsing attributes in process `syz.3.5501'. [ 861.785704][ C0] net_ratelimit: 9644 callbacks suppressed [ 861.785725][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 861.800765][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 861.804248][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 861.816323][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 861.829835][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 861.840432][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 861.852430][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 861.864366][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 861.877938][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 861.888579][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 862.343131][T21488] netlink: 'syz.3.5506': attribute type 39 has an invalid length. [ 862.525470][T21497] __nla_validate_parse: 1 callbacks suppressed [ 862.525488][T21497] netlink: 209852 bytes leftover after parsing attributes in process `syz.4.5511'. [ 864.354206][T21530] netlink: 'syz.4.5524': attribute type 39 has an invalid length. [ 864.892317][T21540] netlink: 9275 bytes leftover after parsing attributes in process `syz.1.5528'. [ 865.274876][T21547] netlink: 209852 bytes leftover after parsing attributes in process `syz.1.5531'. [ 866.790421][ C0] net_ratelimit: 9894 callbacks suppressed [ 866.790443][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 866.808728][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 866.810751][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 866.832468][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 866.833356][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 866.845733][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 866.857763][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 866.870887][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 866.881706][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 866.893754][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 868.132168][T21555] netlink: 209852 bytes leftover after parsing attributes in process `syz.5.5535'. [ 868.478903][T21566] netlink: 'syz.5.5538': attribute type 39 has an invalid length. [ 868.676623][T21573] netlink: 'syz.1.5540': attribute type 10 has an invalid length. [ 868.790440][T21573] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 868.872863][T21573] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 869.004261][T21573] bond0: (slave batadv_slave_0): Enslaving as an active interface with an up link [ 869.159430][T21587] netlink: 10 bytes leftover after parsing attributes in process `syz.1.5540'. [ 869.276456][T21591] bridge0: port 3(veth0_to_bridge) entered blocking state [ 869.316303][T21591] bridge0: port 3(veth0_to_bridge) entered disabled state [ 869.349736][T21600] netlink: 209852 bytes leftover after parsing attributes in process `syz.1.5549'. [ 869.355445][T21591] device veth0_to_bridge entered promiscuous mode [ 869.407836][T21591] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 869.477418][T21591] bridge0: port 3(veth0_to_bridge) entered blocking state [ 869.485170][T21591] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 869.513212][T21603] netlink: 'syz.4.5550': attribute type 3 has an invalid length. [ 869.553920][T21603] netlink: 105116 bytes leftover after parsing attributes in process `syz.4.5550'. [ 870.305658][T21625] netlink: 'syz.1.5559': attribute type 21 has an invalid length. [ 870.367779][T21625] netlink: 132 bytes leftover after parsing attributes in process `syz.1.5559'. [ 870.579503][T21632] netlink: 'syz.4.5560': attribute type 10 has an invalid length. [ 870.655128][T21632] netlink: 40 bytes leftover after parsing attributes in process `syz.4.5560'. [ 870.686169][T21632] device vlan1 entered promiscuous mode [ 870.968549][T21641] netlink: 'syz.5.5573': attribute type 39 has an invalid length. [ 871.516130][T21655] bridge0: port 4(veth0_to_bridge) entered blocking state [ 871.570860][T21655] bridge0: port 4(veth0_to_bridge) entered disabled state [ 871.626038][T21655] device veth0_to_bridge entered promiscuous mode [ 871.642918][T21655] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 871.690846][T21655] bridge0: port 4(veth0_to_bridge) entered blocking state [ 871.698453][T21655] bridge0: port 4(veth0_to_bridge) entered forwarding state [ 871.800768][ C1] net_ratelimit: 7058 callbacks suppressed [ 871.800787][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 871.801922][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 871.806968][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 871.819127][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 871.831150][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 871.844559][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 871.855091][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 871.867224][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 871.879237][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 