last executing test programs: 6.556541775s ago: executing program 2 (id=2407): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x40009, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0xffffffffffffffff, 0x3fff8000}, 0x0, 0xff, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext={0x0, 0x1000000}, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x3, 0x13, &(0x7f00000001c0)=ANY=[@ANYBLOB="18020000057700000000000000000000182ec0002020702500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb70200000800c309b703000024000000850000000600000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007b00000095000000"], 0x0, 0x5, 0x0, 0x0, 0x41000, 0xc}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000540)={0x7, 0x80, 0xb, 0xc0, 0x7, 0x6, 0x0, 0x5, 0x100, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8, 0x1}, 0x8, 0x5, 0x6, 0x9, 0x7, 0x35b, 0x7, 0x0, 0x2, 0x0, 0x8}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) ioctl$SIOCSIFHWADDR(r2, 0x8b06, &(0x7f0000000080)={'wlan1\x00', @random="02000000000a"}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x6, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000080)="5c00000013006bcc9e3be35c6e17aa31076b876c1d0000007ea60864160af36514000cc0040002020800010004000600eab556a70500006182940d0151f60a84c9f4d4938037e786a6d0001000000e4509c5bbcd72c6c92800000000", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x300) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000780)="d80000001a0081044e81f782db4cb904021d0800fe007c05e8fe55a115001c000200142603600e12080005007a010401a800160020001d400d000000035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000dc0)={0x0, 0x80, 0x0, 0x5, 0x8, 0x6, 0x0, 0xd, 0x20002, 0xf, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfb, 0x1, @perf_config_ext={0x5, 0x8}, 0x2a0f, 0xc046, 0x3e, 0xa, 0x0, 0x7, 0x8, 0x0, 0x8, 0x0, 0x4}, r5, 0xc, r3, 0x0) socket$kcm(0xa, 0x2, 0x3a) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f00000000c0)={r4, r1}) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8b06, &(0x7f0000000140)={'wlan1\x00', @random="0100000000eb"}) recvmsg$unix(r4, &(0x7f00000005c0)={&(0x7f00000006c0), 0x6e, &(0x7f0000000e40)=[{&(0x7f0000000f00)=""/121, 0x79}, {&(0x7f0000000900)=""/148, 0x94}, {&(0x7f00000009c0)=""/93, 0x5d}, {&(0x7f0000000cc0)=""/216, 0xd8}, {0x0}], 0x5, &(0x7f0000000f80)}, 0x3) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x16, 0x3, &(0x7f0000000ec0)=ANY=[@ANYBLOB="720ac4ffe3d5332d6910160f848e00000000009500"], &(0x7f0000000480)='GPL\x00'}, 0x94) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440), 0x10000, 0x0) ioctl$TUNGETFEATURES(r8, 0x800454cf, &(0x7f0000000500)) close(0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000100)={&(0x7f0000000180)="8621457b1771c16215fa9f61f75cf2b7f246ca4726d77339de5f19bddf0e5e56d67a9c943710e1856ef4ad79e01a9e315c18d7cfe9f2b7527bb11ccb33e891fa895730a87e5468f436edbb5d4eba1e745b31397bed3c53a4c68eaf5697a2c64ed886ef9b468a17df0d2b8c040881d9bedade4bdde343850d24292a7c60802c73cf50c1ae0025bd41c61d4c0b3102ef54a5f3794886c958e725ec90ce3eca7054853eec33b7402219c45ff36057cf8b61e733ff4aeeac7cd30de0c2ecc2acd297be4c9ef5be139211942840f35ce90696aee14a5897b38c31f11599d9130fda79a950312b9a3c827897be60496a100454", &(0x7f0000000280)=""/154, &(0x7f0000000040)="5c40ff6c90ecb6021e46e04c1f7aae2f2d8e506a417ab09fbb2b537853cfa3e9c5d04be090aed655ef6821faf3ca9dadea8cafd1a902", &(0x7f0000000340)="784be7fc6158bb0b3359fdfa2a5268088c9a001d031aeebbe7ea32e7d7471d6a12035e3e287920198e1e8b7f4b9ea835cd3507f75eeb3d14aaf87b67cd380c6aca71308453aa304c285216186aa407310c25a9cdc6f262efe072fe58b303a96c51616cffa3f1235c60d84dd19034455c78646b6318116eef81d035553dc7f149e23c84b72fc2cd5363fbe9411d5f4c8ac8a75c352e0e4a24a1c50f95d3d2e6eb9c4d4afff03860fe1455a9fc8b2ddcdc38cbee31137a544b36fa3690d6449ea78c1a3702c99a11ccbb998d210cb81c5c11", 0x8a8, 0xffffffffffffffff, 0x4}, 0x38) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x26e1, 0x0) 6.365208334s ago: executing program 3 (id=2408): r0 = socket$kcm(0x2, 0x5, 0x84) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0x6, 0x10, &(0x7f00000008c0)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b704000000000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000)=r4, 0x10) sendmsg$inet(r0, 0x0, 0x80d1) close(0x3) 6.210865212s ago: executing program 1 (id=2409): r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d2f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_type(r1, &(0x7f0000000100), 0x2, 0x0) r2 = openat$cgroup(r1, &(0x7f00000001c0)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x80, 0x9, 0x3, 0x5, 0x4, 0x0, 0x8000000000000000, 0x50ad2, 0xa, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x108653, 0x9, 0x6, 0x1, 0x1000, 0xc, 0x800, 0x0, 0x7, 0x0, 0x1}, r2, 0x10, r0, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="09000000040000000c0000000b"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r5}, 0xc) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000480), 0x2, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000e8"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000042100b702000000000000008af8ff00000000bfa200020000000007020000f8fffffff703000008000800b70400000000000085000000030000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r7, r6}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x58, &(0x7f0000000500)}, 0x10) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000080)=r7, 0x4) r8 = openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000c40), 0x12) 6.198226593s ago: executing program 3 (id=2410): r0 = socket$kcm(0x2a, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x1, 0x3}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="85feff0fc9"], 0x0}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYRES8], 0x12) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x64b2074d57f2d605, 0x400000, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) syz_clone(0x80090000, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r4, 0x0, 0xe900) sendmsg(r4, 0x0, 0x40e4804) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4000004) socketpair(0x1, 0x1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r3, 0xb) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r5 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r5, &(0x7f00000003c0)={&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0xe0ff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000100)="b7", 0x1}], 0x1}, 0x40080c0) sendmsg$kcm(r0, 0x0, 0x0) 5.461716949s ago: executing program 3 (id=2412): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x16, 0x2, 0x0, 0x0, 0x6, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801, 0x0, @perf_bp={0x0, 0x6}, 0x100000, 0xca, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000001}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x7fff}, 0x1000, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/uts\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x0, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x8c}, 0x140) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x6c0141, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[@ANYRES8=r1, @ANYRES8=r5], 0x12) 5.347254325s ago: executing program 1 (id=2413): socket$kcm(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0xa, 0x2, 0x0) socket$kcm(0x21, 0x2, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000004000)=ANY=[@ANYBLOB="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"], &(0x7f00000003c0)='syzkaller\x00'}, 0x51) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200002, 0x0) socket$kcm(0x2, 0x1, 0x84) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}], 0xa8}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x52a, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0xc}, 0x100084, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r2, 0x81000000, 0x12, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee6888808", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 5.292019248s ago: executing program 0 (id=2414): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={&(0x7f0000000100), 0xb}, 0x0, 0x35, 0x43a1bd75, 0x7, 0x9, 0x80000006, 0x2, 0x0, 0x0, 0x0, 0x4002009}, 0x0, 0x7, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0x80218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xa}, 0x2005, 0x0, 0x51, 0x3, 0x0, 0x4, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1007f}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x23, &(0x7f0000000000), 0x4) write$cgroup_devices(r1, &(0x7f0000000200)=ANY=[], 0x9) recvmsg$unix(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x15}, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffffffffffffffff, 0x7}, 0x104101, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000000)="d8000000580081044e81f782db44b904021d080009000200e8fe55a1180015000600142603600e120900210000000401a80016000a00014006000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7ce", 0x6c}, {&(0x7f0000000540)="47e2ef3330b4efa56e2aed9961d244728046f7e077f2e17fe99eb02cc704ca74e513a8046b12c800061e2d1a3b750e5d29002c99980f4a0ccd7a793f2f41bf6f028eb2ad8ba2068150ea4164d3cc2563ae7aaa346f975c0bbc6150f0b4ad75d246ac5fecbd465371b5cf8316", 0x6c}], 0x2}, 0x84884) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b26, &(0x7f0000000000)={'wlan1\x00', @random="0202000400"}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6349363006"], 0xfdef) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff7ffa}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[], 0x48) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xfffffffffffffff8, 0x3}, 0x0, 0x0, 0x2, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0xffffffffffffffff}, 0x124a08, 0x0, 0x0, 0x0, 0x6, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x400200000000003e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001100)={0x5, 0x80, 0x9, 0x8, 0xb, 0xfb, 0x0, 0x3c, 0xc002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x18842, 0x1, 0x7fffffff, 0x7, 0x9, 0x3, 0x7, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={0x0, 0x8}, 0x4010, 0x0, 0x0, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x1000b0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={0x0, 0x1}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 4.860158859s ago: executing program 3 (id=2415): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={&(0x7f0000000100), 0xb}, 0x0, 0x35, 0x43a1bd75, 0x7, 0x9, 0x80000006, 0x2, 0x0, 0x0, 0x0, 0x4002009}, 0x0, 0x7, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0x80218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xa}, 0x2005, 0x0, 0x51, 0x3, 0x0, 0x4, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1007f}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x23, &(0x7f0000000000), 0x4) write$cgroup_devices(r1, &(0x7f0000000200)=ANY=[], 0x9) recvmsg$unix(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x15}, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffffffffffffffff, 0x7}, 0x104101, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000000)="d8000000580081044e81f782db44b904021d080009000200e8fe55a1180015000600142603600e120900210000000401a80016000a00014006000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7ce", 0x6c}, {&(0x7f0000000540)="47e2ef3330b4efa56e2aed9961d244728046f7e077f2e17fe99eb02cc704ca74e513a8046b12c800061e2d1a3b750e5d29002c99980f4a0ccd7a793f2f41bf6f028eb2ad8ba2068150ea4164d3cc2563ae7aaa346f975c0bbc6150f0b4ad75d246ac5fecbd465371b5cf8316", 0x6c}], 0x2}, 0x84884) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b26, &(0x7f0000000000)={'wlan1\x00', @random="0202000400"}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6349363006"], 0xfdef) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff7ffa}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[], 0x48) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xfffffffffffffff8, 0x3}, 0x0, 0x0, 0x2, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0xffffffffffffffff}, 0x124a08, 0x0, 0x0, 0x0, 0x6, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x400200000000003e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001100)={0x5, 0x80, 0x9, 0x8, 0xb, 0xfb, 0x0, 0x3c, 0xc002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x18842, 0x1, 0x7fffffff, 0x7, 0x9, 0x3, 0x7, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={0x0, 0x8}, 0x4010, 0x0, 0x0, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x1000b0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={0x0, 0x1}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 4.529194546s ago: executing program 0 (id=2416): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f0000003a80)={&(0x7f00000004c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000003a00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1}}}], 0x20}, 0x4008804) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f00000002c0)=@l2tp={0x2, 0x0, @remote, 0xfffffffe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000002b40)="da752f575198baaac222d34e85893d37a6bd281687872ed9151c56f415698f3fecf56eebf5edb42ed5d54e0419b2a13128d3ad19b6eed6b450aad46baaa57203e0d4f567d8d79fe07e7b3142de43e55cf69c65db2469175cf60c82f49d0f9dc4c4dde733a14d57f4117ed2f46aea5950ff0176d73349c2808eee62ce1c7d846ffdf65211f3192dabe5b3ac1516ad90e618d0ca9e4ac2778acabeac244f2f90af2616647e5cf8ab5e2ac404ebf2a866c8a73f68ae2cc4523e63e3a1aa5ab60a23e4c47534bda546042120c5333d91fefc68226bc9149d282937797a2fe036a58c9ecd19e54bcfb85d3f75ec7c74d86be94ef6b9191e0fa86d2a9330af3f592e24bc30b84632e5121bf04abc0e12f4073f6678ad97b786cc73b8175e35eda542e3631d283a3ca6fef91607ec7dee1b4a62bae169cc8fb64e8bdef95474f0b3c526f69ce55281e18016a4785875ba99e313fd63f66cfd36234bcc6048f25bce8cce39cf709eb10e1ea88497ff7401aae0d4a7e07f14691b6c4b75dc16e2586744317ffbb9966d8bfb16efcdf6ab308426e5c1aec6a6636122ffaca89af3b03834612b93989d0bbb251a42c1b48b86ac7162ad8d5cbf3d6cfccdc590724ff6caa85320f9d5beea2370b8c0533c19422c9097a7164651ad9d8f9cca4ea7", 0x1db}], 0x1}, 0x8400) sendmsg$inet(r0, &(0x7f0000000500)={&(0x7f0000000080)={0x2, 0x0, @local}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000100)="fb", 0x1}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000c40)=""/4096, 0x1000}], 0x1}, 0x0) 4.199557762s ago: executing program 0 (id=2417): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b000000000000"], 0x50) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f020033000b35d25a806c8c6f94f90f24", 0x12}], 0x1}, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={&(0x7f0000000100)=@in={0x2, 0x4e21, @remote}, 0x80, &(0x7f0000000000)=[{&(0x7f00000006c0)='@', 0x1}], 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="180099816b5d00008400000852000000d55160dd57720000"], 0x18}, 0x41) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2500000000002020207b1af80700000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b0000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r1, 0x58, &(0x7f00000005c0)}, 0x10) r4 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8003}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x8, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r5, 0x0, 0x0}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r6, &(0x7f0000000280), 0x0, 0x2}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x0, 0x7, 0x0, &(0x7f0000000900)="928e04b416cac9", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000400000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r7, 0x3, 0x25, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100000, 0x4, 0x2, 0x0, 0x80, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x7, 0x3, &(0x7f0000000500)=ANY=[], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r8, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) close(0x3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_lsm={0x6, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x80010, 0x0, 0x0, 0x0, 0x21}, 0x94) 3.299082377s ago: executing program 2 (id=2418): bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xfa, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x2e04, 0x7, 0x43a1bd76, 0x7, 0x9, 0x5, 0x2, 0x0, 0x0, 0x0, 0x2008}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = socket$kcm(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) sendmsg$inet(r4, &(0x7f0000003780)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="0212000902000000e4a17c45c8568660", 0x10}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$kcm(0xa, 0x922000000003, 0x11) r7 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000140081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8011, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x40}, 0x50) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000200)="30fdd0dab85f337092bbdcf3e050cd9173c2d1a68cd3e40676873c4002f898b3ce78e5093881c922c49e4e2830514d061e5fbfa616fbd87cdc6f00829ca85af9cc0178fee3584b6d375102f95502327ca9b483adfc57567ebebd2b60e89c3a01e4cd542b6adacfe7c68602f070f204fe854297321dd961d72b7436d6b64925fcecd62a75b6c36158f3d22e860142b0af1082a66b9645c4b06ee973f49b7cb3261f4d303986846d29d6e4ad87e503dc2136", 0x0}, 0x20) 2.155383763s ago: executing program 1 (id=2419): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509c5bb", 0x50}, {&(0x7f0000002340)="c6d1d1ea7c6987e81baef8", 0xb}], 0x2, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000003340)=""/4103, 0x1007}, {&(0x7f0000000240)=""/166, 0xa6}, {&(0x7f0000000740)=""/126, 0x1e}], 0x3}, 0x0) 2.082953067s ago: executing program 3 (id=2420): r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x5, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="563f00001a00599c6d0e000091d028ef80"], 0xfe33) socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22101, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x1, @perf_bp={0x0}, 0x800, 0x0, 0x0, 0x1, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000062c0)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f00000012c0)="f6", 0x1}], 0x1}, 0x4004045) close(r2) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1e, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000c40)=[{0x0, 0x0, 0x0, 0xa}, {0x1, 0x0, 0x2}, {0x0, 0x80004, 0x10100, 0x3}], 0x10, 0x1}, 0x94) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x92c0199, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003e000b05d25a806c8c6f94f90224fc60100005000a000200053582c137153e37000c0980fc0b10000300", 0x33fe0}], 0x1}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x41100, 0x24, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xf475, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x81}, 0x94) socket$kcm(0x11, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x1}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0xa) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd637f4b22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa35f086dd"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200"], 0xcfa4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x8, 0x7, 0x9, 0x0, 0x4, 0xcd00, 0x6, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x6, 0x9}, 0x8100, 0x7, 0x100, 0x1, 0xf, 0xfffffffd, 0x3, 0x0, 0x5, 0x0, 0x7}, 0x0, 0x9, r0, 0x8) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x40, 0x0, 0x6, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, r5, 0x0) socket$kcm(0xa, 0x2, 0x73) openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) 2.01878199s ago: executing program 2 (id=2421): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x10, 0x3, 0x10) r0 = socket$kcm(0xa, 0x2, 0x3a) sendmsg$kcm(r0, &(0x7f0000000440)={&(0x7f0000000100)=@in6={0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000780)="a08d5b020eaa4da2", 0x8}], 0x1, 0x0, 0x0, 0x900}, 0x0) 2.01791422s ago: executing program 0 (id=2422): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.stat\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000010003000000000000000000711220000000d0b6c2e03e"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x24}, 0x94) (async) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) (async) ioctl$SIOCSIFHWADDR(r0, 0x8b0b, &(0x7f0000000000)={'wlan1\x00', @random='\x00\x00 \x00'}) (async) r2 = getpid() r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xa}, 0x104109, 0x0, 0x0, 0x9, 0x1, 0x0, 0x1}, r2, 0x1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) close(0x3) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x40009, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0xff, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x4000, &(0x7f00000025c0), 