last executing test programs: 25m56.331445709s ago: executing program 3 (id=4): r0 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000)=r4, 0x10) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @loopback}, 0x10, &(0x7f0000000080)=[{&(0x7f00000000c0)='\"', 0x1}], 0x1}, 0x40004044) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={0xffffffffffffffff, 0x0, &(0x7f0000000340)=""/55, 0x7d8}, 0x20) socket$kcm(0x10, 0x400000002, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair(0x1, 0x3, 0x0, &(0x7f0000000200)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r6, 0x84, 0x1f, &(0x7f0000000000), 0x90) r7 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r8 = getpid() syz_open_procfs$namespace(r8, &(0x7f00000001c0)='ns/time_for_children\x00') perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c35, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffb, 0x81}, 0x100c, 0x0, 0x0, 0x9, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r7, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x20}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000380), 0xff7a}], 0x1, &(0x7f0000007880)=[@ip_tos_u8={{0x11, 0x34000}}, @ip_pktinfo={{0x1c, 0xfd000f00, 0x8, {0x0, @remote, @multicast1}}}, @ip_pktinfo={{0x1c, 0x28f0700, 0x8, {0x0, @empty=0xa0050000}}}, @ip_retopts={{0x24, 0x0, 0x7, {[@ra={0x94, 0x4}, @timestamp={0x44, 0x10, 0x88, 0x0, 0x0, [0x0, 0x0, 0x0]}]}}}, @ip_tos_u8={{0x11}}], 0x98}, 0x0) 25m56.203088841s ago: executing program 2 (id=3): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9c, 0x10}, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x441a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0x6}, 0x2000, 0x2, 0xfffffffe, 0x9, 0x2, 0x2, 0x40, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x18, 0x2, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) close(r1) r2 = getpid() perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r2, r0, 0x0, 0x0, 0x0}, 0x30) 25m55.321527798s ago: executing program 3 (id=8): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac59}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x21, 0x2, 0x2) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200002, 0x0) socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r2, 0x81000000, 0x12, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee6888100", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 25m55.252839409s ago: executing program 2 (id=10): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9c, 0x10}, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x441a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0x6}, 0x2000, 0x2, 0xfffffffe, 0x9, 0x2, 0x2, 0x40, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x18, 0x2, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) close(r0) r1 = getpid() perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 25m54.637679712s ago: executing program 3 (id=12): r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x8000, 0x200}, 0x10002a, 0xac5d, 0x100, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x61, &(0x7f00000027c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1}, 0x10100) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001500)=ANY=[@ANYBLOB="0100000004000000080000003d000000410000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000200000000000000000000000000000000000000000008d59e65878337db9eb6cd84cbc72c73d61a29cc98f6d6a07035c090fce90c705be0faad3fd21eb902da6dfb34d803350720845efa01a55099da23a2fcf04f09372c0b9b224a7f06bdc2e6e01add12023e26d3da5985e1fb082c5daf5aacceb3d0abd4eef69b2417fd3"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000080), &(0x7f0000000540)=""/210}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x401c5820, &(0x7f0000001000)=0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)=@generic={&(0x7f0000000340)='./file0\x00', r2}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x2000002, 0x1, 0x0, 0x6, 0x4, [{0xa}]}]}, {0x0, [0x2e, 0x2e]}}, 0x0, 0x30}, 0x28) socket$kcm(0x11, 0x2, 0x300) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000), 0x0, 0xca, r3}, 0x38) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}], 0x20, 0x114}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x22, &(0x7f00000018c0), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext, 0x10c002, 0x7, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$kcm(0x2, 0x5, 0x84) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0x80218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7}, 0x2005, 0x0, 0x51, 0x0, 0x3, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r5, 0x0, 0xe, 0x0, &(0x7f0000000100)="c1dfb061cd21d3084d94d35486dd", 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socket$kcm(0x11, 0x3, 0x0) 25m54.554773416s ago: executing program 2 (id=13): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1007f}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x2000300, 0xe, 0x0, &(0x7f0000000000)="63eced8e46dc3f0adf3389f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46a, 0x1, @perf_bp={0x0}, 0x81, 0x3, 0x0, 0x0, 0x1, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000280)="39000000140081ae0000dc676f97daf01effffff0521018701546fabca1b4e8a06a6580e88370200c5090000009c40ebb3734b49bbc51245e7", 0x39}], 0x1}, 0x0) close(0x3) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000580)="6700000011008188040f56ecdb4cb9cca7480ef436000000e3bd6efb440009000e000a0010000000ba80010000005a8c3774fa0af3dc59a933c1e7a6d3361d83b20000319cdf5656826edaaa11032701c61ec666d482078ccebcb9a4f187f7a4e98f09cdc2649f", 0x67}], 0x1}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x39, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xf475, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x40000000}, 0x94) socketpair$unix(0x1, 0x2, 0x0, 0x0) r6 = socket$kcm(0x11, 0x2, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000300), 0xb}, 0x2, 0x1, 0x0, 0x6, 0x2, 0x4}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000001780)={&(0x7f00000003c0)=@caif, 0x80, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce220000"], 0xfdef) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x5, 0x47, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x80040000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 25m39.213241692s ago: executing program 32 (id=13): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1007f}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x2000300, 0xe, 0x0, &(0x7f0000000000)="63eced8e46dc3f0adf3389f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46a, 0x1, @perf_bp={0x0}, 0x81, 0x3, 0x0, 0x0, 0x1, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000280)="39000000140081ae0000dc676f97daf01effffff0521018701546fabca1b4e8a06a6580e88370200c5090000009c40ebb3734b49bbc51245e7", 0x39}], 0x1}, 0x0) close(0x3) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000580)="6700000011008188040f56ecdb4cb9cca7480ef436000000e3bd6efb440009000e000a0010000000ba80010000005a8c3774fa0af3dc59a933c1e7a6d3361d83b20000319cdf5656826edaaa11032701c61ec666d482078ccebcb9a4f187f7a4e98f09cdc2649f", 0x67}], 0x1}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x39, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xf475, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x40000000}, 0x94) socketpair$unix(0x1, 0x2, 0x0, 0x0) r6 = socket$kcm(0x11, 0x2, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000300), 0xb}, 0x2, 0x1, 0x0, 0x6, 0x2, 0x4}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r6, &(0x7f0000001780)={&(0x7f00000003c0)=@caif, 0x80, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce220000"], 0xfdef) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x5, 0x47, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x80040000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 25m39.044858129s ago: executing program 33 (id=12): r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x8000, 0x200}, 0x10002a, 0xac5d, 0x100, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x61, &(0x7f00000027c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1}, 0x10100) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000002c0), 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001500)=ANY=[@ANYBLOB="0100000004000000080000003d000000410000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000200000000000000000000000000000000000000000008d59e65878337db9eb6cd84cbc72c73d61a29cc98f6d6a07035c090fce90c705be0faad3fd21eb902da6dfb34d803350720845efa01a55099da23a2fcf04f09372c0b9b224a7f06bdc2e6e01add12023e26d3da5985e1fb082c5daf5aacceb3d0abd4eef69b2417fd3"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000080), &(0x7f0000000540)=""/210}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x401c5820, &(0x7f0000001000)=0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)=@generic={&(0x7f0000000340)='./file0\x00', r2}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x2000002, 0x1, 0x0, 0x6, 0x4, [{0xa}]}]}, {0x0, [0x2e, 0x2e]}}, 0x0, 0x30}, 0x28) socket$kcm(0x11, 0x2, 0x300) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000), 0x0, 0xca, r3}, 0x38) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}], 0x20, 0x114}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x22, &(0x7f00000018c0), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext, 0x10c002, 0x7, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$kcm(0x2, 0x5, 0x84) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0x80218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7}, 0x2005, 0x0, 0x51, 0x0, 0x3, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r5, 0x0, 0xe, 0x0, &(0x7f0000000100)="c1dfb061cd21d3084d94d35486dd", 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socket$kcm(0x11, 0x3, 0x0) 52.870093011s ago: executing program 4 (id=6226): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x92, 0x1, 0x0, 0x0, 0x0, 0x2, 0x20460, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x1, @perf_bp={0x0}, 0x2080, 0x1, 0x3, 0x0, 0x6, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x0, 0x0, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @cgroup_sock_addr=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000100)=ANY=[@ANYBLOB="18020000feffffff0000000003000000850000004100000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f805ffffb702000008000006b703000003000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) 52.486816406s ago: executing program 4 (id=6231): r0 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, 0x0, 0x0) r1 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f00000008c0), 0x43) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x604, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x20, &(0x7f0000001840)=[{&(0x7f0000000580)="6700000011008188040f56ecdb4cb9cca7480ef434000000e3bd6efb440009000e000a0010000000ba80010000005a8c3774fa0af3dc59a933c1e7a6d3361d83b20000319cdf5656826edaaa11032701c61ec666d482078ccebcb9a4f187f7a4e98f09cdc2649f", 0x67}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000000), 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001bc0)={0xffffffffffffffff, 0x0, 0x0, 0x4c, 0x0, &(0x7f0000001c40)=""/76, 0x4000, 0x0, 0x43, 0x19, &(0x7f0000001ac0)="9c01bd6f9a6028c80d7364240fd78867d9d62eca43c565f2c5ac65dd4a0fadceb6c65dcb07f2421e69087e0f17b4eb709e4805f2722709c46bef17c4cb9aed9fb1c342", &(0x7f0000001a40)="408fd0050dc7945b483103067eca9bd26ffbe35abf0f88a103", 0x1, 0x0, 0x13}, 0x50) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x101d0) close(0x3) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x7, 0x40, 0x7, 0x0, 0x3, 0x2005e, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0}, 0x118183, 0x6, 0x7, 0x0, 0x81, 0x2, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000140)}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1c, &(0x7f0000000440)=ANY=[@ANYBLOB="180800000040000000000000fdffffff18110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000308500000005000000bca900000000000035090100000000009500500000000006b702000000000000739af0ff00000000b509020000030000dbaaf0fff10000002f8900000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018220000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000036080000000000008500000007000000b70000000000000095000000000000008880d0114f6a9a9f14a18f2d2a7c58126ad722f83147337faabe2360b64078f42de3971278c3253eae81d910b1b7628da64d62456b386c63008a33a44e7a3343fe3e79c83bf4f3321a40cfde5e8622f53184928cb7aa3b54dcf07d376082d62fabedd75e3091aaa242363a3bcefd3ab8a8a73aa1a941cb3e4c4041f7a591fb634acaf908769e4a44b85c8a4144afc19020517466926452103bca963b9bee01d4309a61a6255e4ebaec4011914fd31c3e590768842d7e"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 51.642608937s ago: executing program 4 (id=6234): socket$kcm(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac59}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0xa, 0x2, 0x0) socket$kcm(0x21, 0x2, 0x2) socket$kcm(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200002, 0x0) socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x88}, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe89}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500), 0xc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x81000000, 0x12, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee6888808", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 48.369719854s ago: executing program 4 (id=6238): getpid() socket$kcm(0xa, 0x6, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x2ac02, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8b2b, &(0x7f0000000040)={'wlan1\x00', @random="010000000002"}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[], 0x0, 0x26, 0x0, 0x0, 0x0, 0x4000000}, 0x28) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x15, 0x5, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x922000000003, 0x11) socket$kcm(0x2, 0x200000000000001, 0x0) r1 = socket$kcm(0xa, 0x2, 0x3a) sendmsg$kcm(r1, &(0x7f0000000440)={&(0x7f0000000180)=@in6={0xa, 0xffff, 0x0, @mcast1, 0x6}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000780)="80005b020eaa4da2", 0x8}, {0x0, 0x30}], 0x2, 0x0, 0x0, 0x900}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='cpuset.sched_load_balance\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f00000000c0)=0x100000000, 0x12) 47.706461265s ago: executing program 4 (id=6239): socket$kcm(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac59}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x21, 0x2, 0x2) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200002, 0x0) socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0xa8}, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x8100002f, 0x7, 0x0, &(0x7f0000000900)="c1dfb080cd21d3", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 47.228993425s ago: executing program 4 (id=6242): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x2, &(0x7f0000000440)=ANY=[@ANYBLOB="850000000f0000009500000000000000141dea02fed2b50f0af040050ea87da2f56bcaf5f4f51b1034a5cc3f7c69da721e2fd23097996dce4a7e37bb8c9a8a86ec403f601d8c2178694eccc938eab450c164c46f650e7c7ff5af63f9b3b4df045a30a2143f811bbb0c7aa1"], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe9, &(0x7f0000000240)=""/233, 0x0, 0x11}, 0x80) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40002002) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x18, '\x00', 0x0, @sock_ops}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)=ANY=[], 0x50) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="00000000000000002702000014005800b7030000000000008500000059000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000000000000b70000000000000095"], &(0x7f0000000c80)='syzkaller\x00'}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x3, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000008afea650540c305d0000850002000000000000000000bb1b00009500000000000000e3a9652696da7f94c5912543f25d30fe0265dec43d8b22dc9cf8580e565d1b54c891d879de60dc2a3cea6018450fb905afc8b7d853458197a455619fe3eb645e382cdc5bfd26807fd6ba6752175b990d9e8b68b8e54b2398988dbcfeb368"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x18000000000002a0, 0x14, 0x0, &(0x7f0000000100)="b9ff033168440372b89e14f008004d5613fdbe33", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x7}]}) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000032000b07d25a806f8c6394f90824fc60", 0x14}], 0x1}, 0x0) recvmsg(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r1, 0x40107446, &(0x7f0000000180)) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) socket$kcm(0x2b, 0x1, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000011c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000008000000060000000000000c03000000000000000004000201000000000000000200000d00000800090000000300000007000000040000000000000000005f00"], 0x0, 0x54}, 0x28) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) 13.93562928s ago: executing program 5 (id=6309): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x2, &(0x7f0000000440)=ANY=[@ANYBLOB="850000000f0000009500000000000000141dea02fed2b50f0af040050ea87da2f56bcaf5f4f51b1034a5cc3f7c69da721e2fd23097996dce4a7e37bb8c9a8a86ec403f601d8c2178694eccc938eab450c164c46f650e7c7ff5af63f9b3b4df045a30a2143f811bbb0c7aa1"], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe9, &(0x7f0000000240)=""/233, 0x0, 0x11}, 0x80) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40002002) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x18, '\x00', 0x0, @sock_ops}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)=ANY=[], 