871.892762][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 872.050367][T21663] FAULT_INJECTION: forcing a failure. [ 872.050367][T21663] name failslab, interval 1, probability 0, space 0, times 0 [ 872.064314][ T4903] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 872.075200][T21663] CPU: 0 PID: 21663 Comm: syz.6.5574 Not tainted syzkaller #0 [ 872.082709][T21663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 872.092807][T21663] Call Trace: [ 872.096125][T21663] [ 872.099098][T21663] dump_stack_lvl+0x188/0x250 [ 872.103837][T21663] ? show_regs_print_info+0x20/0x20 [ 872.109083][T21663] ? load_image+0x400/0x400 [ 872.113649][T21663] ? __might_sleep+0xf0/0xf0 [ 872.118293][T21663] ? __lock_acquire+0x7d10/0x7d10 [ 872.123387][T21663] should_fail+0x38c/0x4c0 [ 872.127869][T21663] should_failslab+0x5/0x20 [ 872.132408][T21663] slab_pre_alloc_hook+0x51/0xc0 [ 872.137399][T21663] __kmalloc_node_track_caller+0x68/0x3a0 [ 872.143168][T21663] ? netlink_sendmsg+0x654/0xbe0 [ 872.148154][T21663] ? kmem_cache_alloc_node+0x162/0x2d0 [ 872.153671][T21663] ? __alloc_skb+0xf4/0x750 [ 872.158226][T21663] ? netlink_sendmsg+0x654/0xbe0 [ 872.163217][T21663] __alloc_skb+0x22c/0x750 [ 872.167695][T21663] netlink_sendmsg+0x654/0xbe0 [ 872.172537][T21663] ? netlink_getsockopt+0x570/0x570 [ 872.177800][T21663] ? aa_sock_msg_perm+0x94/0x150 [ 872.182797][T21663] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 872.188129][T21663] ? security_socket_sendmsg+0x7c/0xa0 [ 872.193648][T21663] ? netlink_getsockopt+0x570/0x570 [ 872.198893][T21663] ____sys_sendmsg+0x5b7/0x8f0 [ 872.203739][T21663] ? __sys_sendmsg_sock+0x30/0x30 [ 872.208844][T21663] ? import_iovec+0x6f/0xa0 [ 872.213405][T21663] ___sys_sendmsg+0x236/0x2e0 [ 872.218162][T21663] ? __sys_sendmsg+0x2a0/0x2a0 [ 872.223130][T21663] __se_sys_sendmsg+0x1af/0x290 [ 872.228043][T21663] ? __x64_sys_sendmsg+0x80/0x80 [ 872.233080][T21663] ? syscall_enter_from_user_mode+0x2a/0x70 [ 872.239033][T21663] do_syscall_64+0x4c/0xa0 [ 872.243485][T21663] ? clear_bhb_loop+0x30/0x80 [ 872.248175][T21663] ? clear_bhb_loop+0x30/0x80 [ 872.252878][T21663] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 872.258796][T21663] RIP: 0033:0x7f23e8c35819 [ 872.263229][T21663] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 872.282851][T21663] RSP: 002b:00007f23e6e8f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 872.291290][T21663] RAX: ffffffffffffffda RBX: 00007f23e8eaefa0 RCX: 00007f23e8c35819 [ 872.299278][T21663] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000009 [ 872.307260][T21663] RBP: 00007f23e6e8f090 R08: 0000000000000000 R09: 0000000000000000 [ 872.315242][T21663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 872.323226][T21663] R13: 00007f23e8eaf038 R14: 00007f23e8eaefa0 R15: 00007ffdcd3d0e58 [ 872.331254][T21663] [ 872.937311][T21675] netlink: 'syz.1.5578': attribute type 39 has an invalid length. [ 872.987627][T21679] netlink: 'syz.6.5579': attribute type 10 has an invalid length. [ 872.999136][T21679] netlink: 55 bytes leftover after parsing attributes in process `syz.6.5579'. [ 873.164981][T21685] FAULT_INJECTION: forcing a failure. [ 873.164981][T21685] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 873.219995][T21685] CPU: 1 PID: 21685 Comm: syz.5.5581 Not tainted syzkaller #0 [ 873.227518][T21685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 873.237602][T21685] Call Trace: [ 873.240909][T21685] [ 873.243873][T21685] dump_stack_lvl+0x188/0x250 [ 873.248586][T21685] ? show_regs_print_info+0x20/0x20 [ 873.253823][T21685] ? load_image+0x400/0x400 [ 873.258373][T21685] ? __lock_acquire+0x7d10/0x7d10 [ 873.263439][T21685] should_fail+0x38c/0x4c0 [ 873.267897][T21685] _copy_from_user+0x2e/0x170 [ 873.272612][T21685] __copy_msghdr_from_user+0xc9/0x630 [ 873.278192][T21685] ? verify_lock_unused+0x140/0x140 [ 873.283423][T21685] ? __ia32_sys_shutdown+0x1d0/0x1d0 [ 873.288752][T21685] ___sys_sendmsg+0x19a/0x2e0 [ 873.293526][T21685] ? __sys_sendmsg+0x2a0/0x2a0 [ 873.298507][T21685] ? __fget_files+0xff/0x480 [ 873.303154][T21685] __se_sys_sendmsg+0x1af/0x290 [ 873.308149][T21685] ? __x64_sys_sendmsg+0x80/0x80 [ 873.313436][T21685] ? syscall_enter_from_user_mode+0x2a/0x70 [ 873.320166][T21685] do_syscall_64+0x4c/0xa0 [ 873.324596][T21685] ? clear_bhb_loop+0x30/0x80 [ 873.329282][T21685] ? clear_bhb_loop+0x30/0x80 [ 873.333966][T21685] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 873.339870][T21685] RIP: 0033:0x7f130f644819 [ 873.344289][T21685] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 873.363905][T21685] RSP: 002b:00007f130d89e028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 873.372340][T21685] RAX: ffffffffffffffda RBX: 00007f130f8bdfa0 RCX: 00007f130f644819 [ 873.380324][T21685] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000005 [ 873.388311][T21685] RBP: 00007f130d89e090 R08: 0000000000000000 R09: 0000000000000000 [ 873.396302][T21685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 