0x0, 0x0, 0x0, 0x0) (async) r4 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r4, 0x29, 0x3a, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="0b0000000501000000", @ANYRESHEX=r1, @ANYRES8, @ANYRES64, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000004b492305ad4cf4a150cc345a3d6dfe5c4b36046891aafd1c0d0a099c27b7bb04173848373021240ee4935c4c56da001570f3b310f1a8c2f8e424d507c47f089635c143aaf440e9c749d56534d92b5494844ae295ce86e2"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x14, &(0x7f0000000700)=ANY=[@ANYRES8=r1, @ANYRES32=r4, @ANYBLOB="7539f242117e90574d75ae800a3130c9b050c7c406262fc7b8a1aaf76a7353926dba3c90dfb2b3bb54929a2182c753f6fc00ae67f85e482cff3a19ae61dd5d1c7de153c403cd90186f1bacfaec7f5592d1ef4b3819f372b5c911074ad7a71bb513c29b077b31579b9b691798b3d04c8fff7285e8f197c76da74f74fdf8930e2aa6f1f151db06e8147c5dc7f4b7f3271407f0a33fa9c3ad17f0e8fb4e0afbd6a27383efbb0cbcd0a2d2e9f977c2f3d8fcde0376a93928b3270894aadc3b", @ANYRESOCT=r2, @ANYRES64=0x0, @ANYRESDEC=r5], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x50, '\x00', 0x0, @fallback=0x1b, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000000c0)={r6}, 0xc) (async, rerun: 64) r7 = perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0xed, 0x0, 0x0, 0x81, 0x0, 0xd, 0xa111, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x820e2, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1d1301bfdfc5d711) (rerun: 64) r8 = socket$kcm(0x10, 0x2, 0x10) (async) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, &(0x7f0000000100)=0x9) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020023000b02d25a806f8c6394f91424fc60040f030047000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f00000009c0)="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", 0x0}, 0x20) (async) r9 = socket$kcm(0x23, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000000140)={&(0x7f0000000680)=@phonet, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)="b8", 0x1}], 0x1}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0xd5, 0x0, &(0x7f00000004c0)="b9180bb76003070c009e40f086dd1fff310000003c0020010010ac14142ee0080001c699da153f0ae0e6e380f60115f683317585d7472ce0ab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703c", 0x0, 0x31, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) write$cgroup_subtree(r0, &(0x7f0000000300)=ANY=[@ANYRESDEC=r7], 0xfdef) (async, rerun: 64) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) (rerun: 64) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) (async) write$cgroup_subtree(r10, &(0x7f0000000200)=ANY=[@ANYRESHEX, @ANYRES8, @ANYRESDEC=r10, @ANYRES64=r6], 0x36) 1.908004445s ago: executing program 2 (id=2423): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x16, 0x2, 0x0, 0x0, 0x6, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801, 0x0, @perf_bp={0x0, 0x6}, 0x100000, 0xca, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000001}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x7fff}, 0x1000, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/uts\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x0, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x8c}, 0x140) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x6c0141, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[@ANYRES8=r1, @ANYRES8=r5], 0x12) 1.127174424s ago: executing program 1 (id=2424): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={&(0x7f0000000100), 0xb}, 0x0, 0x35, 0x43a1bd75, 0x7, 0x9, 0x80000006, 0x2, 0x0, 0x0, 0x0, 0x4002009}, 0x0, 0x7, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0x80218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xa}, 0x2005, 0x0, 0x51, 0x3, 0x0, 0x4, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1007f}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x23, &(0x7f0000000000), 0x4) write$cgroup_devices(r1, &(0x7f0000000200)=ANY=[], 0x9) recvmsg$unix(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x15}, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffffffffffffffff, 0x7}, 0x104101, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000000)="d8000000580081044e81f782db44b904021d080009000200e8fe55a1180015000600142603600e120900210000000401a80016000a00014006000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7ce", 0x6c}, {&(0x7f0000000540)="47e2ef3330b4efa56e2aed9961d244728046f7e077f2e17fe99eb02cc704ca74e513a8046b12c800061e2d1a3b750e5d29002c99980f4a0ccd7a793f2f41bf6f028eb2ad8ba2068150ea4164d3cc2563ae7aaa346f975c0bbc6150f0b4ad75d246ac5fecbd465371b5cf8316", 0x6c}], 0x2}, 0x84884) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b26, &(0x7f0000000000)={'wlan1\x00', @random="0202000400"}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6349363006"], 0xfdef) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff7ffa}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[], 0x48) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xfffffffffffffff8, 0x3}, 0x0, 0x0, 0x2, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0xffffffffffffffff}, 0x124a08, 0x0, 0x0, 0x0, 0x6, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x400200000000003e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001100)={0x5, 0x80, 0x9, 0x8, 0xb, 0xfb, 0x0, 0x3c, 0xc002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x18842, 0x1, 0x7fffffff, 0x7, 0x9, 0x3, 0x7, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={0x0, 0x8}, 0x4010, 0x0, 0x0, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x1000b0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={0x0, 0x1}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 768.816382ms ago: executing program 0 (id=2425): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f0000003a80)={&(0x7f00000004c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000003a00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1}}}], 0x20}, 0x4008804) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f00000002c0)=@l2tp={0x2, 0x0, @remote, 0xfffffffe}, 0x80, &(0x7f0000000180)=[{0x0}, {&(0x7f0000002b40)="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", 0x1db}], 0x2}, 0x8400) sendmsg$inet(r0, &(0x7f0000000500)={&(0x7f0000000080)={0x2, 0x0, @local}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000100)="fb", 0x1}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000c40)=""/4096, 0x1000}], 0x1}, 0x0) 700.688735ms ago: executing program 3 (id=2426): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x40009, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0xffffffffffffffff, 0x3fff8000}, 0x0, 0xff, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext={0x0, 0x1000000}, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x3, 0x13, &(0x7f00000001c0)=ANY=[@ANYBLOB="18020000057700000000000000000000182ec0002020702500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb70200000800c309b703000024000000850000000600000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007b00000095000000"], 0x0, 0x5, 0x0, 0x0, 0x41000, 0xc}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000540)={0x7, 0x80, 0xb, 0xc0, 0x7, 0x6, 0x0, 0x5, 0x100, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8, 0x1}, 0x8, 0x5, 0x6, 0x9, 0x7, 0x35b, 0x7, 0x0, 0x2, 0x0, 0x8}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) ioctl$SIOCSIFHWADDR(r2, 0x8b06, &(0x7f0000000080)={'wlan1\x00', @random="02000000000a"}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x6, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000080)="5c00000013006bcc9e3be35c6e17aa31076b876c1d0000007ea60864160af36514000cc0040002020800010004000600eab556a70500006182940d0151f60a84c9f4d4938037e786a6d0001000000e4509c5bbcd72c6c92800000000", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x300) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000780)="d80000001a0081044e81f782db4cb904021d0800fe007c05e8fe55a115001c000200142603600e12080005007a010401a800160020001d400d000000035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000dc0)={0x0, 0x80, 0x0, 0x5, 0x8, 0x6, 0x0, 0xd, 0x20002, 0xf, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfb, 0x1, @perf_config_ext={0x5, 0x8}, 0x2a0f, 0xc046, 0x3e, 0xa, 0x0, 0x7, 0x8, 0x0, 0x8, 0x0, 0x4}, r5, 0xc, r3, 0x0) socket$kcm(0xa, 0x2, 0x3a) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f00000000c0)={r4, r1}) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8b06, &(0x7f0000000140)={'wlan1\x00', @random="0100000000eb"}) recvmsg$unix(r4, &(0x7f00000005c0)={&(0x7f00000006c0), 0x6e, &(0x7f0000000e40)=[{&(0x7f0000000f00)=""/121, 0x79}, {&(0x7f0000000900)=""/148, 0x94}, {&(0x7f00000009c0)=""/93, 0x5d}, {&(0x7f0000000cc0)=""/216, 0xd8}, {0x0}], 0x5, &(0x7f0000000f80)}, 0x3) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x16, 0x3, &(0x7f0000000ec0)=ANY=[@ANYBLOB="720ac4ffe3d5332d6910160f848e00000000009500"], &(0x7f0000000480)='GPL\x00'}, 0x94) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440), 0x10000, 0x0) ioctl$TUNGETFEATURES(r8, 0x800454cf, &(0x7f0000000500)) close(0x3) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000100)={&(0x7f0000000180)="8621457b1771c16215fa9f61f75cf2b7f246ca4726d77339de5f19bddf0e5e56d67a9c943710e1856ef4ad79e01a9e315c18d7cfe9f2b7527bb11ccb33e891fa895730a87e5468f436edbb5d4eba1e745b31397bed3c53a4c68eaf5697a2c64ed886ef9b468a17df0d2b8c040881d9bedade4bdde343850d24292a7c60802c73cf50c1ae0025bd41c61d4c0b3102ef54a5f3794886c958e725ec90ce3eca7054853eec33b7402219c45ff36057cf8b61e733ff4aeeac7cd30de0c2ecc2acd297be4c9ef5be139211942840f35ce90696aee14a5897b38c31f11599d9130fda79a950312b9a3c827897be60496a100454", &(0x7f0000000280)=""/154, &(0x7f0000000040)="5c40ff6c90ecb6021e46e04c1f7aae2f2d8e506a417ab09fbb2b537853cfa3e9c5d04be090aed655ef6821faf3ca9dadea8cafd1a902", &(0x7f0000000340)="784be7fc6158bb0b3359fdfa2a5268088c9a001d031aeebbe7ea32e7d7471d6a12035e3e287920198e1e8b7f4b9ea835cd3507f75eeb3d14aaf87b67cd380c6aca71308453aa304c285216186aa407310c25a9cdc6f262efe072fe58b303a96c51616cffa3f1235c60d84dd19034455c78646b6318116eef81d035553dc7f149e23c84b72fc2cd5363fbe9411d5f4c8ac8a75c352e0e4a24a1c50f95d3d2e6eb9c4d4afff03860fe1455a9fc8b2ddcdc38cbee31137a544b36fa3690d6449ea78c1a3702c99a11ccbb998d210cb81c5c11", 0x8a8, 0xffffffffffffffff, 0x4}, 0x38) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x26e1, 0x0) 662.979537ms ago: executing program 2 (id=2434): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x16, 0x2, 0x0, 0x0, 0x6, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801, 0x0, @perf_bp={0x0, 0x6}, 0x100000, 0xca, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000001}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x6, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x7fff}, 0x1000, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/uts\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x0, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x8c}, 0x140) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x6c0141, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[@ANYRES8=r1, @ANYRES8=r5], 0x12) 561.451892ms ago: executing program 0 (id=2427): socket$kcm(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0xa, 0x2, 0x0) socket$kcm(0x21, 0x2, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000004000)=ANY=[@ANYBLOB="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"], &(0x7f00000003c0)='syzkaller\x00'}, 0x51) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200002, 0x0) socket$kcm(0x2, 0x1, 0x84) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}], 0xa8}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x52a, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0xc}, 0x100084, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r2, 0x81000000, 0x12, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee6888808", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 495.727595ms ago: executing program 1 (id=2428): r0 = socket$kcm(0x10, 0x3, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{}, {0x1}], 0x10, 0x3}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000000)=r5, 0x8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000001c0)={0x4, 0x80, 0x3, 0x4b, 0x5, 0xe1, 0x0, 0x7619, 0x10408, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff5fc1, 0x4, @perf_config_ext={0x0, 0x7427f5b4}, 0x100890, 0x9, 0x55, 0x1, 0x101, 0x3, 0xb, 0x0, 0xa, 0x0, 0x101}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r7, 0x29, 0x10, 0x0, 0x1300) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r6) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030033000b35d25a806c8c6f94f91824fc60100005000a000200053582c137153e37000c0680050003000300", 0x33fe0}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) 310.742354ms ago: executing program 2 (id=2429): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={&(0x7f0000000100), 0xb}, 0x0, 0x35, 0x43a1bd75, 0x7, 0x9, 0x80000006, 0x2, 0x0, 0x0, 0x0, 0x4002009}, 0x0, 0x7, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0x80218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xa}, 0x2005, 0x0, 0x51, 0x3, 0x0, 0x4, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1007f}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x23, &(0x7f0000000000), 0x4) write$cgroup_devices(r1, &(0x7f0000000200)=ANY=[], 0x9) recvmsg$unix(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x15}, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffffffffffffffff, 0x7}, 0x104101, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000000)="d8000000580081044e81f782db44b904021d080009000200e8fe55a1180015000600142603600e120900210000000401a80016000a00014006000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7ce", 0x6c}, {&(0x7f0000000540)="47e2ef3330b4efa56e2aed9961d244728046f7e077f2e17fe99eb02cc704ca74e513a8046b12c800061e2d1a3b750e5d29002c99980f4a0ccd7a793f2f41bf6f028eb2ad8ba2068150ea4164d3cc2563ae7aaa346f975c0bbc6150f0b4ad75d246ac5fecbd465371b5cf8316", 0x6c}], 0x2}, 0x84884) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b26, &(0x7f0000000000)={'wlan1\x00', @random="0202000400"}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6349363006"], 0xfdef) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff7ffa}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[], 0x48) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xfffffffffffffff8, 0x3}, 0x0, 0x0, 0x2, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0xffffffffffffffff}, 0x124a08, 0x0, 0x0, 0x0, 0x6, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x400200000000003e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001100)={0x5, 0x80, 0x9, 0x8, 0xb, 0xfb, 0x0, 0x3c, 0xc002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x18842, 0x1, 0x7fffffff, 0x7, 0x9, 0x3, 0x7, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={0x0, 0x8}, 0x4010, 0x0, 0x0, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x1000b0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={0x0, 0x1}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 0s ago: executing program 1 (id=2430): r0 = socket$kcm(0x10, 0x3, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0xffffffff, 0x0, 0xb, 0x3}, {0x10000002, 0x20, 0x400084, 0x3}]}, 0x94) close(0x3) r1 = socket$kcm(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r5 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x2, 0x0, 0x1800}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x64, &(0x7f0000000000)=r4, 0x10) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000140)=[{&(0x7f00000005c0)="df", 0x1}], 0x1}, 0x0) (fail_nth: 2) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x102) kernel console output (not intermixed with test programs): 0815fa0 R15: 00007ffcf2b9b018 [ 428.879372][T10182] [ 432.383555][T10200] mac80211_hwsim hwsim5 wlan1: entered allmulticast mode [ 433.575527][T10236] netlink: 'syz.3.1515': attribute type 19 has an invalid length. [ 433.839898][T10238] mac80211_hwsim hwsim9 wlan1: entered allmulticast mode [ 434.853186][T10262] netlink: 4595 bytes leftover after parsing attributes in process `syz.0.1525'. [ 435.344832][ T5782] Bluetooth: hci1: unexpected event 0x33 length: 15 > 10 [ 436.840501][ T5782] Bluetooth: hci2: unexpected event 0x33 length: 15 > 10 [ 437.122096][T10315] netlink: 'syz.2.1542': attribute type 10 has an invalid length. [ 437.246649][T10315] team0: Device vxcan1 is of different type [ 437.498804][T10307] syzkaller0: entered promiscuous mode [ 437.514681][T10307] syzkaller0: entered allmulticast mode [ 437.671295][T10318] netlink: 'syz.2.1542': attribute type 10 has an invalid length. [ 437.682377][T10318] netlink: 128 bytes leftover after parsing attributes in process `syz.2.1542'. [ 440.383490][ T1287] ieee802154 phy0 wpan0: encryption failed: -22 [ 440.396811][ T1287] ieee802154 phy1 wpan1: encryption failed: -22 [ 440.902611][T10353] netlink: 4595 bytes leftover after parsing attributes in process `syz.1.1557'. [ 441.167338][T10359] netlink: 'syz.1.1559': attribute type 11 has an invalid length. [ 441.184491][T10359] netlink: 184116 bytes leftover after parsing attributes in process `syz.1.1559'. [ 441.222886][T10359] debugfs: Directory '!!ô' with parent 'ieee80211' already present! [ 442.314961][T10374] netlink: 'syz.3.1563': attribute type 10 has an invalid length. [ 442.329317][T10374] netlink: 55 bytes leftover after parsing attributes in process `syz.3.1563'. [ 443.961918][T10363] syz.1.1560 (10363) used greatest stack depth: 18216 bytes left [ 444.372480][T10407] netlink: 'syz.2.1573': attribute type 11 has an invalid length. [ 444.383453][T10407] netlink: 184116 bytes leftover after parsing attributes in process `syz.2.1573'. [ 444.472370][T10407] sysfs: cannot create duplicate filename '/class/ieee80211/!!ô' [ 444.509371][T10407] CPU: 1 PID: 10407 Comm: syz.2.1573 Not tainted syzkaller #0 [ 444.516933][T10407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 444.527222][T10407] Call Trace: [ 444.530561][T10407] [ 444.533547][T10407] dump_stack_lvl+0x18c/0x250 [ 444.538311][T10407] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 444.544528][T10407] ? show_regs_print_info+0x20/0x20 [ 444.549977][T10407] ? load_image+0x400/0x400 [ 444.554555][T10407] ? sysfs_warn_dup+0x65/0xa0 [ 444.559389][T10407] sysfs_warn_dup+0x8e/0xa0 [ 444.563954][T10407] sysfs_do_create_link_sd+0xc0/0x110 [ 444.569481][T10407] device_add_class_symlinks+0x1cf/0x240 [ 444.575193][T10407] device_add+0x507/0xc20 [ 444.579612][T10407] wiphy_register+0x1dad/0x2ae0 [ 444.584547][T10407] ? cfg80211_event_work+0x40/0x40 [ 444.589725][T10407] ? minstrel_ht_alloc+0x88a/0x990 [ 444.594926][T10407] ? ieee80211_init_rate_ctrl_alg+0x562/0x5e0 [ 444.601065][T10407] ieee80211_register_hw+0x3464/0x4250 [ 444.606621][T10407] ? ieee80211_tasklet_handler+0x20/0x20 [ 444.612327][T10407] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 444.618542][T10407] mac80211_hwsim_new_radio+0x2a00/0x4d10 [ 444.624342][T10407] ? mac80211_hwsim_free+0x220/0x220 [ 444.629677][T10407] ? rcu_is_watching+0x15/0xb0 [ 444.634488][T10407] ? kstrndup+0xbd/0x140 [ 444.638786][T10407] hwsim_new_radio_nl+0xdc9/0x1a90 [ 444.643945][T10407] ? __nla_validate+0x50/0x50 [ 444.648676][T10407] ? hwsim_tx_info_frame_received_nl+0xd60/0xd60 [ 444.655087][T10407] ? __nla_parse+0x40/0x50 [ 444.659556][T10407] ? genl_family_rcv_msg_attrs_parse+0x1c6/0x290 [ 444.665922][T10407] genl_family_rcv_msg_doit+0x211/0x310 [ 444.671506][T10407] ? genl_family_rcv_msg_dumpit+0x310/0x310 [ 444.677444][T10407] ? bpf_lsm_capable+0x9/0x10 [ 444.682155][T10407] ? security_capable+0x89/0xb0 [ 444.687046][T10407] genl_rcv_msg+0x619/0x7a0 [ 444.691668][T10407] ? genl_bind+0x360/0x360 [ 444.696157][T10407] ? hwsim_tx_info_frame_received_nl+0xd60/0xd60 [ 444.702565][T10407] netlink_rcv_skb+0x241/0x4d0 [ 444.707373][T10407] ? genl_bind+0x360/0x360 [ 444.711831][T10407] ? netlink_ack+0x1180/0x1180 [ 444.716652][T10407] ? __lock_acquire+0x7d40/0x7d40 [ 444.721715][T10407] ? net_generic+0x1e/0x240 [ 444.726264][T10407] ? down_read+0x1ac/0x2e0 [ 444.730718][T10407] genl_rcv+0x28/0x40 [ 444.734739][T10407] netlink_unicast+0x751/0x8d0 [ 444.739558][T10407] netlink_sendmsg+0x8d0/0xbf0 [ 444.744471][T10407] ? lockdep_hardirqs_on+0x98/0x150 [ 444.749883][T10407] ? netlink_getsockopt+0x590/0x590 [ 444.755123][T10407] ? aa_sock_msg_perm+0x94/0x150 [ 444.760100][T10407] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 444.765420][T10407] ? security_socket_sendmsg+0x80/0xa0 [ 444.770911][T10407] ? netlink_getsockopt+0x590/0x590 [ 444.776154][T10407] ____sys_sendmsg+0x5ba/0x960 [ 444.780965][T10407] ? __asan_memset+0x22/0x40 [ 444.785702][T10407] ? __sys_sendmsg_sock+0x30/0x30 [ 444.790827][T10407] ? __import_iovec+0x5f2/0x850 [ 444.795834][T10407] ? import_iovec+0x73/0xa0 [ 444.800389][T10407] ___sys_sendmsg+0x2a6/0x360 [ 444.805122][T10407] ? __sys_sendmsg+0x2a0/0x2a0 [ 444.810013][T10407] __se_sys_sendmsg+0x1c2/0x2b0 [ 444.814988][T10407] ? __x64_sys_sendmsg+0x80/0x80 [ 444.819995][T10407] do_syscall_64+0x55/0xa0 [ 444.824478][T10407] ? clear_bhb_loop+0x40/0x90 [ 444.829287][T10407] ? clear_bhb_loop+0x40/0x90 [ 444.834006][T10407] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 444.839984][T10407] RIP: 0033:0x7fa408f9c799 [ 444.844450][T10407] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 444.864629][T10407] RSP: 002b:00007fa409f0c028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 444.873170][T10407] RAX: ffffffffffffffda RBX: 00007fa409215fa0 RCX: 00007fa408f9c799 [ 444.881268][T10407] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000008 [ 444.889277][T10407] RBP: 00007fa409032c99 R08: 0000000000000000 R09: 0000000000000000 [ 444.897277][T10407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 444.905376][T10407] R13: 00007fa409216038 R14: 00007fa409215fa0 R15: 00007ffe47b661a8 [ 444.913402][T10407] [ 445.339448][ T5782] Bluetooth: hci0: unexpected event 0x33 length: 15 > 10 [ 447.414312][T10438] netlink: 'syz.1.1584': attribute type 10 has an invalid length. [ 447.465631][T10438] team0: Device ipvlan1 failed to register rx_handler [ 447.541490][T10440] netlink: 'syz.1.1584': attribute type 10 has an invalid length. [ 447.562228][T10440] netlink: 40 bytes leftover after parsing attributes in process `syz.1.1584'. [ 447.581068][T10440] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 447.810607][ T5782] Bluetooth: hci0: unexpected event 0x33 length: 15 > 10 [ 448.841639][T10460] netlink: 'syz.0.1590': attribute type 11 has an invalid length. [ 448.878896][T10460] netlink: 184116 bytes leftover after parsing attributes in process `syz.0.1590'. [ 448.957680][T10460] debugfs: Directory '!!