0x50) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="00000000000000002702000014005800b7030000000000008500000059000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000000000000b70000000000000095"], &(0x7f0000000c80)='syzkaller\x00'}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x3, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000008afea650540c305d0000850002000000000000000000bb1b00009500000000000000e3a9652696da7f94c5912543f25d30fe0265dec43d8b22dc9cf8580e565d1b54c891d879de60dc2a3cea6018450fb905afc8b7d853458197a455619fe3eb645e382cdc5bfd26807fd6ba6752175b990d9e8b68b8e54b2398988dbcfeb368"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x18000000000002a0, 0x14, 0x0, &(0x7f0000000100)="b9ff033168440372b89e14f008004d5613fdbe33", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x7}]}) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000032000b07d25a806f8c6394f90824fc60", 0x14}], 0x1}, 0x0) recvmsg(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r1, 0x40107446, &(0x7f0000000180)) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) socket$kcm(0x2b, 0x1, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) 10.748981033s ago: executing program 6 (id=6312): r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001a80)={0x0, 0x0, 0x0}, 0x2000) (async) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0x5, 0x16, 0xb4, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xef, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188e6b62aa73772cc9f1ba1f848480000005e140602000000000e000a0010000000028000031294", 0x2e}], 0x1}, 0x0) (async) recvmsg$kcm(r0, &(0x7f0000000400)={&(0x7f0000000100)=@phonet, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)=""/15, 0xf}, {&(0x7f0000000180)=""/243, 0xf3}, {&(0x7f0000000280)=""/225, 0xe1}], 0x3, &(0x7f0000000440)=""/138, 0x8a}, 0x40000261) 10.458530981s ago: executing program 6 (id=6315): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0xf, 0x4, 0x4, 0x12, 0x10000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x10003}, 0x50) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x28) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xf, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24004010) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x0, 0x3, &(0x7f0000000040)=@framed, 0x0}, 0x90) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000040)={0xa, 0x0, @local}, 0x1c, &(0x7f0000000180)=[{&(0x7f0000000080)="a2", 0x34000}], 0x1, 0x0, 0x0, 0x2000}, 0x60) (fail_nth: 6) 8.91094578s ago: executing program 6 (id=6316): r0 = syz_clone(0x40008000, &(0x7f0000000280)="947494b445acf092c6bde1504f35d742b5f960bbd6196909490177d2842d4ffed3dc4c7eb90fce08c8964206b9856f455ecb23be987377aec7080b09357732d78a9918df9758fd1721d6a3c07a3678a7b71871e7da8df2f9e957d7a4f0368b72eb88370fb80db0553c977f826e0f3ff9b9f8400b0061461a1e506167077c76355123444dee727d47a2f0f3de6097c36cbe", 0x91, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="319faeae0f937c00b528f282803d85b3b7c57b2676b4ad9233127962d4095ed135d4c505") r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x1, 0x4}, 0x0, 0x10000, 0x0, 0x5, 0x400008, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext, 0x0, 0x0, 0x7092}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="05000008000000", @ANYRES32=0x1, @ANYBLOB="00000100"/20, @ANYRES32=0x0, @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000440), 0x311002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="030000000400000004"], 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r4, &(0x7f0000000040)={0x0, 0x51, &(0x7f0000000100)=[{&(0x7f00000006c0)="5c00000013006bcd9e3fe3dc6e48aa310b6b87033c0000001f03000000000000040014000d000a000d0000009ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r5 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.1GB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f00000002c0)=ANY=[], 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r6 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r6, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001380)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x1ff, 0x200}, 0x8000, 0xcdd, 0x43a1bd76, 0x4, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r7 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r7, &(0x7f0000001640)={&(0x7f0000000580)={0x2, 0x0, @loopback}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x4d}}], 0x18}, 0x8001) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r1, @ANYRES64=r4, @ANYRESHEX=r2, @ANYRES16=r3], 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r8, &(0x7f0000000280), 0x0}, 0x20) recvmsg$kcm(r7, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x10002) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe89}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r9, 0x0, 0xcc0, 0x0, &(0x7f0000000040)="2b1c52ac82e71ea05b0c5e43ede4", 0x0, 0xb20c, 0x0, 0x0, 0xe8, 0x0, &(0x7f0000000280)="dd"}, 0x48) recvmsg(r7, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x40000000) 8.839076752s ago: executing program 5 (id=6317): socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0xa}, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa40, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100)=r2, 0x12) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x8, 0x0, 0xff6c}, 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x4, 0xc272}, 0x10c002, 0xac5d, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x56, 0x0, &(0x7f0000000100)="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", 0x0, 0xfb, 0x60006000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000001c40)="beb61ec2ca90080239f2a54e2368fa761313c3a024a98109ba1e2e7b780d03c54b7a83d56fce397842e724674507d531762055fca371ea775f418df7bee236c9b9968146efb3232ae3413b617445e98bb644a892b9337f1a9135d9f30457a8ffb21aef4a95a155fab70a40b086056b0f63331a66b3457c", 0x2}, 0x2c) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x4, 0x4}, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x50) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0xc29a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)=@generic={&(0x7f0000000100)='./file0\x00', r4}, 0x18) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000780)={0x3, 0x80, 0x4, 0xaa, 0x9, 0x40, 0x0, 0xa, 0x200, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x7fff, 0x6, 0x2, 0x5, 0x7, 0x6, 0x0, 0x1427, 0x0, 0x35e}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x18, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000f40)=ANY=[@ANYBLOB="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", @ANYRES8], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x16, 0x0, 0xffffffffffffffff, 0xffffffffffffffc9}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe80, 0x0, &(0x7f0000000000)="378303076844268cb89e14f008004ee0ffff00febabec41177fb86dd1402e000030c", 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00\t \x00', @ANYRES32, @ANYBLOB="0100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000003000000040000000c00"/28], 0x48) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) 8.487614211s ago: executing program 1 (id=6320): socket$kcm(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac59}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x21, 0x2, 0x2) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200002, 0x0) socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0xa8}, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x8100002f, 0xd, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee68881", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 7.782639819s ago: executing program 1 (id=6321): socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10}, 0x0, 0xca, 0x0, 0x2, 0x0, 0x10, 0x0, 0x0, 0xfffffffe, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0xc2ba, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[@ANYRES8=r1, @ANYRES8], 0x12) 7.639571533s ago: executing program 5 (id=6322): socket$kcm(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac59}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0xa, 0x2, 0x0) socket$kcm(0x21, 0x2, 0x2) socket$kcm(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200002, 0x0) socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x88}, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe89}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500), 0xc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x81000000, 0x12, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee6888808", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 7.392501484s ago: executing program 1 (id=6323): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000580)=[0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa6, &(0x7f0000000600)=[{}], 0x8, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0xa5, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0x58, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r0, &(0x7f0000000980)={&(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10, &(0x7f0000000440)=[{&(0x7f0000000380)="35220db2bb048adf926313ea22fb96967ace2a7376cc4b6313b55fcad9c39243cf239d8630100b0cf284a1e50f661033c468eb554e33b3bc002f719fa9f05a579721890b40f29930ccf8187144d7a1dcc20b73377a9f4742cb8fd3188403cff04d73e21b37c3770b05e7295b7f4a0b3c5a991f9cb6f9c647f72274561abbffc7f42673", 0x83}], 0x1, &(0x7f0000000900)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @multicast2, @multicast2}}}, @ip_retopts={{0x28, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0xf, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x17}]}, @lsrr={0x83, 0xb, 0x7e, [@loopback, @local]}]}}}], 0x80}, 0x24008884) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000200)='./cgroup\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x58c8, 0x0, 0xeffffffc, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="6112a8000000000061134c0000000000bf20000000000000160005003f1b48013d030100000000009500000000000000bc26000000000000bf67000000000000070200000fff07006702000003000000360600000ee600f0bf050000000000000f650000000000006507f4ff0200"], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = socket$kcm(0x2, 0x2, 0x73) sendmsg$kcm(r3, &(0x7f0000000340)={&(0x7f0000000040)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000640)=ANY=[], 0x14f8}, 0x90) 7.376261097s ago: executing program 0 (id=6324): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x20, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000022003505d25a806f8c6394f97e24fc60", 0x14}], 0x1, 0x0, 0x0, 0x74000000}, 0x10) 6.788125395s ago: executing program 0 (id=6325): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) close(r4) ioctl$SIOCSIFHWADDR(r4, 0xc0189436, &(0x7f0000000000)={'bridge_slave_1\x00'}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000740)={0x8, 0x0}, 0x8) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)=@o_path={&(0x7f0000000780)='./file0\x00', 0x0, 0x0, r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x18, 0x26, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xc7ef}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@jmp={0x5, 0x0, 0xc, 0xa, 0x7, 0x6, 0xfffffffffffffffe}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x6b3}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x1}, @ldst={0x2, 0x1, 0x3, 0x0, 0x9, 0x8, 0xffffffffffffffff}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}}}, &(0x7f00000003c0)='GPL\x00', 0x0, 0xd7, &(0x7f0000000500)=""/215, 0x41000, 0x2c, '\x00', r3, @fallback=0x11, r4, 0x8, &(0x7f00000006c0)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000700)={0x1, 0x3, 0x8, 0x10001}, 0x10, r5, r1, 0x1, &(0x7f0000000800)=[r0, r6], &(0x7f0000000840)=[{0x2, 0x5, 0xa, 0x4}], 0x10, 0x3}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r7}, 0xc) 6.58096649s ago: executing program 0 (id=6326): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x2, &(0x7f0000000440)=ANY=[@ANYBLOB="850000000f0000009500000000000000141dea02fed2b50f0af040050ea87da2f56bcaf5f4f51b1034a5cc3f7c69da721e2fd23097996dce4a7e37bb8c9a8a86ec403f601d8c2178694eccc938eab450c164c46f650e7c7ff5af63f9b3b4df045a30a2143f811bbb0c7aa1"], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe9, &(0x7f0000000240)=""/233, 0x0, 0x11}, 0x80) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40002002) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x18, '\x00', 0x0, @sock_ops}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)=ANY=[], 0x50) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="00000000000000002702000014005800b7030000000000008500000059000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000000000000b70000000000000095"], &(0x7f0000000c80)='syzkaller\x00'}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x3, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000008afea650540c305d0000850002000000000000000000bb1b00009500000000000000e3a9652696da7f94c5912543f25d30fe0265dec43d8b22dc9cf8580e565d1b54c891d879de60dc2a3cea6018450fb905afc8b7d853458197a455619fe3eb645e382cdc5bfd26807fd6ba6752175b990d9e8b68b8e54b2398988dbcfeb368"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x18000000000002a0, 0x14, 0x0, &(0x7f0000000100)="b9ff033168440372b89e14f008004d5613fdbe33", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x7}]}) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000032000b07d25a806f8c6394f90824fc60", 0x14}], 0x1}, 0x0) recvmsg(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r1, 0x40107446, &(0x7f0000000180)) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) socket$kcm(0x2b, 0x1, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) 4.480025581s ago: executing program 5 (id=6327): socket$kcm(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac59}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0xa, 0x2, 0x0) socket$kcm(0x21, 0x2, 0x2) socket$kcm(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200002, 0x0) socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000010c0)={0xc, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x2}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @exit]}, &(0x7f0000000fc0)='GPL\x00', 0x1, 0x98, &(0x7f00000001c0)=""/152, 0x41100, 0xa}, 0x94) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x88}, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe89}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500), 0xc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x81000000, 0x12, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee6888808", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 4.479379481s ago: executing program 1 (id=6328): r0 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x21b, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6307ce22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa35f0"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x1c, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200"], 0xcfa4) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0x20a, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)=[{0x0}], 0x1}, 0x4084) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0xf, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x25, 0x3, 0x6, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000080)) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 4.468983993s ago: executing program 6 (id=6329): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x0, 0x0, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @cgroup_sock_addr=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000100)=ANY=[@ANYBLOB="18020000feffffff0000000003000000850000004100000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f805ffffb702000008000006b703000003000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) 4.327695296s ago: executing program 0 (id=6330): r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x8001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0xc2ba, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='(())') r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0x1, 0xffffffffffffffff}, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x16, 0x2, 0x80000001, 0x4, 0x1000, 0xffffffffffffffff, 0xffffff75, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0xe0, &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000006c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000700)=[0x0], &(0x7f0000000740)=[0x0], 0x0, 0x1000c4, &(0x7f0000000840)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000100), &(0x7f00000008c0), 0x8, 0xa7, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b00)={&(0x7f0000000a80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@typedef={0x7, 0x0, 0x0, 0x8, 0x4}, @volatile={0x10}]}, {0x0, [0x2e, 0x5f]}}, &(0x7f0000000ac0)=""/56, 0x34, 0x38, 0x1, 0x2}, 0x28) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000002000000000000000000000d00000000000000000000000a"], 0x0, 0x32}, 0x20) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x2, 0xc2ba, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="d8000000210081044e81f782db44b90402", 0x11}], 0x1}, 0x0) r8 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x10001, 0x0, 0xfffffffc, 0x5}, {0x2}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r8, 0x84, 0x6e, &(0x7f0000000000)=r11, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x18, 0x4, &(0x7f0000000e40)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006dfef5c19d67b9220f3e9a000000950d7cc102045a51cebba635157b75285d3833cc5ed752f40b3b6220cb3d404aeda33047a187019ad0687ea2f3649228ac3393b16af83267ad5c0601346b2c67b8312685a3ec8ae8dd4fd86230ab3c4508d0082d0de678e9ea3f03cc18b3a79052"], &(0x7f0000000bc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r6}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x20, &(0x7f00000003c0)={&(0x7f0000000340), 0x0, 0x0, &(0x7f0000000380)=""/16, 0x10}}, 0x10) r13 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440)={0xffffffffffffffff}, 0x4) r14 = bpf$ITER_CREATE(0x21, &(0x7f0000000500), 0x8) r15 