873.404292][T21685] R13: 00007f130f8be038 R14: 00007f130f8bdfa0 R15: 00007ffdfe1f2388 [ 873.412292][T21685] [ 874.414398][T21700] netlink: 'syz.5.5587': attribute type 3 has an invalid length. [ 874.431012][T21700] netlink: 105116 bytes leftover after parsing attributes in process `syz.5.5587'. [ 874.640515][T21704] netlink: 188 bytes leftover after parsing attributes in process `syz.3.5588'. [ 874.676072][T21704] netlink: 188 bytes leftover after parsing attributes in process `syz.3.5588'. [ 874.703435][T21704] netlink: 188 bytes leftover after parsing attributes in process `syz.3.5588'. [ 874.730406][T21704] netlink: 188 bytes leftover after parsing attributes in process `syz.3.5588'. [ 874.765335][T21704] netlink: 188 bytes leftover after parsing attributes in process `syz.3.5588'. [ 874.792186][T21704] netlink: 188 bytes leftover after parsing attributes in process `syz.3.5588'. [ 874.801790][T21704] netlink: 188 bytes leftover after parsing attributes in process `syz.3.5588'. [ 874.852274][T21704] netlink: 188 bytes leftover after parsing attributes in process `syz.3.5588'. [ 874.888027][T21704] netlink: 188 bytes leftover after parsing attributes in process `syz.3.5588'. [ 875.229899][ T1422] ieee802154 phy0 wpan0: encryption failed: -22 [ 875.236278][ T1422] ieee802154 phy1 wpan1: encryption failed: -22 [ 875.515343][T21715] netlink: 'syz.5.5592': attribute type 39 has an invalid length. [ 875.639918][T21717] netlink: 'syz.3.5593': attribute type 21 has an invalid length. [ 876.382490][T21724] delete_channel: no stack [ 876.461790][T21724] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 876.469245][T21724] IPv6: NLM_F_CREATE should be set when creating new route [ 876.476638][T21724] IPv6: NLM_F_CREATE should be set when creating new route [ 876.484028][T21724] IPv6: NLM_F_CREATE should be set when creating new route [ 876.587627][T21726] netlink: 'syz.3.5596': attribute type 6 has an invalid length. [ 876.824398][ C1] net_ratelimit: 8785 callbacks suppressed [ 876.824417][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 876.831586][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 876.842542][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 876.854607][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 876.866533][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 876.879547][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 876.890476][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 876.902572][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 876.914559][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 876.927607][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 878.322204][T21772] netlink: 'syz.4.5612': attribute type 10 has an invalid length. [ 878.411422][T21769] FAULT_INJECTION: forcing a failure. [ 878.411422][T21769] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 878.442038][T21778] netlink: 'syz.5.5613': attribute type 3 has an invalid length. [ 878.512999][T21769] CPU: 1 PID: 21769 Comm: syz.6.5610 Not tainted syzkaller #0 [ 878.520550][T21769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 878.530724][T21769] Call Trace: [ 878.534023][T21769] [ 878.536967][T21769] dump_stack_lvl+0x188/0x250 [ 878.541675][T21769] ? show_regs_print_info+0x20/0x20 [ 878.546894][T21769] ? load_image+0x400/0x400 [ 878.551434][T21769] ? __lock_acquire+0x7d10/0x7d10 [ 878.556583][T21769] should_fail+0x38c/0x4c0 [ 878.561036][T21769] _copy_from_user+0x2e/0x170 [ 878.565748][T21769] bond_do_ioctl+0x1bc/0x920 [ 878.570368][T21769] ? bond_eth_ioctl+0x240/0x240 [ 878.575363][T21769] ? do_raw_spin_unlock+0x11d/0x230 [ 878.580609][T21769] ? __mutex_lock_common+0x155c/0x2400 [ 878.586115][T21769] ? full_name_hash+0x8e/0xe0 [ 878.590819][T21769] ? dev_siocbond+0xcf/0x100 [ 878.595479][T21769] dev_ifsioc+0xb43/0xd50 [ 878.599813][T21769] ? dev_ioctl+0xe30/0xe30 [ 878.604349][T21769] ? full_name_hash+0x8e/0xe0 [ 878.609048][T21769] dev_ioctl+0x545/0xe30 [ 878.613383][T21769] ? _copy_from_user+0x111/0x170 [ 878.618330][T21769] sock_do_ioctl+0x245/0x320 [ 878.622926][T21769] ? sock_show_fdinfo+0xb0/0xb0 [ 878.627799][T21769] ? sock_ioctl+0x1a0/0x710 [ 878.632397][T21769] sock_ioctl+0x4d2/0x710 [ 878.636732][T21769] ? sock_poll+0x410/0x410 [ 878.641159][T21769] ? bpf_lsm_file_ioctl+0x5/0x10 [ 878.646105][T21769] ? security_file_ioctl+0x7c/0xa0 [ 878.651217][T21769] ? sock_poll+0x410/0x410 [ 878.655722][T21769] __se_sys_ioctl+0xfa/0x170 [ 878.660315][T21769] do_syscall_64+0x4c/0xa0 [ 878.664732][T21769] ? clear_bhb_loop+0x30/0x80 [ 878.669427][T21769] ? clear_bhb_loop+0x30/0x80 [ 878.674105][T21769] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 878.680020][T21769] RIP: 0033:0x7f23e8c35819 [ 878.684448][T21769] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 878.704141][T21769] RSP: 002b:00007f23e6e8f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 878.712608][T21769] RAX: ffffffffffffffda RBX: 00007f23e8eaefa0 RCX: 00007f23e8c35819 [ 