ô' with parent 'ieee80211' already present! [ 449.286329][T10468] FAULT_INJECTION: forcing a failure. [ 449.286329][T10468] name failslab, interval 1, probability 0, space 0, times 0 [ 449.299589][T10468] CPU: 1 PID: 10468 Comm: syz.3.1594 Not tainted syzkaller #0 [ 449.307115][T10468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 449.317222][T10468] Call Trace: [ 449.320547][T10468] [ 449.323526][T10468] dump_stack_lvl+0x18c/0x250 [ 449.328276][T10468] ? show_regs_print_info+0x20/0x20 [ 449.333540][T10468] ? load_image+0x400/0x400 [ 449.338159][T10468] should_fail_ex+0x39d/0x4d0 [ 449.342911][T10468] should_failslab+0x9/0x20 [ 449.347480][T10468] slab_pre_alloc_hook+0x59/0x310 [ 449.352581][T10468] kmem_cache_alloc+0x5a/0x2d0 [ 449.357408][T10468] ? sctp_get_port_local+0x6d4/0x1620 [ 449.362844][T10468] sctp_get_port_local+0x6d4/0x1620 [ 449.368169][T10468] ? sctp_do_bind+0x990/0x990 [ 449.372913][T10468] ? sctp_bind_addr_match+0x30/0x2a0 [ 449.378268][T10468] sctp_do_bind+0x555/0x990 [ 449.382842][T10468] sctp_connect_new_asoc+0x26a/0x6a0 [ 449.388185][T10468] ? __sctp_connect+0xd80/0xd80 [ 449.393357][T10468] ? __local_bh_enable_ip+0x13a/0x1c0 [ 449.398799][T10468] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 449.404405][T10468] ? security_sctp_bind_connect+0x89/0xb0 [ 449.410182][T10468] sctp_sendmsg+0x1575/0x28c0 [ 449.414935][T10468] ? sctp_getsockopt+0xb60/0xb60 [ 449.419925][T10468] ? lock_chain_count+0x20/0x20 [ 449.424855][T10468] ? inet_send_prepare+0x260/0x260 [ 449.430022][T10468] ? sock_rps_record_flow+0x19/0x3f0 [ 449.435372][T10468] ? inet_sendmsg+0xe9/0x2f0 [ 449.440014][T10468] ? inet_send_prepare+0x260/0x260 [ 449.445193][T10468] ____sys_sendmsg+0x5ba/0x960 [ 449.450006][T10468] ? __lock_acquire+0x7d40/0x7d40 [ 449.455107][T10468] ? __asan_memset+0x22/0x40 [ 449.459763][T10468] ? __sys_sendmsg_sock+0x30/0x30 [ 449.464831][T10468] ? __import_iovec+0x5f2/0x850 [ 449.469762][T10468] ? import_iovec+0x73/0xa0 [ 449.474316][T10468] ___sys_sendmsg+0x2a6/0x360 [ 449.479059][T10468] ? __sys_sendmsg+0x2a0/0x2a0 [ 449.483901][T10468] ? seqcount_lockdep_reader_access+0x17b/0x1d0 [ 449.490218][T10468] __se_sys_sendmsg+0x1c2/0x2b0 [ 449.495124][T10468] ? __x64_sys_sendmsg+0x80/0x80 [ 449.500185][T10468] ? lockdep_hardirqs_on+0x98/0x150 [ 449.505448][T10468] do_syscall_64+0x55/0xa0 [ 449.509922][T10468] ? clear_bhb_loop+0x40/0x90 [ 449.514666][T10468] ? clear_bhb_loop+0x40/0x90 [ 449.519398][T10468] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 449.525440][T10468] RIP: 0033:0x7f48d059c799 [ 449.529901][T10468] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 449.549564][T10468] RSP: 002b:00007f48d13cf028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 449.558052][T10468] RAX: ffffffffffffffda RBX: 00007f48d0815fa0 RCX: 00007f48d059c799 [ 449.566082][T10468] RDX: 0000000000008054 RSI: 0000200000000ac0 RDI: 0000000000000004 [ 449.574110][T10468] RBP: 00007f48d13cf090 R08: 0000000000000000 R09: 0000000000000000 [ 449.582138][T10468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 449.590342][T10468] R13: 00007f48d0816038 R14: 00007f48d0815fa0 R15: 00007ffcf2b9b018 [ 449.598403][T10468] [ 449.770550][ T5782] Bluetooth: hci0: unexpected event 0x33 length: 15 > 10 [ 450.551291][T10486] netlink: 'syz.1.1599': attribute type 10 has an invalid length. [ 450.691711][T10486] team0: Device vxcan1 is of different type [ 450.788473][T10492] netlink: 'syz.1.1599': attribute type 10 has an invalid length. [ 450.800611][T10492] netlink: 128 bytes leftover after parsing attributes in process `syz.1.1599'. [ 451.488522][ T5782] Bluetooth: hci2: unexpected event 0x33 length: 15 > 10 [ 452.779760][T10538] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1615'. [ 454.683248][T10538] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1615'. [ 455.362908][ T5782] Bluetooth: hci0: unexpected event 0x33 length: 15 > 10 [ 455.515973][T10549] netlink: 'syz.0.1619': attribute type 10 has an invalid length. [ 455.711188][T10549] team0: Device vxcan1 is of different type [ 455.893239][T10559] netlink: 'syz.0.1619': attribute type 10 has an invalid length. [ 455.947085][T10559] netlink: 128 bytes leftover after parsing attributes in process `syz.0.1619'. [ 457.003390][T10563] syzkaller0: entered promiscuous mode [ 457.015479][T10563] syzkaller0: entered allmulticast mode [ 457.468321][T10580] netlink: 209852 bytes leftover after parsing attributes in process `syz.0.1626'. [ 460.041083][T10590] netlink: 'syz.2.1629': attribute type 3 has an invalid length. [ 460.068216][T10590] netlink: 130984 bytes leftover after parsing attributes in process `syz.2.1629'. [ 460.584792][T10600] bond0: left allmulticast mode [ 460.596133][T10600] bond_slave_0: left allmulticast mode [ 460.603999][T10600] bond_slave_1: left allmulticast mode [ 460.620168][T10600] bridge0: port 3(bond0) entered disabled state [ 460.727968][T10600] bridge_slave_1: left allmulticast mode [ 460.734373][T10600] bridge_slave_1: left promiscuous mode [ 460.742015][T10600] bridge0: port 2(bridge_slave_1) entered disabled state [ 460.758287][T10600] bridge_slave_0: left allmulticast mode [ 460.765061][T10600] bridge_slave_0: left promiscuous mode [ 460.773890][T10600] bridge0: port 1(bridge_slave_0) entered disabled state [ 461.782201][T10623] syzkaller0: entered promiscuous mode [ 461.803808][T10623] syzkaller0: entered allmulticast mode [ 462.133087][T10636] netlink: 15487 bytes leftover after parsing attributes in process `syz.3.1645'. [ 463.986490][T10649] FAULT_INJECTION: forcing a failure. [ 463.986490][T10649] name failslab, interval 1, probability 0, space 0, times 0 [ 464.002244][T10647] bridge_slave_1: left allmulticast mode [ 464.011708][T10647] bridge_slave_1: left promiscuous mode [ 464.029234][T10649] CPU: 1 PID: 10649 Comm: syz.3.1650 Not tainted syzkaller #0 [ 464.036947][T10649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 464.039351][T10647] bridge0: port 2(bridge_slave_1) entered disabled state [ 464.047072][T10649] Call Trace: [ 464.047124][T10649] [ 464.047134][T10649] dump_stack_lvl+0x18c/0x250 [ 464.047172][T10649] ? sctp_sendmsg+0x1575/0x28c0 [ 464.047194][T10649] ? ___sys_sendmsg+0x2a6/0x360 [ 464.047216][T10649] ? show_regs_print_info+0x20/0x20 [ 464.047248][T10649] ? load_image+0x400/0x400 [ 464.047291][T10649] should_fail_ex+0x39d/0x4d0 [ 464.047329][T10649] should_failslab+0x9/0x20 [ 464.047360][T10649] slab_pre_alloc_hook+0x59/0x310 [ 464.047394][T10649] ? sctp_add_bind_addr+0x8c/0x360 [ 464.047417][T10649] __kmem_cache_alloc_node+0x53/0x250 [ 464.047453][T10649] ? sctp_add_bind_addr+0x8c/0x360 [ 464.047474][T10649] kmalloc_trace+0x2a/0xe0 [ 464.047507][T10649] sctp_add_bind_addr+0x8c/0x360 [ 464.047534][T10649] sctp_copy_local_addr_list+0x315/0x4f0 [ 464.047572][T10649] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 464.047607][T10649] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 464.047644][T10649] ? sctp_v6_is_any+0x64/0x70 [ 464.047674][T10649] ? sctp_copy_one_addr+0x8c/0x350 [ 464.152883][T10649] sctp_bind_addr_copy+0xb3/0x3c0 [ 464.157985][T10649] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 464.164389][T10649] sctp_connect_new_asoc+0x2f9/0x6a0 [ 464.169741][T10649] ? __sctp_connect+0xd80/0xd80 [ 464.174648][T10649] ? __local_bh_enable_ip+0x13a/0x1c0 [ 464.180083][T10649] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 464.185686][T10649] ? security_sctp_bind_connect+0x89/0xb0 [ 464.191467][T10649] sctp_sendmsg+0x1575/0x28c0 [ 464.196212][T10649] ? sctp_getsockopt+0xb60/0xb60 [ 464.201206][T10649] ? aa_sk_perm+0x83c/0x970 [ 464.205782][T10649] ? aa_af_perm+0x330/0x330 [ 464.210346][T10649] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 464.216824][T10649] ? sock_rps_record_flow+0x19/0x3f0 [ 464.222185][T10649] ? inet_sendmsg+0xe9/0x2f0 [ 464.226935][T10649] ? inet_send_prepare+0x260/0x260 [ 464.232121][T10649] ____sys_sendmsg+0x5ba/0x960 [ 464.236946][T10649] ? __lock_acquire+0x7d40/0x7d40 [ 464.242090][T10649] ? __asan_memset+0x22/0x40 [ 464.246739][T10649] ? __sys_sendmsg_sock+0x30/0x30 [ 464.251808][T10649] ? __import_iovec+0x5f2/0x850 [ 464.256913][T10649] ? import_iovec+0x73/0xa0 [ 464.261477][T10649] ___sys_sendmsg+0x2a6/0x360 [ 464.266215][T10649] ? __sys_sendmsg+0x2a0/0x2a0 [ 464.271152][T10649] ? trace_call_bpf+0xc3/0x6c0 [ 464.276015][T10649] __se_sys_sendmsg+0x1c2/0x2b0 [ 464.281098][T10649] ? __x64_sys_sendmsg+0x80/0x80 [ 464.286129][T10649] ? lockdep_hardirqs_on+0x98/0x150 [ 464.291381][T10649] do_syscall_64+0x55/0xa0 [ 464.295943][T10649] ? clear_bhb_loop+0x40/0x90 [ 464.300680][T10649] ? clear_bhb_loop+0x40/0x90 [ 464.305398][T10649] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 464.311326][T10649] RIP: 0033:0x7f48d059c799 [ 464.315779][T10649] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 464.335404][T10649] RSP: 002b:00007f48d13cf028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 464.343938][T10649] RAX: ffffffffffffffda RBX: 00007f48d0815fa0 RCX: 00007f48d059c799 [ 464.351994][T10649] RDX: 000000002600c055 RSI: 00002000000000c0 RDI: 0000000000000003 [ 464.360005][T10649] RBP: 00007f48d13cf090 R08: 0000000000000000 R09: 0000000000000000 [ 464.368004][T10649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 464.376223][T10649] R13: 00007f48d0816038 R14: 00007f48d0815fa0 R15: 00007ffcf2b9b018 [ 464.384256][T10649] [ 464.608180][T10647] bridge0: port 1(bridge_slave_0) entered disabled state [ 466.427513][T10681] netlink: 'syz.0.1660': attribute type 10 has an invalid length. [ 467.286900][T10686] bridge_slave_1: left allmulticast mode [ 467.293846][T10686] bridge_slave_1: left promiscuous mode [ 467.326715][T10686] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.347257][T10686] bridge_slave_0: left allmulticast mode [ 467.358960][T10686] bridge_slave_0: left promiscuous mode [ 467.365546][T10686] bridge0: port 1(bridge_slave_0) entered disabled state [ 467.618029][T10701] netlink: 'syz.3.1664': attribute type 10 has an invalid length. [ 467.644909][T10701] ref_tracker: memory allocation failure, unreliable refcount tracker. [ 468.233738][T10714] netlink: 192436 bytes leftover after parsing attributes in process `syz.3.1671'. [ 468.258965][T10714] openvswitch: netlink: Message has 20476 unknown bytes. [ 468.456914][T10720] netlink: 209852 bytes leftover after parsing attributes in process `syz.3.1672'. [ 468.851118][T10726] netlink: 15487 bytes leftover after parsing attributes in process `syz.2.1673'. [ 469.130436][T10730] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 469.137335][T10730] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 469.346533][T10738] FAULT_INJECTION: forcing a failure. [ 469.346533][T10738] name failslab, interval 1, probability 0, space 0, times 0 [ 469.374718][T10738] CPU: 1 PID: 10738 Comm: syz.3.1679 Not tainted syzkaller #0 [ 469.382262][T10738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 469.392798][T10738] Call Trace: [ 469.396159][T10738] [ 469.399136][T10738] dump_stack_lvl+0x18c/0x250 [ 469.403912][T10738] ? show_regs_print_info+0x20/0x20 [ 469.409172][T10738] ? load_image+0x400/0x400 [ 469.413737][T10738] ? __might_sleep+0xe0/0xe0 [ 469.418378][T10738] ? __lock_acquire+0x7d40/0x7d40 [ 469.423568][T10738] should_fail_ex+0x39d/0x4d0 [ 469.428335][T10738] should_failslab+0x9/0x20 [ 469.432904][T10738] slab_pre_alloc_hook+0x59/0x310 [ 469.437988][T10738] ? __get_vm_area_node+0x125/0x370 [ 469.443591][T10738] __kmem_cache_alloc_node+0x53/0x250 [ 469.449017][T10738] ? __get_vm_area_node+0x125/0x370 [ 469.454284][T10738] kmalloc_node_trace+0x26/0xe0 [ 469.459201][T10738] __get_vm_area_node+0x125/0x370 [ 469.464292][T10738] __vmalloc_node_range+0x36e/0x1330 [ 469.469627][T10738] ? copy_process+0x586/0x3d80 [ 469.474467][T10738] ? free_vm_area+0x50/0x50 [ 469.479037][T10738] ? arch_dup_task_struct+0x57/0xd0 [ 469.484287][T10738] ? __asan_memcpy+0x40/0x70 [ 469.488930][T10738] dup_task_struct+0x3d0/0x7c0 [ 469.493729][T10738] ? copy_process+0x586/0x3d80 [ 469.498534][T10738] copy_process+0x586/0x3d80 [ 469.503162][T10738] ? debug_object_activate+0x304/0x4f0 [ 469.508664][T10738] ? __rwlock_init+0x150/0x150 [ 469.513462][T10738] ? do_raw_spin_unlock+0x121/0x230 [ 469.518705][T10738] ? _raw_spin_unlock_irqrestore+0xc5/0x120 [ 469.524632][T10738] ? __pidfd_prepare+0x140/0x140 [ 469.529602][T10738] ? ktime_get+0x7f/0x280 [ 469.534079][T10738] kernel_clone+0x24b/0x8a0 [ 469.538786][T10738] ? hrtimer_interrupt+0x597/0x9c0 [ 469.543923][T10738] ? ktime_get+0x7f/0x280 [ 469.548282][T10738] ? create_io_thread+0x190/0x190 [ 469.553335][T10738] ? seqcount_lockdep_reader_access+0x17b/0x1d0 [ 469.559618][T10738] __x64_sys_clone+0x1b7/0x230 [ 469.564504][T10738] ? lapic_next_event+0x11/0x20 [ 469.569381][T10738] ? clockevents_program_event+0x230/0x310 [ 469.575224][T10738] ? __ia32_sys_vfork+0x140/0x140 [ 469.580286][T10738] ? lock_chain_count+0x20/0x20 [ 469.585167][T10738] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 469.591266][T10738] ? lockdep_hardirqs_on+0x98/0x150 [ 469.596516][T10738] do_syscall_64+0x55/0xa0 [ 469.600990][T10738] ? clear_bhb_loop+0x40/0x90 [ 469.605792][T10738] ? clear_bhb_loop+0x40/0x90 [ 469.610504][T10738] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 469.616424][T10738] RIP: 0033:0x7f48d059c799 [ 469.620898][T10738] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 469.640537][T10738] RSP: 002b:00007f48d13cefd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 469.648976][T10738] RAX: ffffffffffffffda RBX: 00007f48d0815fa0 RCX: 00007f48d059c799 [ 469.656970][T10738] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000126400 [ 469.665056][T10738] RBP: 00007f48d13cf090 R08: 0000000000000000 R09: 0000000000000000 [ 469.673050][T10738] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 469.681067][T10738] R13: 00007f48d0816038 R14: 00007f48d0815fa0 R15: 00007ffcf2b9b018 [ 469.689096][T10738] [ 469.769578][T10738] syz.3.1679: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz3,mems_allowed=0-1 [ 469.785927][T10738] CPU: 1 PID: 10738 Comm: syz.3.1679 Not tainted syzkaller #0 [ 469.793447][T10738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 469.803635][T10738] Call Trace: [ 469.806954][T10738] [ 469.809929][T10738] dump_stack_lvl+0x18c/0x250 [ 469.814772][T10738] ? show_regs_print_info+0x20/0x20 [ 469.820119][T10738] ? load_image+0x400/0x400 [ 469.824693][T10738] ? cpuset_print_current_mems_allowed+0x1f/0x360 [ 469.831168][T10738] ? cpuset_print_current_mems_allowed+0x2e7/0x360 [ 469.837734][T10738] warn_alloc+0x246/0x340 [ 469.842132][T10738] ? __get_vm_area_node+0x125/0x370 [ 469.847397][T10738] ? zone_watermark_ok_safe+0x230/0x230 [ 469.853017][T10738] ? rcu_is_watching+0x15/0xb0 [ 469.858245][T10738] ? __get_vm_area_node+0x356/0x370 [ 469.863520][T10738] __vmalloc_node_range+0x393/0x1330 [ 469.866057][T10742] netlink: 'syz.2.1678': attribute type 33 has an invalid length. [ 469.868876][T10738] ? free_vm_area+0x50/0x50 [ 469.881274][T10738] ? arch_dup_task_struct+0x57/0xd0 [ 469.886621][T10738] ? __asan_memcpy+0x40/0x70 [ 469.891281][T10738] dup_task_struct+0x3d0/0x7c0 [ 469.896098][T10738] ? copy_process+0x586/0x3d80 [ 469.900949][T10738] copy_process+0x586/0x3d80 [ 469.905606][T10738] ? debug_object_activate+0x304/0x4f0 [ 469.911133][T10738] ? __rwlock_init+0x150/0x150 [ 469.915967][T10738] ? do_raw_spin_unlock+0x121/0x230 [ 469.921228][T10738] ? _raw_spin_unlock_irqrestore+0xc5/0x120 [ 469.927314][T10738] ? __pidfd_prepare+0x140/0x140 [ 469.932308][T10738] ? ktime_get+0x7f/0x280 [ 469.934292][T10742] netlink: 152 bytes leftover after parsing attributes in process `syz.2.1678'. [ 469.936683][T10738] kernel_clone+0x24b/0x8a0 [ 469.936714][T10738] ? hrtimer_interrupt+0x597/0x9c0 [ 469.936738][T10738] ? ktime_get+0x7f/0x280 [ 469.959962][T10738] ? create_io_thread+0x190/0x190 [ 469.965039][T10738] ? seqcount_lockdep_reader_access+0x17b/0x1d0 [ 469.971382][T10738] __x64_sys_clone+0x1b7/0x230 [ 469.976240][T10738] ? lapic_next_event+0x11/0x20 [ 469.981147][T10738] ? clockevents_program_event+0x230/0x310 [ 469.987057][T10738] ? __ia32_sys_vfork+0x140/0x140 [ 469.992153][T10738] ? lock_chain_count+0x20/0x20 [ 469.997059][T10738] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 470.003111][T10738] ? lockdep_hardirqs_on+0x98/0x150 [ 470.008369][T10738] do_syscall_64+0x55/0xa0 [ 470.012866][T10738] ? clear_bhb_loop+0x40/0x90 [ 470.017598][T10738] ? clear_bhb_loop+0x40/0x90 [ 470.022338][T10738] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 470.028302][T10738] RIP: 0033:0x7f48d059c799 [ 470.032763][T10738] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 470.052424][T10738] RSP: 002b:00007f48d13cefd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 470.060956][T10738] RAX: ffffffffffffffda RBX: 00007f48d0815fa0 RCX: 00007f48d059c799 [ 470.068986][T10738] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000126400 [ 470.077216][T10738] RBP: 00007f48d13cf090 R08: 0000000000000000 R09: 0000000000000000 [ 470.085266][T10738] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 470.093636][T10738] R13: 00007f48d0816038 R14: 00007f48d0815fa0 R15: 00007ffcf2b9b018 [ 470.102023][T10738] [ 470.163846][T10738] Mem-Info: [ 470.167611][T10738] active_anon:21829 inactive_anon:0 isolated_anon:0 [ 470.167611][T10738] active_file:19384 inactive_file:40079 isolated_file:0 [ 470.167611][T10738] unevictable:768 dirty:163 writeback:0 [ 470.167611][T10738] slab_reclaimable:10846 slab_unreclaimable:92743 [ 470.167611][T10738] mapped:35068 shmem:17059 pagetables:630 [ 470.167611][T10738] sec_pagetables:0 bounce:0 [ 470.167611][T10738] kernel_misc_reclaimable:0 [ 470.167611][T10738] free:1327798 free_pcp:9086 free_cma:0 [ 470.214968][T10738] Node 0 active_anon:87516kB inactive_anon:0kB active_file:77536kB inactive_file:160108kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:140472kB dirty:652kB writeback:0kB shmem:66900kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:10752kB pagetables:2520kB sec_pagetables:0kB all_unreclaimable? no [ 470.269562][T10738] Node 