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540)={0xffffffffffffffff, 0x2, 0xe9a49e1b3271eadd}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1f, 0x2, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0xb}, @func={0x85, 0x0, 0x1, 0x0, 0x8}], &(0x7f0000000080)='syzkaller\x00', 0x5, 0xde, &(0x7f00000001c0)=""/222, 0x41000, 0x9, '\x00', 0x0, @fallback=0x31, r7, 0x8, &(0x7f00000002c0)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0x7, 0x6, 0xd}, 0x10, r12, r13, 0x2, &(0x7f0000000580)=[0xffffffffffffffff, r14, r15], &(0x7f00000005c0)=[{0x3, 0x4, 0xc, 0x8}, {0x1, 0x2, 0x8, 0x8}], 0x10, 0xfffffffa}, 0x94) r16 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="1b0000000000000000000000760000ec00000000", @ANYRES32, @ANYBLOB="0400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="030000000300"/28], 0x50) r17 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB="0e00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000052000"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0x1c, 0x25, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x2, 0x0, 0x1, 0x1, 0x6, 0x0, 0xfffffffffffffffc}, @ldst={0x2, 0x0, 0x1, 0x3, 0x0, 0x50, 0xfffffffffffffffc}, @ldst={0x0, 0x2, 0x0, 0x5, 0x0, 0xfffffffffffffff8, 0xffffffffffffffff}, @alu={0x4, 0x1, 0xd, 0x6, 0xb, 0xffffffffffffffff, 0x4}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x40}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xd}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7fffffff}, @map_fd={0x18, 0x7, 0x1, 0x0, r4}]}, &(0x7f0000000680)='GPL\x00', 0x400, 0x0, 0x0, 0x40f00, 0x28, '\x00', r5, @fallback=0x2, r6, 0x8, &(0x7f0000000b40)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000b80)={0x2, 0xc, 0x7, 0x1}, 0x10, r12, r2, 0x0, &(0x7f0000000d40)=[r16, r1, r17], 0x0, 0x10, 0x3ff}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r2, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.250415481s ago: executing program 0 (id=6331): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x26, 0xc, 0x0, 0x0, 0x0, 0x9, 0x242b9, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x382a, 0xffffffffffff0001}, 0x8000, 0x3, 0x43a1bd76, 0x7, 0x9, 0x658, 0x1, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x11, 0x3, 0x0) socket$kcm(0x2, 0x200000000000001, 0x106) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff7ffa}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)=ANY=[], 0x50) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x480c0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="11000000040000000400000005"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000200007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x5, 0xb, 0x0, &(0x7f0000000900)="25a688a800a34400000000", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0}, 0x50) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea032f"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000600)={0x0, 0x21, &(0x7f0000000040)=[{&(0x7f0000000340)="2e1f000010008188e6b62aa73f72cc9f0ba1f848390000005e100602000000000e000a0010000000028000001294", 0x2e}], 0x1}, 0x20000800) sendmsg$inet(r0, &(0x7f0000001000)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x26}, @loopback}}}], 0x20}, 0x0) 1.240658512s ago: executing program 6 (id=6332): r0 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x21b, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6307ce22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa35f0"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x1c, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0x20a, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)=[{0x0}], 0x1}, 0x4084) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0xf, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000080)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3d) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 1.181198093s ago: executing program 5 (id=6333): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x92, 0x1, 0x0, 0x0, 0x0, 0x2, 0x20460, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x1, @perf_bp={0x0}, 0x2080, 0x1, 0x3, 0x0, 0x6, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="b400000000000020dd0a0000000000006301a40000000000950000000000000096f5bee14ac7337830e56fa8d6fda1a75c64f5f707e615d7f81d6ffb7f889a2ad4799f2c715a11850bec862f44fff320844e5ac8b474faa7bd9526605687628ab80096eed4e025bc2e9c5e2f71494254ceebc04fb41b74dc7173efb1e0bba27131824a589c4a879d3d76938941a6a2092779074f1cfc49675de45866b85439e499f08a35"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xb5}, 0x48) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x0, 0x0, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @cgroup_sock_addr=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x81, 0x86f46, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={0x0, 0xf}, 0x10001, 0x5, 0x84, 0x0, 0x0, 0xffff0000, 0x0, 0x0, 0xfffffffe, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xd, r0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000100)=ANY=[@ANYBLOB="18020000feffffff0000000003000000850000004100000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f805ffffb702000008000006b703000003000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) 1.132260841s ago: executing program 1 (id=6334): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000}, 0x10e002, 0x2c5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f00000010c0)="5c00000031086b8703300000001f00000000000000040014000d002900070100009ee537d34460bc0deab556a705251e306282949a", 0x35}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x1f000801}, 0x24048081) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000d40), 0x4) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x97ef490e4b99f9ac) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x4}, 0x0, 0x0, 0x0, 0x8, 0x2, 0xfffffffc}, 0x0, 0x100000000, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000001180)='hugetlb.2MB.rsvd.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[@ANYBLOB='e'], 0x27) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) mkdir(0x0, 0x0) r4 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)=@generic={0x0, 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{0x1}, 0x0, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB], 0x50) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x80, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x492}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x50) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000012c0)={0x6, 0x4, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xe}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}]}, 0x0, 0x2, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x25, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20}, 0x94) recvmsg(0xffffffffffffffff, 0x0, 0x3f00) 119.99534ms ago: executing program 0 (id=6335): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x945, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x80}, 0x0, 0xffffffffffffffff, r0, 0x8) perf_event_open(&(0x7f0000000800)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x8000000, 0x4, 0x0, 0x0, 0x4, 0x0, 0x6}, 0xffffffffffffffff, 0x1, r1, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfffffffc, 0x0, 0x0, 0x4, 0x0, 0x3}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0x9, 0x0, 0x1a) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) getpid() close(r3) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c040, 0x7, 0x0, 0x5, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f00000003c0)={0x5, 0x80, 0xfc, 0x9, 0x3, 0x0, 0x0, 0x0, 0x1010, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1, 0x7fff}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x800003}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f00000008c0), 0x43) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000638877fbacfe1416e000000144040203fe80000000000000845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000}, 0x2c) r5 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r5, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x3, @private2, 0x6, 0x3}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x900}, 0x0) socket$kcm(0x2, 0x3, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000073113900"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x4}, 0x8}, 0x94) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000300)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d004892e822a6abc02ad2602a5ad6f7007ea60864160af365935cfaea3f49d8df1931a0e64ffc4c78029ee517d34460bc06000000938037e70e457ae2bb24ef6697070000000000", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg(r6, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000002e00)=""/4082, 0xff2}, {&(0x7f00000073c0)=""/4118, 0x1016}, {&(0x7f0000000d00)=""/237, 0xed}], 0x3}, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8b15, &(0x7f0000000000)={'wlan1\x00', @remote}) 59.18402ms ago: executing program 1 (id=6336): socket$kcm(0x21, 0x2, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac59}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0xa, 0x2, 0x0) socket$kcm(0x21, 0x2, 0x2) socket$kcm(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200002, 0x0) socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x88}, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500), 0xc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x81000000, 0x12, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee6888808", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 41.281953ms ago: executing program 6 (id=6337): r0 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x21b, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6307ce22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa35f0"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x1c, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200"], 0xcfa4) socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0x20a, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)=[{0x0}], 0x1}, 0x4084) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0xf, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000080)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3d) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 0s ago: executing program 5 (id=6338): bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x21, 0x2, 0x2) socket$kcm(0x29, 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1, 0x8, 0x8, 0x8, 0x40, 0xffffffffffffffff, 0x20}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)="c6d3ddca886199f5af98723127d2", &(0x7f0000000340), 0xffffffff, r0}, 0x38) r1 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x4044}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)={0xffffffffffffffff}, 0x4) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x2, 0x804, 0x0, 0x7}, {0x10400002, 0x2, 0x0, 0x5}], 0x10, 0xfffffffd}, 0x94) r3 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) sendmsg$inet(r5, &(0x7f0000000200)={&(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x10, 0x0, 0xffffffffffffff23}, 0x60000c6) socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r3, 0x84, 0x64, &(0x7f0000000000)=r6, 0x10) setsockopt$sock_attach_bpf(r3, 0x84, 0x1e, &(0x7f0000000000), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r7, 0x84, 0x64, &(0x7f0000000000)=r10, 0x10) kernel console output (not intermixed with test programs): 5852][T22044] RIP: 0033:0x7fcc3e99c819 [ 1386.360301][T22044] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1386.380147][T22044] RSP: 002b:00007fcc3f927028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1386.388600][T22044] RAX: ffffffffffffffda RBX: 00007fcc3ec15fa0 RCX: 00007fcc3e99c819 [ 1386.396616][T22044] RDX: 0000000000000000 RSI: 0000200000000640 RDI: 0000000000000003 [ 1386.404723][T22044] RBP: 00007fcc3f927090 R08: 0000000000000000 R09: 0000000000000000 [ 1386.412726][T22044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1386.420727][T22044] R13: 00007fcc3ec16038 R14: 00007fcc3ec15fa0 R15: 00007fff61f59308 [ 1386.428757][T22044] [ 1389.825908][T22077] validate_nla: 1 callbacks suppressed [ 1389.825928][T22077] netlink: 'syz.0.5418': attribute type 29 has an invalid length. [ 1389.841026][T22079] netlink: 'syz.6.5416': attribute type 7 has an invalid length. [ 1389.850866][T22077] netlink: 'syz.0.5418': attribute type 29 has an invalid length. [ 1389.860256][T22077] netlink: 'syz.0.5418': attribute type 29 has an invalid length. [ 1390.156842][T22092] FAULT_INJECTION: forcing a failure. [ 1390.156842][T22092] name failslab, interval 1, probability 0, space 0, times 0 [ 1390.180107][T22092] CPU: 0 PID: 22092 Comm: syz.5.5423 Not tainted syzkaller #0 [ 1390.187673][T22092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1390.197943][T22092] Call Trace: [ 1390.201350][T22092] [ 1390.204319][T22092] dump_stack_lvl+0x188/0x24e [ 1390.209053][T22092] ? show_regs_print_info+0x12/0x12 [ 1390.214312][T22092] ? load_image+0x400/0x400 [ 1390.218867][T22092] ? __might_sleep+0xd0/0xd0 [ 1390.223499][T22092] ? __lock_acquire+0x7d10/0x7d10 [ 1390.228580][T22092] should_fail_ex+0x399/0x4d0 [ 1390.233317][T22092] should_failslab+0x5/0x20 [ 1390.237859][T22092] slab_pre_alloc_hook+0x59/0x310 [ 1390.242932][T22092] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 1390.248713][T22092] __kmem_cache_alloc_node+0x4f/0x260 [ 1390.254149][T22092] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 1390.259920][T22092] __kmalloc+0xa0/0x240 [ 1390.264124][T22092] tomoyo_realpath_from_path+0xdf/0x5d0 [ 1390.269715][T22092] ? tomoyo_path_number_perm+0x205/0x650 [ 1390.275608][T22092] tomoyo_path_number_perm+0x22f/0x650 [ 1390.281103][T22092] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 1390.286583][T22092] ? ksys_write+0x1c0/0x250 [ 1390.291114][T22092] ? common_file_perm+0x171/0x1c0 [ 1390.296204][T22092] ? __fget_files+0x28/0x4b0 [ 1390.300832][T22092] ? __fget_files+0x28/0x4b0 [ 1390.305470][T22092] security_file_ioctl+0x6c/0xa0 [ 1390.310443][T22092] __se_sys_ioctl+0x48/0x170 [ 1390.315064][T22092] do_syscall_64+0x4c/0xa0 [ 1390.319504][T22092] ? clear_bhb_loop+0x60/0xb0 [ 1390.324210][T22092] ? clear_bhb_loop+0x60/0xb0 [ 1390.328911][T22092] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1390.334827][T22092] RIP: 0033:0x7fa5e1b9c819 [ 1390.339262][T22092] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1390.358885][T22092] RSP: 002b:00007fa5e29e5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1390.367331][T22092] RAX: ffffffffffffffda RBX: 00007fa5e1e15fa0 RCX: 00007fa5e1b9c819 [ 1390.375323][T22092] RDX: 0000200000000040 RSI: 0000000000008916 RDI: 0000000000000003 [ 1390.383302][T22092] RBP: 00007fa5e29e5090 R08: 0000000000000000 R09: 0000000000000000 [ 1390.391292][T22092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1390.399363][T22092] R13: 00007fa5e1e16038 R14: 00007fa5e1e15fa0 R15: 00007ffc1e9b3d08 [ 1390.407364][T22092] [ 1390.465847][T22092] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1390.695389][T22105] FAULT_INJECTION: forcing a failure. [ 1390.695389][T22105] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1390.709112][T22105] CPU: 0 PID: 22105 Comm: syz.6.5428 Not tainted syzkaller #0 [ 1390.716608][T22105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1390.726697][T22105] Call Trace: [ 1390.730025][T22105] [ 1390.733005][T22105] dump_stack_lvl+0x188/0x24e [ 1390.737739][T22105] ? show_regs_print_info+0x12/0x12 [ 1390.742988][T22105] ? load_image+0x400/0x400 [ 1390.747536][T22105] ? __lock_acquire+0x7d10/0x7d10 [ 1390.752624][T22105] should_fail_ex+0x399/0x4d0 [ 1390.757449][T22105] _copy_from_user+0x2c/0x170 [ 1390.762182][T22105] __sys_bpf+0x2ea/0x780 [ 1390.766486][T22105] ? bpf_link_show_fdinfo+0x380/0x380 [ 1390.771932][T22105] ? lock_chain_count+0x20/0x20 [ 1390.776834][T22105] __x64_sys_bpf+0x78/0x90 [ 1390.781297][T22105] do_syscall_64+0x4c/0xa0 [ 1390.785756][T22105] ? clear_bhb_loop+0x60/0xb0 [ 1390.790489][T22105] ? clear_bhb_loop+0x60/0xb0 [ 1390.795207][T22105] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1390.801151][T22105] RIP: 0033:0x7f3ed799c819 [ 1390.805701][T22105] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1390.825699][T22105] RSP: 002b:00007f3ed892d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1390.834159][T22105] RAX: ffffffffffffffda RBX: 00007f3ed7c15fa0 RCX: 00007f3ed799c819 [ 1390.842253][T22105] RDX: 000000000000000c RSI: 00002000000003c0 RDI: 000000000000000a [ 1390.850240][T22105] RBP: 00007f3ed892d090 R08: 0000000000000000 R09: 0000000000000000 [ 1390.858222][T22105] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1390.866209][T22105] R13: 00007f3ed7c16038 R14: 00007f3ed7c15fa0 R15: 00007fffd10b38b8 [ 1390.874209][T22105] [ 1391.649351][T22112] netlink: 'syz.5.5431': attribute type 29 has an invalid length. [ 1391.666042][T22112] netlink: 'syz.5.5431': attribute type 29 has an invalid length. [ 1391.712915][T22116] netlink: 'syz.5.5431': attribute type 29 has an invalid length. [ 1391.899550][T22117] netlink: 'syz.1.5432': attribute type 10 has an invalid length. [ 1391.937460][T22117] bridge0: port 2(bridge_slave_1) entered disabled state [ 1391.949645][T22117] bridge0: port 1(bridge_slave_0) entered disabled state [ 1392.038152][T22123] netlink: 'syz.1.5432': attribute type 7 has an invalid length. [ 1392.145373][T22123] netlink: 208404 bytes leftover after parsing attributes in process `syz.1.5432'. [ 1392.649251][T22117] bridge0: port 2(bridge_slave_1) entered blocking state [ 1392.656709][T22117] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1392.664370][T22117] bridge0: port 1(bridge_slave_0) entered blocking state [ 