878.720583][T21769] RDX: 00002000000002c0 RSI: 0000000000008993 RDI: 0000000000000004 [ 878.728553][T21769] RBP: 00007f23e6e8f090 R08: 0000000000000000 R09: 0000000000000000 [ 878.736528][T21769] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 878.744505][T21769] R13: 00007f23e8eaf038 R14: 00007f23e8eaefa0 R15: 00007ffdcd3d0e58 [ 878.752587][T21769] [ 879.834649][T21791] netlink: 'syz.3.5619': attribute type 39 has an invalid length. [ 879.974620][T21808] netlink: 'syz.6.5624': attribute type 9 has an invalid length. [ 879.983676][T21804] netlink: 'syz.4.5623': attribute type 11 has an invalid length. [ 879.991913][T21808] __nla_validate_parse: 59 callbacks suppressed [ 879.991932][T21808] netlink: 146428 bytes leftover after parsing attributes in process `syz.6.5624'. [ 880.014866][T21804] netlink: 148 bytes leftover after parsing attributes in process `syz.4.5623'. [ 880.055181][T21803] netlink: 22 bytes leftover after parsing attributes in process `syz.6.5624'. [ 880.089795][T21805] netlink: 'syz.4.5623': attribute type 21 has an invalid length. [ 880.451004][T21817] netlink: 'syz.4.5627': attribute type 28 has an invalid length. [ 880.564144][T21817] netlink: 'syz.4.5627': attribute type 9 has an invalid length. [ 880.630668][T21817] netlink: 209836 bytes leftover after parsing attributes in process `syz.4.5627'. [ 880.715839][T21827] netlink: 132 bytes leftover after parsing attributes in process `syz.5.5631'. [ 881.106428][T21836] device sit0 entered promiscuous mode [ 881.389267][T21843] sctp: [Deprecated]: syz.3.5635 (pid 21843) Use of struct sctp_assoc_value in delayed_ack socket option. [ 881.389267][T21843] Use struct sctp_sack_info instead [ 881.847721][ C0] net_ratelimit: 6292 callbacks suppressed [ 881.847743][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 881.847916][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 881.854209][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 881.866428][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 881.880062][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 881.890501][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 881.902492][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 881.914395][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 881.927974][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 881.938456][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 886.850534][ C1] net_ratelimit: 11523 callbacks suppressed [ 886.850555][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 886.864176][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 886.868800][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 886.880886][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 886.892836][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 886.906273][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 886.916913][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 886.928862][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 886.940873][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 886.954038][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:de:66:27:99:d4:18, vlan:0) [ 887.532940][T21841] netlink: 'syz.1.5636': attribute type 39 has an invalid length. [ 887.550316][T21847] netlink: 14568 bytes leftover after parsing attributes in process `syz.6.5637'. [ 887.560544][T21851] netlink: 'syz.5.5638': attribute type 21 has an invalid length. [ 887.568720][T21851] netlink: 128 bytes leftover after parsing attributes in process `syz.5.5638'. [ 887.690032][T21851] netlink: 'syz.5.5638': attribute type 4 has an invalid length. [ 887.862451][T21859] netlink: 180 bytes leftover after parsing attributes in process `syz.3.5640'. [ 888.046452][T21876] device lo entered promiscuous mode [ 888.403717][T21894] netlink: 830 bytes leftover after parsing attributes in process `syz.5.5650'. [ 888.575877][T21903] sctp: [Deprecated]: syz.4.5651 (pid 21903) Use of struct sctp_assoc_value in delayed_ack socket option. [ 888.575877][T21903] Use struct sctp_sack_info instead [ 888.715286][T21904] netlink: 'syz.6.5652': attribute type 39 has an invalid length. [ 888.814536][T21908] netlink: 14568 bytes leftover after parsing attributes in process `syz.1.5653'. [ 889.158998][T21917] netlink: 143108 bytes leftover after parsing attributes in process `syz.5.5656'. [ 889.213516][T21917] netlink: 'syz.5.5656': attribute type 1 has an invalid length. [ 889.404806][ C1] ------------[ cut here ]------------ [ 889.404817][ C1] WARNING: CPU: 1 PID: 21925 at mm/maccess.c:226 copy_from_user_nofault+0x160/0x1c0 [ 889.404851][ C1] Modules linked in: [ 889.404863][ C1] CPU: 1 PID: 21925 Comm: syz.1.5661 Not tainted syzkaller #0 [ 889.404880][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 889.404890][ C1] RIP: 0010:copy_from_user_nofault+0x160/0x1c0 [ 889.404910][ C1] Code: 24 45 31 f6 31 ff 89 de e8 fd 94 d8 ff 85 db 48 c7 c0 f2 ff ff ff 49 0f 44 c6 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 80 91 d8 ff <0f> 0b