1 active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:208kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:1536kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:16kB pagetables:0kB sec_pagetables:0kB all_unreclaimable? no [ 470.349253][T10738] Node 0 DMA free:15360kB boost:0kB min:204kB low:252kB high:300kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 470.432469][T10738] lowmem_reserve[]: 0 2521 2522 2522 2522 [ 470.451207][T10738] Node 0 DMA32 free:1393280kB boost:0kB min:34644kB low:43304kB high:51964kB reserved_highatomic:0KB active_anon:92504kB inactive_anon:0kB active_file:77536kB inactive_file:159280kB unevictable:1536kB writepending:660kB present:3129332kB managed:2586964kB mlocked:0kB bounce:0kB free_pcp:18660kB local_pcp:7448kB free_cma:0kB [ 470.547762][T10738] lowmem_reserve[]: 0 0 0 0 0 [ 470.583774][T10738] Node 0 Normal free:0kB boost:0kB min:8kB low:8kB high:8kB reserved_highatomic:0KB active_anon:36kB inactive_anon:0kB active_file:0kB inactive_file:828kB unevictable:0kB writepending:0kB present:1048576kB managed:872kB mlocked:0kB bounce:0kB free_pcp:8kB local_pcp:8kB free_cma:0kB [ 470.620307][T10738] lowmem_reserve[]: 0 0 0 0 0 [ 470.624127][T10741] netlink: 'syz.0.1680': attribute type 12 has an invalid length. [ 470.625744][T10738] Node 1 Normal free:3897516kB boost:0kB min:55244kB low:69052kB high:82860kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:208kB unevictable:1536kB writepending:0kB present:4194304kB managed:4117312kB mlocked:0kB bounce:0kB free_pcp:17376kB local_pcp:3840kB free_cma:0kB [ 470.656780][T10741] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1680'. [ 470.688807][T10738] lowmem_reserve[]: 0 0 0 0 0 [ 470.698720][T10738] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 470.719158][T10738] Node 0 DMA32: 1067*4kB (UME) 754*8kB (UM) 371*16kB (UME) 63*32kB (UE) 1035*64kB (UME) 746*128kB (UME) 225*256kB (UME) 92*512kB (UM) 46*1024kB (UM) 14*2048kB (UM) 250*4096kB (M) = 1384460kB [ 470.753627][T10738] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 470.774407][T10738] Node 1 Normal: 269*4kB (UME) 61*8kB (UM) 37*16kB (UME) 168*32kB (UME) 39*64kB (UE) 13*128kB (UME) 1*256kB (U) 1*512kB (M) 2*1024kB (UE) 2*2048kB (UE) 947*4096kB (M) = 3897516kB [ 470.834182][T10738] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 470.873022][T10738] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 470.947036][T10738] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 470.997861][T10738] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 471.007520][T10738] 82237 total pagecache pages [ 471.030582][T10738] 0 pages in swap cache [ 471.035062][T10738] Free swap = 124996kB [ 471.049128][T10738] Total swap = 124996kB [ 471.059826][T10738] 2097051 pages RAM [ 471.063790][T10738] 0 pages HighMem/MovableOnly [ 471.073924][T10738] 416924 pages reserved [ 471.078142][T10738] 0 pages cma reserved [ 472.149503][T10760] netlink: 10 bytes leftover after parsing attributes in process `syz.1.1686'. [ 472.714514][T10768] netlink: 'syz.3.1688': attribute type 10 has an invalid length. [ 473.020992][ T5782] Bluetooth: hci1: unexpected event 0x33 length: 15 > 10 [ 474.890007][T10798] netlink: 'syz.2.1699': attribute type 10 has an invalid length. [ 475.771378][ T5782] Bluetooth: hci0: unexpected event 0x33 length: 15 > 10 [ 476.029366][T10820] netlink: 188 bytes leftover after parsing attributes in process `syz.2.1703'. [ 479.434797][T10885] netlink: 'syz.0.1725': attribute type 10 has an invalid length. [ 479.443763][T10885] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1725'. [ 479.465864][T10885] team0: Device lo is loopback device. Loopback devices can't be added as a team port [ 479.494748][T10885] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 480.536410][T10905] netlink: 16186 bytes leftover after parsing attributes in process `syz.0.1732'. [ 480.832020][T10915] netlink: 209820 bytes leftover after parsing attributes in process `syz.0.1735'. [ 480.881608][T10917] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1735'. [ 480.909337][T10917] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1735'. [ 481.828275][T10938] FAULT_INJECTION: forcing a failure. [ 481.828275][T10938] name failslab, interval 1, probability 0, space 0, times 0 [ 481.889371][T10938] CPU: 1 PID: 10938 Comm: syz.1.1744 Not tainted syzkaller #0 [ 481.896924][T10938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 481.907046][T10938] Call Trace: [ 481.910385][T10938] [ 481.913369][T10938] dump_stack_lvl+0x18c/0x250 [ 481.918129][T10938] ? show_regs_print_info+0x20/0x20 [ 481.923390][T10938] ? load_image+0x400/0x400 [ 481.928068][T10938] ? trace_event_raw_event_lock+0x250/0x250 [ 481.934045][T10938] should_fail_ex+0x39d/0x4d0 [ 481.938794][T10938] should_failslab+0x9/0x20 [ 481.943444][T10938] slab_pre_alloc_hook+0x59/0x310 [ 481.948619][T10938] ? tipc_sub_subscribe+0x118/0x690 [ 481.953897][T10938] __kmem_cache_alloc_node+0x53/0x250 [ 481.959332][T10938] ? tipc_sub_subscribe+0x118/0x690 [ 481.964584][T10938] kmalloc_trace+0x2a/0xe0 [ 481.969063][T10938] tipc_sub_subscribe+0x118/0x690 [ 481.974175][T10938] tipc_conn_rcv_sub+0x136/0x350 [ 481.979263][T10938] tipc_topsrv_kern_subscr+0x189/0x250 [ 481.984783][T10938] ? conn_put+0x310/0x310 [ 481.989602][T10938] ? __asan_memset+0x22/0x40 [ 481.994233][T10938] tipc_group_create+0x364/0x500 [ 481.999224][T10938] tipc_sk_join+0x253/0x6a0 [ 482.003771][T10938] ? __tipc_sendstream+0x1270/0x1270 [ 482.009103][T10938] tipc_setsockopt+0x73f/0x990 [ 482.013902][T10938] ? tipc_shutdown+0x4d0/0x4d0 [ 482.018696][T10938] ? __fget_files+0x28/0x4b0 [ 482.023410][T10938] ? __fget_files+0x28/0x4b0 [ 482.028094][T10938] ? aa_sock_opt_perm+0x74/0x100 [ 482.033070][T10938] ? bpf_lsm_socket_setsockopt+0x9/0x10 [ 482.038645][T10938] ? security_socket_setsockopt+0x7e/0xa0 [ 482.044388][T10938] ? tipc_shutdown+0x4d0/0x4d0 [ 482.049215][T10938] do_sock_setsockopt+0x175/0x1a0 [ 482.054271][T10938] ? __fdget+0x180/0x210 [ 482.058560][T10938] __x64_sys_setsockopt+0x182/0x200 [ 482.063799][T10938] do_syscall_64+0x55/0xa0 [ 482.068258][T10938] ? clear_bhb_loop+0x40/0x90 [ 482.072966][T10938] ? clear_bhb_loop+0x40/0x90 [ 482.077791][T10938] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 482.083748][T10938] RIP: 0033:0x7f439639c799 [ 482.088204][T10938] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 482.107945][T10938] RSP: 002b:00007f4397255028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 482.116431][T10938] RAX: ffffffffffffffda RBX: 00007f4396615fa0 RCX: 00007f439639c799 [ 482.124441][T10938] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000004 [ 482.132437][T10938] RBP: 00007f4397255090 R08: 00000000000004bd R09: 0000000000000000 [ 482.140437][T10938] R10: 0000200000000180 R11: 0000000000000246 R12: 0000000000000001 [ 482.148437][T10938] R13: 00007f4396616038 R14: 00007f4396615fa0 R15: 00007ffd91dfd878 [ 482.156586][T10938] [ 482.210813][T10938] tipc: Subscription rejected, no memory [ 483.963514][ T5782] Bluetooth: hci1: unexpected event 0x1c length: 15 > 5 [ 485.746929][T11000] FAULT_INJECTION: forcing a failure. [ 485.746929][T11000] name failslab, interval 1, probability 0, space 0, times 0 [ 485.784313][T11000] CPU: 0 PID: 11000 Comm: syz.3.1765 Not tainted syzkaller #0 [ 485.792035][T11000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 485.802225][T11000] Call Trace: [ 485.805642][T11000] [ 485.808614][T11000] dump_stack_lvl+0x18c/0x250 [ 485.813454][T11000] ? show_regs_print_info+0x20/0x20 [ 485.818715][T11000] ? load_image+0x400/0x400 [ 485.823275][T11000] ? __might_sleep+0xe0/0xe0 [ 485.827923][T11000] ? __lock_acquire+0x7d40/0x7d40 [ 485.833039][T11000] ? lock_chain_count+0x20/0x20 [ 485.837976][T11000] should_fail_ex+0x39d/0x4d0 [ 485.842726][T11000] should_failslab+0x9/0x20 [ 485.847384][T11000] slab_pre_alloc_hook+0x59/0x310 [ 485.852491][T11000] ? _raw_spin_unlock+0x40/0x40 [ 485.857423][T11000] ? __request_module+0x2d1/0x600 [ 485.862551][T11000] __kmem_cache_alloc_node+0x53/0x250 [ 485.868002][T11000] ? __request_module+0x2d1/0x600 [ 485.873077][T11000] kmalloc_trace+0x2a/0xe0 [ 485.877641][T11000] __request_module+0x2d1/0x600 [ 485.882581][T11000] ? module_enforce_rwx_sections+0x150/0x150 [ 485.888623][T11000] ? dev_load+0x21/0x1f0 [ 485.892941][T11000] ? bpf_lsm_capable+0x9/0x10 [ 485.897701][T11000] ? dev_load+0x21/0x1f0 [ 485.902008][T11000] dev_load+0x18b/0x1f0 [ 485.906226][T11000] dev_ioctl+0x79f/0x1140 [ 485.910615][T11000] sock_do_ioctl+0x239/0x310 [ 485.915287][T11000] ? sock_show_fdinfo+0xb0/0xb0 [ 485.920291][T11000] sock_ioctl+0x5ba/0x7e0 [ 485.924681][T11000] ? sock_poll+0x3e0/0x3e0 [ 485.929165][T11000] ? bpf_lsm_file_ioctl+0x9/0x10 [ 485.934162][T11000] ? security_file_ioctl+0x80/0xa0 [ 485.939330][T11000] ? sock_poll+0x3e0/0x3e0 [ 485.943804][T11000] __se_sys_ioctl+0xfd/0x170 [ 485.948466][T11000] do_syscall_64+0x55/0xa0 [ 485.952958][T11000] ? clear_bhb_loop+0x40/0x90 [ 485.957701][T11000] ? clear_bhb_loop+0x40/0x90 [ 485.962441][T11000] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 485.968379][T11000] RIP: 0033:0x7f48d059c799 [ 485.972853][T11000] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 485.992601][T11000] RSP: 002b:00007f48d13cf028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 486.001081][T11000] RAX: ffffffffffffffda RBX: 00007f48d0815fa0 RCX: 00007f48d059c799 [ 486.009103][T11000] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000011 [ 486.017125][T11000] RBP: 00007f48d13cf090 R08: 0000000000000000 R09: 0000000000000000 [ 486.025150][T11000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 486.033231][T11000] R13: 00007f48d0816038 R14: 00007f48d0815fa0 R15: 00007ffcf2b9b018 [ 486.041275][T11000] [ 488.940477][T11047] FAULT_INJECTION: forcing a failure. [ 488.940477][T11047] name failslab, interval 1, probability 0, space 0, times 0 [ 489.017428][T11047] CPU: 0 PID: 11047 Comm: syz.3.1779 Not tainted syzkaller #0 [ 489.024983][T11047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 489.035093][T11047] Call Trace: [ 489.038421][T11047] [ 489.041436][T11047] dump_stack_lvl+0x18c/0x250 [ 489.046181][T11047] ? show_regs_print_info+0x20/0x20 [ 489.051457][T11047] ? load_image+0x400/0x400 [ 489.056025][T11047] ? __might_sleep+0xe0/0xe0 [ 489.060721][T11047] ? __lock_acquire+0x7d40/0x7d40 [ 489.065808][T11047] should_fail_ex+0x39d/0x4d0 [ 489.070676][T11047] should_failslab+0x9/0x20 [ 489.075332][T11047] slab_pre_alloc_hook+0x59/0x310 [ 489.080483][T11047] kmem_cache_alloc+0x5a/0x2d0 [ 489.085751][T11047] ? getname_flags+0xbb/0x500 [ 489.090501][T11047] getname_flags+0xbb/0x500 [ 489.095109][T11047] do_sys_openat2+0xda/0x1d0 [ 489.099756][T11047] ? perf_trace_preemptirq_template+0x269/0x330 [ 489.106061][T11047] ? do_sys_open+0xe0/0xe0 [ 489.110538][T11047] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 489.116579][T11047] ? lock_chain_count+0x20/0x20 [ 489.121485][T11047] __x64_sys_openat+0x139/0x160 [ 489.126406][T11047] do_syscall_64+0x55/0xa0 [ 489.130889][T11047] ? clear_bhb_loop+0x40/0x90 [ 489.135703][T11047] ? clear_bhb_loop+0x40/0x90 [ 489.140418][T11047] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 489.146447][T11047] RIP: 0033:0x7f48d059c799 [ 489.150902][T11047] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 489.170545][T11047] RSP: 002b:00007f48d13cf028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 489.179253][T11047] RAX: ffffffffffffffda RBX: 00007f48d0815fa0 RCX: 00007f48d059c799 [ 489.187277][T11047] RDX: 000000000000275a RSI: 00002000000001c0 RDI: ffffffffffffff9c [ 489.195268][T11047] RBP: 00007f48d13cf090 R08: 0000000000000000 R09: 0000000000000000 [ 489.203312][T11047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 489.211314][T11047] R13: 00007f48d0816038 R14: 00007f48d0815fa0 R15: 00007ffcf2b9b018 [ 489.219333][T11047] [ 489.389847][ T5782] Bluetooth: hci0: unexpected event 0x14 length: 15 > 6 [ 489.765409][T11056] FAULT_INJECTION: forcing a failure. [ 489.765409][T11056] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 489.795432][T11057] netlink: 'syz.1.1782': attribute type 39 has an invalid length. [ 489.839779][T11056] CPU: 1 PID: 11056 Comm: syz.1.1782 Not tainted syzkaller #0 [ 489.847326][T11056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 489.857441][T11056] Call Trace: [ 489.860763][T11056] [ 489.863723][T11056] dump_stack_lvl+0x18c/0x250 [ 489.868447][T11056] ? show_regs_print_info+0x20/0x20 [ 489.873860][T11056] ? load_image+0x400/0x400 [ 489.878404][T11056] ? __might_fault+0xaa/0x120 [ 489.883111][T11056] ? __lock_acquire+0x7d40/0x7d40 [ 489.888185][T11056] ? __might_fault+0x22/0x120 [ 489.892929][T11056] should_fail_ex+0x39d/0x4d0 [ 489.897662][T11056] _copy_from_user+0x2f/0xe0 [ 489.902324][T11056] __sys_bpf+0x23e/0x890 [ 489.906611][T11056] ? bpf_link_show_fdinfo+0x390/0x390 [ 489.912036][T11056] ? lock_chain_count+0x20/0x20 [ 489.916946][T11056] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 489.922970][T11056] __x64_sys_bpf+0x7c/0x90 [ 489.927415][T11056] do_syscall_64+0x55/0xa0 [ 489.931876][T11056] ? clear_bhb_loop+0x40/0x90 [ 489.936582][T11056] ? clear_bhb_loop+0x40/0x90 [ 489.941299][T11056] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 489.947220][T11056] RIP: 0033:0x7f439639c799 [ 489.951750][T11056] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 489.971573][T11056] RSP: 002b:00007f4397255028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 489.980029][T11056] RAX: ffffffffffffffda RBX: 00007f4396615fa0 RCX: 00007f439639c799 [ 489.988118][T11056] RDX: 0000000000000048 RSI: 00002000000054c0 RDI: 0000000000000005 [ 489.996390][T11056] RBP: 00007f4397255090 R08: 0000000000000000 R09: 0000000000000000 [ 490.004647][T11056] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 490.012736][T11056] R13: 00007f4396616038 R14: 00007f4396615fa0 R15: 00007ffd91dfd878 [ 490.020934][T11056] [ 492.121689][T11060] netlink: 'syz.3.1784': attribute type 39 has an invalid length. [ 492.423993][T11081] sctp: [Deprecated]: syz.0.1789 (pid 11081) Use of struct sctp_assoc_value in delayed_ack socket option. [ 492.423993][T11081] Use struct sctp_sack_info instead [ 493.701329][T11098] syzkaller0: entered allmulticast mode [ 493.828721][T11098] sctp: [Deprecated]: syz.0.1795 (pid 11098) Use of struct sctp_assoc_value in delayed_ack socket option. [ 493.828721][T11098] Use struct sctp_sack_info instead [ 497.453346][T11119] netlink: 209852 bytes leftover after parsing attributes in process `syz.0.1801'. [ 497.509298][T11119] openvswitch: netlink: IP tunnel attribute has 3064 unknown bytes. [ 497.644598][T11124] FAULT_INJECTION: forcing a failure. [ 497.644598][T11124] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 497.660453][T11124] CPU: 0 PID: 11124 Comm: syz.2.1802 Not tainted syzkaller #0 [ 497.668016][T11124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 497.678132][T11124] Call Trace: [ 497.681463][T11124] [ 497.684441][T11124] dump_stack_lvl+0x18c/0x250 [ 497.689180][T11124] ? show_regs_print_info+0x20/0x20 [ 497.694431][T11124] ? load_image+0x400/0x400 [ 497.698971][T11124] ? __might_fault+0xaa/0x120 [ 497.703676][T11124] ? __lock_acquire+0x7d40/0x7d40 [ 497.708732][T11124] should_fail_ex+0x39d/0x4d0 [ 497.713483][T11124] _copy_to_user+0x2f/0xa0 [ 497.717949][T11124] bpf_test_finish+0x25a/0x650 [ 497.722841][T11124] ? convert___skb_to_skb+0x590/0x590 [ 497.728272][T11124] ? convert_skb_to___skb+0x420/0x420 [ 497.733684][T11124] ? bpf_prog_test_run_xdp+0xf62/0x10e0 [ 497.739549][T11124] bpf_prog_test_run_xdp+0x8a9/0x10e0 [ 497.744961][T11124] ? dev_put+0x80/0x80 [ 497.749095][T11124] ? bpf_prog_test_run+0x256/0x390 [ 497.754341][T11124] ? dev_put+0x80/0x80 [ 497.758438][T11124] bpf_prog_test_run+0x321/0x390 [ 497.763415][T11124] __sys_bpf+0x49d/0x890 [ 497.767691][T11124] ? bpf_link_show_fdinfo+0x390/0x390 [ 497.773116][T11124] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 497.779344][T11124] __x64_sys_bpf+0x7c/0x90 [ 497.783790][T11124] do_syscall_64+0x55/0xa0 [ 497.788325][T11124] ? clear_bhb_loop+0x40/0x90 [ 497.793060][T11124] ? clear_bhb_loop+0x40/0x90 [ 497.797764][T11124] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 497.803685][T11124] RIP: 0033:0x7fa408f9c799 [ 497.808126][T11124] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 497.827787][T11124] RSP: 002b:00007fa409f0c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 497.836235][T11124] RAX: ffffffffffffffda RBX: 00007fa409215fa0 RCX: 00007fa408f9c799 [ 497.844260][T11124] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 497.852781][T11124] RBP: 00007fa409f0c090 R08: 0000000000000000 R09: 0000000000000000 [ 497.860870][T11124] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 497.868867][T11124] R13: 00007fa409216038 R14: 00007fa409215fa0 R15: 00007ffe47b661a8 [ 497.876894][T11124] [ 498.614532][T11151] syzkaller0: entered allmulticast mode [ 498.686357][T11151] sctp: [Deprecated]: syz.3.1813 (pid 11151) Use of struct sctp_assoc_value in delayed_ack socket option. [ 498.686357][T11151] Use struct sctp_sack_info instead [ 499.215442][T11163] netlink: 'syz.2.1816': attribute type 3 has an invalid length. [ 499.279530][T11163] netlink: 132 bytes leftover after parsing attributes in process `syz.2.1816'. [ 499.478231][T11166] netlink: 192440 bytes leftover after parsing attributes in process `syz.1.1819'. [ 499.512741][T11166] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 499.556554][T11168] netlink: 'syz.1.1819': attribute type 6 has an invalid length. [ 499.572341][T11168] netlink: 'syz.1.1819': attribute type 1 has an invalid length. [ 499.599022][T11163] netlink: 830 bytes leftover after parsing attributes in process `syz.2.1816'. [ 499.599363][T11168] netlink: 199820 bytes leftover after parsing attributes in process `syz.1.1819'. [ 501.118007][T11200] syzkaller0: entered allmulticast mode [ 501.228886][T11202] netlink: 192440 bytes leftover after parsing attributes in process `syz.0.1830'. [ 501.315915][T11204] sctp: [Deprecated]: syz.2.1829 (pid 11204) Use of struct sctp_assoc_value in delayed_ack socket option. [ 501.315915][T11204] Use struct sctp_sack_info instead [ 501.356102][T11203] netlink: 'syz.0.1830': attribute type 6 has an invalid length. [ 501.369387][T11202] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 501.429340][T11203] netlink: 'syz.0.1830': attribute type 1 has an invalid length. [ 501.437192][T11203] netlink: 199820 bytes leftover after parsing attributes in process `syz.0.1830'. [ 501.817880][ T1287] ieee802154 phy0 wpan0: encryption failed: -22 [ 501.828736][ T1287] ieee802154 phy1 wpan1: encryption failed: -22 [ 503.292491][T11239] netlink: 'syz.1.1841': attribute type 21 has an invalid length. [ 503.330007][T11239] netlink: 164 bytes leftover after parsing attributes in process `syz.1.1841'. [ 503.367037][T11241] tipc: Failed to clone mcast rcv buffer [ 505.428672][T11258] netlink: 192440 bytes leftover after parsing attributes in process `syz.3.1846'. [ 505.549240][T11258] openvswitch: netlink: Key 9 has unexpected len 3064 expected 4 [ 505.762303][T11258] netlink: 'syz.3.1846': attribute type 6 has an invalid length. [ 505.833724][T11258] netlink: 'syz.3.1846': attribute type 1 has an invalid length. [ 505.863455][T11258] netlink: 199820 bytes leftover after parsing attributes in process `syz.3.1846'. [ 506.554801][T11276] netlink: 11262 bytes leftover after parsing attributes in process `syz.3.1852'. [ 506.615795][T11281] netlink: 1 bytes leftover after parsing attributes in process `syz.0.1855'. [ 506.695368][T11283] netlink: 11262 bytes leftover after parsing attributes in process `syz.3.1852'. [ 506.795054][T11281] netlink: 'syz.0.1855': attribute type 39 has an invalid length. [ 508.296076][T11312] FAULT_INJECTION: forcing a failure. [ 508.296076][T11312] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 508.343835][T11312] CPU: 0 PID: 11312 Comm: syz.1.1867 Not tainted syzkaller #0 [ 508.351383][T11312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 508.361588][T11312] Call Trace: [ 508.364916][T11312] [ 508.367896][T11312] dump_stack_lvl+0x18c/0x250 [ 508.372701][T11312] ? show_regs_print_info+0x20/0x20 [ 508.377975][T11312] ? load_image+0x400/0x400 [ 