1392.671767][T22117] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1392.809972][T22117] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 1392.826729][T22129] netlink: 'syz.0.5436': attribute type 21 has an invalid length. [ 1392.884986][T22134] FAULT_INJECTION: forcing a failure. [ 1392.884986][T22134] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1392.932985][T22134] CPU: 0 PID: 22134 Comm: syz.6.5437 Not tainted syzkaller #0 [ 1392.940629][T22134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1392.950822][T22134] Call Trace: [ 1392.954137][T22134] [ 1392.957102][T22134] dump_stack_lvl+0x188/0x24e [ 1392.961838][T22134] ? show_regs_print_info+0x12/0x12 [ 1392.967161][T22134] ? load_image+0x400/0x400 [ 1392.971719][T22134] ? __lock_acquire+0x7d10/0x7d10 [ 1392.976797][T22134] should_fail_ex+0x399/0x4d0 [ 1392.981517][T22134] _copy_from_user+0x2c/0x170 [ 1392.986237][T22134] ___sys_recvmsg+0x172/0x590 [ 1392.990970][T22134] ? __sys_recvmsg+0x290/0x290 [ 1392.995796][T22134] ? common_file_perm+0x171/0x1c0 [ 1393.000882][T22134] ? __fget_files+0x43d/0x4b0 [ 1393.005663][T22134] __x64_sys_recvmsg+0x205/0x2e0 [ 1393.010647][T22134] ? ___sys_recvmsg+0x590/0x590 [ 1393.015580][T22134] ? lockdep_hardirqs_on+0x94/0x140 [ 1393.020817][T22134] do_syscall_64+0x4c/0xa0 [ 1393.025271][T22134] ? clear_bhb_loop+0x60/0xb0 [ 1393.029982][T22134] ? clear_bhb_loop+0x60/0xb0 [ 1393.034780][T22134] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1393.040704][T22134] RIP: 0033:0x7f3ed799c819 [ 1393.045150][T22134] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1393.065092][T22134] RSP: 002b:00007f3ed890c028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1393.073639][T22134] RAX: ffffffffffffffda RBX: 00007f3ed7c16090 RCX: 00007f3ed799c819 [ 1393.081662][T22134] RDX: 0000000000000041 RSI: 0000200000002980 RDI: 0000000000000003 [ 1393.089698][T22134] RBP: 00007f3ed890c090 R08: 0000000000000000 R09: 0000000000000000 [ 1393.097756][T22134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1393.105853][T22134] R13: 00007f3ed7c16128 R14: 00007f3ed7c16090 R15: 00007fffd10b38b8 [ 1393.113985][T22134] [ 1393.347339][T22143] bridge0: port 1(bridge_slave_0) entered blocking state [ 1393.354813][T22143] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1394.322926][T22165] FAULT_INJECTION: forcing a failure. [ 1394.322926][T22165] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1394.353923][T22165] CPU: 0 PID: 22165 Comm: syz.5.5448 Not tainted syzkaller #0 [ 1394.361481][T22165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1394.371567][T22165] Call Trace: [ 1394.374878][T22165] [ 1394.377926][T22165] dump_stack_lvl+0x188/0x24e [ 1394.382646][T22165] ? show_regs_print_info+0x12/0x12 [ 1394.387969][T22165] ? load_image+0x400/0x400 [ 1394.392510][T22165] ? __lock_acquire+0x7d10/0x7d10 [ 1394.397606][T22165] ? perf_trace_lock_acquire+0x100/0x3e0 [ 1394.403408][T22165] should_fail_ex+0x399/0x4d0 [ 1394.408134][T22165] _copy_from_user+0x2c/0x170 [ 1394.412848][T22165] ___sys_sendmsg+0x1c3/0x360 [ 1394.417575][T22165] ? __sys_sendmsg+0x290/0x290 [ 1394.422404][T22165] ? __lock_acquire+0x7d10/0x7d10 [ 1394.427538][T22165] __se_sys_sendmsg+0x1bb/0x2a0 [ 1394.432463][T22165] ? ct_nmi_exit+0x145/0x1c0 [ 1394.437092][T22165] ? __x64_sys_sendmsg+0x80/0x80 [ 1394.442104][T22165] ? lockdep_hardirqs_on+0x94/0x140 [ 1394.447340][T22165] do_syscall_64+0x4c/0xa0 [ 1394.451791][T22165] ? clear_bhb_loop+0x60/0xb0 [ 1394.456501][T22165] ? clear_bhb_loop+0x60/0xb0 [ 1394.461333][T22165] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1394.467263][T22165] RIP: 0033:0x7fa5e1b9c819 [ 1394.471712][T22165] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1394.491346][T22165] RSP: 002b:00007fa5e29e5028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1394.499793][T22165] RAX: ffffffffffffffda RBX: 00007fa5e1e15fa0 RCX: 00007fa5e1b9c819 [ 1394.507802][T22165] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 1394.515796][T22165] RBP: 00007fa5e29e5090 R08: 0000000000000000 R09: 0000000000000000 [ 1394.523785][T22165] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1394.531789][T22165] R13: 00007fa5e1e16038 R14: 00007fa5e1e15fa0 R15: 00007ffc1e9b3d08 [ 1394.539818][T22165] [ 1394.837640][T12927] Bluetooth: hci3: ISO packet for unknown connection handle 3849 [ 1396.712383][T22180] FAULT_INJECTION: forcing a failure. [ 1396.712383][T22180] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1396.764180][T22180] CPU: 1 PID: 22180 Comm: syz.6.5453 Not tainted syzkaller #0 [ 1396.771722][T22180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1396.781825][T22180] Call Trace: [ 1396.785140][T22180] [ 1396.788118][T22180] dump_stack_lvl+0x188/0x24e [ 1396.792858][T22180] ? show_regs_print_info+0x12/0x12 [ 1396.798113][T22180] ? load_image+0x400/0x400 [ 1396.802663][T22180] ? __lock_acquire+0x7d10/0x7d10 [ 1396.807736][T22180] should_fail_ex+0x399/0x4d0 [ 1396.812624][T22180] _copy_from_user+0x2c/0x170 [ 1396.817340][T22180] ___sys_recvmsg+0x172/0x590 [ 1396.822138][T22180] ? __sys_recvmsg+0x290/0x290 [ 1396.827026][T22180] ? common_file_perm+0x171/0x1c0 [ 1396.832262][T22180] ? __fget_files+0x43d/0x4b0 [ 1396.836983][T22180] __x64_sys_recvmsg+0x205/0x2e0 [ 1396.841965][T22180] ? ___sys_recvmsg+0x590/0x590 [ 1396.847041][T22180] ? lockdep_hardirqs_on+0x94/0x140 [ 1396.852276][T22180] do_syscall_64+0x4c/0xa0 [ 1396.856761][T22180] ? clear_bhb_loop+0x60/0xb0 [ 1396.861473][T22180] ? clear_bhb_loop+0x60/0xb0 [ 1396.866184][T22180] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1396.872113][T22180] RIP: 0033:0x7f3ed799c819 [ 1396.876557][T22180] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1396.896196][T22180] RSP: 002b:00007f3ed892d028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1396.904644][T22180] RAX: ffffffffffffffda RBX: 00007f3ed7c15fa0 RCX: 00007f3ed799c819 [ 1396.912643][T22180] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 1396.920643][T22180] RBP: 00007f3ed892d090 R08: 0000000000000000 R09: 0000000000000000 [ 1396.928633][T22180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1396.936625][T22180] R13: 00007f3ed7c16038 R14: 00007f3ed7c15fa0 R15: 00007fffd10b38b8 [ 1396.944809][T22180] [ 1397.326599][T22192] FAULT_INJECTION: forcing a failure. [ 1397.326599][T22192] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1397.341496][T22192] CPU: 0 PID: 22192 Comm: syz.6.5458 Not tainted syzkaller #0 [ 1397.349054][T22192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1397.359163][T22192] Call Trace: [ 1397.362478][T22192] [ 1397.365439][T22192] dump_stack_lvl+0x188/0x24e [ 1397.370170][T22192] ? show_regs_print_info+0x12/0x12 [ 1397.375499][T22192] ? load_image+0x400/0x400 [ 1397.380041][T22192] ? __lock_acquire+0x7d10/0x7d10 [ 1397.385113][T22192] should_fail_ex+0x399/0x4d0 [ 1397.389841][T22192] _copy_from_user+0x2c/0x170 [ 1397.394600][T22192] ___sys_sendmsg+0x1c3/0x360 [ 1397.399345][T22192] ? __sys_sendmsg+0x290/0x290 [ 1397.404193][T22192] ? __lock_acquire+0x7d10/0x7d10 [ 1397.409300][T22192] __se_sys_sendmsg+0x1bb/0x2a0 [ 1397.414301][T22192] ? ct_nmi_exit+0x145/0x1c0 [ 1397.418944][T22192] ? __x64_sys_sendmsg+0x80/0x80 [ 1397.423950][T22192] ? lockdep_hardirqs_on+0x94/0x140 [ 1397.429203][T22192] do_syscall_64+0x4c/0xa0 [ 1397.433759][T22192] ? clear_bhb_loop+0x60/0xb0 [ 1397.438497][T22192] ? clear_bhb_loop+0x60/0xb0 [ 1397.443229][T22192] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1397.449174][T22192] RIP: 0033:0x7f3ed799c819 [ 1397.453637][T22192] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1397.473293][T22192] RSP: 002b:00007f3ed892d028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1397.481763][T22192] RAX: ffffffffffffffda RBX: 00007f3ed7c15fa0 RCX: 00007f3ed799c819 [ 1397.489760][T22192] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000000000000005 [ 1397.497936][T22192] RBP: 00007f3ed892d090 R08: 0000000000000000 R09: 0000000000000000 [ 1397.505939][T22192] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1397.514025][T22192] R13: 00007f3ed7c16038 R14: 00007f3ed7c15fa0 R15: 00007fffd10b38b8 [ 1397.522049][T22192] [ 1397.676759][T22197] validate_nla: 3 callbacks suppressed [ 1397.676780][T22197] netlink: 'syz.5.5459': attribute type 29 has an invalid length. [ 1397.766614][T22197] netlink: 'syz.5.5459': attribute type 29 has an invalid length. [ 1397.796025][T22201] netlink: 'syz.5.5459': attribute type 29 has an invalid length. [ 1401.144828][T22238] netlink: 132 bytes leftover after parsing attributes in process `syz.1.5470'. [ 1401.320261][T22249] netlink: 'syz.4.5474': attribute type 29 has an invalid length. [ 1401.348983][T22249] netlink: 'syz.4.5474': attribute type 29 has an invalid length. [ 1401.405196][T22252] netlink: 'syz.4.5474': attribute type 29 has an invalid length. [ 1401.754079][T22265] FAULT_INJECTION: forcing a failure. [ 1401.754079][T22265] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1401.771246][T22265] CPU: 0 PID: 22265 Comm: syz.0.5477 Not tainted syzkaller #0 [ 1401.778820][T22265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1401.788969][T22265] Call Trace: [ 1401.792343][T22265] [ 1401.795357][T22265] dump_stack_lvl+0x188/0x24e [ 1401.800180][T22265] ? show_regs_print_info+0x12/0x12 [ 1401.805538][T22265] ? load_image+0x400/0x400 [ 1401.810176][T22265] ? __lock_acquire+0x7d10/0x7d10 [ 1401.815378][T22265] should_fail_ex+0x399/0x4d0 [ 1401.820289][T22265] _copy_from_user+0x2c/0x170 [ 1401.825102][T22265] ___sys_sendmsg+0x1c3/0x360 [ 1401.829900][T22265] ? __sys_sendmsg+0x290/0x290 [ 1401.834836][T22265] ? __lock_acquire+0x7d10/0x7d10 [ 1401.840046][T22265] __se_sys_sendmsg+0x1bb/0x2a0 [ 1401.845056][T22265] ? __x64_sys_sendmsg+0x80/0x80 [ 1401.850217][T22265] ? lockdep_hardirqs_on+0x94/0x140 [ 1401.855500][T22265] do_syscall_64+0x4c/0xa0 [ 1401.859968][T22265] ? clear_bhb_loop+0x60/0xb0 [ 1401.864693][T22265] ? clear_bhb_loop+0x60/0xb0 [ 1401.869526][T22265] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1401.875495][T22265] RIP: 0033:0x7fcc3e99c819 [ 1401.879982][T22265] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1401.899642][T22265] RSP: 002b:00007fcc3f927028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1401.908113][T22265] RAX: ffffffffffffffda RBX: 00007fcc3ec15fa0 RCX: 00007fcc3e99c819 [ 1401.916131][T22265] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000005 [ 1401.924141][T22265] RBP: 00007fcc3f927090 R08: 0000000000000000 R09: 0000000000000000 [ 1401.932156][T22265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1401.940168][T22265] R13: 00007fcc3ec16038 R14: 00007fcc3ec15fa0 R15: 00007fff61f59308 [ 1401.948262][T22265] [ 1405.391744][T22292] netlink: 'syz.5.5487': attribute type 29 has an invalid length. [ 1405.558092][T22292] netlink: 'syz.5.5487': attribute type 29 has an invalid length. [ 1405.571893][T22295] netlink: 'syz.5.5487': attribute type 29 has an invalid length. [ 1406.023621][T22308] netlink: 'syz.4.5492': attribute type 29 has an invalid length. [ 1406.040784][T22308] netlink: 'syz.4.5492': attribute type 29 has an invalid length. [ 1406.071871][T22308] netlink: 'syz.4.5492': attribute type 29 has an invalid length. [ 1406.237586][T22312] netlink: 'syz.5.5493': attribute type 10 has an invalid length. [ 1406.402325][T22312] netlink: 'syz.5.5493': attribute type 7 has an invalid length. [ 1406.434897][T22312] netlink: 208404 bytes leftover after parsing attributes in process `syz.5.5493'. [ 1408.697508][T22335] netlink: 'syz.6.5500': attribute type 29 has an invalid length. [ 1408.729025][T22335] netlink: 'syz.6.5500': attribute type 29 has an invalid length. [ 1408.741449][T22337] FAULT_INJECTION: forcing a failure. [ 1408.741449][T22337] name failslab, interval 1, probability 0, space 0, times 0 [ 1408.767885][T22338] FAULT_INJECTION: forcing a failure. [ 1408.767885][T22338] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1408.782924][T22337] CPU: 0 PID: 22337 Comm: syz.5.5501 Not tainted syzkaller #0 [ 1408.790442][T22337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1408.800540][T22337] Call Trace: [ 1408.803869][T22337] [ 1408.806833][T22337] dump_stack_lvl+0x188/0x24e [ 1408.811562][T22337] ? show_regs_print_info+0x12/0x12 [ 1408.816818][T22337] ? load_image+0x400/0x400 [ 1408.821436][T22337] ? __might_sleep+0xd0/0xd0 [ 1408.826146][T22337] ? __lock_acquire+0x7d10/0x7d10 [ 1408.831296][T22337] should_fail_ex+0x399/0x4d0 [ 1408.836014][T22337] should_failslab+0x5/0x20 [ 1408.840646][T22337] slab_pre_alloc_hook+0x59/0x310 [ 1408.845716][T22337] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 1408.851523][T22337] __kmem_cache_alloc_node+0x4f/0x260 [ 1408.856938][T22337] ? tomoyo_realpath_from_path+0xdf/0x5d0 [ 1408.862738][T22337] __kmalloc+0xa0/0x240 [ 1408.867039][T22337] tomoyo_realpath_from_path+0xdf/0x5d0 [ 1408.872643][T22337] ? tomoyo_path_number_perm+0x205/0x650 [ 1408.878408][T22337] tomoyo_path_number_perm+0x22f/0x650 [ 1408.884000][T22337] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 1408.889491][T22337] ? ksys_write+0x1c0/0x250 [ 1408.894095][T22337] ? common_file_perm+0x171/0x1c0 [ 1408.899207][T22337] ? __fget_files+0x28/0x4b0 [ 1408.903847][T22337] ? __fget_files+0x28/0x4b0 [ 1408.908609][T22337] security_file_ioctl+0x6c/0xa0 [ 1408.913578][T22337] __se_sys_ioctl+0x48/0x170 [ 1408.918211][T22337] do_syscall_64+0x4c/0xa0 [ 1408.922676][T22337] ? clear_bhb_loop+0x60/0xb0 [ 1408.927398][T22337] ? clear_bhb_loop+0x60/0xb0 [ 1408.932145][T22337] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1408.938084][T22337] RIP: 0033:0x7fa5e1b9c819 [ 1408.942573][T22337] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1408.962213][T22337] RSP: 002b:00007fa5e29e5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1408.970663][T22337] RAX: ffffffffffffffda RBX: 00007fa5e1e15fa0 RCX: 00007fa5e1b9c819 [ 1408.978930][T22337] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 0000000000000004 [ 1408.986939][T22337] RBP: 00007fa5e29e5090 R08: 0000000000000000 R09: 0000000000000000 [ 1408.994934][T22337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1409.002928][T22337] R13: 00007fa5e1e16038 R14: 00007fa5e1e15fa0 R15: 00007ffc1e9b3d08 [ 1409.010954][T22337] [ 1409.019536][T22337] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1409.029847][T22338] CPU: 1 PID: 22338 Comm: syz.6.5500 Not tainted syzkaller #0 [ 1409.037386][T22338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1409.047568][T22338] Call Trace: [ 1409.050882][T22338] [ 1409.053871][T22338] dump_stack_lvl+0x188/0x24e [ 1409.058612][T22338] ? show_regs_print_info+0x12/0x12 [ 1409.063866][T22338] ? load_image+0x400/0x400 [ 1409.068421][T22338] ? __lock_acquire+0x7d10/0x7d10 [ 1409.073496][T22338] ? perf_trace_lock+0xf8/0x390 [ 1409.078427][T22338] should_fail_ex+0x399/0x4d0 [ 1409.083147][T22338] _copy_from_user+0x2c/0x170 [ 1409.087885][T22338] ___sys_recvmsg+0x172/0x590 [ 1409.092618][T22338] ? __sys_recvmsg+0x290/0x290 [ 1409.097455][T22338] ? common_file_perm+0x171/0x1c0 [ 1409.102549][T22338] ? __fget_files+0x43d/0x4b0 [ 1409.107295][T22338] __x64_sys_recvmsg+0x205/0x2e0 [ 1409.112293][T22338] ? ___sys_recvmsg+0x590/0x590 [ 1409.117218][T22338] ? lockdep_hardirqs_on+0x94/0x140 [ 1409.122457][T22338] do_syscall_64+0x4c/0xa0 [ 1409.126910][T22338] ? clear_bhb_loop+0x60/0xb0 [ 1409.131638][T22338] ? clear_bhb_loop+0x60/0xb0 [ 1409.136355][T22338] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1409.142284][T22338] RIP: 0033:0x7f3ed799c819 [ 1409.146824][T22338] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1409.166465][T22338] RSP: 002b:00007f3ed890c028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1409.174914][T22338] RAX: ffffffffffffffda RBX: 00007f3ed7c16090 RCX: 00007f3ed799c819 [ 1409.183001][T22338] RDX: 0000000040010102 RSI: 0000200000000040 RDI: 0000000000000003 [ 1409.191005][T22338] RBP: 00007f3ed890c090 R08: 0000000000000000 R09: 0000000000000000 [ 1409.199021][T22338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1409.207038][T22338] R13: 00007f3ed7c16128 R14: 00007f3ed7c16090 R15: 00007fffd10b38b8 [ 1409.215234][T22338] [ 1409.299435][T22349] netlink: 105116 bytes leftover after parsing attributes in process `syz.6.5505'. [ 1409.980478][T22367] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1410.276867][T22373] netlink: 52 bytes leftover after parsing attributes in process `syz.5.5515'. [ 1411.435269][T22396] validate_nla: 7 callbacks suppressed [ 1411.435289][T22396] netlink: 'syz.5.5521': attribute type 10 has an invalid length. [ 1411.863355][T22407] FAULT_INJECTION: forcing a failure. [ 1411.863355][T22407] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1411.914759][T22407] CPU: 0 PID: 22407 Comm: syz.6.5524 Not tainted syzkaller #0 [ 1411.922311][T22407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1411.932597][T22407] Call Trace: [ 1411.935908][T22407] [ 1411.938878][T22407] dump_stack_lvl+0x188/0x24e [ 1411.943612][T22407] ? show_regs_print_info+0x12/0x12 [ 1411.948865][T22407] ? load_image+0x400/0x400 [ 1411.953418][T22407] ? __lock_acquire+0x7d10/0x7d10 [ 1411.958664][T22407] ? seqcount_lockdep_reader_access+0x177/0x1d0 [ 1411.964959][T22407] should_fail_ex+0x399/0x4d0 [ 1411.969681][T22407] _copy_from_user+0x2c/0x170 [ 1411.974381][T22407] __sys_bpf+0x2ea/0x780 [ 1411.978643][T22407] ? bpf_link_show_fdinfo+0x380/0x380 [ 1411.984038][T22407] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 1411.990217][T22407] __x64_sys_bpf+0x78/0x90 [ 1411.994680][T22407] do_syscall_64+0x4c/0xa0 [ 1411.999112][T22407] ? clear_bhb_loop+0x60/0xb0 [ 