e9 1c ff ff ff 44 89 e1 80 e1 07 80 c1 03 38 c1 0f 8c ea fe [ 889.404925][ C1] RSP: 0018:fffffe000005d8e8 EFLAGS: 00010006 [ 889.404941][ C1] RAX: ffffffff81a08f90 RBX: 0000000000000008 RCX: ffff888079611dc0 [ 889.404954][ C1] RDX: 0000000000110000 RSI: 0000000000000000 RDI: 0000000000000000 [ 889.404966][ C1] RBP: 0000000000000000 R08: ffff888079611dc7 R09: 1ffff1100f2c23b8 [ 889.404978][ C1] R10: dffffc0000000000 R11: ffffed100f2c23b9 R12: ffff888079613548 [ 889.404991][ C1] R13: 00007ffffffff000 R14: fffffe000005d958 R15: 0000000020000000 [ 889.405003][ C1] FS: 00007f5b5388e6c0(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000 [ 889.405018][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 889.405030][ C1] CR2: 000000110c2eb3a4 CR3: 000000005e82e000 CR4: 00000000003506e0 [ 889.405047][ C1] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000200000000300 [ 889.405059][ C1] DR3: 0000200000000300 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 889.405071][ C1] Call Trace: [ 889.405078][ C1] <#DB> [ 889.405094][ C1] bpf_probe_read_compat+0xdd/0x170 [ 889.405127][ C1] bpf_prog_ca2ebcd76953ac02_F+0x2c/0x370 [ 889.405151][ C1] bpf_prog_b89d7ca37128ef40+0x1a/0x138 [ 889.405181][ C1] bpf_overflow_handler+0x1c2/0x4a0 [ 889.405215][ C1] ? perf_event_switch_output+0x730/0x730 [ 889.405255][ C1] ? __perf_event_account_interrupt+0x187/0x280 [ 889.405281][ C1] __perf_event_overflow+0x364/0x530 [ 889.405311][ C1] perf_swevent_event+0x4ad/0x530 [ 889.405343][ C1] perf_bp_event+0x276/0x320 [ 889.405367][ C1] ? perf_trace_lock_acquire+0x340/0x3e0 [ 889.405393][ C1] ? perf_event_free_bpf_prog+0x110/0x110 [ 889.405464][ C1] ? rcu_lock_acquire+0x9/0x30 [ 889.405489][ C1] ? read_lock_is_recursive+0x10/0x10 [ 889.405526][ C1] hw_breakpoint_exceptions_notify+0x152/0x470 [ 889.405555][ C1] atomic_notifier_call_chain+0x15d/0x280 [ 889.405586][ C1] notify_die+0x141/0x1a0 [ 889.405610][ C1] ? srcu_init_notifier_head+0x90/0x90 [ 889.405642][ C1] ? exc_debug+0x6e/0x130 [ 889.405663][ C1] ? trace_hardirqs_off_finish+0x57/0x1f0 [ 889.405690][ C1] notify_debug+0x20/0x30 [ 889.405717][ C1] exc_debug+0xcf/0x130 [ 889.405741][ C1] asm_exc_debug+0x1a/0x40 [ 889.405757][ C1] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 889.405776][ C1] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 89 d1 83 f8 [ 889.405790][ C1] RSP: 0018:ffffc900032df458 EFLAGS: 00050206 [ 889.405804][ C1] RAX: ffffffff83e3e301 RBX: 0000000000000058 RCX: 000000000000003e [ 889.405815][ C1] RDX: 0000000000000058 RSI: ffff8880650b8686 RDI: 0000200000000303 [ 889.405827][ C1] RBP: 0000000000000000 R08: ffff8880650b86c3 R09: 1ffff1100ca170d8 [ 889.405837][ C1] R10: dffffc0000000000 R11: ffffed100ca170d9 R12: 00007ffffffff000 [ 889.405848][ C1] R13: 0000200000000341 R14: ffff8880650b866c R15: 00002000000002e9 [ 889.405874][ C1] ? _copy_to_user+0xc1/0x130 [ 889.405906][ C1] [ 889.405911][ C1] [ 889.405916][ C1] _copy_to_user+0xf0/0x130 [ 889.405941][ C1] bpf_verifier_vlog+0x1b5/0x350 [ 889.406006][ C1] verbose+0x1f2/0x2b0 [ 889.406030][ C1] ? verbose+0x1f2/0x2b0 [ 889.406054][ C1] ? bpf_check+0xf270/0xf270 [ 889.406101][ C1] bpf_check+0x8a18/0xf270 [ 889.406152][ C1] ? mark_lock+0x94/0x320 [ 889.406176][ C1] ? __lock_acquire+0x13bc/0x7d10 [ 889.406202][ C1] ? bpf_get_btf_vmlinux+0x10/0x10 [ 889.406253][ C1] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 889.406280][ C1] ? verify_lock_unused+0x140/0x140 [ 889.406301][ C1] ? perf_trace_lock_acquire+0x340/0x3e0 [ 889.406325][ C1] ? perf_trace_lock+0xe4/0x390 [ 889.406355][ C1] ? trace_event_raw_event_lock+0x270/0x270 [ 889.406411][ C1] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 889.406438][ C1] ? lock_chain_count+0x20/0x20 [ 889.406470][ C1] ? seqcount_lockdep_reader_access+0x127/0x1d0 [ 889.406490][ C1] ? lockdep_hardirqs_on+0x94/0x140 [ 889.406509][ C1] ? ktime_get_with_offset+0xff/0x320 [ 889.406526][ C1] ? seqcount_lockdep_reader_access+0x18d/0x1d0 [ 889.406545][ C1] ? ktime_get_real_ts64+0x440/0x440 [ 889.406560][ C1] ? pcpu_alloc+0x1121/0x1770 [ 889.406594][ C1] ? __might_fault+0xb3/0x110 [ 889.406616][ C1] ? memset+0x1e/0x40 [ 889.406639][ C1] ? bpf_obj_name_cpy+0x190/0x1d0 [ 889.406666][ C1] bpf_prog_load+0xfec/0x1510 [ 889.406719][ C1] ? map_freeze+0x350/0x350 [ 889.406739][ C1] ? __might_fault+0xb7/0x110 [ 889.406785][ C1] ? __might_fault+0xb3/0x110 [ 889.406808][ C1] ? bpf_lsm_bpf+0x5/0x10 [ 889.406826][ C1] ? security_bpf+0x7a/0xa0 [ 889.406851][ C1] __sys_bpf+0x532/0x6f0 [ 889.406878][ C1] ? bpf_link_show_fdinfo+0x380/0x380 [ 889.406921][ C1] ? vtime_user_exit+0x2c8/0x3e0 [ 889.406956][ C1] __x64_sys_bpf+0x78/0x90 [ 889.406979][ C1] do_syscall_64+0x4c/0xa0 [ 889.406995][ C1] ? clear_bhb_loop+0x30/0x80 [ 889.407011][ C1] ? clear_bhb_loop+0x30/0x80 [ 889.407032][ C1] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 889.407050][ C1] RIP: 0033:0x7f5b55634819 [ 889.407068][ C1] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 889.407083][ C1] RSP: 