508.382570][T11312] ? __might_fault+0xaa/0x120 [ 508.387310][T11312] ? __lock_acquire+0x7d40/0x7d40 [ 508.392394][T11312] should_fail_ex+0x39d/0x4d0 [ 508.397142][T11312] _copy_from_user+0x2f/0xe0 [ 508.401796][T11312] __sys_bpf+0x23e/0x890 [ 508.406097][T11312] ? bpf_link_show_fdinfo+0x390/0x390 [ 508.411533][T11312] ? lock_chain_count+0x20/0x20 [ 508.416431][T11312] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 508.422733][T11312] __x64_sys_bpf+0x7c/0x90 [ 508.427201][T11312] do_syscall_64+0x55/0xa0 [ 508.431695][T11312] ? clear_bhb_loop+0x40/0x90 [ 508.436428][T11312] ? clear_bhb_loop+0x40/0x90 [ 508.441245][T11312] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 508.447194][T11312] RIP: 0033:0x7f439639c799 [ 508.451668][T11312] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 508.471616][T11312] RSP: 002b:00007f4397255028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 508.480064][T11312] RAX: ffffffffffffffda RBX: 00007f4396615fa0 RCX: 00007f439639c799 [ 508.488067][T11312] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 508.496081][T11312] RBP: 00007f4397255090 R08: 0000000000000000 R09: 0000000000000000 [ 508.504085][T11312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 508.512093][T11312] R13: 00007f4396616038 R14: 00007f4396615fa0 R15: 00007ffd91dfd878 [ 508.520114][T11312] [ 509.126974][T11326] netlink: 60 bytes leftover after parsing attributes in process `syz.2.1870'. [ 509.170580][T11326] netlink: 60 bytes leftover after parsing attributes in process `syz.2.1870'. [ 509.200727][T11329] netlink: 60 bytes leftover after parsing attributes in process `syz.2.1870'. [ 509.228049][T11326] netlink: 63503 bytes leftover after parsing attributes in process `syz.2.1870'. [ 509.255834][T11326] netlink: 60 bytes leftover after parsing attributes in process `syz.2.1870'. [ 511.598068][T11377] netlink: 'syz.1.1888': attribute type 29 has an invalid length. [ 511.698890][T11377] netlink: 'syz.1.1888': attribute type 29 has an invalid length. [ 511.731371][T11378] netlink: 'syz.1.1888': attribute type 29 has an invalid length. [ 512.636419][T11392] netlink: 1 bytes leftover after parsing attributes in process `syz.2.1893'. [ 512.664807][T11392] netlink: 'syz.2.1893': attribute type 39 has an invalid length. [ 513.740574][T11408] netlink: 'syz.2.1899': attribute type 29 has an invalid length. [ 513.748858][T11408] netlink: 'syz.2.1899': attribute type 29 has an invalid length. [ 513.786074][T11408] netlink: 'syz.2.1899': attribute type 29 has an invalid length. [ 514.857299][T11434] netlink: 'syz.1.1907': attribute type 2 has an invalid length. [ 514.911199][T11434] netlink: 'syz.1.1907': attribute type 1 has an invalid length. [ 514.966472][T11434] netlink: 199820 bytes leftover after parsing attributes in process `syz.1.1907'. [ 515.589260][T11451] netlink: 'syz.3.1911': attribute type 29 has an invalid length. [ 516.271512][T11461] netlink: 132 bytes leftover after parsing attributes in process `syz.2.1916'. [ 516.886036][T11467] netlink: 169232 bytes leftover after parsing attributes in process `syz.0.1917'. [ 518.940871][T11487] validate_nla: 4 callbacks suppressed [ 518.940898][T11487] netlink: 'syz.0.1925': attribute type 29 has an invalid length. [ 518.985084][T11487] netlink: 'syz.0.1925': attribute type 29 has an invalid length. [ 519.010305][T11489] netlink: 'syz.0.1925': attribute type 29 has an invalid length. [ 520.682411][T11511] netlink: 169232 bytes leftover after parsing attributes in process `syz.1.1935'. [ 522.033809][T11536] netlink: 'syz.1.1943': attribute type 10 has an invalid length. [ 522.755067][T11556] netlink: 169232 bytes leftover after parsing attributes in process `syz.3.1948'. [ 522.755181][T11558] FAULT_INJECTION: forcing a failure. [ 522.755181][T11558] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 522.814888][T11558] CPU: 1 PID: 11558 Comm: syz.0.1950 Not tainted syzkaller #0 [ 522.822439][T11558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 522.832754][T11558] Call Trace: [ 522.836074][T11558] [ 522.839045][T11558] dump_stack_lvl+0x18c/0x250 [ 522.843791][T11558] ? show_regs_print_info+0x20/0x20 [ 522.849056][T11558] ? load_image+0x400/0x400 [ 522.853730][T11558] ? __might_fault+0xaa/0x120 [ 522.858476][T11558] ? __lock_acquire+0x7d40/0x7d40 [ 522.863569][T11558] should_fail_ex+0x39d/0x4d0 [ 522.868396][T11558] _copy_from_iter+0x1d9/0x12e0 [ 522.873492][T11558] ? dev_get_by_index+0x22/0x2d0 [ 522.878511][T11558] ? __lock_acquire+0x7d40/0x7d40 [ 522.883590][T11558] ? copyout_mc+0x70/0x70 [ 522.887988][T11558] ? verify_lock_unused+0x140/0x140 [ 522.893251][T11558] ? dev_get_by_index+0x22/0x2d0 [ 522.898238][T11558] ? dev_get_by_index+0x22/0x2d0 [ 522.903354][T11558] packet_sendmsg+0x2e23/0x4d70 [ 522.908290][T11558] ? aa_sk_perm+0x970/0x970 [ 522.912875][T11558] ? __might_sleep+0xe0/0xe0 [ 522.917569][T11558] ? verify_lock_unused+0x140/0x140 [ 522.922821][T11558] ? perf_trace_lock_acquire+0x104/0x410 [ 522.928609][T11558] ? aa_sk_perm+0x83c/0x970 [ 522.933177][T11558] ? packet_getsockopt+0xad0/0xad0 [ 522.938363][T11558] ? aa_sock_msg_perm+0x94/0x150 [ 522.943353][T11558] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 522.948689][T11558] ? security_socket_sendmsg+0x80/0xa0 [ 522.954202][T11558] ? packet_getsockopt+0xad0/0xad0 [ 522.959377][T11558] ____sys_sendmsg+0x5ba/0x960 [ 522.964184][T11558] ? __lock_acquire+0x7d40/0x7d40 [ 522.969263][T11558] ? __asan_memset+0x22/0x40 [ 522.973905][T11558] ? __sys_sendmsg_sock+0x30/0x30 [ 522.978977][T11558] ? __import_iovec+0x5f2/0x850 [ 522.983910][T11558] ? import_iovec+0x73/0xa0 [ 522.988457][T11558] ___sys_sendmsg+0x2a6/0x360 [ 522.993195][T11558] ? get_pid_task+0x20/0x1e0 [ 522.997911][T11558] ? __sys_sendmsg+0x2a0/0x2a0 [ 523.002812][T11558] ? __lock_acquire+0x7d40/0x7d40 [ 523.007892][T11558] __se_sys_sendmsg+0x1c2/0x2b0 [ 523.012783][T11558] ? __x64_sys_sendmsg+0x80/0x80 [ 523.017799][T11558] ? lockdep_hardirqs_on+0x98/0x150 [ 523.023122][T11558] do_syscall_64+0x55/0xa0 [ 523.027582][T11558] ? clear_bhb_loop+0x40/0x90 [ 523.032396][T11558] ? clear_bhb_loop+0x40/0x90 [ 523.037183][T11558] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 523.043112][T11558] RIP: 0033:0x7f00ffb9c799 [ 523.047651][T11558] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 523.067328][T11558] RSP: 002b:00007f0100ac4028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 523.075772][T11558] RAX: ffffffffffffffda RBX: 00007f00ffe15fa0 RCX: 00007f00ffb9c799 [ 523.083776][T11558] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 523.091780][T11558] RBP: 00007f0100ac4090 R08: 0000000000000000 R09: 0000000000000000 [ 523.099782][T11558] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 523.107864][T11558] R13: 00007f00ffe16038 R14: 00007f00ffe15fa0 R15: 00007ffca7287ae8 [ 523.115883][T11558] [ 524.820579][T11567] FAULT_INJECTION: forcing a failure. [ 524.820579][T11567] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 524.834852][T11567] CPU: 1 PID: 11567 Comm: syz.0.1953 Not tainted syzkaller #0 [ 524.842400][T11567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 524.852521][T11567] Call Trace: [ 524.855852][T11567] [ 524.858836][T11567] dump_stack_lvl+0x18c/0x250 [ 524.863597][T11567] ? show_regs_print_info+0x20/0x20 [ 524.868872][T11567] ? load_image+0x400/0x400 [ 524.873462][T11567] ? __might_fault+0xaa/0x120 [ 524.878215][T11567] ? __lock_acquire+0x7d40/0x7d40 [ 524.883329][T11567] should_fail_ex+0x39d/0x4d0 [ 524.888175][T11567] _copy_from_iter+0x1d9/0x12e0 [ 524.893190][T11567] ? slab_post_alloc_hook+0x8a/0x4b0 [ 524.898546][T11567] ? __virt_addr_valid+0x18c/0x540 [ 524.903733][T11567] ? __lock_acquire+0x7d40/0x7d40 [ 524.908823][T11567] ? rcu_is_watching+0x15/0xb0 [ 524.913754][T11567] ? copyout_mc+0x70/0x70 [ 524.918242][T11567] ? __virt_addr_valid+0x18c/0x540 [ 524.923435][T11567] ? __virt_addr_valid+0x18c/0x540 [ 524.928621][T11567] ? __virt_addr_valid+0x469/0x540 [ 524.933804][T11567] ? __check_object_size+0x506/0xa20 [ 524.939173][T11567] netlink_sendmsg+0x76b/0xbf0 [ 524.944037][T11567] ? netlink_getsockopt+0x590/0x590 [ 524.949313][T11567] ? aa_sock_msg_perm+0x94/0x150 [ 524.954337][T11567] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 524.959777][T11567] ? security_socket_sendmsg+0x80/0xa0 [ 524.965309][T11567] ? netlink_getsockopt+0x590/0x590 [ 524.970586][T11567] ____sys_sendmsg+0x5ba/0x960 [ 524.975404][T11567] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 524.981646][T11567] ? __asan_memset+0x22/0x40 [ 524.986412][T11567] ? __sys_sendmsg_sock+0x30/0x30 [ 524.991505][T11567] ? __import_iovec+0x5f2/0x850 [ 524.996451][T11567] ? import_iovec+0x73/0xa0 [ 525.001050][T11567] ___sys_sendmsg+0x2a6/0x360 [ 525.005807][T11567] ? __sys_sendmsg+0x2a0/0x2a0 [ 525.010766][T11567] ? __lock_acquire+0x7d40/0x7d40 [ 525.015917][T11567] __se_sys_sendmsg+0x1c2/0x2b0 [ 525.020841][T11567] ? __x64_sys_sendmsg+0x80/0x80 [ 525.026060][T11567] ? lockdep_hardirqs_on+0x98/0x150 [ 525.031344][T11567] do_syscall_64+0x55/0xa0 [ 525.035834][T11567] ? clear_bhb_loop+0x40/0x90 [ 525.040580][T11567] ? clear_bhb_loop+0x40/0x90 [ 525.045334][T11567] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 525.051299][T11567] RIP: 0033:0x7f00ffb9c799 [ 525.055770][T11567] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 525.075438][T11567] RSP: 002b:00007f0100ac4028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 525.083926][T11567] RAX: ffffffffffffffda RBX: 00007f00ffe15fa0 RCX: 00007f00ffb9c799 [ 525.091976][T11567] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 000000000000000e [ 525.100008][T11567] RBP: 00007f0100ac4090 R08: 0000000000000000 R09: 0000000000000000 [ 525.108152][T11567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 525.116178][T11567] R13: 00007f00ffe16038 R14: 00007f00ffe15fa0 R15: 00007ffca7287ae8 [ 525.124423][T11567] [ 525.291030][T11575] netlink: 7551 bytes leftover after parsing attributes in process `syz.2.1957'. [ 525.367415][T11581] netlink: 'syz.0.1958': attribute type 12 has an invalid length. [ 525.377857][T11581] netlink: 172 bytes leftover after parsing attributes in process `syz.0.1958'. [ 525.660924][T11592] FAULT_INJECTION: forcing a failure. [ 525.660924][T11592] name failslab, interval 1, probability 0, space 0, times 0 [ 525.674076][T11592] CPU: 0 PID: 11592 Comm: syz.3.1961 Not tainted syzkaller #0 [ 525.681608][T11592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 525.691717][T11592] Call Trace: [ 525.695084][T11592] [ 525.698080][T11592] dump_stack_lvl+0x18c/0x250 [ 525.702823][T11592] ? sctp_sendmsg+0x1575/0x28c0 [ 525.707736][T11592] ? ___sys_sendmsg+0x2a6/0x360 [ 525.712646][T11592] ? show_regs_print_info+0x20/0x20 [ 525.717920][T11592] ? load_image+0x400/0x400 [ 525.722578][T11592] should_fail_ex+0x39d/0x4d0 [ 525.727656][T11592] should_failslab+0x9/0x20 [ 525.732243][T11592] slab_pre_alloc_hook+0x59/0x310 [ 525.737340][T11592] ? sctp_add_bind_addr+0x8c/0x360 [ 525.742515][T11592] __kmem_cache_alloc_node+0x53/0x250 [ 525.747959][T11592] ? sctp_add_bind_addr+0x8c/0x360 [ 525.753141][T11592] kmalloc_trace+0x2a/0xe0 [ 525.757623][T11592] sctp_add_bind_addr+0x8c/0x360 [ 525.762642][T11592] sctp_copy_local_addr_list+0x315/0x4f0 [ 525.768360][T11592] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 525.774163][T11592] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 525.780414][T11592] ? sctp_v4_is_any+0x35/0x60 [ 525.785145][T11592] ? sctp_copy_one_addr+0x8c/0x350 [ 525.790352][T11592] sctp_bind_addr_copy+0xb3/0x3c0 [ 525.795447][T11592] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 525.802013][T11592] sctp_connect_new_asoc+0x2f9/0x6a0 [ 525.807453][T11592] ? __sctp_connect+0xd80/0xd80 [ 525.812348][T11592] ? __local_bh_enable_ip+0x13a/0x1c0 [ 525.817796][T11592] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 525.823397][T11592] ? security_sctp_bind_connect+0x89/0xb0 [ 525.829196][T11592] sctp_sendmsg+0x1575/0x28c0 [ 525.834056][T11592] ? sctp_getsockopt+0xb60/0xb60 [ 525.839146][T11592] ? aa_sk_perm+0x83c/0x970 [ 525.843754][T11592] ? aa_af_perm+0x330/0x330 [ 525.848315][T11592] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 525.854811][T11592] ? sock_rps_record_flow+0x19/0x3f0 [ 525.860166][T11592] ? inet_sendmsg+0xe9/0x2f0 [ 525.864819][T11592] ? inet_send_prepare+0x260/0x260 [ 525.869995][T11592] ____sys_sendmsg+0x5ba/0x960 [ 525.874846][T11592] ? __lock_acquire+0x7d40/0x7d40 [ 525.879957][T11592] ? __asan_memset+0x22/0x40 [ 525.884613][T11592] ? __sys_sendmsg_sock+0x30/0x30 [ 525.889778][T11592] ? __import_iovec+0x5f2/0x850 [ 525.894715][T11592] ? import_iovec+0x73/0xa0 [ 525.899293][T11592] ___sys_sendmsg+0x2a6/0x360 [ 525.904130][T11592] ? __sys_sendmsg+0x2a0/0x2a0 [ 525.909025][T11592] ? __lock_acquire+0x7d40/0x7d40 [ 525.914189][T11592] __se_sys_sendmsg+0x1c2/0x2b0 [ 525.919116][T11592] ? __x64_sys_sendmsg+0x80/0x80 [ 525.924163][T11592] ? lockdep_hardirqs_on+0x98/0x150 [ 525.929467][T11592] do_syscall_64+0x55/0xa0 [ 525.933961][T11592] ? clear_bhb_loop+0x40/0x90 [ 525.938774][T11592] ? clear_bhb_loop+0x40/0x90 [ 525.943517][T11592] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 525.949470][T11592] RIP: 0033:0x7f48d059c799 [ 525.953937][T11592] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 525.973606][T11592] RSP: 002b:00007f48d13cf028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 525.982120][T11592] RAX: ffffffffffffffda RBX: 00007f48d0815fa0 RCX: 00007f48d059c799 [ 525.990162][T11592] RDX: 00000000000080d1 RSI: 0000200000000140 RDI: 0000000000000003 [ 525.998180][T11592] RBP: 00007f48d13cf090 R08: 0000000000000000 R09: 0000000000000000 [ 526.006204][T11592] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 526.014227][T11592] R13: 00007f48d0816038 R14: 00007f48d0815fa0 R15: 00007ffcf2b9b018 [ 526.022335][T11592] [ 526.035309][T11589] netlink: zone id is out of range [ 526.041341][T11589] netlink: set zone limit has 8 unknown bytes [ 527.347818][T11615] netlink: 'syz.2.1970': attribute type 11 has an invalid length. [ 527.373962][T11615] netlink: 184116 bytes leftover after parsing attributes in process `syz.2.1970'. [ 527.386612][T11616] netlink: 'syz.2.1970': attribute type 11 has an invalid length. [ 527.395841][T11616] netlink: 184116 bytes leftover after parsing attributes in process `syz.2.1970'. [ 527.768749][T11628] netlink: 'syz.2.1973': attribute type 10 has an invalid length. [ 527.951264][T11634] netlink: 209844 bytes leftover after parsing attributes in process `syz.1.1976'. [ 528.626504][T11645] netlink: 'syz.2.1979': attribute type 10 has an invalid length. [ 528.699966][T11645] team0: Port device netdevsim0 added [ 529.083006][T11657] netlink: 'syz.3.1982': attribute type 10 has an invalid length. [ 529.443051][T11657] hsr_slave_0 (unregistering): left promiscuous mode [ 529.918224][T11652] delete_channel: no stack [ 530.224372][T11670] FAULT_INJECTION: forcing a failure. [ 530.224372][T11670] name failslab, interval 1, probability 0, space 0, times 0 [ 530.250421][T11670] CPU: 0 PID: 11670 Comm: syz.0.1985 Not tainted syzkaller #0 [ 530.257968][T11670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 530.268076][T11670] Call Trace: [ 530.271401][T11670] [ 530.274380][T11670] dump_stack_lvl+0x18c/0x250 [ 530.279147][T11670] ? show_regs_print_info+0x20/0x20 [ 530.284425][T11670] ? load_image+0x400/0x400 [ 530.289001][T11670] ? __might_sleep+0xe0/0xe0 [ 530.293665][T11670] ? __lock_acquire+0x7d40/0x7d40 [ 530.298898][T11670] ? prepend_path+0x4b/0x960 [ 530.303653][T11670] should_fail_ex+0x39d/0x4d0 [ 530.308409][T11670] should_failslab+0x9/0x20 [ 530.313064][T11670] slab_pre_alloc_hook+0x59/0x310 [ 530.318542][T11670] ? __asan_memcpy+0x40/0x70 [ 530.323284][T11670] ? tomoyo_encode+0x28b/0x540 [ 530.328122][T11670] ? tomoyo_encode+0x28b/0x540 [ 530.332948][T11670] __kmem_cache_alloc_node+0x53/0x250 [ 530.338393][T11670] ? prepend_path+0x4b/0x960 [ 530.343042][T11670] ? tomoyo_encode+0x28b/0x540 [ 530.347887][T11670] __kmalloc+0xa4/0x230 [ 530.352148][T11670] tomoyo_encode+0x28b/0x540 [ 530.356798][T11670] tomoyo_realpath_from_path+0x592/0x5d0 [ 530.362520][T11670] tomoyo_path_number_perm+0x248/0x620 [ 530.368044][T11670] ? tomoyo_path_number_perm+0x217/0x620 [ 530.373749][T11670] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 530.379337][T11670] ? ksys_write+0x1c4/0x260 [ 530.383938][T11670] ? __fget_files+0x28/0x4b0 [ 530.388643][T11670] ? __fget_files+0x28/0x4b0 [ 530.393443][T11670] security_file_ioctl+0x70/0xa0 [ 530.398463][T11670] __se_sys_ioctl+0x48/0x170 [ 530.403110][T11670] do_syscall_64+0x55/0xa0 [ 530.407607][T11670] ? clear_bhb_loop+0x40/0x90 [ 530.412360][T11670] ? clear_bhb_loop+0x40/0x90 [ 530.417090][T11670] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 530.423131][T11670] RIP: 0033:0x7f00ffb9c799 [ 530.427775][T11670] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 530.447705][T11670] RSP: 002b:00007f0100ac4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 530.456177][T11670] RAX: ffffffffffffffda RBX: 00007f00ffe15fa0 RCX: 00007f00ffb9c799 [ 530.464210][T11670] RDX: 0000000000000001 RSI: 00000000400454d0 RDI: 0000000000000003 [ 530.472236][T11670] RBP: 00007f0100ac4090 R08: 0000000000000000 R09: 0000000000000000 [ 530.480262][T11670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 530.488287][T11670] R13: 00007f00ffe16038 R14: 00007f00ffe15fa0 R15: 00007ffca7287ae8 [ 530.496329][T11670] [ 530.515089][T11670] ERROR: Out of memory at tomoyo_realpath_from_path. [ 531.161454][T11686] netlink: 209844 bytes leftover after parsing attributes in process `syz.3.1990'. [ 531.354623][T11694] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1995'. [ 531.539767][T11694] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1995'. [ 531.585286][T11698] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1995'. [ 532.222925][T11706] netlink: 'syz.0.1998': attribute type 12 has an invalid length. [ 532.251371][T11706] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1998'. [ 532.468879][T11714] netlink: 'syz.2.2000': attribute type 3 has an invalid length. [ 532.489416][T11714] netlink: 201372 bytes leftover after parsing attributes in process `syz.2.2000'. [ 533.119381][T11737] netlink: 'syz.1.2008': attribute type 10 has an invalid length. [ 533.444841][T11737] team0: Port device dummy0 added [ 533.815180][T11737] syz.1.2008 (11737) used greatest stack depth: 18160 bytes left [ 534.053040][T11752] netlink: 209844 bytes leftover after parsing attributes in process `syz.2.2011'. [ 535.505083][T11775] netlink: 'syz.2.2018': attribute type 10 has an invalid length. [ 536.605848][T11788] netlink: 14560 bytes leftover after parsing attributes in process `syz.0.2021'. [ 537.183847][ T51] Bluetooth: hci1: unexpected event 0x14 length: 15 > 6 [ 538.405506][T11820] netlink: 209844 bytes leftover after parsing attributes in process `syz.0.2029'. [ 538.441646][T11823] FAULT_INJECTION: forcing a failure. [ 538.441646][T11823] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 538.493552][T11823] CPU: 1 PID: 11823 Comm: syz.2.2031 Not tainted syzkaller #0 [ 538.501106][T11823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 538.511312][T11823] Call Trace: [ 538.514648][T11823] [ 538.517725][T11823] dump_stack_lvl+0x18c/0x250 [ 538.522476][T11823] ? show_regs_print_info+0x20/0x20 [ 538.527740][T11823] ? load_image+0x400/0x400 [ 538.532303][T11823] ? __might_fault+0xaa/0x120 [ 538.537034][T11823] ? __lock_acquire+0x7d40/0x7d40 [ 538.542173][T11823] should_fail_ex+0x39d/0x4d0 [ 538.546920][T11823] _copy_from_user+0x2f/0xe0 [ 538.551595][T11823] ___sys_recvmsg+0x176/0x590 [ 538.556606][T11823] ? __sys_recvmsg+0x2a0/0x2a0 [ 538.561428][T11823] ? ksys_write+0x1c4/0x260 [ 538.566015][T11823] ? __fget_files+0x43d/0x4b0 [ 538.571124][T11823] __x64_sys_recvmsg+0x20c/0x2e0 [ 538.576146][T11823] ? ___sys_recvmsg+0x590/0x590 [ 538.581097][T11823] ? lockdep_hardirqs_on+0x98/0x150 [ 538.586453][T11823] do_syscall_64+0x55/0xa0 [ 538.591013][T11823] ? clear_bhb_loop+0x40/0x90 [ 538.595744][T11823] ? clear_bhb_loop+0x40/0x90 [ 538.600483][T11823] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 538.606482][T11823] RIP: 0033:0x7fa408f9c799 [ 538.611092][T11823] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 538.630941][T11823] RSP: 