1412.003810][T22407] ? clear_bhb_loop+0x60/0xb0 [ 1412.008519][T22407] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1412.014700][T22407] RIP: 0033:0x7f3ed799c819 [ 1412.019131][T22407] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1412.038759][T22407] RSP: 002b:00007f3ed892d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1412.047202][T22407] RAX: ffffffffffffffda RBX: 00007f3ed7c15fa0 RCX: 00007f3ed799c819 [ 1412.055199][T22407] RDX: 0000000000000050 RSI: 00002000000003c0 RDI: 000000000000000a [ 1412.063183][T22407] RBP: 00007f3ed892d090 R08: 0000000000000000 R09: 0000000000000000 [ 1412.071168][T22407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1412.079236][T22407] R13: 00007f3ed7c16038 R14: 00007f3ed7c15fa0 R15: 00007fffd10b38b8 [ 1412.087232][T22407] [ 1412.467382][T22419] netlink: 'syz.5.5528': attribute type 29 has an invalid length. [ 1412.525997][T22419] netlink: 'syz.5.5528': attribute type 29 has an invalid length. [ 1412.657035][T22422] netlink: 'syz.5.5528': attribute type 29 has an invalid length. [ 1415.030565][T22453] netlink: 134056 bytes leftover after parsing attributes in process `syz.0.5538'. [ 1415.041310][T22452] netlink: 134056 bytes leftover after parsing attributes in process `syz.0.5538'. [ 1415.238034][T22459] FAULT_INJECTION: forcing a failure. [ 1415.238034][T22459] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1415.257463][T22459] CPU: 0 PID: 22459 Comm: syz.5.5540 Not tainted syzkaller #0 [ 1415.265016][T22459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1415.275219][T22459] Call Trace: [ 1415.278560][T22459] [ 1415.281542][T22459] dump_stack_lvl+0x188/0x24e [ 1415.286279][T22459] ? show_regs_print_info+0x12/0x12 [ 1415.291536][T22459] ? load_image+0x400/0x400 [ 1415.296102][T22459] ? __lock_acquire+0x7d10/0x7d10 [ 1415.301212][T22459] should_fail_ex+0x399/0x4d0 [ 1415.305962][T22459] _copy_from_user+0x2c/0x170 [ 1415.310698][T22459] __sys_bpf+0x2ea/0x780 [ 1415.315000][T22459] ? bpf_link_show_fdinfo+0x380/0x380 [ 1415.320471][T22459] ? lock_chain_count+0x20/0x20 [ 1415.325413][T22459] __x64_sys_bpf+0x78/0x90 [ 1415.329892][T22459] do_syscall_64+0x4c/0xa0 [ 1415.334371][T22459] ? clear_bhb_loop+0x60/0xb0 [ 1415.339107][T22459] ? clear_bhb_loop+0x60/0xb0 [ 1415.343850][T22459] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1415.349807][T22459] RIP: 0033:0x7fa5e1b9c819 [ 1415.354294][T22459] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1415.373969][T22459] RSP: 002b:00007fa5e29e5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1415.382446][T22459] RAX: ffffffffffffffda RBX: 00007fa5e1e15fa0 RCX: 00007fa5e1b9c819 [ 1415.390463][T22459] RDX: 0000000000000004 RSI: 0000200000000340 RDI: 0000000000000013 [ 1415.398476][T22459] RBP: 00007fa5e29e5090 R08: 0000000000000000 R09: 0000000000000000 [ 1415.406545][T22459] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1415.414577][T22459] R13: 00007fa5e1e16038 R14: 00007fa5e1e15fa0 R15: 00007ffc1e9b3d08 [ 1415.422654][T22459] [ 1417.879065][T22518] FAULT_INJECTION: forcing a failure. [ 1417.879065][T22518] name failslab, interval 1, probability 0, space 0, times 0 [ 1417.935850][T22518] CPU: 0 PID: 22518 Comm: syz.4.5559 Not tainted syzkaller #0 [ 1417.943462][T22518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1417.953573][T22518] Call Trace: [ 1417.956883][T22518] [ 1417.959844][T22518] dump_stack_lvl+0x188/0x24e [ 1417.964569][T22518] ? show_regs_print_info+0x12/0x12 [ 1417.969827][T22518] ? load_image+0x400/0x400 [ 1417.974384][T22518] ? __might_sleep+0xd0/0xd0 [ 1417.979025][T22518] ? __lock_acquire+0x7d10/0x7d10 [ 1417.984099][T22518] should_fail_ex+0x399/0x4d0 [ 1417.988816][T22518] should_failslab+0x5/0x20 [ 1417.993351][T22518] slab_pre_alloc_hook+0x59/0x310 [ 1417.998434][T22518] ? apparmor_sk_alloc_security+0x74/0x100 [ 1418.004283][T22518] __kmem_cache_alloc_node+0x4f/0x260 [ 1418.009702][T22518] ? apparmor_sk_alloc_security+0x74/0x100 [ 1418.015803][T22518] kmalloc_trace+0x26/0xe0 [ 1418.020278][T22518] apparmor_sk_alloc_security+0x74/0x100 [ 1418.025949][T22518] security_sk_alloc+0x6a/0xa0 [ 1418.030931][T22518] sk_prot_alloc+0x101/0x210 [ 1418.035567][T22518] ? sk_alloc+0x20/0x340 [ 1418.039851][T22518] sk_alloc+0x36/0x340 [ 1418.043958][T22518] ? bpf_ctx_init+0x163/0x1a0 [ 1418.048679][T22518] ? bpf_prog_test_run_skb+0x26f/0x12a0 [ 1418.054315][T22518] bpf_prog_test_run_skb+0x35e/0x12a0 [ 1418.059794][T22518] ? __fget_files+0x28/0x4b0 [ 1418.064407][T22518] ? __fget_files+0x43d/0x4b0 [ 1418.069106][T22518] ? cpu_online+0xa0/0xa0 [ 1418.073450][T22518] bpf_prog_test_run+0x31e/0x390 [ 1418.078415][T22518] __sys_bpf+0x62b/0x780 [ 1418.082677][T22518] ? bpf_link_show_fdinfo+0x380/0x380 [ 1418.088075][T22518] ? lock_chain_count+0x20/0x20 [ 1418.092952][T22518] __x64_sys_bpf+0x78/0x90 [ 1418.097396][T22518] do_syscall_64+0x4c/0xa0 [ 1418.101859][T22518] ? clear_bhb_loop+0x60/0xb0 [ 1418.106642][T22518] ? clear_bhb_loop+0x60/0xb0 [ 1418.111336][T22518] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1418.117247][T22518] RIP: 0033:0x7f0a4039c819 [ 1418.121677][T22518] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1418.141298][T22518] RSP: 002b:00007f0a412d5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1418.149725][T22518] RAX: ffffffffffffffda RBX: 00007f0a40615fa0 RCX: 00007f0a4039c819 [ 1418.157802][T22518] RDX: 0000000000000048 RSI: 0000200000000180 RDI: 000000000000000a [ 1418.165789][T22518] RBP: 00007f0a412d5090 R08: 0000000000000000 R09: 0000000000000000 [ 1418.173789][T22518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1418.181880][T22518] R13: 00007f0a40616038 R14: 00007f0a40615fa0 R15: 00007ffd5a0cbd88 [ 1418.189890][T22518] [ 1419.582631][T22533] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1420.107272][T12927] Bluetooth: hci1: ISO packet for unknown connection handle 3849 [ 1420.191610][T22559] FAULT_INJECTION: forcing a failure. [ 1420.191610][T22559] name failslab, interval 1, probability 0, space 0, times 0 [ 1420.242006][T22562] netlink: 'syz.6.5576': attribute type 29 has an invalid length. [ 1420.251456][T22559] CPU: 1 PID: 22559 Comm: syz.5.5574 Not tainted syzkaller #0 [ 1420.258979][T22559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1420.269075][T22559] Call Trace: [ 1420.272397][T22559] [ 1420.275362][T22559] dump_stack_lvl+0x188/0x24e [ 1420.280096][T22559] ? show_regs_print_info+0x12/0x12 [ 1420.285440][T22559] ? load_image+0x400/0x400 [ 1420.290005][T22559] ? __might_sleep+0xd0/0xd0 [ 1420.294640][T22559] ? __lock_acquire+0x7d10/0x7d10 [ 1420.295899][T22562] netlink: 'syz.6.5576': attribute type 29 has an invalid length. [ 1420.299729][T22559] should_fail_ex+0x399/0x4d0 [ 1420.299765][T22559] should_failslab+0x5/0x20 [ 1420.299786][T22559] slab_pre_alloc_hook+0x59/0x310 [ 1420.321869][T22559] ? dev_ethtool+0x125/0x12f0 [ 1420.326718][T22559] __kmem_cache_alloc_node+0x4f/0x260 [ 1420.332116][T22559] ? dev_ethtool+0x125/0x12f0 [ 1420.336814][T22559] kmalloc_trace+0x26/0xe0 [ 1420.341250][T22559] dev_ethtool+0x125/0x12f0 [ 1420.345808][T22559] ? ethtool_get_module_eeprom_call+0x170/0x170 [ 1420.352153][T22559] ? __lock_acquire+0x7d10/0x7d10 [ 1420.357203][T22559] ? __kmem_cache_free+0xb6/0x1f0 [ 1420.362241][T22559] ? full_name_hash+0x8e/0xe0 [ 1420.366929][T22559] ? dev_load+0x1d/0x1e0 [ 1420.371183][T22559] ? dev_load+0x1d/0x1e0 [ 1420.375435][T22559] dev_ioctl+0x474/0xe80 [ 1420.379692][T22559] sock_do_ioctl+0x245/0x320 [ 1420.384296][T22559] ? sock_show_fdinfo+0xb0/0xb0 [ 1420.389227][T22559] sock_ioctl+0x4d2/0x710 [ 1420.393565][T22559] ? sock_poll+0x410/0x410 [ 1420.397998][T22559] ? bpf_lsm_file_ioctl+0x5/0x10 [ 1420.402947][T22559] ? security_file_ioctl+0x7c/0xa0 [ 1420.408076][T22559] ? sock_poll+0x410/0x410 [ 1420.412589][T22559] __se_sys_ioctl+0xfa/0x170 [ 1420.417200][T22559] do_syscall_64+0x4c/0xa0 [ 1420.421632][T22559] ? clear_bhb_loop+0x60/0xb0 [ 1420.426405][T22559] ? clear_bhb_loop+0x60/0xb0 [ 1420.431095][T22559] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1420.437377][T22559] RIP: 0033:0x7fa5e1b9c819 [ 1420.441800][T22559] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1420.461421][T22559] RSP: 002b:00007fa5e29e5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1420.469845][T22559] RAX: ffffffffffffffda RBX: 00007fa5e1e15fa0 RCX: 00007fa5e1b9c819 [ 1420.477843][T22559] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 0000000000000004 [ 1420.485834][T22559] RBP: 00007fa5e29e5090 R08: 0000000000000000 R09: 0000000000000000 [ 1420.493833][T22559] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1420.502262][T22559] R13: 00007fa5e1e16038 R14: 00007fa5e1e15fa0 R15: 00007ffc1e9b3d08 [ 1420.510267][T22559] [ 1420.588860][T22568] netlink: 'syz.6.5576': attribute type 29 has an invalid length. [ 1421.752369][T22587] netlink: 'syz.4.5582': attribute type 10 has an invalid length. [ 1421.879229][T22587] team0 (unregistering): Port device team_slave_1 removed [ 1421.926829][T22587] team0 (unregistering): Port device netdevsim0 removed [ 1422.626944][T12927] Bluetooth: hci0: ISO packet for unknown connection handle 3849 [ 1422.765367][T22610] FAULT_INJECTION: forcing a failure. [ 1422.765367][T22610] name failslab, interval 1, probability 0, space 0, times 0 [ 1422.778660][T22610] CPU: 0 PID: 22610 Comm: syz.0.5589 Not tainted syzkaller #0 [ 1422.786163][T22610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1422.796334][T22610] Call Trace: [ 1422.799647][T22610] [ 1422.802615][T22610] dump_stack_lvl+0x188/0x24e [ 1422.807368][T22610] ? show_regs_print_info+0x12/0x12 [ 1422.812693][T22610] ? load_image+0x400/0x400 [ 1422.817238][T22610] ? lockdep_hardirqs_on_prepare+0x409/0x770 [ 1422.823367][T22610] should_fail_ex+0x399/0x4d0 [ 1422.828088][T22610] should_failslab+0x5/0x20 [ 1422.832627][T22610] slab_pre_alloc_hook+0x59/0x310 [ 1422.837694][T22610] kmem_cache_alloc+0x56/0x2f0 [ 1422.842503][T22610] ? __build_skb+0x2a/0x3c0 [ 1422.847083][T22610] __build_skb+0x2a/0x3c0 [ 1422.851476][T22610] build_skb+0x1e/0x230 [ 1422.855684][T22610] bpf_prog_test_run_skb+0x37e/0x12a0 [ 1422.861095][T22610] ? __fget_files+0x28/0x4b0 [ 1422.865726][T22610] ? __fget_files+0x43d/0x4b0 [ 1422.870539][T22610] ? cpu_online+0xa0/0xa0 [ 1422.874912][T22610] bpf_prog_test_run+0x31e/0x390 [ 1422.879980][T22610] __sys_bpf+0x62b/0x780 [ 1422.884271][T22610] ? bpf_link_show_fdinfo+0x380/0x380 [ 1422.889705][T22610] ? lock_chain_count+0x20/0x20 [ 1422.894608][T22610] __x64_sys_bpf+0x78/0x90 [ 1422.899063][T22610] do_syscall_64+0x4c/0xa0 [ 1422.903533][T22610] ? clear_bhb_loop+0x60/0xb0 [ 1422.908251][T22610] ? clear_bhb_loop+0x60/0xb0 [ 1422.912963][T22610] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1422.918892][T22610] RIP: 0033:0x7fcc3e99c819 [ 1422.923341][T22610] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1422.943075][T22610] RSP: 002b:00007fcc3f927028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1422.951616][T22610] RAX: ffffffffffffffda RBX: 00007fcc3ec15fa0 RCX: 00007fcc3e99c819 [ 1422.959968][T22610] RDX: 000000000000004c RSI: 0000200000000380 RDI: 000000000000000a [ 1422.967971][T22610] RBP: 00007fcc3f927090 R08: 0000000000000000 R09: 0000000000000000 [ 1422.975969][T22610] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1422.983973][T22610] R13: 00007fcc3ec16038 R14: 00007fcc3ec15fa0 R15: 00007fff61f59308 [ 1422.991995][T22610] [ 1423.012114][ T1277] ieee802154 phy0 wpan0: encryption failed: -22 [ 1423.018616][ T1277] ieee802154 phy1 wpan1: encryption failed: -22 [ 1423.421938][T22614] netlink: 'syz.6.5591': attribute type 29 has an invalid length. [ 1423.455879][T22614] netlink: 'syz.6.5591': attribute type 29 has an invalid length. [ 1423.493117][T22617] netlink: 'syz.6.5591': attribute type 29 has an invalid length. [ 1425.443162][T22666] FAULT_INJECTION: forcing a failure. [ 1425.443162][T22666] name failslab, interval 1, probability 0, space 0, times 0 [ 1425.456733][T22666] CPU: 1 PID: 22666 Comm: syz.4.5610 Not tainted syzkaller #0 [ 1425.464520][T22666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1425.474609][T22666] Call Trace: [ 1425.477944][T22666] [ 1425.480909][T22666] dump_stack_lvl+0x188/0x24e [ 1425.485624][T22666] ? show_regs_print_info+0x12/0x12 [ 1425.490856][T22666] ? load_image+0x400/0x400 [ 1425.495386][T22666] ? __might_sleep+0xd0/0xd0 [ 1425.500094][T22666] ? __lock_acquire+0x7d10/0x7d10 [ 1425.505196][T22666] should_fail_ex+0x399/0x4d0 [ 1425.509998][T22666] should_failslab+0x5/0x20 [ 1425.514515][T22666] slab_pre_alloc_hook+0x59/0x310 [ 1425.519565][T22666] kmem_cache_alloc_node+0x5a/0x320 [ 1425.524780][T22666] ? lock_chain_count+0x20/0x20 [ 1425.529673][T22666] ? dup_task_struct+0x57/0x6b0 [ 1425.534558][T22666] dup_task_struct+0x57/0x6b0 [ 1425.539265][T22666] ? lockdep_hardirqs_on+0x94/0x140 [ 1425.544524][T22666] copy_process+0x5fa/0x4030 [ 1425.549142][T22666] ? trace_event_raw_event_lock+0x250/0x250 [ 1425.555154][T22666] ? idle_dummy+0x10/0x10 [ 1425.559507][T22666] ? __lock_acquire+0x7d10/0x7d10 [ 1425.564557][T22666] kernel_clone+0x24b/0x900 [ 1425.569079][T22666] ? trace_call_bpf+0xbf/0x6b0 [ 1425.573863][T22666] ? trace_call_bpf+0xbf/0x6b0 [ 1425.578657][T22666] ? create_io_thread+0x170/0x170 [ 1425.583713][T22666] __x64_sys_clone+0x1a7/0x220 [ 1425.588575][T22666] ? perf_trace_run_bpf_submit+0x124/0x1c0 [ 1425.594411][T22666] ? __ia32_sys_vfork+0x140/0x140 [ 1425.599461][T22666] ? lock_chain_count+0x20/0x20 [ 1425.604335][T22666] ? lockdep_hardirqs_on+0x94/0x140 [ 1425.609555][T22666] do_syscall_64+0x4c/0xa0 [ 1425.613990][T22666] ? clear_bhb_loop+0x60/0xb0 [ 1425.618718][T22666] ? clear_bhb_loop+0x60/0xb0 [ 1425.623415][T22666] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1425.629350][T22666] RIP: 0033:0x7f0a4039c819 [ 1425.633776][T22666] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1425.653403][T22666] RSP: 002b:00007f0a412d4fd8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1425.661836][T22666] RAX: ffffffffffffffda RBX: 00007f0a40615fa0 RCX: 00007f0a4039c819 [ 1425.669911][T22666] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1425.677907][T22666] RBP: 00007f0a412d5090 R08: 0000000000000000 R09: 0000000000000000 [ 1425.686023][T22666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1425.694003][T22666] R13: 00007f0a40616038 R14: 00007f0a40615fa0 R15: 00007ffd5a0cbd88 [ 1425.702001][T22666] [ 1425.907089][T22669] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1426.384152][T22683] netlink: 'syz.5.5617': attribute type 10 has an invalid length. [ 1426.462941][T22683] device hsr0 entered promiscuous mode [ 1426.493441][T22683] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 1426.559108][T22685] netlink: 'syz.4.5618': attribute type 10 has an invalid length. [ 1426.582992][T22685] netlink: 40 bytes leftover after parsing attributes in process `syz.4.5618'. [ 1427.068295][T22683] netlink: 11562 bytes leftover after parsing attributes in process `syz.5.5617'. [ 1428.700613][T22732] netlink: 144 bytes leftover after parsing attributes in process `syz.4.5630'. [ 1428.879186][T22747] netlink: 'syz.1.5634': attribute type 10 has an invalid length. [ 1428.906713][T22747] device hsr0 entered promiscuous mode [ 1428.994258][T22747] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 1429.447802][T22747] netlink: 11562 bytes leftover after parsing attributes in process `syz.1.5634'. [ 1430.281283][T12927] Bluetooth: hci0: ISO packet for unknown connection handle 3849 [ 1431.146770][T22796] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1431.202659][T22796] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1431.260353][T22808] netlink: 'syz.1.5656': attribute type 29 has an invalid length. [ 1431.312243][T22808] netlink: 'syz.1.5656': attribute type 29 has an invalid length. [ 1431.327076][T22809] netlink: 'syz.0.5655': attribute type 10 has an invalid length. [ 1431.340538][T22809] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 1431.406219][T22813] netlink: 'syz.1.5656': attribute type 29 has an invalid length. [ 1431.701474][T22819] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1432.510625][T12927] Bluetooth: hci4: ISO packet for unknown connection handle 3849 [ 1432.714901][T22836] netlink: 'syz.1.5663': attribute type 21 has an invalid length. [ 1432.771991][T22836] netlink: 'syz.1.5663': attribute type 6 has an invalid length. [ 1432.795618][T22836] netlink: 132 bytes leftover after parsing attributes in process `syz.1.5663'. [ 1433.063432][T22844] FAULT_INJECTION: forcing a failure. [ 1433.063432][T22844] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1433.099841][T22844] CPU: 0 PID: 22844 Comm: syz.0.5667 Not tainted syzkaller #0 [ 1433.107397][T22844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1433.117591][T22844] Call Trace: [ 1433.120905][T22844] [ 1433.123867][T22844] dump_stack_lvl+0x188/0x24e [ 1433.128599][T22844] ? show_regs_print_info+0x12/0x12 [ 1433.133848][T22844] ? load_image+0x400/0x400 [ 1433.138487][T22844] ? __lock_acquire+0x7d10/0x7d10 [ 1433.140373][T22852] netlink: 'syz.5.5670': attribute type 29 has an invalid length. [ 1433.143546][T22844] ? perf_trace_lock_acquire+0x100/0x3e0 [ 1433.152256][T22852] netlink: 'syz.5.5670': attribute type 29 has an invalid length. [ 1433.157004][T22844] should_fail_ex+0x399/0x4d0 [ 1433.157055][T22844] _copy_from_user+0x2c/0x170 [ 1433.157085][T22844] kstrtouint_from_user+0xda/0x170 [ 1433.157118][T22844] ? kstrtol_from_user+0x190/0x190 [ 1433.157163][T22844] proc_fail_nth_write+0x8b/0x200 [ 1433.157188][T22844] ? proc_fail_nth_read+0x220/0x220 [ 