002b:00007f5b5388e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 889.407102][ C1] RAX: ffffffffffffffda RBX: 00007f5b558adfa0 RCX: 00007f5b55634819 [ 889.407115][ C1] RDX: 0000000000000080 RSI: 0000200000000440 RDI: 0000000000000005 [ 889.407127][ C1] RBP: 00007f5b556cac91 R08: 0000000000000000 R09: 0000000000000000 [ 889.407138][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 889.407149][ C1] R13: 00007f5b558ae038 R14: 00007f5b558adfa0 R15: 00007ffd58d24908 [ 889.407192][ C1] [ 889.407201][ C1] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 889.407210][ C1] CPU: 1 PID: 21925 Comm: syz.1.5661 Not tainted syzkaller #0 [ 889.407228][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 889.407236][ C1] Call Trace: [ 889.407242][ C1] <#DB> [ 889.407249][ C1] dump_stack_lvl+0x188/0x250 [ 889.407274][ C1] ? show_regs_print_info+0x20/0x20 [ 889.407297][ C1] ? load_image+0x400/0x400 [ 889.407339][ C1] panic+0x2e5/0x810 [ 889.407370][ C1] ? bpf_jit_dump+0xd0/0xd0 [ 889.407414][ C1] ? copy_from_user_nofault+0x160/0x1c0 [ 889.407439][ C1] __warn+0x248/0x2b0 [ 889.407459][ C1] ? copy_from_user_nofault+0x160/0x1c0 [ 889.407485][ C1] report_bug+0x1b7/0x2e0 [ 889.407517][ C1] handle_bug+0x3a/0x70 [ 889.407535][ C1] exc_invalid_op+0x16/0x40 [ 889.407553][ C1] asm_exc_invalid_op+0x16/0x20 [ 889.407569][ C1] RIP: 0010:copy_from_user_nofault+0x160/0x1c0 [ 889.407589][ C1] Code: 24 45 31 f6 31 ff 89 de e8 fd 94 d8 ff 85 db 48 c7 c0 f2 ff ff ff 49 0f 44 c6 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 80 91 d8 ff <0f> 0b e9 1c ff ff ff 44 89 e1 80 e1 07 80 c1 03 38 c1 0f 8c ea fe [ 889.407602][ C1] RSP: 0018:fffffe000005d8e8 EFLAGS: 00010006 [ 889.407617][ C1] RAX: ffffffff81a08f90 RBX: 0000000000000008 RCX: ffff888079611dc0 [ 889.407628][ C1] RDX: 0000000000110000 RSI: 0000000000000000 RDI: 0000000000000000 [ 889.407639][ C1] RBP: 0000000000000000 R08: ffff888079611dc7 R09: 1ffff1100f2c23b8 [ 889.407651][ C1] R10: dffffc0000000000 R11: ffffed100f2c23b9 R12: ffff888079613548 [ 889.407662][ C1] R13: 00007ffffffff000 R14: fffffe000005d958 R15: 0000000020000000 [ 889.407688][ C1] ? copy_from_user_nofault+0x160/0x1c0 [ 889.407735][ C1] ? copy_from_user_nofault+0x160/0x1c0 [ 889.407762][ C1] bpf_probe_read_compat+0xdd/0x170 [ 889.407790][ C1] bpf_prog_ca2ebcd76953ac02_F+0x2c/0x370 [ 889.407812][ C1] bpf_prog_b89d7ca37128ef40+0x1a/0x138 [ 889.407830][ C1] bpf_overflow_handler+0x1c2/0x4a0 [ 889.407862][ C1] ? perf_event_switch_output+0x730/0x730 [ 889.407899][ C1] ? __perf_event_account_interrupt+0x187/0x280 [ 889.407924][ C1] __perf_event_overflow+0x364/0x530 [ 889.407957][ C1] perf_swevent_event+0x4ad/0x530 [ 889.407987][ C1] perf_bp_event+0x276/0x320 [ 889.408010][ C1] ? perf_trace_lock_acquire+0x340/0x3e0 [ 889.408032][ C1] ? perf_event_free_bpf_prog+0x110/0x110 [ 889.408107][ C1] ? rcu_lock_acquire+0x9/0x30 [ 889.408130][ C1] ? read_lock_is_recursive+0x10/0x10 [ 889.408168][ C1] hw_breakpoint_exceptions_notify+0x152/0x470 [ 889.408197][ C1] atomic_notifier_call_chain+0x15d/0x280 [ 889.408228][ C1] notify_die+0x141/0x1a0 [ 889.408254][ C1] ? srcu_init_notifier_head+0x90/0x90 [ 889.408286][ C1] ? exc_debug+0x6e/0x130 [ 889.408307][ C1] ? trace_hardirqs_off_finish+0x57/0x1f0 [ 889.408334][ C1] notify_debug+0x20/0x30 [ 889.408351][ C1] exc_debug+0xcf/0x130 [ 889.408376][ C1] asm_exc_debug+0x1a/0x40 [ 889.408391][ C1] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 889.408418][ C1] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 89 d1 83 f8 [ 889.408431][ C1] RSP: 0018:ffffc900032df458 EFLAGS: 00050206 [ 889.408444][ C1] RAX: ffffffff83e3e301 RBX: 0000000000000058 RCX: 000000000000003e [ 889.408463][ C1] RDX: 0000000000000058 RSI: ffff8880650b8686 RDI: 0000200000000303 [ 889.408474][ C1] RBP: 0000000000000000 R08: ffff8880650b86c3 R09: 1ffff1100ca170d8 [ 889.408485][ C1] R10: dffffc0000000000 R11: ffffed100ca170d9 R12: 00007ffffffff000 [ 889.408496][ C1] R13: 0000200000000341 R14: ffff8880650b866c R15: 00002000000002e9 [ 889.408521][ C1] ? _copy_to_user+0xc1/0x130 [ 889.408550][ C1] [ 889.408555][ C1] [ 889.408559][ C1] _copy_to_user+0xf0/0x130 [ 889.408582][ C1] bpf_verifier_vlog+0x1b5/0x350 [ 889.408611][ C1] verbose+0x1f2/0x2b0 [ 889.408633][ C1] ? verbose+0x1f2/0x2b0 [ 889.408658][ C1] ? bpf_check+0xf270/0xf270 [ 889.408714][ C1] bpf_check+0x8a18/0xf270 [ 889.408772][ C1] ? mark_lock+0x94/0x320 [ 889.408797][ C1] ? __lock_acquire+0x13bc/0x7d10 [ 889.408822][ C1] ? bpf_get_btf_vmlinux+0x10/0x10 [ 889.408872][ C1] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 889.408899][ C1] ? verify_lock_unused+0x140/0x140 [ 889.408919][ C1] ? perf_trace_lock_acquire+0x340/0x3e0 [ 889.408944][ C1] ? perf_trace_lock+0xe4/0x390 [ 889.408974][ C1] ? trace_event_raw_event_lock+0x270/0x270 [ 889.409029][ C1] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 889.409056][ C1] ? lock_chain_count+0x20/0x20 [ 889.409090][ C1] ? seqcount_lockdep_reader_access+0x127/0x1d0 [ 889.409110][ C1] ? lockdep_hardirqs_on+0x94/0x140 [ 889.409130][ C1] ? ktime_get_with_offset+0xff/0x320 [ 889.409147][ C1] ? seqcount_lockdep_reader_access+0x18d/0x1d0 [ 889.409166][ C1] ? ktime_get_real_ts64+0x440/0x440 [ 889.409182][ C1] ? pcpu_alloc+0x1121/0x1770 [ 889.409216][ C1] ? __might_fault+0xb3/0x110 [ 889.409240][ C1] ? memset+0x1e/0x40 [ 889.409262][ C1] ? bpf_obj_name_cpy+0x190/0x1d0 [ 889.409290][ C1] bpf_prog_load+0xfec/0x1510 [ 889.409333][ C1] ? map_freeze+0x350/0x350 [ 889.409354][ C1] ? __might_fault+0xb7/0x110 [ 889.409400][ C1] ? __might_fault+0xb3/0x110 [ 889.409422][ C1] ? bpf_lsm_bpf+0x5/0x10 [ 889.409439][ C1] ? security_bpf+0x7a/0xa0 [ 889.409462][ C1] __sys_bpf+0x532/0x6f0 [ 889.409486][ C1] ? bpf_link_show_fdinfo+0x380/0x380 [ 889.409528][ C1] ? vtime_user_exit+0x2c8/0x3e0 [ 889.409562][ C1] __x64_sys_bpf+0x78/0x90 [ 889.409585][ C1] do_syscall_64+0x4c/0xa0 [ 889.409601][ C1] ? clear_bhb_loop+0x30/0x80 [ 889.409617][ C1] ? clear_bhb_loop+0x30/0x80 [ 889.409639][ C1] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 889.409655][ C1] RIP: 0033:0x7f5b55634819 [ 889.409672][ C1] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 889.409685][ C1] RSP: 002b:00007f5b5388e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 889.409712][ C1] RAX: ffffffffffffffda RBX: 00007f5b558adfa0 RCX: 00007f5b55634819 [ 889.409725][ C1] RDX: 0000000000000080 RSI: 0000200000000440 RDI: 0000000000000005 [ 889.409736][ C1] RBP: 00007f5b556cac91 R08: 0000000000000000 R09: 0000000000000000 [ 889.409747][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 889.409757][ C1] R13: 00007f5b558ae038 R14: 00007f5b558adfa0 R15: 00007ffd58d24908 [ 889.409800][ C1] [ 889.410153][ C1] Kernel Offset: disabled [ 889.410163][ C1] [ 889.410166][ C1] ================================ [ 889.410170][ C1] WARNING: inconsistent lock state [ 889.410174][ C1] syzkaller #0 Not tainted [ 889.410180][ C1] -------------------------------- [ 889.410183][ C1] inconsistent {INITIAL USE} -> {IN-NMI} usage. [ 889.410187][ C1] syz.1.5661/21925 [HC1[1]:SC0[0]:HE0:SE1] takes: [ 889.410198][ C1] ffffffff8c313578 ((console_sem).lock){-.-.}-{2:2}, at: down_trylock+0x1c/0xa0 [ 889.410231][ C1] {INITIAL USE} state was registered at: [ 889.410238][ C1] irq event stamp: 1686 [ 889.410243][ C1] hardirqs last enabled at (1685): [] exc_debug+0xe6/0x130 [ 889.410259][ C1] hardirqs last disabled at (1686): [] exc_debug+0x6e/0x130 [ 889.410270][ C1] softirqs last enabled at (1604): [] sk_common_release+0x174/0x310 [ 889.410284][ C1] softirqs last disabled at (1602): [] sk_common_release+0x118/0x310 [ 889.410295][ C1] [ 889.410295][ C1] other info that might help us debug this: [ 889.410298][ C1] Possible unsafe locking scenario: [ 889.410298][ C1] [ 889.410300][ C1] CPU0 [ 889.410302][ C1] ---- [ 889.410304][ C1] lock((console_sem).lock); [ 889.410310][ C1] [ 889.410312][ C1] lock((console_sem).lock); [ 889.410319][ C1] [ 889.410319][ C1] *** DEADLOCK *** [ 889.410319][ C1] [ 889.410321][ C1] no locks held by syz.1.5661/21925. [ 889.410325][ C1] [ 889.410325][ C1] stack backtrace: [ 889.410328][ C1] CPU: 1 PID: 21925 Comm: syz.1.5661 Not tainted syzkaller #0 [ 889.410338][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 889.410343][ C1] Call Trace: [ 889.410346][ C1] <#DB> [ 889.410351][ C1] dump_stack_lvl+0x188/0x250 [ 889.410364][ C1] ? show_regs_print_info+0x20/0x20 [ 889.410383][ C1] ? print_usage_bug+0x42a/0x690 [ 889.410394][ C1] ? verify_lock_unused+0x18/0x140 [ 889.410409][ C1] lock_acquire+0x2c3/0x400 [ 889.410421][ C1] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 889.410434][ C1] ? down_trylock+0x1c/0xa0 [ 889.410448][ C1] ? read_lock_is_recursive+0x10/0x10 [ 889.410468][ C1] ? perf_trace_lock+0xe4/0x390 [ 889.410482][ C1] _raw_spin_lock_irqsave+0xb0/0x100 [ 889.410492][ C1] ? down_trylock+0x1c/0xa0 [ 889.410502][ C1] ? _raw_spin_lock+0x40/0x40 [ 889.410513][ C1] ? verify_lock_unused+0x18/0x140 [ 889.410532][ C1] down_trylock+0x1c/0xa0 [ 889.410545][ C1] __down_trylock_console_sem+0xd4/0x1f0 [ 889.410558][ C1] ? is_console_locked+0x5/0x10 [ 889.410566][ C1] ? panic+0x37b/0x810 [ 889.410577][ C1] ? console_trylock+0x70/0x70 [ 889.410588][ C1] ? __lock_acquire+0x7d10/0x7d10 [ 889.410600][ C1] ? give_up_console+0x20/0x20 [ 889.410619][ C1] console_unblank+0x28/0x180 [ 889.410631][ C1] panic+0x37b/0x810 [ 889.410648][ C1] ? bpf_jit_dump+0xd0/0xd0 [ 889.410671][ C1] ? copy_from_user_nofault+0x160/0x1c0 [ 889.410684][ C1] __warn+0x248/0x2b0 [ 889.410703][ C1] ? copy_from_user_nofault+0x160/0x1c0 [ 889.410716][ C1] report_bug+0x1b7/0x2e0 [ 889.410733][ C1] handle_bug+0x3a/0x70 [ 889.410743][ C1] exc_invalid_op+0x16/0x40 [ 889.410754][ C1] asm_exc_invalid_op+0x16/0x20 [ 889.410763][ C1] RIP: 0010:copy_from_user_nofault+0x160/0x1c0 [ 889.410774][ C1] Code: 24 45 31 f6 31 ff 89 de e8 fd 94 d8 ff 85 db 48 c7 c0 f2 ff ff ff 49 0f 44 c6 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 80 91 d8 ff <0f> 0b e9 1c ff ff ff 44 89 e1 80 e1 07 80 c1 03 38 c1 0f 8c ea fe [ 889.410782][ C1] RSP: 