002b:00007fa409eeb028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 538.639516][T11823] RAX: ffffffffffffffda RBX: 00007fa409216090 RCX: 00007fa408f9c799 [ 538.647654][T11823] RDX: 0000000000010057 RSI: 0000200000000300 RDI: 0000000000000003 [ 538.655696][T11823] RBP: 00007fa409eeb090 R08: 0000000000000000 R09: 0000000000000000 [ 538.663728][T11823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 538.671769][T11823] R13: 00007fa409216128 R14: 00007fa409216090 R15: 00007ffe47b661a8 [ 538.679831][T11823] [ 539.822378][T11842] netlink: 14560 bytes leftover after parsing attributes in process `syz.1.2038'. [ 540.146772][T11853] FAULT_INJECTION: forcing a failure. [ 540.146772][T11853] name failslab, interval 1, probability 0, space 0, times 0 [ 540.180547][T11853] CPU: 0 PID: 11853 Comm: syz.1.2041 Not tainted syzkaller #0 [ 540.188112][T11853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 540.198232][T11853] Call Trace: [ 540.201580][T11853] [ 540.204659][T11853] dump_stack_lvl+0x18c/0x250 [ 540.209493][T11853] ? show_regs_print_info+0x20/0x20 [ 540.214769][T11853] ? load_image+0x400/0x400 [ 540.219342][T11853] ? __might_sleep+0xe0/0xe0 [ 540.224005][T11853] ? __lock_acquire+0x7d40/0x7d40 [ 540.229101][T11853] should_fail_ex+0x39d/0x4d0 [ 540.233936][T11853] should_failslab+0x9/0x20 [ 540.238506][T11853] slab_pre_alloc_hook+0x59/0x310 [ 540.243770][T11853] ? tomoyo_encode+0x28b/0x540 [ 540.248626][T11853] ? tomoyo_encode+0x28b/0x540 [ 540.253452][T11853] __kmem_cache_alloc_node+0x53/0x250 [ 540.258894][T11853] ? tomoyo_encode+0x28b/0x540 [ 540.263801][T11853] __kmalloc+0xa4/0x230 [ 540.268004][T11853] tomoyo_encode+0x28b/0x540 [ 540.272640][T11853] tomoyo_realpath_from_path+0x592/0x5d0 [ 540.278314][T11853] tomoyo_path_number_perm+0x248/0x620 [ 540.283924][T11853] ? tomoyo_path_number_perm+0x217/0x620 [ 540.289630][T11853] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 540.295151][T11853] ? ksys_write+0x1c4/0x260 [ 540.299810][T11853] ? __fget_files+0x28/0x4b0 [ 540.304449][T11853] ? __fget_files+0x28/0x4b0 [ 540.309270][T11853] security_file_ioctl+0x70/0xa0 [ 540.314254][T11853] __se_sys_ioctl+0x48/0x170 [ 540.318885][T11853] do_syscall_64+0x55/0xa0 [ 540.323339][T11853] ? clear_bhb_loop+0x40/0x90 [ 540.328049][T11853] ? clear_bhb_loop+0x40/0x90 [ 540.332765][T11853] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 540.338694][T11853] RIP: 0033:0x7f439639c799 [ 540.343154][T11853] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 540.362804][T11853] RSP: 002b:00007f4397255028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 540.371266][T11853] RAX: ffffffffffffffda RBX: 00007f4396615fa0 RCX: 00007f439639c799 [ 540.379363][T11853] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000004 [ 540.387368][T11853] RBP: 00007f4397255090 R08: 0000000000000000 R09: 0000000000000000 [ 540.395605][T11853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 540.403618][T11853] R13: 00007f4396616038 R14: 00007f4396615fa0 R15: 00007ffd91dfd878 [ 540.411640][T11853] [ 540.424697][T11853] ERROR: Out of memory at tomoyo_realpath_from_path. [ 540.702438][T11856] delete_channel: no stack [ 541.327934][T11875] netlink: 'syz.0.2050': attribute type 33 has an invalid length. [ 541.384641][T11875] netlink: 152 bytes leftover after parsing attributes in process `syz.0.2050'. [ 541.715989][T11887] FAULT_INJECTION: forcing a failure. [ 541.715989][T11887] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 541.789481][T11887] CPU: 0 PID: 11887 Comm: syz.0.2053 Not tainted syzkaller #0 [ 541.797144][T11887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 541.807287][T11887] Call Trace: [ 541.810661][T11887] [ 541.813667][T11887] dump_stack_lvl+0x18c/0x250 [ 541.818482][T11887] ? show_regs_print_info+0x20/0x20 [ 541.823782][T11887] ? load_image+0x400/0x400 [ 541.828386][T11887] ? __might_fault+0xaa/0x120 [ 541.833157][T11887] ? __lock_acquire+0x7d40/0x7d40 [ 541.838304][T11887] should_fail_ex+0x39d/0x4d0 [ 541.843112][T11887] _copy_from_user+0x2f/0xe0 [ 541.847839][T11887] __sys_bpf+0x23e/0x890 [ 541.852187][T11887] ? bpf_link_show_fdinfo+0x390/0x390 [ 541.857704][T11887] ? lock_chain_count+0x20/0x20 [ 541.862689][T11887] __x64_sys_bpf+0x7c/0x90 [ 541.867218][T11887] do_syscall_64+0x55/0xa0 [ 541.871736][T11887] ? clear_bhb_loop+0x40/0x90 [ 541.876759][T11887] ? clear_bhb_loop+0x40/0x90 [ 541.881538][T11887] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 541.887549][T11887] RIP: 0033:0x7f00ffb9c799 [ 541.892063][T11887] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 541.911755][T11887] RSP: 002b:00007f0100ac4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 541.920251][T11887] RAX: ffffffffffffffda RBX: 00007f00ffe15fa0 RCX: 00007f00ffb9c799 [ 541.928297][T11887] RDX: 0000000000000010 RSI: 0000200000000b40 RDI: 000000000000000f [ 541.936347][T11887] RBP: 00007f0100ac4090 R08: 0000000000000000 R09: 0000000000000000 [ 541.944418][T11887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 541.952478][T11887] R13: 00007f00ffe16038 R14: 00007f00ffe15fa0 R15: 00007ffca7287ae8 [ 541.960613][T11887] [ 542.175206][T11890] delete_channel: no stack [ 542.649869][T11906] netlink: 135856 bytes leftover after parsing attributes in process `syz.2.2059'. [ 542.796364][T11908] FAULT_INJECTION: forcing a failure. [ 542.796364][T11908] name failslab, interval 1, probability 0, space 0, times 0 [ 542.819890][T11908] CPU: 0 PID: 11908 Comm: syz.0.2060 Not tainted syzkaller #0 [ 542.827441][T11908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 542.837635][T11908] Call Trace: [ 542.840964][T11908] [ 542.843943][T11908] dump_stack_lvl+0x18c/0x250 [ 542.848685][T11908] ? show_regs_print_info+0x20/0x20 [ 542.853948][T11908] ? load_image+0x400/0x400 [ 542.858519][T11908] ? __might_sleep+0xe0/0xe0 [ 542.863203][T11908] ? __lock_acquire+0x7d40/0x7d40 [ 542.868284][T11908] ? lock_chain_count+0x20/0x20 [ 542.873192][T11908] should_fail_ex+0x39d/0x4d0 [ 542.877951][T11908] should_failslab+0x9/0x20 [ 542.882516][T11908] slab_pre_alloc_hook+0x59/0x310 [ 542.887600][T11908] ? sk_prot_alloc+0xe7/0x210 [ 542.892343][T11908] ? sk_prot_alloc+0xe7/0x210 [ 542.897079][T11908] ? sk_prot_alloc+0xe7/0x210 [ 542.901809][T11908] __kmem_cache_alloc_node+0x53/0x250 [ 542.907251][T11908] ? sk_prot_alloc+0xe7/0x210 [ 542.912023][T11908] __kmalloc+0xa4/0x230 [ 542.916246][T11908] sk_prot_alloc+0xe7/0x210 [ 542.920800][T11908] ? sk_alloc+0x24/0x360 [ 542.925107][T11908] sk_alloc+0x3a/0x360 [ 542.929235][T11908] ? bpf_ctx_init+0x163/0x1a0 [ 542.933971][T11908] ? bpf_prog_test_run_skb+0x273/0x12b0 [ 542.939662][T11908] bpf_prog_test_run_skb+0x3a5/0x12b0 [ 542.945178][T11908] ? __fget_files+0x28/0x4b0 [ 542.949855][T11908] ? __fget_files+0x28/0x4b0 [ 542.954506][T11908] ? __fget_files+0x43d/0x4b0 [ 542.959242][T11908] ? cpu_online+0x60/0x60 [ 542.963622][T11908] bpf_prog_test_run+0x321/0x390 [ 542.968626][T11908] __sys_bpf+0x49d/0x890 [ 542.972921][T11908] ? bpf_link_show_fdinfo+0x390/0x390 [ 542.978401][T11908] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 542.984633][T11908] __x64_sys_bpf+0x7c/0x90 [ 542.989131][T11908] do_syscall_64+0x55/0xa0 [ 542.993619][T11908] ? clear_bhb_loop+0x40/0x90 [ 542.998376][T11908] ? clear_bhb_loop+0x40/0x90 [ 543.003115][T11908] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 543.009059][T11908] RIP: 0033:0x7f00ffb9c799 [ 543.013621][T11908] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 543.033377][T11908] RSP: 002b:00007f0100ac4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 543.041855][T11908] RAX: ffffffffffffffda RBX: 00007f00ffe15fa0 RCX: 00007f00ffb9c799 [ 543.049969][T11908] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 543.057999][T11908] RBP: 00007f0100ac4090 R08: 0000000000000000 R09: 0000000000000000 [ 543.066281][T11908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 543.074310][T11908] R13: 00007f00ffe16038 R14: 00007f00ffe15fa0 R15: 00007ffca7287ae8 [ 543.082369][T11908] [ 544.320532][T11922] delete_channel: no stack [ 545.729146][T11956] delete_channel: no stack [ 548.782055][T11974] FAULT_INJECTION: forcing a failure. [ 548.782055][T11974] name failslab, interval 1, probability 0, space 0, times 0 [ 548.799174][T11974] CPU: 1 PID: 11974 Comm: syz.1.2085 Not tainted syzkaller #0 [ 548.806764][T11974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 548.816918][T11974] Call Trace: [ 548.820695][T11974] [ 548.823764][T11974] dump_stack_lvl+0x18c/0x250 [ 548.828565][T11974] ? sctp_sendmsg+0x1575/0x28c0 [ 548.833490][T11974] ? ___sys_sendmsg+0x2a6/0x360 [ 548.838394][T11974] ? show_regs_print_info+0x20/0x20 [ 548.843729][T11974] ? load_image+0x400/0x400 [ 548.848399][T11974] should_fail_ex+0x39d/0x4d0 [ 548.853237][T11974] should_failslab+0x9/0x20 [ 548.857801][T11974] slab_pre_alloc_hook+0x59/0x310 [ 548.862903][T11974] ? sctp_add_bind_addr+0x8c/0x360 [ 548.868069][T11974] __kmem_cache_alloc_node+0x53/0x250 [ 548.873675][T11974] ? sctp_add_bind_addr+0x8c/0x360 [ 548.878819][T11974] kmalloc_trace+0x2a/0xe0 [ 548.883281][T11974] sctp_add_bind_addr+0x8c/0x360 [ 548.888267][T11974] sctp_copy_local_addr_list+0x315/0x4f0 [ 548.894034][T11974] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 548.899802][T11974] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 548.905921][T11974] ? sctp_v4_is_any+0x35/0x60 [ 548.910648][T11974] ? sctp_copy_one_addr+0x8c/0x350 [ 548.915808][T11974] sctp_bind_addr_copy+0xb3/0x3c0 [ 548.921140][T11974] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 548.927589][T11974] sctp_connect_new_asoc+0x2f9/0x6a0 [ 548.932906][T11974] ? __sctp_connect+0xd80/0xd80 [ 548.937879][T11974] ? __local_bh_enable_ip+0x13a/0x1c0 [ 548.943288][T11974] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 548.948871][T11974] ? security_sctp_bind_connect+0x89/0xb0 [ 548.954627][T11974] sctp_sendmsg+0x1575/0x28c0 [ 548.959440][T11974] ? sctp_getsockopt+0xb60/0xb60 [ 548.964410][T11974] ? aa_sk_perm+0x83c/0x970 [ 548.968975][T11974] ? aa_af_perm+0x330/0x330 [ 548.973523][T11974] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 548.979972][T11974] ? sock_rps_record_flow+0x19/0x3f0 [ 548.985470][T11974] ? inet_sendmsg+0xe9/0x2f0 [ 548.990097][T11974] ? inet_send_prepare+0x260/0x260 [ 548.995249][T11974] ____sys_sendmsg+0x5ba/0x960 [ 549.000160][T11974] ? __lock_acquire+0x7d40/0x7d40 [ 549.005222][T11974] ? __asan_memset+0x22/0x40 [ 549.009881][T11974] ? __sys_sendmsg_sock+0x30/0x30 [ 549.014933][T11974] ? __import_iovec+0x5f2/0x850 [ 549.019852][T11974] ? import_iovec+0x73/0xa0 [ 549.024388][T11974] ___sys_sendmsg+0x2a6/0x360 [ 549.029102][T11974] ? get_pid_task+0x20/0x1e0 [ 549.033817][T11974] ? __sys_sendmsg+0x2a0/0x2a0 [ 549.038626][T11974] ? __lock_acquire+0x7d40/0x7d40 [ 549.043721][T11974] __se_sys_sendmsg+0x1c2/0x2b0 [ 549.048602][T11974] ? __x64_sys_sendmsg+0x80/0x80 [ 549.053587][T11974] ? lockdep_hardirqs_on+0x98/0x150 [ 549.058905][T11974] do_syscall_64+0x55/0xa0 [ 549.063368][T11974] ? clear_bhb_loop+0x40/0x90 [ 549.068096][T11974] ? clear_bhb_loop+0x40/0x90 [ 549.072901][T11974] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 549.078833][T11974] RIP: 0033:0x7f439639c799 [ 549.083307][T11974] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 549.102941][T11974] RSP: 002b:00007f4397255028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 549.111388][T11974] RAX: ffffffffffffffda RBX: 00007f4396615fa0 RCX: 00007f439639c799 [ 549.119392][T11974] RDX: 0000000000000010 RSI: 0000200000000480 RDI: 0000000000000003 [ 549.127401][T11974] RBP: 00007f4397255090 R08: 0000000000000000 R09: 0000000000000000 [ 549.135493][T11974] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 549.143492][T11974] R13: 00007f4396616038 R14: 00007f4396615fa0 R15: 00007ffd91dfd878 [ 549.151504][T11974] [ 549.756449][T11985] netlink: 'syz.1.2088': attribute type 9 has an invalid length. [ 549.781680][T11985] netlink: 209836 bytes leftover after parsing attributes in process `syz.1.2088'. [ 549.893496][T11986] netlink: 'syz.1.2088': attribute type 9 has an invalid length. [ 549.901538][T11986] netlink: 209836 bytes leftover after parsing attributes in process `syz.1.2088'. [ 550.299367][T11997] netlink: 176 bytes leftover after parsing attributes in process `syz.0.2091'. [ 550.310162][T11995] delete_channel: no stack [ 551.688443][T12025] delete_channel: no stack [ 552.026206][T12035] netlink: 'syz.0.2113': attribute type 10 has an invalid length. [ 552.247134][T12035] hsr_slave_0 (unregistering): left promiscuous mode [ 552.342586][T12033] netlink: 176 bytes leftover after parsing attributes in process `syz.2.2105'. [ 552.407282][T12034] delete_channel: no stack [ 553.799737][T12062] netlink: 'syz.1.2116': attribute type 17 has an invalid length. [ 553.832307][T12062] netlink: 'syz.1.2116': attribute type 16 has an invalid length. [ 553.850633][T12062] netlink: 152 bytes leftover after parsing attributes in process `syz.1.2116'. [ 553.955376][T12069] netlink: 164 bytes leftover after parsing attributes in process `syz.3.2118'. [ 554.287887][T12072] netlink: 176 bytes leftover after parsing attributes in process `syz.1.2119'. [ 557.298077][T12076] netlink: 'syz.0.2121': attribute type 21 has an invalid length. [ 557.316542][T12076] netlink: 'syz.0.2121': attribute type 30 has an invalid length. [ 557.852316][T12093] netlink: 'syz.1.2127': attribute type 10 has an invalid length. [ 558.180394][T12093] hsr_slave_0 (unregistering): left promiscuous mode [ 558.368661][T12090] delete_channel: no stack [ 560.262009][T12117] delete_channel: no stack [ 562.134672][T12115] netlink: 'syz.2.2136': attribute type 21 has an invalid length. [ 562.143923][T12115] netlink: 'syz.2.2136': attribute type 30 has an invalid length. [ 562.172608][T12122] netlink: 'syz.1.2137': attribute type 10 has an invalid length. [ 563.075243][T12151] netlink: 'syz.3.2148': attribute type 21 has an invalid length. [ 563.110517][T12151] netlink: 'syz.3.2148': attribute type 30 has an invalid length. [ 563.136993][T12153] netlink: 'syz.0.2149': attribute type 10 has an invalid length. [ 563.150111][T12152] delete_channel: no stack [ 563.252807][T12156] netlink: 132 bytes leftover after parsing attributes in process `syz.1.2150'. [ 563.264420][ T1287] ieee802154 phy0 wpan0: encryption failed: -22 [ 563.273131][ T1287] ieee802154 phy1 wpan1: encryption failed: -22 [ 563.611542][ T51] Bluetooth: hci1: unexpected event 0x33 length: 15 > 10 [ 563.762518][T12171] netlink: 'syz.0.2155': attribute type 9 has an invalid length. [ 563.789608][T12171] netlink: 209836 bytes leftover after parsing attributes in process `syz.0.2155'. [ 563.873970][T12172] netlink: 'syz.0.2155': attribute type 9 has an invalid length. [ 563.908331][T12172] netlink: 209836 bytes leftover after parsing attributes in process `syz.0.2155'. [ 564.418504][T12188] netlink: 'syz.3.2161': attribute type 10 has an invalid length. [ 564.440743][T12187] delete_channel: no stack [ 565.096829][ T51] Bluetooth: hci2: unexpected event 0x33 length: 15 > 10 [ 565.631512][T12217] netlink: 65047 bytes leftover after parsing attributes in process `syz.2.2172'. [ 565.752836][T12218] macvlan1: entered allmulticast mode [ 567.452824][ T51] Bluetooth: hci0: unexpected event 0x14 length: 15 > 6 [ 568.819344][T12252] netlink: 'syz.3.2186': attribute type 10 has an invalid length. [ 568.918778][T12251] delete_channel: no stack [ 569.906547][ T51] Bluetooth: hci1: unexpected event 0x33 length: 15 > 10 [ 572.831667][T12290] netlink: 'syz.2.2198': attribute type 21 has an invalid length. [ 572.870937][T12290] IPv6: NLM_F_CREATE should be specified when creating new route [ 573.080287][T12297] netlink: 'syz.3.2199': attribute type 10 has an invalid length. [ 573.124120][T12296] delete_channel: no stack [ 573.163120][T12300] FAULT_INJECTION: forcing a failure. [ 573.163120][T12300] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 573.188847][T12300] CPU: 0 PID: 12300 Comm: syz.0.2200 Not tainted syzkaller #0 [ 573.196490][T12300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 573.206688][T12300] Call Trace: [ 573.210014][T12300] [ 573.213076][T12300] dump_stack_lvl+0x18c/0x250 [ 573.217816][T12300] ? show_regs_print_info+0x20/0x20 [ 573.223254][T12300] ? load_image+0x400/0x400 [ 573.227815][T12300] ? __might_fault+0xaa/0x120 [ 573.232551][T12300] ? __lock_acquire+0x7d40/0x7d40 [ 573.237679][T12300] should_fail_ex+0x39d/0x4d0 [ 573.242418][T12300] _copy_from_user+0x2f/0xe0 [ 573.247047][T12300] __sys_bpf+0x23e/0x890 [ 573.251414][T12300] ? bpf_link_show_fdinfo+0x390/0x390 [ 573.256854][T12300] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 573.263055][T12300] __x64_sys_bpf+0x7c/0x90 [ 573.267515][T12300] do_syscall_64+0x55/0xa0 [ 573.271985][T12300] ? clear_bhb_loop+0x40/0x90 [ 573.276724][T12300] ? clear_bhb_loop+0x40/0x90 [ 573.281449][T12300] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 573.287383][T12300] RIP: 0033:0x7f00ffb9c799 [ 573.291845][T12300] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 573.311484][T12300] RSP: 002b:00007f0100ac4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 573.319937][T12300] RAX: ffffffffffffffda RBX: 00007f00ffe15fa0 RCX: 00007f00ffb9c799 [ 573.327954][T12300] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 573.335948][T12300] RBP: 00007f0100ac4090 R08: 0000000000000000 R09: 0000000000000000 [ 573.343971][T12300] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 573.352245][T12300] R13: 00007f00ffe16038 R14: 00007f00ffe15fa0 R15: 00007ffca7287ae8 [ 573.360300][T12300] [ 574.794861][ T51] Bluetooth: hci2: unexpected event 0x33 length: 15 > 10 [ 575.263377][T12335] netlink: 'syz.0.2213': attribute type 10 has an invalid length. [ 575.297047][T12334] delete_channel: no stack [ 575.966621][ T51] Bluetooth: hci2: unexpected event 0x33 length: 15 > 10 [ 576.555719][T12356] netlink: 'syz.2.2222': attribute type 21 has an invalid length. [ 576.596273][T12358] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 576.603694][T12356] netlink: 'syz.2.2222': attribute type 15 has an invalid length. [ 576.613525][T12358] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 576.619702][T12356] netlink: 'syz.2.2222': attribute type 16 has an invalid length. [ 576.634389][T12358] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 576.642014][T12356] netlink: 'syz.2.2222': attribute type 21 has an invalid length. [ 576.650717][T12356] netlink: 'syz.2.2222': attribute type 25 has an invalid length. [ 576.658848][T12356] netlink: 'syz.2.2222': attribute type 27 has an invalid length. [ 576.667381][T12358] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 576.669675][T12356] netlink: 'syz.2.2222': attribute type 28 has an invalid length. [ 576.694181][T12358] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 576.694192][T12356] netlink: 'syz.2.2222': attribute type 29 has an invalid length. [ 576.713002][T12358] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 576.721010][T12356] netlink: 'syz.2.2222': attribute type 30 has an invalid length. [ 576.837301][ T6395] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 577.146546][ T6395] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 577.299667][T12373] hsr_slave_0 (unregistering): left promiscuous mode [ 577.400992][ T6395] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 577.428600][T12371] delete_channel: no stack [ 577.515203][ T6395] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 577.662533][T12358] Bluetooth: hci3: unexpected event 0x33 length: 15 > 10 [ 577.695705][T12383] syz.3.2229[12383] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 577.703140][T12383] syz.3.2229[12383] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 578.072769][T12396] netlink: 112860 bytes leftover after parsing attributes in process `syz.2.2231'. [ 578.109118][T12396] netlink: 9 bytes leftover after parsing attributes in process `syz.2.2231'. [ 578.110645][T12394] syzkaller0: entered promiscuous mode [ 578.158245][T12394] syzkaller0: entered allmulticast mode [ 578.188180][T12357] chnl_net:caif_netlink_parms(): no params data found [ 578.769292][T12358] Bluetooth: hci0: command tx timeout [ 578.832338][T12357] bridge0: port 1(bridge_slave_0) entered blocking state [ 578.869415][T12357] bridge0: port 