1433.157211][T22844] ? common_file_perm+0x171/0x1c0 [ 1433.157237][T22844] ? proc_fail_nth_read+0x220/0x220 [ 1433.157260][T22844] vfs_write+0x2e6/0xa30 [ 1433.183580][T22852] netlink: 'syz.5.5670': attribute type 29 has an invalid length. [ 1433.184774][T22844] ? file_end_write+0x250/0x250 [ 1433.222353][T22844] ? __fget_files+0x28/0x4b0 [ 1433.226994][T22844] ? __fget_files+0x28/0x4b0 [ 1433.231635][T22844] ? __fget_files+0x43d/0x4b0 [ 1433.236371][T22844] ? __fdget_pos+0x2ae/0x360 [ 1433.241095][T22844] ? ksys_write+0x71/0x250 [ 1433.245568][T22844] ksys_write+0x14c/0x250 [ 1433.249947][T22844] ? __ia32_sys_read+0x80/0x80 [ 1433.254761][T22844] ? lockdep_hardirqs_on+0x94/0x140 [ 1433.260187][T22844] do_syscall_64+0x4c/0xa0 [ 1433.264650][T22844] ? clear_bhb_loop+0x60/0xb0 [ 1433.269498][T22844] ? clear_bhb_loop+0x60/0xb0 [ 1433.274227][T22844] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1433.280159][T22844] RIP: 0033:0x7fcc3e95d04e [ 1433.284625][T22844] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1433.304274][T22844] RSP: 002b:00007fcc3f905fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1433.312735][T22844] RAX: ffffffffffffffda RBX: 00007fcc3f9066c0 RCX: 00007fcc3e95d04e [ 1433.320744][T22844] RDX: 0000000000000001 RSI: 00007fcc3f9060a0 RDI: 000000000000000e [ 1433.328757][T22844] RBP: 00007fcc3f906090 R08: 0000000000000000 R09: 0000000000000000 [ 1433.336773][T22844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1433.345039][T22844] R13: 00007fcc3ec16128 R14: 00007fcc3ec16090 R15: 00007fff61f59308 [ 1433.353068][T22844] [ 1433.885184][T22866] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1433.951270][T12927] Bluetooth: hci4: ISO packet for unknown connection handle 3849 [ 1434.416293][T22882] netlink: 'syz.1.5681': attribute type 29 has an invalid length. [ 1434.424474][T22882] netlink: 'syz.1.5681': attribute type 29 has an invalid length. [ 1434.593603][T22882] netlink: 'syz.1.5681': attribute type 29 has an invalid length. [ 1435.056521][T22901] netlink: 'syz.1.5685': attribute type 21 has an invalid length. [ 1435.071666][T22901] netlink: 132 bytes leftover after parsing attributes in process `syz.1.5685'. [ 1435.450055][T12927] Bluetooth: hci2: ISO packet for unknown connection handle 3849 [ 1435.919066][T22920] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1437.104446][T22938] netlink: 144 bytes leftover after parsing attributes in process `syz.0.5701'. [ 1437.380761][T22948] validate_nla: 4 callbacks suppressed [ 1437.380953][T22948] netlink: 'syz.1.5706': attribute type 21 has an invalid length. [ 1437.498001][T22948] netlink: 'syz.1.5706': attribute type 6 has an invalid length. [ 1437.549528][T22948] netlink: 132 bytes leftover after parsing attributes in process `syz.1.5706'. [ 1437.850426][T22958] netlink: 'syz.5.5709': attribute type 29 has an invalid length. [ 1437.895955][T22958] netlink: 'syz.5.5709': attribute type 29 has an invalid length. [ 1437.921047][T22958] netlink: 'syz.5.5709': attribute type 29 has an invalid length. [ 1438.618219][T22973] netlink: 'syz.0.5714': attribute type 3 has an invalid length. [ 1438.651462][T22973] netlink: 105116 bytes leftover after parsing attributes in process `syz.0.5714'. [ 1438.811813][T22976] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1438.929856][T22976] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1439.463814][T22994] netlink: 'syz.0.5720': attribute type 10 has an invalid length. [ 1439.581614][T22994] team0: Device xfrm0 is of different type [ 1439.881229][T23004] netlink: 'syz.5.5724': attribute type 29 has an invalid length. [ 1439.916318][T23004] netlink: 'syz.5.5724': attribute type 29 has an invalid length. [ 1439.926997][T23004] netlink: 'syz.5.5724': attribute type 29 has an invalid length. [ 1440.662609][T23024] netlink: 105116 bytes leftover after parsing attributes in process `syz.6.5731'. [ 1441.290141][T23035] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1442.861712][T23076] validate_nla: 4 callbacks suppressed [ 1442.861739][T23076] netlink: 'syz.1.5748': attribute type 3 has an invalid length. [ 1442.900107][T23076] netlink: 105116 bytes leftover after parsing attributes in process `syz.1.5748'. [ 1443.114868][T23075] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1445.241466][T23111] netlink: 830 bytes leftover after parsing attributes in process `syz.4.5761'. [ 1446.696636][T23137] netlink: 'syz.4.5767': attribute type 3 has an invalid length. [ 1446.709582][T23137] netlink: 105116 bytes leftover after parsing attributes in process `syz.4.5767'. [ 1446.785438][T23135] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1447.793645][T23161] netlink: 64985 bytes leftover after parsing attributes in process `syz.4.5779'. [ 1448.707788][T23179] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1449.518904][T23207] FAULT_INJECTION: forcing a failure. [ 1449.518904][T23207] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1449.615802][T23207] CPU: 1 PID: 23207 Comm: syz.5.5793 Not tainted syzkaller #0 [ 1449.623450][T23207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1449.633639][T23207] Call Trace: [ 1449.636959][T23207] [ 1449.639932][T23207] dump_stack_lvl+0x188/0x24e [ 1449.644653][T23207] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 1449.650841][T23207] ? show_regs_print_info+0x12/0x12 [ 1449.656081][T23207] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 1449.662288][T23207] should_fail_ex+0x399/0x4d0 [ 1449.667025][T23207] _copy_from_user+0x2c/0x170 [ 1449.671738][T23207] __copy_msghdr+0x3b7/0x580 [ 1449.676376][T23207] ___sys_sendmsg+0x210/0x360 [ 1449.681098][T23207] ? __sys_sendmsg+0x290/0x290 [ 1449.686010][T23207] ? rcu_is_watching+0x11/0xa0 [ 1449.690840][T23207] __se_sys_sendmsg+0x1bb/0x2a0 [ 1449.695727][T23207] ? __x64_sys_sendmsg+0x80/0x80 [ 1449.700754][T23207] ? syscall_enter_from_user_mode+0x2a/0x80 [ 1449.706685][T23207] do_syscall_64+0x4c/0xa0 [ 1449.711132][T23207] ? clear_bhb_loop+0x60/0xb0 [ 1449.715845][T23207] ? clear_bhb_loop+0x60/0xb0 [ 1449.720570][T23207] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1449.726491][T23207] RIP: 0033:0x7fa5e1b9c819 [ 1449.731023][T23207] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1449.750663][T23207] RSP: 002b:00007fa5e29c4028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1449.759296][T23207] RAX: ffffffffffffffda RBX: 00007fa5e1e16090 RCX: 00007fa5e1b9c819 [ 1449.767299][T23207] RDX: 0000000000000000 RSI: 0000200000007940 RDI: 000000000000000f [ 1449.775304][T23207] RBP: 00007fa5e29c4090 R08: 0000000000000000 R09: 0000000000000000 [ 1449.783307][T23207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1449.791306][T23207] R13: 00007fa5e1e16128 R14: 00007fa5e1e16090 R15: 00007ffc1e9b3d08 [ 1449.799367][T23207] [ 1450.441124][T12927] Bluetooth: hci1: ISO packet for unknown connection handle 255 [ 1451.145146][T23239] netlink: 'syz.6.5805': attribute type 10 has an invalid length. [ 1451.641087][T23246] syz.5.5808[23246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1451.641208][T23246] syz.5.5808[23246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1452.467322][T23269] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1455.249239][T23302] tap0: tun_chr_ioctl cmd 2147767517 [ 1455.298585][T23307] netlink: 'syz.1.5827': attribute type 10 has an invalid length. [ 1455.333669][T23323] netlink: 'syz.6.5823': attribute type 1 has an invalid length. [ 1455.339422][T23307] bond0: (slave netdevsim0): Enslaving as an active interface with an up link [ 1455.392124][T23323] netlink: 105120 bytes leftover after parsing attributes in process `syz.6.5823'. [ 1456.128588][T23339] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1456.316631][T23349] FAULT_INJECTION: forcing a failure. [ 1456.316631][T23349] name failslab, interval 1, probability 0, space 0, times 0 [ 1456.373152][T23349] CPU: 0 PID: 23349 Comm: syz.1.5838 Not tainted syzkaller #0 [ 1456.380876][T23349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1456.390988][T23349] Call Trace: [ 1456.394302][T23349] [ 1456.397269][T23349] dump_stack_lvl+0x188/0x24e [ 1456.402015][T23349] ? show_regs_print_info+0x12/0x12 [ 1456.407271][T23349] ? load_image+0x400/0x400 [ 1456.411817][T23349] ? verify_lock_unused+0x140/0x140 [ 1456.417046][T23349] should_fail_ex+0x399/0x4d0 [ 1456.421753][T23349] should_failslab+0x5/0x20 [ 1456.426276][T23349] slab_pre_alloc_hook+0x59/0x310 [ 1456.431411][T23349] kmem_cache_alloc+0x56/0x2f0 [ 1456.436187][T23349] ? skb_clone+0x1e7/0x370 [ 1456.440625][T23349] skb_clone+0x1e7/0x370 [ 1456.444887][T23349] __netlink_deliver_tap+0x3ed/0x800 [ 1456.450200][T23349] ? netlink_deliver_tap+0x2e/0x1b0 [ 1456.455419][T23349] netlink_deliver_tap+0x19c/0x1b0 [ 1456.460548][T23349] netlink_unicast+0x728/0x8d0 [ 1456.465345][T23349] netlink_sendmsg+0x8ad/0xbd0 [ 1456.470228][T23349] ? netlink_getsockopt+0x550/0x550 [ 1456.475457][T23349] ? aa_sock_msg_perm+0x94/0x150 [ 1456.480412][T23349] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1456.485712][T23349] ? security_socket_sendmsg+0x7c/0xa0 [ 1456.491190][T23349] ? netlink_getsockopt+0x550/0x550 [ 1456.496409][T23349] ____sys_sendmsg+0x5be/0x970 [ 1456.501199][T23349] ? __sys_sendmsg_sock+0x30/0x30 [ 1456.506249][T23349] ? __import_iovec+0x315/0x500 [ 1456.511148][T23349] ? import_iovec+0x6f/0xa0 [ 1456.515679][T23349] ___sys_sendmsg+0x2a2/0x360 [ 1456.520392][T23349] ? __sys_sendmsg+0x290/0x290 [ 1456.525555][T23349] ? __lock_acquire+0x7d10/0x7d10 [ 1456.530630][T23349] __se_sys_sendmsg+0x1bb/0x2a0 [ 1456.535506][T23349] ? __x64_sys_sendmsg+0x80/0x80 [ 1456.540486][T23349] ? lockdep_hardirqs_on+0x94/0x140 [ 1456.545705][T23349] do_syscall_64+0x4c/0xa0 [ 1456.550141][T23349] ? clear_bhb_loop+0x60/0xb0 [ 1456.554832][T23349] ? clear_bhb_loop+0x60/0xb0 [ 1456.559530][T23349] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1456.565448][T23349] RIP: 0033:0x7f94ff99c819 [ 1456.569875][T23349] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1456.589505][T23349] RSP: 002b:00007f95008f2028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1456.597955][T23349] RAX: ffffffffffffffda RBX: 00007f94ffc15fa0 RCX: 00007f94ff99c819 [ 1456.605974][T23349] RDX: 0000000000000000 RSI: 0000200000000600 RDI: 0000000000000003 [ 1456.614056][T23349] RBP: 00007f95008f2090 R08: 0000000000000000 R09: 0000000000000000 [ 1456.622046][T23349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1456.630028][T23349] R13: 00007f94ffc16038 R14: 00007f94ffc15fa0 R15: 00007fffbc19cdb8 [ 1456.638029][T23349] [ 1456.766660][T23354] netlink: 'syz.6.5840': attribute type 21 has an invalid length. [ 1456.807592][T23354] netlink: 'syz.6.5840': attribute type 6 has an invalid length. [ 1456.938021][T23354] netlink: 132 bytes leftover after parsing attributes in process `syz.6.5840'. [ 1456.969161][T23349] netlink: 'syz.1.5838': attribute type 10 has an invalid length. [ 1457.717914][T23373] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1459.337622][T23405] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1460.717272][T23412] netlink: 'syz.5.5858': attribute type 21 has an invalid length. [ 1460.763151][T23412] netlink: 'syz.5.5858': attribute type 6 has an invalid length. [ 1460.826917][T23412] netlink: 132 bytes leftover after parsing attributes in process `syz.5.5858'. [ 1461.151094][T23429] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1461.603725][T23434] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1462.376420][T23456] tap0: tun_chr_ioctl cmd 2147767517 [ 1463.469577][T23476] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1463.627296][T23454] netlink: 'syz.0.5869': attribute type 1 has an invalid length. [ 1463.683256][T23454] netlink: 105120 bytes leftover after parsing attributes in process `syz.0.5869'. [ 1464.309924][T23482] netlink: 'syz.5.5876': attribute type 21 has an invalid length. [ 1464.331710][T23482] netlink: 'syz.5.5876': attribute type 6 has an invalid length. [ 1464.360489][T23482] netlink: 132 bytes leftover after parsing attributes in process `syz.5.5876'. [ 1464.701229][T23489] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1465.015753][T23494] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1465.803875][T12927] Bluetooth: hci0: ISO packet for unknown connection handle 255 [ 1466.058597][ T4267] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 1466.069777][ T4267] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 1466.079434][ T4267] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 1466.104648][ T4267] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 1466.112658][ T4267] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 1466.120824][ T4267] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 1467.303664][T23548] netlink: 'syz.1.5894': attribute type 1 has an invalid length. [ 1467.312529][T23548] netlink: 105120 bytes leftover after parsing attributes in process `syz.1.5894'. [ 1468.187055][ T4267] Bluetooth: hci5: command 0x0409 tx timeout [ 1468.876975][T23544] tap0: tun_chr_ioctl cmd 2147767517 [ 1468.906312][T23522] chnl_net:caif_netlink_parms(): no params data found [ 1468.953794][ T4342] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1469.119287][ T4342] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1469.289282][ T4342] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1469.339086][T23562] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1469.736088][ T4342] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1469.774442][T23522] bridge0: port 1(bridge_slave_0) entered blocking state [ 1469.785650][T23522] bridge0: port 1(bridge_slave_0) entered disabled state [ 1469.794007][T23522] device bridge_slave_0 entered promiscuous mode [ 1469.824131][T23522] bridge0: port 2(bridge_slave_1) entered blocking state [ 1469.842432][T23522] bridge0: port 2(bridge_slave_1) entered disabled state [ 1469.852805][T23522] device bridge_slave_1 entered promiscuous mode [ 1469.944756][T23522] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1470.016006][T23522] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1470.221386][T23522] team0: Port device team_slave_0 added [ 1470.247435][T12927] Bluetooth: hci5: command 0x041b tx timeout [ 1470.254574][T23522] team0: Port device team_slave_1 added [ 1470.441950][T23522] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1470.451002][T23522] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1470.478416][T23522] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1470.492193][T23522] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1470.499697][T23522] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1470.530163][T23522] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1471.235140][T23522] device hsr_slave_0 entered promiscuous mode [ 1471.433195][T23522] device hsr_slave_1 entered promiscuous mode [ 1471.449119][T23522] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1471.459165][T23522] Cannot create hsr debugfs directory [ 1471.466578][T23591] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1472.326255][T12927] Bluetooth: hci5: command 0x040f tx timeout [ 1472.441395][T23624] netlink: 'syz.5.5914': attribute type 21 has an invalid length. [ 1472.456252][T23624] netlink: 'syz.5.5914': attribute type 6 has an invalid length. [ 1472.464372][T23624] netlink: 132 bytes leftover after parsing attributes in process `syz.5.5914'. [ 1473.983426][T23645] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1474.405495][T12927] Bluetooth: hci5: command 0x0419 tx timeout [ 1474.856053][T23675] netlink: 'syz.1.5927': attribute type 21 has an invalid length. [ 1474.864106][T23675] netlink: 'syz.1.5927': attribute type 6 has an invalid length. [ 1474.872741][T23675] netlink: 132 bytes leftover after parsing attributes in process `syz.1.5927'. [ 1474.893136][T23522] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1475.103095][T23522] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1475.180937][T23522] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1475.321500][ T4342] device hsr_slave_0 left promiscuous mode [ 1475.359115][ T4342] device bridge_slave_1 left promiscuous mode [ 1475.371112][ T4342] bridge0: port 2(bridge_slave_1) entered disabled state [ 1475.428755][ T4342] device bridge_slave_0 left promiscuous mode [ 1475.448950][ T4342] bridge0: port 1(bridge_slave_0) entered disabled state [ 1475.553099][ T4342] device veth1_vlan left promiscuous mode [ 1476.963238][ T4342] team0 (unregistering): Port device team_slave_1 removed [ 1477.081519][ T4342] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1477.125830][ T4342] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1477.401335][ T4342] bond0 (unregistering): Released all slaves [ 1477.489972][T23522] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1477.500806][T23687] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1477.836500][T23522] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1477.888607][T23725] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1478.009082][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1478.019038][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1478.041341][T23522] 8021q: adding VLAN 0 to HW filter on device team0 [ 1478.073842][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1478.094435][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1478.124249][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 1478.131492][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1478.140787][T23733] FAULT_INJECTION: forcing a failure. [ 1478.140787][T23733] name failslab, interval 