0018:fffffe000005d8e8 EFLAGS: 00010006 [ 889.410790][ C1] RAX: ffffffff81a08f90 RBX: 0000000000000008 RCX: ffff888079611dc0 [ 889.410796][ C1] RDX: 0000000000110000 RSI: 0000000000000000 RDI: 0000000000000000 [ 889.410802][ C1] RBP: 0000000000000000 R08: ffff888079611dc7 R09: 1ffff1100f2c23b8 [ 889.410809][ C1] R10: dffffc0000000000 R11: ffffed100f2c23b9 R12: ffff888079613548 [ 889.410816][ C1] R13: 00007ffffffff000 R14: fffffe000005d958 R15: 0000000020000000 [ 889.410830][ C1] ? copy_from_user_nofault+0x160/0x1c0 [ 889.410847][ C1] ? copy_from_user_nofault+0x160/0x1c0 [ 889.410861][ C1] bpf_probe_read_compat+0xdd/0x170 [ 889.410877][ C1] bpf_prog_ca2ebcd76953ac02_F+0x2c/0x370 [ 889.410889][ C1] bpf_prog_b89d7ca37128ef40+0x1a/0x138 [ 889.410900][ C1] bpf_overflow_handler+0x1c2/0x4a0 [ 889.410917][ C1] ? perf_event_switch_output+0x730/0x730 [ 889.410936][ C1] ? __perf_event_account_interrupt+0x187/0x280 [ 889.410950][ C1] __perf_event_overflow+0x364/0x530 [ 889.410967][ C1] perf_swevent_event+0x4ad/0x530 [ 889.410984][ C1] perf_bp_event+0x276/0x320 [ 889.410996][ C1] ? perf_trace_lock_acquire+0x340/0x3e0 [ 889.411009][ C1] ? perf_event_free_bpf_prog+0x110/0x110 [ 889.411046][ C1] ? rcu_lock_acquire+0x9/0x30 [ 889.411068][ C1] ? read_lock_is_recursive+0x10/0x10 [ 889.411088][ C1] hw_breakpoint_exceptions_notify+0x152/0x470 [ 889.411104][ C1] atomic_notifier_call_chain+0x15d/0x280 [ 889.411121][ C1] notify_die+0x141/0x1a0 [ 889.411134][ C1] ? srcu_init_notifier_head+0x90/0x90 [ 889.411151][ C1] ? exc_debug+0x6e/0x130 [ 889.411162][ C1] ? trace_hardirqs_off_finish+0x57/0x1f0 [ 889.411176][ C1] notify_debug+0x20/0x30 [ 889.411187][ C1] exc_debug+0xcf/0x130 [ 889.411200][ C1] asm_exc_debug+0x1a/0x40 [ 889.411209][ C1] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 889.411226][ C1] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 89 d1 83 f8 [ 889.411234][ C1] RSP: 0018:ffffc900032df458 EFLAGS: 00050206 [ 889.411248][ C1] RAX: ffffffff83e3e301 RBX: 0000000000000058 RCX: 000000000000003e [ 889.411254][ C1] RDX: 0000000000000058 RSI: ffff8880650b8686 RDI: 0000200000000303 [ 889.411265][ C1] RBP: 0000000000000000 R08: ffff8880650b86c3 R09: 1ffff1100ca170d8 [ 889.411272][ C1] R10: dffffc0000000000 R11: ffffed100ca170d9 R12: 00007ffffffff000 [ 889.411279][ C1] R13: 0000200000000341 R14: ffff8880650b866c R15: 00002000000002e9 [ 889.411300][ C1] ? _copy_to_user+0xc1/0x130 [ 889.411320][ C1] [ 889.411323][ C1] [ 889.411326][ C1] _copy_to_user+0xf0/0x130 [ 889.411340][ C1] bpf_verifier_vlog+0x1b5/0x350 [ 889.411356][ C1] verbose+0x1f2/0x2b0 [ 889.411368][ C1] ? verbose+0x1f2/0x2b0 [ 889.411382][ C1] ? bpf_check+0xf270/0xf270 [ 889.411406][ C1] bpf_check+0x8a18/0xf270 [ 889.411436][ C1] ? mark_lock+0x94/0x320 [ 889.411452][ C1] ? __lock_acquire+0x13bc/0x7d10 [ 889.411466][ C1] ? bpf_get_btf_vmlinux+0x10/0x10 [ 889.411492][ C1] ? perf_trace_run_bpf_submit+0xf3/0x1c0 [ 889.411507][ C1] ? verify_lock_unused+0x140/0x140 [ 889.411518][ C1] ? perf_trace_lock_acquire+0x340/0x3e0 [ 889.411532][ C1] ? perf_trace_lock+0xe4/0x390 [ 889.411548][ C1] ? trace_event_raw_event_lock+0x270/0x270 [ 889.411577][ C1] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 889.411592][ C1] ? lock_chain_count+0x20/0x20 [ 889.411610][ C1] ? seqcount_lockdep_reader_access+0x127/0x1d0 [ 889.411621][ C1] ? lockdep_hardirqs_on+0x94/0x140 [ 889.411632][ C1] ? ktime_get_with_offset+0xff/0x320 [ 889.411642][ C1] ? seqcount_lockdep_reader_access+0x18d/0x1d0 [ 889.411652][ C1] ? ktime_get_real_ts64+0x440/0x440 [ 889.411661][ C1] ? pcpu_alloc+0x1121/0x1770 [ 889.411679][ C1] ? __might_fault+0xb3/0x110 [ 889.411692][ C1] ? memset+0x1e/0x40 [ 889.411710][ C1] ? bpf_obj_name_cpy+0x190/0x1d0 [ 889.411725][ C1] bpf_prog_load+0xfec/0x1510 [ 889.411747][ C1] ? map_freeze+0x350/0x350 [ 889.411758][ C1] ? __might_fault+0xb7/0x110 [ 889.411782][ C1] ? __might_fault+0xb3/0x110 [ 889.411794][ C1] ? bpf_lsm_bpf+0x5/0x10 [ 889.411804][ C1] ? security_bpf+0x7a/0xa0 [ 889.411817][ C1] __sys_bpf+0x532/0x6f0 [ 889.411830][ C1] ? bpf_link_show_fdinfo+0x380/0x380 [ 889.411852][ C1] ? vtime_user_exit+0x2c8/0x3e0 [ 889.411870][ C1] __x64_sys_bpf+0x78/0x90 [ 889.411882][ C1] do_syscall_64+0x4c/0xa0 [ 889.411892][ C1] ? clear_bhb_loop+0x30/0x80 [ 889.411900][ C1] ? clear_bhb_loop+0x30/0x80 [ 889.411912][ C1] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 889.411922][ C1] RIP: 0033:0x7f5b55634819 [ 889.411931][ C1] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 889.411938][ C1] RSP: 002b:00007f5b5388e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 889.411948][ C1] RAX: ffffffffffffffda RBX: 00007f5b558adfa0 RCX: 00007f5b55634819 [ 889.411955][ C1] RDX: 0000000000000080 RSI: 0000200000000440 RDI: 0000000000000005 [ 889.411961][ C1] RBP: 00007f5b556cac91 R08: 0000000000000000 R09: 0000000000000000 [ 889.411967][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 889.411973][ C1] R13: 00007f5b558ae038 R14: 00007f5b558adfa0 R15: 00007ffd58d24908 [ 889.411994][ C1]