1(bridge_slave_0) entered disabled state [ 578.876718][T12357] bridge_slave_0: entered allmulticast mode [ 578.915675][T12357] bridge_slave_0: entered promiscuous mode [ 580.333741][T12420] delete_channel: no stack [ 580.440007][T12358] Bluetooth: hci1: unexpected event 0x33 length: 15 > 10 [ 580.849284][T12358] Bluetooth: hci0: command tx timeout [ 582.159872][T12357] bridge0: port 2(bridge_slave_1) entered blocking state [ 582.182796][T12357] bridge0: port 2(bridge_slave_1) entered disabled state [ 582.193586][T12357] bridge_slave_1: entered allmulticast mode [ 582.212977][T12357] bridge_slave_1: entered promiscuous mode [ 582.224810][T12422] validate_nla: 2 callbacks suppressed [ 582.224826][T12422] netlink: 'syz.2.2235': attribute type 10 has an invalid length. [ 582.555024][T12357] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 582.585974][T12357] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 582.604269][T12445] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2240'. [ 582.944260][T12358] Bluetooth: hci0: command tx timeout [ 583.073902][T12357] team0: Port device team_slave_0 added [ 583.126065][T12358] Bluetooth: hci3: unexpected event 0x33 length: 15 > 10 [ 583.144455][T12357] team0: Port device team_slave_1 added [ 583.272533][T12357] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 583.281179][T12357] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 583.311742][T12357] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 583.402012][T12357] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 583.429533][T12357] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 583.513113][T12357] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 583.790356][T12358] Bluetooth: hci3: unexpected event 0x33 length: 15 > 10 [ 583.804210][T12466] netlink: 'syz.2.2247': attribute type 10 has an invalid length. [ 583.890412][T12465] delete_channel: no stack [ 583.904817][T12357] hsr_slave_0: entered promiscuous mode [ 583.912331][T12357] hsr_slave_1: entered promiscuous mode [ 583.983715][T12357] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 584.003952][T12357] Cannot create hsr debugfs directory [ 584.236516][T12482] netlink: 192436 bytes leftover after parsing attributes in process `syz.2.2248'. [ 584.319890][T12482] openvswitch: netlink: Duplicate key (type 0). [ 584.762027][T12495] netlink: 192436 bytes leftover after parsing attributes in process `syz.3.2255'. [ 584.790491][T12496] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2254'. [ 584.800382][T12495] openvswitch: netlink: Duplicate key (type 0). [ 585.010014][T12358] Bluetooth: hci0: command tx timeout [ 585.074982][T12500] netlink: 'syz.0.2256': attribute type 10 has an invalid length. [ 585.115857][T12499] delete_channel: no stack [ 585.188035][T12358] Bluetooth: hci1: unexpected event 0x33 length: 15 > 10 [ 585.242886][ T6395] hsr_slave_1: left promiscuous mode [ 585.368164][ T6395] veth1_macvtap: left promiscuous mode [ 585.375660][ T6395] veth1_vlan: left promiscuous mode [ 585.388933][ T6395] veth0_vlan: left promiscuous mode [ 585.863373][T12358] Bluetooth: hci3: unexpected event 0x33 length: 15 > 10 [ 586.659762][ T6395] team0 (unregistering): Port device team_slave_1 removed [ 586.716694][ T6395] team0 (unregistering): Port device team_slave_0 removed [ 586.772639][ T6395] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 586.821793][ T6395] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 587.114597][ T6395] team0 (unregistering): Port device dummy0 removed [ 587.171103][ T6395] bond0 (unregistering): Released all slaves [ 587.294541][T12536] ip6gretap0: refused to change device tx_queue_len [ 587.377301][T12538] syzkaller0: entered promiscuous mode [ 587.389162][T12538] syzkaller0: entered allmulticast mode [ 589.515086][T12559] netlink: 'syz.0.2266': attribute type 10 has an invalid length. [ 589.526631][T12558] delete_channel: no stack [ 589.807381][T12357] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 589.845965][T12357] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 589.863426][T12357] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 589.880665][T12357] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 589.938958][T12358] Bluetooth: hci3: unexpected event 0x33 length: 15 > 10 [ 590.103473][T12357] 8021q: adding VLAN 0 to HW filter on device bond0 [ 590.142660][T12568] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2269'. [ 590.233094][T12357] 8021q: adding VLAN 0 to HW filter on device team0 [ 590.333496][ T6423] bridge0: port 1(bridge_slave_0) entered blocking state [ 590.340765][ T6423] bridge0: port 1(bridge_slave_0) entered forwarding state [ 590.386525][ T6423] bridge0: port 2(bridge_slave_1) entered blocking state [ 590.393808][ T6423] bridge0: port 2(bridge_slave_1) entered forwarding state [ 591.554553][T12597] netlink: 'syz.2.2274': attribute type 10 has an invalid length. [ 591.596752][T12596] delete_channel: no stack [ 591.815067][T12357] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 591.946370][T12357] veth0_vlan: entered promiscuous mode [ 592.015794][T12357] veth1_vlan: entered promiscuous mode [ 592.094385][T12358] Bluetooth: hci1: unexpected event 0x33 length: 15 > 10 [ 592.145201][T12357] veth0_macvtap: entered promiscuous mode [ 592.205173][T12357] veth1_macvtap: entered promiscuous mode [ 592.288305][T12357] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 592.325184][T12357] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 592.352697][T12357] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 592.383523][T12357] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 592.409110][T12357] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 592.443363][T12357] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 592.479443][T12357] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 592.499862][T12357] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 592.514314][T12357] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 592.545801][T12357] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 592.797992][T12631] netlink: 'syz.0.2282': attribute type 2 has an invalid length. [ 592.850068][T12631] netlink: 'syz.0.2282': attribute type 1 has an invalid length. [ 592.872314][ T6395] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 592.899412][T12631] netlink: 152 bytes leftover after parsing attributes in process `syz.0.2282'. [ 592.946393][ T6395] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 593.195549][ T6395] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 593.222303][ T6395] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 593.732544][T12358] Bluetooth: hci2: unexpected event 0x33 length: 15 > 10 [ 594.169048][T12663] netlink: 'syz.3.2290': attribute type 10 has an invalid length. [ 594.190350][T12663] netlink: 65015 bytes leftover after parsing attributes in process `syz.3.2290'. [ 594.242672][T12667] netlink: 830 bytes leftover after parsing attributes in process `syz.3.2290'. [ 594.282763][T12667] veth0_to_bond: entered promiscuous mode [ 594.684679][T12673] netlink: 'syz.2.2293': attribute type 2 has an invalid length. [ 594.725743][T12673] netlink: 'syz.2.2293': attribute type 1 has an invalid length. [ 594.789711][T12673] netlink: 152 bytes leftover after parsing attributes in process `syz.2.2293'. [ 594.811424][ T6423] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 594.905011][ T51] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 594.916586][ T51] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 594.931342][ T51] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 594.947918][ T51] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 594.978973][ T51] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 594.990045][ T51] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 595.240068][ T6423] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 595.416222][ T6423] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 595.620805][ T6423] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 595.745564][ T51] Bluetooth: hci0: unexpected event 0x33 length: 15 > 10 [ 596.082479][T12679] chnl_net:caif_netlink_parms(): no params data found [ 596.135814][T12706] netlink: 'syz.1.2298': attribute type 10 has an invalid length. [ 596.296810][T12706] team0: Port device wlan1 added [ 596.341318][T12705] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 596.934795][T12679] bridge0: port 1(bridge_slave_0) entered blocking state [ 596.946264][T12679] bridge0: port 1(bridge_slave_0) entered disabled state [ 596.954680][T12679] bridge_slave_0: entered allmulticast mode [ 596.966774][T12679] bridge_slave_0: entered promiscuous mode [ 597.010790][T12679] bridge0: port 2(bridge_slave_1) entered blocking state [ 597.018185][T12679] bridge0: port 2(bridge_slave_1) entered disabled state [ 597.019441][ T51] Bluetooth: hci3: command tx timeout [ 597.083122][T12679] bridge_slave_1: entered allmulticast mode [ 597.128492][T12679] bridge_slave_1: entered promiscuous mode [ 597.378909][ T51] Bluetooth: hci0: unexpected event 0x33 length: 15 > 10 [ 597.435455][T12679] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 597.543917][T12679] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 597.576908][T12760] FAULT_INJECTION: forcing a failure. [ 597.576908][T12760] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 597.613675][T12760] CPU: 0 PID: 12760 Comm: syz.1.2308 Not tainted syzkaller #0 [ 597.621234][T12760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 597.631341][T12760] Call Trace: [ 597.634657][T12760] [ 597.637701][T12760] dump_stack_lvl+0x18c/0x250 [ 597.642430][T12760] ? show_regs_print_info+0x20/0x20 [ 597.647678][T12760] ? load_image+0x400/0x400 [ 597.652239][T12760] ? __lock_acquire+0x7d40/0x7d40 [ 597.657380][T12760] should_fail_ex+0x39d/0x4d0 [ 597.662101][T12760] _copy_from_user+0x2f/0xe0 [ 597.666740][T12760] __copy_msghdr+0x3bb/0x580 [ 597.671464][T12760] ___sys_sendmsg+0x214/0x360 [ 597.676225][T12760] ? __sys_sendmsg+0x2a0/0x2a0 [ 597.681063][T12760] __se_sys_sendmsg+0x1c2/0x2b0 [ 597.685954][T12760] ? __x64_sys_sendmsg+0x80/0x80 [ 597.690938][T12760] ? syscall_enter_from_user_mode+0x2e/0x80 [ 597.696870][T12760] do_syscall_64+0x55/0xa0 [ 597.701323][T12760] ? clear_bhb_loop+0x40/0x90 [ 597.706038][T12760] ? clear_bhb_loop+0x40/0x90 [ 597.710753][T12760] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 597.716690][T12760] RIP: 0033:0x7f3c41d9c799 [ 597.721142][T12760] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 597.740790][T12760] RSP: 002b:00007f3c42c52028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 597.749239][T12760] RAX: ffffffffffffffda RBX: 00007f3c42015fa0 RCX: 00007f3c41d9c799 [ 597.757332][T12760] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000003 [ 597.765337][T12760] RBP: 00007f3c42c52090 R08: 0000000000000000 R09: 0000000000000000 [ 597.773343][T12760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 597.781396][T12760] R13: 00007f3c42016038 R14: 00007f3c42015fa0 R15: 00007ffff1a129e8 [ 597.789425][T12760] [ 597.821116][T12679] team0: Port device team_slave_0 added [ 597.830707][T12679] team0: Port device team_slave_1 added [ 597.904877][T12679] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 597.913560][T12679] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 597.940738][T12679] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 597.982499][T12679] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 597.993113][T12679] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 598.024602][T12679] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 598.247768][T12679] hsr_slave_0: entered promiscuous mode [ 598.274697][T12679] hsr_slave_1: entered promiscuous mode [ 598.311661][T12679] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 598.335761][T12679] Cannot create hsr debugfs directory [ 598.801190][ T6423] hsr_slave_1: left promiscuous mode [ 598.816185][ T6423] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 598.832529][ T6423] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 598.842370][ T6423] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 598.861754][ T6423] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 598.871176][ T6423] batman_adv: batadv0: Interface deactivated: veth0_vlan [ 598.878493][ T6423] batman_adv: batadv0: Removing interface: veth0_vlan [ 598.918120][ T6423] veth1_vlan: left promiscuous mode [ 598.925889][ T6423] veth0_vlan: left promiscuous mode [ 599.090869][ T51] Bluetooth: hci3: command tx timeout [ 599.606389][ T51] Bluetooth: hci0: unexpected event 0x33 length: 15 > 10 [ 600.338977][ T6423] team0 (unregistering): Port device team_slave_1 removed [ 600.525543][ T6423] team0 (unregistering): Port device team_slave_0 removed [ 600.677488][ T6423] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 600.708718][ T6423] bond_slave_1 (unregistering): left promiscuous mode [ 600.782937][ T6423] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 600.795814][ T6423] bond_slave_0 (unregistering): left promiscuous mode [ 601.178557][ T51] Bluetooth: hci3: command tx timeout [ 601.258225][ T6423] team0 (unregistering): Port device dummy0 removed [ 601.331197][ T6423] bond0 (unregistering): Released all slaves [ 601.453626][T12805] netlink: 'syz.1.2317': attribute type 17 has an invalid length. [ 601.469521][T12805] netlink: 'syz.1.2317': attribute type 16 has an invalid length. [ 601.487685][T12805] netlink: 152 bytes leftover after parsing attributes in process `syz.1.2317'. [ 603.200519][T12837] Dead loop on virtual device ip6_vti0, fix it urgently! [ 603.249326][ T51] Bluetooth: hci3: command tx timeout [ 604.002146][ T51] Bluetooth: hci1: unexpected event 0x33 length: 15 > 10 [ 605.130469][T12846] bridge0: port 3(team0) entered blocking state [ 605.161622][T12846] bridge0: port 3(team0) entered disabled state [ 605.176589][T12846] team0: entered allmulticast mode [ 605.189977][T12846] team_slave_0: entered allmulticast mode [ 605.196289][T12846] team_slave_1: entered allmulticast mode [ 605.219515][T12846] mac80211_hwsim hwsim24 wlan1: entered allmulticast mode [ 605.244055][T12846] team0: entered promiscuous mode [ 605.249659][T12846] team_slave_0: entered promiscuous mode [ 605.256010][T12846] team_slave_1: entered promiscuous mode [ 605.262904][T12846] mac80211_hwsim hwsim24 wlan1: entered promiscuous mode [ 605.292823][T12846] bridge0: port 3(team0) entered blocking state [ 605.299720][T12846] bridge0: port 3(team0) entered forwarding state [ 605.456067][T12850] netlink: 'syz.3.2327': attribute type 10 has an invalid length. [ 605.492293][T12849] delete_channel: no stack [ 605.704738][T12854] netlink: 60 bytes leftover after parsing attributes in process `syz.2.2328'. [ 605.749155][T12854] netlink: 60 bytes leftover after parsing attributes in process `syz.2.2328'. [ 605.803128][T12854] netlink: 60 bytes leftover after parsing attributes in process `syz.2.2328'. [ 605.846066][T12859] netlink: 60 bytes leftover after parsing attributes in process `syz.2.2328'. [ 606.041073][T12866] netlink: 'syz.2.2331': attribute type 10 has an invalid length. [ 606.064168][T12679] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 606.123992][T12679] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 606.156069][T12679] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 606.220096][T12679] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 606.320785][T12876] netlink: 60 bytes leftover after parsing attributes in process `syz.2.2333'. [ 606.365981][T12876] netlink: 60 bytes leftover after parsing attributes in process `syz.2.2333'. [ 606.452541][T12872] netlink: 60 bytes leftover after parsing attributes in process `syz.2.2333'. [ 606.497812][T12872] netlink: 60 bytes leftover after parsing attributes in process `syz.2.2333'. [ 606.693637][T12679] 8021q: adding VLAN 0 to HW filter on device bond0 [ 606.742551][ T51] Bluetooth: hci2: unexpected event 0x33 length: 15 > 10 [ 606.755182][T12679] 8021q: adding VLAN 0 to HW filter on device team0 [ 606.777183][ T6407] bridge0: port 1(bridge_slave_0) entered blocking state [ 606.784412][ T6407] bridge0: port 1(bridge_slave_0) entered forwarding state [ 606.854050][ T6407] bridge0: port 2(bridge_slave_1) entered blocking state [ 606.861307][ T6407] bridge0: port 2(bridge_slave_1) entered forwarding state [ 607.555666][T12892] netlink: 'syz.2.2336': attribute type 10 has an invalid length. [ 607.595076][T12891] delete_channel: no stack [ 607.845679][T12911] FAULT_INJECTION: forcing a failure. [ 607.845679][T12911] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 607.860524][T12904] netlink: 'syz.3.2337': attribute type 10 has an invalid length. [ 607.868738][T12904] mac80211_hwsim hwsim3 wlan1: left allmulticast mode [ 607.879430][T12911] CPU: 1 PID: 12911 Comm: syz.1.2344 Not tainted syzkaller #0 [ 607.886964][T12911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 607.897075][T12911] Call Trace: [ 607.900399][T12911] [ 607.903371][T12911] dump_stack_lvl+0x18c/0x250 [ 607.908127][T12911] ? show_regs_print_info+0x20/0x20 [ 607.913384][T12911] ? load_image+0x400/0x400 [ 607.917948][T12911] ? __lock_acquire+0x7d40/0x7d40 [ 607.923019][T12911] ? snprintf+0xe9/0x140 [ 607.927302][T12911] should_fail_ex+0x39d/0x4d0 [ 607.932033][T12911] _copy_to_user+0x2f/0xa0 [ 607.936496][T12911] simple_read_from_buffer+0xe7/0x150 [ 607.941913][T12911] proc_fail_nth_read+0x1e8/0x260 [ 607.947078][T12911] ? proc_fault_inject_write+0x360/0x360 [ 607.952764][T12911] ? fsnotify_perm+0x271/0x5e0 [ 607.957575][T12911] ? proc_fault_inject_write+0x360/0x360 [ 607.963258][T12911] vfs_read+0x28b/0x970 [ 607.967495][T12911] ? kernel_read+0x1e0/0x1e0 [ 607.972127][T12911] ? __fget_files+0x28/0x4b0 [ 607.976755][T12911] ? __fget_files+0x28/0x4b0 [ 607.981397][T12911] ? __fget_files+0x43d/0x4b0 [ 607.986115][T12911] ? __fdget_pos+0x2a3/0x330 [ 607.990761][T12911] ? ksys_read+0x75/0x260 [ 607.995137][T12911] ksys_read+0x150/0x260 [ 607.999427][T12911] ? vfs_write+0x990/0x990 [ 608.003890][T12911] ? lockdep_hardirqs_on+0x98/0x150 [ 608.009198][T12911] do_syscall_64+0x55/0xa0 [ 608.013668][T12911] ? clear_bhb_loop+0x40/0x90 [ 608.018404][T12911] ? clear_bhb_loop+0x40/0x90 [ 608.023118][T12911] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 608.029053][T12911] RIP: 0033:0x7f3c41d5cfce [ 608.033596][T12911] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 608.053283][T12911] RSP: 002b:00007f3c42c30fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 608.061825][T12911] RAX: ffffffffffffffda RBX: 00007f3c42c316c0 RCX: 00007f3c41d5cfce [ 608.069840][T12911] RDX: 000000000000000f RSI: 00007f3c42c310a0 RDI: 0000000000000005 [ 608.077944][T12911] RBP: 00007f3c42c31090 R08: 0000000000000000 R09: 0000000000000000 [ 608.085957][T12911] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 608.093997][T12911] R13: 00007f3c42016128 R14: 00007f3c42016090 R15: 00007ffff1a129e8 [ 608.102103][T12911] [ 608.128732][T12679] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 608.141555][T12903] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 608.257156][T12916] netlink: 'syz.1.2340': attribute type 25 has an invalid length. [ 608.267009][T12916] netlink: 'syz.1.2340': attribute type 1 has an invalid length. [ 608.275078][T12916] bridge0: port 1(bridge_slave_0) entered disabled state [ 608.295913][T12679] veth0_vlan: entered promiscuous mode [ 608.315728][T12679] veth1_vlan: entered promiscuous mode [ 608.383911][T12679] veth0_macvtap: entered promiscuous mode [ 608.398189][T12679] veth1_macvtap: entered promiscuous mode [ 608.427364][T12679] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 608.448783][T12679] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 608.468395][T12679] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 608.502659][T12679] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 608.515055][T12679] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 608.527815][T12679] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 608.555083][T12679] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 608.566888][T12679] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 608.577295][T12679] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 