1, probability 0, space 0, times 0 [ 1478.249612][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1478.260363][T23733] CPU: 1 PID: 23733 Comm: syz.6.5938 Not tainted syzkaller #0 [ 1478.267895][T23733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1478.278077][T23733] Call Trace: [ 1478.281388][T23733] [ 1478.284438][T23733] dump_stack_lvl+0x188/0x24e [ 1478.289171][T23733] ? show_regs_print_info+0x12/0x12 [ 1478.294410][T23733] ? load_image+0x400/0x400 [ 1478.298958][T23733] ? verify_lock_unused+0x140/0x140 [ 1478.304205][T23733] should_fail_ex+0x399/0x4d0 [ 1478.308920][T23733] should_failslab+0x5/0x20 [ 1478.313540][T23733] slab_pre_alloc_hook+0x59/0x310 [ 1478.318603][T23733] kmem_cache_alloc+0x56/0x2f0 [ 1478.323397][T23733] ? skb_clone+0x1e7/0x370 [ 1478.327960][T23733] skb_clone+0x1e7/0x370 [ 1478.332249][T23733] __netlink_deliver_tap+0x3ed/0x800 [ 1478.337680][T23733] ? netlink_deliver_tap+0x2e/0x1b0 [ 1478.342924][T23733] netlink_deliver_tap+0x19c/0x1b0 [ 1478.348077][T23733] netlink_unicast+0x728/0x8d0 [ 1478.353231][T23733] netlink_sendmsg+0x8ad/0xbd0 [ 1478.358041][T23733] ? netlink_getsockopt+0x550/0x550 [ 1478.363286][T23733] ? aa_sock_msg_perm+0x94/0x150 [ 1478.368261][T23733] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1478.373590][T23733] ? security_socket_sendmsg+0x7c/0xa0 [ 1478.379102][T23733] ? netlink_getsockopt+0x550/0x550 [ 1478.384352][T23733] ____sys_sendmsg+0x5be/0x970 [ 1478.389174][T23733] ? __sys_sendmsg_sock+0x30/0x30 [ 1478.394241][T23733] ? __import_iovec+0x315/0x500 [ 1478.399147][T23733] ? import_iovec+0x6f/0xa0 [ 1478.403699][T23733] ___sys_sendmsg+0x2a2/0x360 [ 1478.408429][T23733] ? __sys_sendmsg+0x290/0x290 [ 1478.413264][T23733] ? __lock_acquire+0x7d10/0x7d10 [ 1478.418367][T23733] __se_sys_sendmsg+0x1bb/0x2a0 [ 1478.423273][T23733] ? __x64_sys_sendmsg+0x80/0x80 [ 1478.428276][T23733] ? lockdep_hardirqs_on+0x94/0x140 [ 1478.433644][T23733] do_syscall_64+0x4c/0xa0 [ 1478.438103][T23733] ? clear_bhb_loop+0x60/0xb0 [ 1478.442811][T23733] ? clear_bhb_loop+0x60/0xb0 [ 1478.447522][T23733] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1478.453456][T23733] RIP: 0033:0x7f3ed799c819 [ 1478.457926][T23733] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1478.477579][T23733] RSP: 002b:00007f3ed892d028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1478.486037][T23733] RAX: ffffffffffffffda RBX: 00007f3ed7c15fa0 RCX: 00007f3ed799c819 [ 1478.494044][T23733] RDX: 0000000020004080 RSI: 0000200000000040 RDI: 0000000000000003 [ 1478.502123][T23733] RBP: 00007f3ed892d090 R08: 0000000000000000 R09: 0000000000000000 [ 1478.510118][T23733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1478.518118][T23733] R13: 00007f3ed7c16038 R14: 00007f3ed7c15fa0 R15: 00007fffd10b38b8 [ 1478.526135][T23733] [ 1478.574305][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1478.604241][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1478.648401][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 1478.655612][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1478.696530][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1478.735125][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1478.814053][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1478.845463][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1478.889686][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1478.908016][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1478.926382][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1478.983385][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1479.038115][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1479.054487][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1479.091611][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1479.126884][T23522] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1479.187565][T23747] netlink: 'syz.4.5940': attribute type 21 has an invalid length. [ 1479.341891][T23747] netlink: 'syz.4.5940': attribute type 6 has an invalid length. [ 1479.376509][T23747] netlink: 132 bytes leftover after parsing attributes in process `syz.4.5940'. [ 1479.529315][T23756] netlink: 'syz.5.5943': attribute type 39 has an invalid length. [ 1479.596290][T23756] netlink: 'syz.5.5943': attribute type 10 has an invalid length. [ 1479.895790][T23763] netlink: 'syz.5.5943': attribute type 2 has an invalid length. [ 1480.541157][T23768] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1480.899858][T23781] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1480.986700][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1481.007090][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1481.025116][T23522] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1481.148342][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1481.188321][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1481.340811][T23522] device veth0_vlan entered promiscuous mode [ 1483.005790][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1483.017517][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1483.042231][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1483.072165][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1483.113603][T23522] device veth1_vlan entered promiscuous mode [ 1483.233962][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1483.245243][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1483.270666][T23522] device veth0_macvtap entered promiscuous mode [ 1483.498270][T23522] device veth1_macvtap entered promiscuous mode [ 1483.638982][T23522] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1483.663097][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1483.672945][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1483.683642][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1483.697409][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1483.711012][T23522] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1483.760535][T23522] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1483.782763][T23522] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1483.792225][T23522] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1483.801311][T23522] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1483.812691][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1483.823971][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1484.144130][T23835] FAULT_INJECTION: forcing a failure. [ 1484.144130][T23835] name failslab, interval 1, probability 0, space 0, times 0 [ 1484.157702][T23835] CPU: 1 PID: 23835 Comm: syz.6.5962 Not tainted syzkaller #0 [ 1484.165419][T23835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1484.175593][T23835] Call Trace: [ 1484.178910][T23835] [ 1484.181955][T23835] dump_stack_lvl+0x188/0x24e [ 1484.186681][T23835] ? show_regs_print_info+0x12/0x12 [ 1484.191913][T23835] ? load_image+0x400/0x400 [ 1484.196483][T23835] ? __might_sleep+0xd0/0xd0 [ 1484.201113][T23835] ? __lock_acquire+0x7d10/0x7d10 [ 1484.206214][T23835] should_fail_ex+0x399/0x4d0 [ 1484.210926][T23835] should_failslab+0x5/0x20 [ 1484.215455][T23835] slab_pre_alloc_hook+0x59/0x310 [ 1484.220513][T23835] ? apparmor_sk_alloc_security+0x74/0x100 [ 1484.226348][T23835] __kmem_cache_alloc_node+0x4f/0x260 [ 1484.231755][T23835] ? apparmor_sk_alloc_security+0x74/0x100 [ 1484.237592][T23835] kmalloc_trace+0x26/0xe0 [ 1484.242057][T23835] apparmor_sk_alloc_security+0x74/0x100 [ 1484.247722][T23835] security_sk_alloc+0x6a/0xa0 [ 1484.252523][T23835] sk_prot_alloc+0x101/0x210 [ 1484.257151][T23835] ? sk_alloc+0x20/0x340 [ 1484.261434][T23835] sk_alloc+0x36/0x340 [ 1484.265629][T23835] ? bpf_ctx_init+0x163/0x1a0 [ 1484.270338][T23835] ? bpf_prog_test_run_skb+0x26f/0x12a0 [ 1484.275930][T23835] bpf_prog_test_run_skb+0x35e/0x12a0 [ 1484.281345][T23835] ? __fget_files+0x28/0x4b0 [ 1484.285972][T23835] ? __fget_files+0x43d/0x4b0 [ 1484.290694][T23835] ? cpu_online+0xa0/0xa0 [ 1484.295144][T23835] bpf_prog_test_run+0x31e/0x390 [ 1484.300128][T23835] __sys_bpf+0x62b/0x780 [ 1484.300513][ T1277] ieee802154 phy0 wpan0: encryption failed: -22 [ 1484.304392][T23835] ? bpf_link_show_fdinfo+0x380/0x380 [ 1484.311423][ T1277] ieee802154 phy1 wpan1: encryption failed: -22 [ 1484.316130][T23835] ? lock_chain_count+0x20/0x20 [ 1484.316169][T23835] __x64_sys_bpf+0x78/0x90 [ 1484.316197][T23835] do_syscall_64+0x4c/0xa0 [ 1484.336210][T23835] ? clear_bhb_loop+0x60/0xb0 [ 1484.340952][T23835] ? clear_bhb_loop+0x60/0xb0 [ 1484.345692][T23835] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1484.351618][T23835] RIP: 0033:0x7f3ed799c819 [ 1484.356142][T23835] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1484.375766][T23835] RSP: 002b:00007f3ed892d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1484.384197][T23835] RAX: ffffffffffffffda RBX: 00007f3ed7c15fa0 RCX: 00007f3ed799c819 [ 1484.392193][T23835] RDX: 0000000000000048 RSI: 0000200000000080 RDI: 000000000000000a [ 1484.400183][T23835] RBP: 00007f3ed892d090 R08: 0000000000000000 R09: 0000000000000000 [ 1484.408175][T23835] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1484.416162][T23835] R13: 00007f3ed7c16038 R14: 00007f3ed7c15fa0 R15: 00007fffd10b38b8 [ 1484.424168][T23835] [ 1486.470895][T23846] netlink: 'syz.1.5965': attribute type 10 has an invalid length. [ 1486.528872][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1486.566778][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1486.624859][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1486.662849][ T11] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1486.689166][ T11] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1486.709103][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1487.721634][T23866] netlink: 'syz.1.5970': attribute type 21 has an invalid length. [ 1487.743084][T23866] netlink: 'syz.1.5970': attribute type 6 has an invalid length. [ 1487.762705][T23866] netlink: 132 bytes leftover after parsing attributes in process `syz.1.5970'. [ 1490.000622][T23892] device syzkaller0 entered promiscuous mode [ 1490.354863][T23917] FAULT_INJECTION: forcing a failure. [ 1490.354863][T23917] name failslab, interval 1, probability 0, space 0, times 0 [ 1490.436921][T23917] CPU: 0 PID: 23917 Comm: syz.1.5986 Not tainted syzkaller #0 [ 1490.444551][T23917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1490.454653][T23917] Call Trace: [ 1490.458052][T23917] [ 1490.461022][T23917] dump_stack_lvl+0x188/0x24e [ 1490.465761][T23917] ? stack_trace_snprint+0xf0/0xf0 [ 1490.470923][T23917] ? show_regs_print_info+0x12/0x12 [ 1490.476178][T23917] ? load_image+0x400/0x400 [ 1490.480743][T23917] should_fail_ex+0x399/0x4d0 [ 1490.485448][T23917] should_failslab+0x5/0x20 [ 1490.489975][T23917] slab_pre_alloc_hook+0x59/0x310 [ 1490.495027][T23917] ? __hw_addr_add_ex+0x202/0x710 [ 1490.500084][T23917] __kmem_cache_alloc_node+0x4f/0x260 [ 1490.505489][T23917] ? __hw_addr_add_ex+0x202/0x710 [ 1490.510534][T23917] kmalloc_trace+0x26/0xe0 [ 1490.514977][T23917] __hw_addr_add_ex+0x202/0x710 [ 1490.519848][T23917] dev_addr_init+0x147/0x230 [ 1490.524450][T23917] ? free_zapped_rcu+0x1f0/0x1f0 [ 1490.529414][T23917] ? dev_addr_flush+0x210/0x210 [ 1490.534281][T23917] ? kvmalloc_node+0x6c/0x180 [ 1490.538979][T23917] ? __kmalloc_node+0xe1/0x240 [ 1490.543769][T23917] alloc_netdev_mqs+0x275/0xf00 [ 1490.548642][T23917] ? synproxy_pernet+0x270/0x270 [ 1490.553683][T23917] vti6_locate+0x5ce/0x770 [ 1490.558117][T23917] ? skb_dst_update_pmtu_no_confirm+0x160/0x160 [ 1490.564374][T23917] ? __might_fault+0xa6/0x120 [ 1490.569060][T23917] ? vti6_siocdevprivate+0x66e/0xb20 [ 1490.574444][T23917] vti6_siocdevprivate+0x699/0xb20 [ 1490.579570][T23917] ? vti6_tnl_xmit+0x1960/0x1960 [ 1490.584539][T23917] ? trace_contention_end+0x5f/0x170 [ 1490.589838][T23917] ? full_name_hash+0xac/0xe0 [ 1490.594532][T23917] dev_ifsioc+0xa4a/0xd40 [ 1490.598874][T23917] ? dev_ioctl+0xe80/0xe80 [ 1490.603307][T23917] ? __lock_acquire+0x7d10/0x7d10 [ 1490.608347][T23917] ? full_name_hash+0xac/0xe0 [ 1490.613035][T23917] ? dev_load+0x1d/0x1e0 [ 1490.617291][T23917] ? dev_load+0x1d/0x1e0 [ 1490.621547][T23917] dev_ioctl+0x5f8/0xe80 [ 1490.625797][T23917] ? get_user_ifreq+0xc7/0x170 [ 1490.630577][T23917] sock_ioctl+0x691/0x710 [ 1490.634920][T23917] ? sock_poll+0x410/0x410 [ 1490.639356][T23917] ? bpf_lsm_file_ioctl+0x5/0x10 [ 1490.644311][T23917] ? security_file_ioctl+0x7c/0xa0 [ 1490.649439][T23917] ? sock_poll+0x410/0x410 [ 1490.653864][T23917] __se_sys_ioctl+0xfa/0x170 [ 1490.658472][T23917] do_syscall_64+0x4c/0xa0 [ 1490.662910][T23917] ? clear_bhb_loop+0x60/0xb0 [ 1490.667602][T23917] ? clear_bhb_loop+0x60/0xb0 [ 1490.672300][T23917] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1490.678211][T23917] RIP: 0033:0x7f94ff99c819 [ 1490.682650][T23917] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1490.702274][T23917] RSP: 002b:00007f95008f2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1490.710700][T23917] RAX: ffffffffffffffda RBX: 00007f94ffc15fa0 RCX: 00007f94ff99c819 [ 1490.718795][T23917] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000004 [ 1490.726892][T23917] RBP: 00007f95008f2090 R08: 0000000000000000 R09: 0000000000000000 [ 1490.734980][T23917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1490.743053][T23917] R13: 00007f94ffc16038 R14: 00007f94ffc15fa0 R15: 00007fffbc19cdb8 [ 1490.751052][T23917] [ 1490.972474][T23920] netlink: 'syz.6.5988': attribute type 21 has an invalid length. [ 1491.088815][T23920] netlink: 'syz.6.5988': attribute type 6 has an invalid length. [ 1491.156928][T23920] netlink: 132 bytes leftover after parsing attributes in process `syz.6.5988'. [ 1493.540197][T23949] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1495.707665][T23984] netlink: 209852 bytes leftover after parsing attributes in process `syz.0.6007'. [ 1500.077438][T24022] FAULT_INJECTION: forcing a failure. [ 1500.077438][T24022] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1500.092151][ T4267] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 1500.106093][ T4267] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 1500.117173][ T4267] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 1500.133334][ T4267] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 1500.141630][ T4267] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 1500.152020][ T4267] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 1500.205742][T24022] CPU: 0 PID: 24022 Comm: syz.5.6018 Not tainted syzkaller #0 [ 1500.213259][T24022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1500.223338][T24022] Call Trace: [ 1500.226654][T24022] [ 1500.229617][T24022] dump_stack_lvl+0x188/0x24e [ 1500.234345][T24022] ? show_regs_print_info+0x12/0x12 [ 1500.239682][T24022] ? load_image+0x400/0x400 [ 1500.244305][T24022] ? __lock_acquire+0x7d10/0x7d10 [ 1500.249371][T24022] ? snprintf+0xe5/0x140 [ 1500.253662][T24022] should_fail_ex+0x399/0x4d0 [ 1500.258386][T24022] _copy_to_user+0x2c/0x130 [ 1500.263050][T24022] simple_read_from_buffer+0xe3/0x150 [ 1500.268478][T24022] proc_fail_nth_read+0x1a6/0x220 [ 1500.273557][T24022] ? proc_fault_inject_write+0x310/0x310 [ 1500.279239][T24022] ? fsnotify_perm+0x248/0x550 [ 1500.284052][T24022] ? proc_fault_inject_write+0x310/0x310 [ 1500.289725][T24022] vfs_read+0x2de/0xa00 [ 1500.293931][T24022] ? kernel_read+0x1e0/0x1e0 [ 1500.298561][T24022] ? __fget_files+0x28/0x4b0 [ 1500.303203][T24022] ? __fget_files+0x28/0x4b0 [ 1500.307801][T24022] ? __fget_files+0x43d/0x4b0 [ 1500.312582][T24022] ? __fdget_pos+0x2ae/0x360 [ 1500.317163][T24022] ? ksys_read+0x71/0x250 [ 1500.321491][T24022] ksys_read+0x14c/0x250 [ 1500.325728][T24022] ? vfs_write+0xa30/0xa30 [ 1500.330152][T24022] ? lockdep_hardirqs_on+0x94/0x140 [ 1500.335441][T24022] do_syscall_64+0x4c/0xa0 [ 1500.339887][T24022] ? clear_bhb_loop+0x60/0xb0 [ 1500.344592][T24022] ? clear_bhb_loop+0x60/0xb0 [ 1500.349271][T24022] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1500.355177][T24022] RIP: 0033:0x7fa5e1b5d04e [ 1500.359617][T24022] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1500.379233][T24022] RSP: 002b:00007fa5e29e4fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1500.387741][T24022] RAX: ffffffffffffffda RBX: 00007fa5e29e56c0 RCX: 00007fa5e1b5d04e [ 1500.395796][T24022] RDX: 000000000000000f RSI: 00007fa5e29e50a0 RDI: 0000000000000005 [ 1500.403760][T24022] RBP: 00007fa5e29e5090 R08: 0000000000000000 R09: 0000000000000000 [ 1500.411723][T24022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1500.419680][T24022] R13: 00007fa5e1e16038 R14: 00007fa5e1e15fa0 R15: 00007ffc1e9b3d08 [ 1500.427650][T24022] [ 1502.047182][ T4342] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1502.071332][T24029] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1502.089473][T24020] chnl_net:caif_netlink_parms(): no params data found [ 1502.183077][ T4342] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1502.245805][ T4267] Bluetooth: hci1: command 0x0409 tx timeout [ 1502.463418][ T4342] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1502.882768][T24063] delete_channel: no stack [ 1502.900445][T24063] delete_channel: no stack [ 1504.379223][ T4267] Bluetooth: hci1: command 0x041b tx timeout [ 1505.376821][ T4342] bond0: (slave netdevsim0): Releasing backup interface [ 1505.421517][ T4342] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1505.477616][T24064] netlink: 'syz.6.6030': attribute type 4 has an invalid length. [ 1505.509448][T24064] netlink: 152 bytes leftover after parsing attributes in process `syz.6.6030'. [ 