608.588046][T12679] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 608.662623][ T51] Bluetooth: hci2: unexpected event 0x33 length: 15 > 10 [ 608.760226][ T6395] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 608.792546][ T6395] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 608.857529][ T6407] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 608.867237][ T6407] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 608.939548][T12926] netlink: 'syz.2.2346': attribute type 10 has an invalid length. [ 609.155181][T12935] bridge0: port 3(team0) entered blocking state [ 609.174035][T12935] bridge0: port 3(team0) entered disabled state [ 609.183252][T12935] team0: entered allmulticast mode [ 609.188833][T12935] team_slave_0: entered allmulticast mode [ 609.195288][T12935] team_slave_1: entered allmulticast mode [ 609.204273][T12935] team0: entered promiscuous mode [ 609.210385][T12935] team_slave_0: entered promiscuous mode [ 609.216354][T12935] team_slave_1: entered promiscuous mode [ 609.224256][T12935] bridge0: port 3(team0) entered blocking state [ 609.230710][T12935] bridge0: port 3(team0) entered forwarding state [ 609.238911][T12939] team0: left allmulticast mode [ 609.244118][T12939] team_slave_0: left allmulticast mode [ 609.252163][T12939] team_slave_1: left allmulticast mode [ 609.257709][T12939] team0: left promiscuous mode [ 609.278393][T12939] team_slave_0: left promiscuous mode [ 609.284661][T12939] team_slave_1: left promiscuous mode [ 609.302354][T12939] bridge0: port 3(team0) entered disabled state [ 609.463662][T12941] netlink: 'syz.2.2350': attribute type 10 has an invalid length. [ 609.476999][T12941] mac80211_hwsim hwsim7 wlan1: left allmulticast mode [ 609.675659][T12941] team0: Port device wlan1 added [ 609.782535][T12940] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 610.056046][ T51] Bluetooth: hci3: unexpected event 0x33 length: 15 > 10 [ 610.232604][T12959] netlink: 'syz.0.2358': attribute type 10 has an invalid length. [ 610.355048][T12959] hsr_slave_0 (unregistering): left promiscuous mode [ 610.507391][T12965] netlink: 'syz.1.2356': attribute type 28 has an invalid length. [ 610.518512][T12965] netlink: 'syz.1.2356': attribute type 29 has an invalid length. [ 610.532742][T12965] netlink: 132 bytes leftover after parsing attributes in process `syz.1.2356'. [ 611.510147][T12962] netlink: 'syz.1.2356': attribute type 1 has an invalid length. [ 611.517955][T12962] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2356'. [ 611.530046][T12962] bridge0: port 1(bridge_slave_0) entered blocking state [ 611.537309][T12962] bridge0: port 1(bridge_slave_0) entered forwarding state [ 611.707811][T12975] Dead loop on virtual device ip6_vti0, fix it urgently! [ 612.212096][ T2909] wlan1: Trigger new scan to find an IBSS to join [ 612.466393][ T51] Bluetooth: hci3: unexpected event 0x33 length: 15 > 10 [ 613.120349][T13005] netlink: 'syz.2.2372': attribute type 10 has an invalid length. [ 613.136899][T13005] netlink: 2 bytes leftover after parsing attributes in process `syz.2.2372'. [ 613.148858][T13005] bond0: entered promiscuous mode [ 613.154981][T13005] bond_slave_0: entered promiscuous mode [ 613.162731][T13005] bond_slave_1: entered promiscuous mode [ 613.211492][T13006] Dead loop on virtual device ip6_vti0, fix it urgently! [ 613.321362][T13009] FAULT_INJECTION: forcing a failure. [ 613.321362][T13009] name failslab, interval 1, probability 0, space 0, times 0 [ 613.348330][T13009] CPU: 0 PID: 13009 Comm: syz.1.2374 Not tainted syzkaller #0 [ 613.355872][T13009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 613.365985][T13009] Call Trace: [ 613.369293][T13009] [ 613.372335][T13009] dump_stack_lvl+0x18c/0x250 [ 613.377056][T13009] ? show_regs_print_info+0x20/0x20 [ 613.382294][T13009] ? load_image+0x400/0x400 [ 613.386916][T13009] ? __lock_acquire+0x7d40/0x7d40 [ 613.391963][T13009] ? __kasan_kmalloc_large+0x8b/0xa0 [ 613.397281][T13009] should_fail_ex+0x39d/0x4d0 [ 613.402005][T13009] should_failslab+0x9/0x20 [ 613.406565][T13009] slab_pre_alloc_hook+0x59/0x310 [ 613.411646][T13009] ? __build_skb_around+0x255/0x3d0 [ 613.416899][T13009] kmem_cache_alloc+0x5a/0x2d0 [ 613.421703][T13009] ? _sctp_make_chunk+0x14e/0x420 [ 613.426858][T13009] _sctp_make_chunk+0x14e/0x420 [ 613.431752][T13009] sctp_make_datafrag_empty+0x12b/0x240 [ 613.437341][T13009] ? sctp_make_ecne+0x340/0x340 [ 613.442278][T13009] ? sctp_auth_send_cid+0x69/0x250 [ 613.447431][T13009] sctp_datamsg_from_user+0x722/0xee0 [ 613.452855][T13009] sctp_sendmsg_to_asoc+0x107f/0x1830 [ 613.458262][T13009] ? __asan_memcpy+0x40/0x70 [ 613.462912][T13009] ? sctp_assoc_add_peer+0xcf3/0x1390 [ 613.468324][T13009] ? sctp_sendmsg_check_sflags+0x2d0/0x2d0 [ 613.474170][T13009] ? __sctp_connect+0xd80/0xd80 [ 613.479052][T13009] ? __local_bh_enable_ip+0x13a/0x1c0 [ 613.484467][T13009] ? _local_bh_enable+0xa0/0xa0 [ 613.489347][T13009] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 613.495191][T13009] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 613.501115][T13009] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 613.506793][T13009] ? security_sctp_bind_connect+0x89/0xb0 [ 613.512553][T13009] sctp_sendmsg+0x1b83/0x28c0 [ 613.517270][T13009] ? sctp_getsockopt+0xb60/0xb60 [ 613.522282][T13009] ? aa_sk_perm+0x83c/0x970 [ 613.526827][T13009] ? aa_af_perm+0x330/0x330 [ 613.531366][T13009] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 613.537831][T13009] ? sock_rps_record_flow+0x19/0x3f0 [ 613.543166][T13009] ? inet_sendmsg+0x7c/0x2f0 [ 613.547840][T13009] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 613.553257][T13009] ? security_socket_sendmsg+0x80/0xa0 [ 613.558751][T13009] ? inet_send_prepare+0x260/0x260 [ 613.563938][T13009] ____sys_sendmsg+0x5ba/0x960 [ 613.568745][T13009] ? __lock_acquire+0x7d40/0x7d40 [ 613.573907][T13009] ? __asan_memset+0x22/0x40 [ 613.578721][T13009] ? __sys_sendmsg_sock+0x30/0x30 [ 613.583791][T13009] ? __import_iovec+0x5f2/0x850 [ 613.588700][T13009] ? import_iovec+0x73/0xa0 [ 613.593233][T13009] ___sys_sendmsg+0x2a6/0x360 [ 613.597946][T13009] ? get_pid_task+0x20/0x1e0 [ 613.602574][T13009] ? __sys_sendmsg+0x2a0/0x2a0 [ 613.607394][T13009] ? __lock_acquire+0x7d40/0x7d40 [ 613.612476][T13009] __se_sys_sendmsg+0x1c2/0x2b0 [ 613.617359][T13009] ? __x64_sys_sendmsg+0x80/0x80 [ 613.622693][T13009] ? lockdep_hardirqs_on+0x98/0x150 [ 613.627926][T13009] do_syscall_64+0x55/0xa0 [ 613.632379][T13009] ? clear_bhb_loop+0x40/0x90 [ 613.637095][T13009] ? clear_bhb_loop+0x40/0x90 [ 613.641907][T13009] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 613.647875][T13009] RIP: 0033:0x7f3c41d9c799 [ 613.652321][T13009] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 613.672302][T13009] RSP: 002b:00007f3c42c52028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 613.680845][T13009] RAX: ffffffffffffffda RBX: 00007f3c42015fa0 RCX: 00007f3c41d9c799 [ 613.688851][T13009] RDX: 00000000000080d1 RSI: 0000200000000140 RDI: 0000000000000003 [ 613.696851][T13009] RBP: 00007f3c42c52090 R08: 0000000000000000 R09: 0000000000000000 [ 613.704857][T13009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 613.713167][T13009] R13: 00007f3c42016038 R14: 00007f3c42015fa0 R15: 00007ffff1a129e8 [ 613.721197][T13009] [ 613.760847][T13011] netlink: 'syz.0.2375': attribute type 10 has an invalid length. [ 613.951991][ T51] Bluetooth: hci2: unexpected event 0x33 length: 15 > 10 [ 617.169345][ T6407] wlan1: Trigger new scan to find an IBSS to join [ 617.734289][T13042] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2388'. [ 617.747080][T13042] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2388'. [ 617.768481][T13042] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2388'. [ 617.786970][ T51] Bluetooth: hci0: unexpected event 0x33 length: 15 > 10 [ 617.790057][T13042] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2388'. [ 617.977669][T13052] netlink: 209852 bytes leftover after parsing attributes in process `syz.0.2393'. [ 617.988541][T13052] openvswitch: netlink: IP tunnel attribute has 3064 unknown bytes. [ 618.126335][ T6423] wlan1: Creating new IBSS network, BSSID 1a:e0:b2:30:4b:09 [ 618.365503][T13067] netlink: 'syz.3.2396': attribute type 2 has an invalid length. [ 618.384893][T13067] netlink: 'syz.3.2396': attribute type 8 has an invalid length. [ 618.395213][T13067] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2396'. [ 618.753316][ T51] Bluetooth: hci3: unexpected event 0x33 length: 15 > 10 [ 619.643878][T13093] netlink: 'syz.2.2407': attribute type 28 has an invalid length. [ 619.672653][T13093] netlink: 'syz.2.2407': attribute type 29 has an invalid length. [ 619.695993][T13093] netlink: 132 bytes leftover after parsing attributes in process `syz.2.2407'. [ 620.722518][T13114] netlink: 'syz.0.2414': attribute type 2 has an invalid length. [ 620.733957][T13114] netlink: 'syz.0.2414': attribute type 1 has an invalid length. [ 620.760489][ T51] Bluetooth: hci1: unexpected event 0x33 length: 15 > 10 [ 620.761615][T13114] netlink: 152 bytes leftover after parsing attributes in process `syz.0.2414'. [ 623.941852][T13140] netlink: 209592 bytes leftover after parsing attributes in process `syz.3.2420'. [ 624.056327][T13140] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 624.070953][T13140] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 624.080996][T13140] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 624.092222][T13140] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 624.102404][T13140] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 624.112544][T13140] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 624.122902][T13140] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 624.132831][T13140] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 624.143436][T13140] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 624.154068][T13140] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 624.181662][T13144] netlink: 'syz.0.2422': attribute type 3 has an invalid length. [ 624.218819][T13144] netlink: 130984 bytes leftover after parsing attributes in process `syz.0.2422'. [ 624.745236][ T1287] ieee802154 phy0 wpan0: encryption failed: -22 [ 624.751867][ T1287] ieee802154 phy1 wpan1: encryption failed: -22 [ 624.937991][T13155] netlink: 'syz.1.2424': attribute type 2 has an invalid length. [ 624.948227][T13155] netlink: 'syz.1.2424': attribute type 1 has an invalid length. [ 624.958156][T13155] netlink: 152 bytes leftover after parsing attributes in process `syz.1.2424'. [ 625.465791][T13166] netlink: 'syz.3.2426': attribute type 28 has an invalid length. [ 625.474221][ T51] Bluetooth: hci2: unexpected event 0x33 length: 15 > 10 [ 625.479131][T13166] netlink: 'syz.3.2426': attribute type 29 has an invalid length. [ 625.496782][T13166] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2426'. [ 625.618484][T13169] netlink: 209852 bytes leftover after parsing attributes in process `syz.1.2428'. [ 625.773893][T13173] netlink: 'syz.2.2429': attribute type 2 has an invalid length. [ 625.792153][T13173] netlink: 'syz.2.2429': attribute type 1 has an invalid length. [ 625.812235][T13173] netlink: 152 bytes leftover after parsing attributes in process `syz.2.2429'. [ 626.147393][T13177] FAULT_INJECTION: forcing a failure. [ 626.147393][T13177] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 626.168141][T13177] CPU: 1 PID: 13177 Comm: syz.1.2430 Not tainted syzkaller #0 [ 626.175716][T13177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 626.185893][T13177] Call Trace: [ 626.189263][T13177] [ 626.192280][T13177] dump_stack_lvl+0x18c/0x250 [ 626.197145][T13177] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 626.203400][T13177] ? show_regs_print_info+0x20/0x20 [ 626.208702][T13177] ? load_image+0x400/0x400 [ 626.213436][T13177] should_fail_ex+0x39d/0x4d0 [ 626.218319][T13177] _copy_from_user+0x2f/0xe0 [ 626.223097][T13177] __copy_msghdr+0x3bb/0x580 [ 626.227790][T13177] ___sys_sendmsg+0x214/0x360 [ 626.232585][T13177] ? __sys_sendmsg+0x2a0/0x2a0 [ 626.237459][T13177] ? perf_trace_preemptirq_template+0xac/0x330 [ 626.243880][T13177] __se_sys_sendmsg+0x1c2/0x2b0 [ 626.248830][T13177] ? __x64_sys_sendmsg+0x80/0x80 [ 626.254010][T13177] ? syscall_enter_from_user_mode+0x2e/0x80 [ 626.260019][T13177] do_syscall_64+0x55/0xa0 [ 626.264529][T13177] ? clear_bhb_loop+0x40/0x90 [ 626.269290][T13177] ? clear_bhb_loop+0x40/0x90 [ 626.274091][T13177] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 626.280074][T13177] RIP: 0033:0x7f3c41d9c799 [ 626.285006][T13177] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 626.304779][T13177] RSP: 002b:00007f3c42c31028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 626.313271][T13177] RAX: ffffffffffffffda RBX: 00007f3c42016090 RCX: 00007f3c41d9c799 [ 626.321310][T13177] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000003 [ 626.329513][T13177] RBP: 00007f3c42c31090 R08: 0000000000000000 R09: 0000000000000000 [ 626.337536][T13177] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 626.345561][T13177] R13: 00007f3c42016128 R14: 00007f3c42016090 R15: 00007ffff1a129e8 [ 626.353656][T13177] [ 628.394723][T13158] ------------[ cut here ]------------ [ 628.400810][T13158] WARNING: CPU: 1 PID: 13158 at kernel/events/core.c:6806 perf_pending_task+0x35c/0x470 [ 628.411144][T13158] Modules linked in: [ 628.415104][T13158] CPU: 1 PID: 13158 Comm: syz.3.2426 Not tainted syzkaller #0 [ 628.423244][T13158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 628.434150][T13158] RIP: 0010:perf_pending_task+0x35c/0x470 [ 628.440477][T13158] Code: ff 84 db 75 14 e8 74 e0 d5 ff 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 60 e0 d5 ff e8 7b 61 4f ff eb e5 e8 54 e0 d5 ff <0f> 0b e9 f3 fe ff ff e8 48 e0 d5 ff 48 c7 c7 70 f3 1c 8d 4c 89 f6 [ 628.461051][T13158] RSP: 0018:ffffc9000537f9c0 EFLAGS: 00010293 [ 628.467777][T13158] RAX: ffffffff81b13c0c RBX: ffff888035ec7e48 RCX: ffff888028681e00 [ 628.476317][T13158] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 628.485066][T13158] RBP: 0000000000000001 R08: ffffffff8e8aeeef R09: 1ffffffff1d15ddd [ 628.493614][T13158] R10: dffffc0000000000 R11: fffffbfff1d15dde R12: ffff888028681e00 [ 628.502104][T13158] R13: ffff888031025d30 R14: ffff888035ec7c08 R15: 1ffff11006bd8f81 [ 628.510811][T13158] FS: 0000000000000000(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000 [ 628.520315][T13158] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 628.527698][T13158] CR2: 000055556302b4e8 CR3: 000000005e648000 CR4: 00000000003506e0 [ 628.536927][T13158] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 628.545532][T13158] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 628.554194][T13158] Call Trace: [ 628.557612][T13158] [ 628.561032][T13158] task_work_run+0x1d4/0x260 [ 628.565719][T13158] ? task_work_cancel+0x220/0x220 [ 628.570992][T13158] do_exit+0x95a/0x2460 [ 628.575308][T13158] ? get_signal+0x1068/0x13f0 [ 628.580179][T13158] ? put_task_struct+0xc0/0xc0 [ 628.585009][T13158] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 628.591086][T13158] ? lock_chain_count+0x20/0x20 [ 628.595996][T13158] ? _raw_spin_lock_irq+0xbb/0xf0 [ 628.601170][T13158] do_group_exit+0x21b/0x2d0 [ 628.605831][T13158] ? lockdep_hardirqs_on+0x98/0x150 [ 628.611492][T13158] get_signal+0x12fc/0x13f0 [ 628.616438][T13158] arch_do_signal_or_restart+0xc2/0x800 [ 628.622177][T13158] ? lock_chain_count+0x20/0x20 [ 628.627158][T13158] ? get_sigframe_size+0x20/0x20 [ 628.632726][T13158] exit_to_user_mode_loop+0x70/0x110 [ 628.638087][T13158] exit_to_user_mode_prepare+0xee/0x180 [ 628.644039][T13158] syscall_exit_to_user_mode+0x1a/0x50 [ 628.649648][T13158] do_syscall_64+0x61/0xa0 [ 628.654149][T13158] ? clear_bhb_loop+0x40/0x90 [ 628.658889][T13158] ? clear_bhb_loop+0x40/0x90 [ 628.663948][T13158] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 628.670063][T13158] RIP: 0033:0x7f48d059c799 [ 628.674539][T13158] Code: Unable to access opcode bytes at 0x7f48d059c76f. [ 628.681704][T13158] RSP: 002b:00007f48d13cf028 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 628.690276][T13158] RAX: 0000000000000000 RBX: 00007f48d0815fa0 RCX: 00007f48d059c799 [ 628.698309][T13158] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 628.706489][T13158] RBP: 00007f48d0632c99 R08: 0000000000000000 R09: 0000000000000000 [ 628.714664][T13158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 628.722907][T13158] R13: 00007f48d0816038 R14: 00007f48d0815fa0 R15: 00007ffcf2b9b018 [ 628.731623][T13158] [ 628.734720][T13158] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 628.742064][T13158] CPU: 1 PID: 13158 Comm: syz.3.2426 Not tainted syzkaller #0 [ 628.749573][T13158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 628.759691][T13158] Call Trace: [ 628.762981][T13158] [ 628.765947][T13158] dump_stack_lvl+0x18c/0x250 [ 628.770655][T13158] ? show_regs_print_info+0x20/0x20 [ 628.775880][T13158] ? load_image+0x400/0x400 [ 628.780504][T13158] panic+0x2dc/0x730 [ 628.784512][T13158] ? bpf_jit_dump+0xd0/0xd0 [ 628.789141][T13158] __warn+0x2e0/0x470 [ 628.793171][T13158] ? perf_pending_task+0x35c/0x470 [ 628.798327][T13158] ? perf_pending_task+0x35c/0x470 [ 628.803474][T13158] report_bug+0x2be/0x4f0 [ 628.807831][T13158] ? perf_pending_task+0x35c/0x470 [ 628.813156][T13158] ? perf_pending_task+0x35c/0x470 [ 628.818406][T13158] ? perf_pending_task+0x35e/0x470 [ 628.823643][T13158] handle_bug+0xcf/0x120 [ 628.828034][T13158] exc_invalid_op+0x1a/0x50 [ 628.832574][T13158] asm_exc_invalid_op+0x1a/0x20 [ 628.837461][T13158] RIP: 0010:perf_pending_task+0x35c/0x470 [ 628.843220][T13158] Code: ff 84 db 75 14 e8 74 e0 d5 ff 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 60 e0 d5 ff e8 7b 61 4f ff eb e5 e8 54 e0 d5 ff <0f> 0b e9 f3 fe ff ff e8 48 e0 d5 ff 48 c7 c7 70 f3 1c 8d 4c 89 f6 [ 628.863030][T13158] RSP: 0018:ffffc9000537f9c0 EFLAGS: 00010293 [ 628.869138][T13158] RAX: ffffffff81b13c0c RBX: ffff888035ec7e48 RCX: ffff888028681e00 [ 628.877135][T13158] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 628.885132][T13158] RBP: 0000000000000001 R08: ffffffff8e8aeeef R09: 1ffffffff1d15ddd [ 628.893166][T13158] R10: dffffc0000000000 R11: fffffbfff1d15dde R12: ffff888028681e00 [ 628.901166][T13158] R13: ffff888031025d30 R14: ffff888035ec7c08 R15: 1ffff11006bd8f81 [ 628.909184][T13158] ? perf_pending_task+0x35c/0x470 [ 628.914343][T13158] task_work_run+0x1d4/0x260 [ 628.918974][T13158] ? task_work_cancel+0x220/0x220 [ 628.924136][T13158] do_exit+0x95a/0x2460 [ 628.928351][T13158] ? get_signal+0x1068/0x13f0 [ 628.933053][T13158] ? put_task_struct+0xc0/0xc0 [ 628.937870][T13158] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 628.943885][T13158] ? lock_chain_count+0x20/0x20 [ 628.948769][T13158] ? _raw_spin_lock_irq+0xbb/0xf0 [ 628.953826][T13158] do_group_exit+0x21b/0x2d0 [ 628.958458][T13158] ? lockdep_hardirqs_on+0x98/0x150 [ 628.963692][T13158] get_signal+0x12fc/0x13f0 [ 628.968242][T13158] arch_do_signal_or_restart+0xc2/0x800 [ 628.973824][T13158] ? lock_chain_count+0x20/0x20 [ 628.978747][T13158] ? get_sigframe_size+0x20/0x20 [ 628.983752][T13158] exit_to_user_mode_loop+0x70/0x110 [ 628.989076][T13158] exit_to_user_mode_prepare+0xee/0x180 [ 628.994678][T13158] syscall_exit_to_user_mode+0x1a/0x50 [ 629.000168][T13158] do_syscall_64+0x61/0xa0 [ 629.004812][T13158] ? clear_bhb_loop+0x40/0x90 [ 629.009557][T13158] ? clear_bhb_loop+0x40/0x90 [ 629.014286][T13158] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 629.020214][T13158] RIP: 0033:0x7f48d059c799 [ 629.024663][T13158] Code: Unable to access opcode bytes at 0x7f48d059c76f. [ 629.031714][T13158] RSP: 002b:00007f48d13cf028 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 629.040172][T13158] RAX: 0000000000000000 RBX: 00007f48d0815fa0 RCX: 00007f48d059c799 [ 629.048174][T13158] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 629.056179][T13158] RBP: 00007f48d0632c99 R08: 0000000000000000 R09: 0000000000000000 [ 629.064219][T13158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 629.072229][T13158] R13: 00007f48d0816038 R14: 00007f48d0815fa0 R15: 00007ffcf2b9b018 [ 629.080427][T13158] [ 629.084061][T13158] Kernel Offset: disabled [ 629.088460][T13158] Rebooting in 86400 seconds..