1505.544062][T24064] A link change request failed with some changes committed already. Interface hsr_slave_1 may have been left with an inconsistent configuration, please check. [ 1505.608996][T24020] bridge0: port 1(bridge_slave_0) entered blocking state [ 1505.616427][T24020] bridge0: port 1(bridge_slave_0) entered disabled state [ 1505.624891][T24020] device bridge_slave_0 entered promiscuous mode [ 1505.646855][T24020] bridge0: port 2(bridge_slave_1) entered blocking state [ 1505.665976][T24020] bridge0: port 2(bridge_slave_1) entered disabled state [ 1505.716261][T24020] device bridge_slave_1 entered promiscuous mode [ 1505.877814][T24020] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1505.974130][T24020] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1506.405479][ T4267] Bluetooth: hci1: command 0x040f tx timeout [ 1507.350060][T24020] team0: Port device team_slave_0 added [ 1507.456988][T24020] team0: Port device team_slave_1 added [ 1508.485607][ T4267] Bluetooth: hci1: command 0x0419 tx timeout [ 1508.584899][T24020] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1508.601336][T24020] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1508.638073][T24020] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1510.913920][T24020] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1510.936652][T24020] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1511.031113][T24020] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1512.093437][T24020] device hsr_slave_0 entered promiscuous mode [ 1512.120087][T24020] device hsr_slave_1 entered promiscuous mode [ 1512.170537][T24020] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1512.183286][T24020] Cannot create hsr debugfs directory [ 1512.192575][T24141] netlink: 'syz.4.6047': attribute type 2 has an invalid length. [ 1512.201953][T24141] netlink: 16162 bytes leftover after parsing attributes in process `syz.4.6047'. [ 1522.078173][ T4342] device hsr_slave_0 left promiscuous mode [ 1522.092090][ T4342] device hsr_slave_1 left promiscuous mode [ 1522.099663][ T4342] device bridge_slave_1 left promiscuous mode [ 1522.107010][ T4342] bridge0: port 2(bridge_slave_1) entered disabled state [ 1522.154202][ T4342] device bridge_slave_0 left promiscuous mode [ 1522.163472][ T4342] bridge0: port 1(bridge_slave_0) entered disabled state [ 1522.248240][ T4342] device veth1_vlan left promiscuous mode [ 1522.254163][ T4342] device veth0_vlan left promiscuous mode [ 1523.902872][ T4342] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1524.153614][ T4342] bond0 (unregistering): (slave bridge0): Releasing backup interface [ 1524.162867][ T4342] bond0 (unregistering): Released all slaves [ 1524.267047][T24020] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1524.284919][T24020] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1524.310264][T24020] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1524.339741][T24020] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1524.844588][T24020] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1524.933585][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1524.951001][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1524.991171][T24020] 8021q: adding VLAN 0 to HW filter on device team0 [ 1525.051316][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1525.076927][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1525.108551][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 1525.115858][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1525.196784][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1525.292470][ T4288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1525.312490][ T4288] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1525.351268][ T4288] bridge0: port 2(bridge_slave_1) entered blocking state [ 1525.358515][ T4288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1525.376988][ T4288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1525.394806][ T4288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1525.633804][T24314] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1525.699273][ T4288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1525.869690][ T4288] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1525.886906][ T4288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1525.896719][ T4288] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1525.906370][ T4288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1525.915160][ T4288] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1525.925750][ T4288] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1525.944963][T24020] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1525.989692][T24020] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1526.010740][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1526.026241][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1527.373493][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1527.414514][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1527.488474][T24020] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1527.652229][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1527.724919][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1527.912166][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1527.924996][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1527.934938][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1527.954782][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1528.075035][T24020] device veth0_vlan entered promiscuous mode [ 1528.162283][T24020] device veth1_vlan entered promiscuous mode [ 1528.367725][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1528.414058][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1528.448248][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1528.501942][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1528.556675][T24020] device veth0_macvtap entered promiscuous mode [ 1528.595270][T24020] device veth1_macvtap entered promiscuous mode [ 1528.710988][T24020] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1528.769041][T24020] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1528.823669][T24020] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1528.852317][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1528.871195][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1528.917799][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1528.976308][T24020] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1529.017453][T24020] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1529.070269][T24020] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1529.111085][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1529.136759][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1529.190720][T24020] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1529.220751][T24020] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1529.264087][T24020] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1529.293818][T24020] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1530.899345][ T4342] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1530.927248][ T4342] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1531.006173][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1531.182801][ T4342] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1531.245163][ T4342] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1531.257013][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1539.232338][T24505] bond0: (slave bridge0): Error: Slave device does not support XDP [ 1544.830474][T24583] netlink: 60 bytes leftover after parsing attributes in process `syz.5.6148'. [ 1545.134533][T24583] netlink: 60 bytes leftover after parsing attributes in process `syz.5.6148'. [ 1545.172183][T24582] netlink: 60 bytes leftover after parsing attributes in process `syz.5.6148'. [ 1545.260526][T12927] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 1545.270951][T12927] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 1545.281618][T12927] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 1545.290608][T12927] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 1545.298765][T12927] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 1545.323464][T12927] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 1545.582086][T24598] FAULT_INJECTION: forcing a failure. [ 1545.582086][T24598] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1545.642838][T24598] CPU: 1 PID: 24598 Comm: syz.4.6150 Not tainted syzkaller #0 [ 1545.650386][T24598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1545.660481][T24598] Call Trace: [ 1545.663795][T24598] [ 1545.666754][T24598] dump_stack_lvl+0x188/0x24e [ 1545.671482][T24598] ? show_regs_print_info+0x12/0x12 [ 1545.676728][T24598] ? load_image+0x400/0x400 [ 1545.681272][T24598] ? __lock_acquire+0x7d10/0x7d10 [ 1545.686341][T24598] should_fail_ex+0x399/0x4d0 [ 1545.691051][T24598] _copy_from_user+0x2c/0x170 [ 1545.695782][T24598] kstrtouint_from_user+0xda/0x170 [ 1545.700930][T24598] ? kstrtol_from_user+0x190/0x190 [ 1545.706097][T24598] proc_fail_nth_write+0x8b/0x200 [ 1545.711171][T24598] ? proc_fail_nth_read+0x220/0x220 [ 1545.716494][T24598] ? common_file_perm+0x171/0x1c0 [ 1545.721555][T24598] ? proc_fail_nth_read+0x220/0x220 [ 1545.726788][T24598] vfs_write+0x2e6/0xa30 [ 1545.731075][T24598] ? file_end_write+0x250/0x250 [ 1545.735968][T24598] ? __fget_files+0x28/0x4b0 [ 1545.740678][T24598] ? __fget_files+0x28/0x4b0 [ 1545.745300][T24598] ? __fget_files+0x43d/0x4b0 [ 1545.750033][T24598] ? __fdget_pos+0x2ae/0x360 [ 1545.754674][T24598] ? ksys_write+0x71/0x250 [ 1545.759139][T24598] ksys_write+0x14c/0x250 [ 1545.763608][T24598] ? __ia32_sys_read+0x80/0x80 [ 1545.768417][T24598] ? lockdep_hardirqs_on+0x94/0x140 [ 1545.773659][T24598] do_syscall_64+0x4c/0xa0 [ 1545.778207][T24598] ? clear_bhb_loop+0x60/0xb0 [ 1545.782924][T24598] ? clear_bhb_loop+0x60/0xb0 [ 1545.787635][T24598] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1545.793572][T24598] RIP: 0033:0x7f0a4035d04e [ 1545.798061][T24598] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1545.805722][ T1277] ieee802154 phy0 wpan0: encryption failed: -22 [ 1545.817685][T24598] RSP: 002b:00007f0a412b3fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1545.817714][T24598] RAX: ffffffffffffffda RBX: 00007f0a412b46c0 RCX: 00007f0a4035d04e [ 1545.817731][T24598] RDX: 0000000000000001 RSI: 00007f0a412b40a0 RDI: 000000000000000a [ 1545.817746][T24598] RBP: 00007f0a412b4090 R08: 0000000000000000 R09: 0000000000000000 [ 1545.824496][ T1277] ieee802154 phy1 wpan1: encryption failed: -22 [ 1545.832423][T24598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1545.832441][T24598] R13: 00007f0a40616128 R14: 00007f0a40616090 R15: 00007ffd5a0cbd88 [ 1545.832475][T24598] [ 1546.185222][T24589] chnl_net:caif_netlink_parms(): no params data found [ 1547.365728][T12927] Bluetooth: hci3: command 0x0409 tx timeout [ 1548.653329][T24589] bridge0: port 1(bridge_slave_0) entered blocking state [ 1548.672632][T24589] bridge0: port 1(bridge_slave_0) entered disabled state [ 1548.728082][T24589] device bridge_slave_0 entered promiscuous mode [ 1548.807223][T24589] bridge0: port 2(bridge_slave_1) entered blocking state [ 1548.814465][T24589] bridge0: port 2(bridge_slave_1) entered disabled state [ 1548.844765][T24589] device bridge_slave_1 entered promiscuous mode [ 1549.445595][T12927] Bluetooth: hci3: command 0x041b tx timeout [ 1551.525592][T12927] Bluetooth: hci3: command 0x040f tx timeout [ 1551.649316][T24622] netlink: 184 bytes leftover after parsing attributes in process `syz.4.6158'. [ 1551.887837][T24589] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1551.940572][T24589] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1552.081851][T12927] Bluetooth: hci5: unexpected subevent 0x1a length: 150 > 6 [ 1552.132236][ T4342] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1552.603592][T24589] team0: Port device team_slave_0 added [ 1552.639672][T24589] team0: Port device team_slave_1 added [ 1552.847152][ T4342] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1553.101136][ T4342] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1553.180981][T12927] Bluetooth: hci4: ISO packet for unknown connection handle 255 [ 1553.608310][T12927] Bluetooth: hci3: command 0x0419 tx timeout [ 1553.956646][T24589] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1553.963907][T24589] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1553.998377][T24589] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1554.019939][T24589] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1554.030095][T24589] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1554.112059][T24589] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1556.560238][T24589] device hsr_slave_0 entered promiscuous mode [ 1556.590525][T24589] device hsr_slave_1 entered promiscuous mode [ 1556.616390][T24589] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1556.624022][T24589] Cannot create hsr debugfs directory [ 1556.680506][ T4342] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1556.747958][T24681] netlink: 'syz.5.6174': attribute type 27 has an invalid length. [ 1556.776193][T24681] netlink: 164 bytes leftover after parsing attributes in process `syz.5.6174'. [ 1556.881077][T24685] netlink: 'syz.4.6176': attribute type 27 has an invalid length. [ 1556.974305][T24685] netlink: 164 bytes leftover after parsing attributes in process `syz.4.6176'. [ 1558.423134][T24697] netlink: 16255 bytes leftover after parsing attributes in process `syz.5.6178'. [ 1558.748343][T12927] Bluetooth: hci1: ISO packet for unknown connection handle 255 [ 1559.319824][T24731] syz.1.6183[24731] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1559.320128][T24731] syz.1.6183[24731] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1560.303023][T24589] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 1560.489561][T24589] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 1560.523715][T24750] netlink: 'syz.0.6188': attribute type 10 has an invalid length. [ 1560.752578][T24750] team0: Device hsr_slave_0 failed to register rx_handler [ 1561.402885][T12927] Bluetooth: hci4: ISO packet for unknown connection handle 255 [ 1561.427123][T24589] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 1561.480345][T24589] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 1563.324945][T24589] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1563.359829][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1563.369292][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1563.393309][T24589] 8021q: adding VLAN 0 to HW filter on device team0 [ 1563.476822][ T4342] device hsr_slave_0 left promiscuous mode [ 1563.488398][ T4342] device hsr_slave_1 left promiscuous mode [ 1563.522805][ T4342] device bridge_slave_1 left promiscuous mode [ 1563.552715][ T4342] bridge0: port 2(bridge_slave_1) entered disabled state [ 1566.457506][ T4342] device bridge_slave_0 left promiscuous mode [ 1566.463908][ T4342] bridge0: port 1(bridge_slave_0) entered disabled state [ 1566.632185][ T4342] device veth1_macvtap left promiscuous mode [ 1566.641079][ T4342] device veth1_vlan left promiscuous mode [ 1566.648955][T12927] Bluetooth: hci4: ISO packet for unknown connection handle 255 [ 1570.431148][ T4342] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1570.652700][ T4342] bond0 (unregistering): (slave bridge0): Releasing backup interface [ 1570.663498][ T4342] bond0 (unregistering): Released all slaves [ 1570.775760][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1570.794488][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1570.818550][ T34] bridge0: port 1(bridge_slave_0) entered blocking state [ 1570.825748][ T34] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1570.837996][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1570.847211][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1570.856282][ T34] bridge0: port 2(bridge_slave_1) entered blocking state [ 1570.863420][ T34] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1570.873745][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1570.911404][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1570.924966][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1570.996827][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1571.021333][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1571.118790][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1571.138757][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1571.212597][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1571.243316][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1571.275784][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1571.300480][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1571.360685][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1571.412348][T24589] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1571.780966][T24850] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1571.799373][T24850] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1571.919736][T24850] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1571.939612][T12927] Bluetooth: hci1: ISO packet for unknown connection handle 255 [ 1572.038141][T24850] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1572.874413][T24854] netlink: 'syz.0.6213': attribute type 21 has an invalid length. [ 1572.893475][T24854] netlink: 'syz.0.6213': attribute type 6 has an invalid length. [ 1572.901928][T24854] netlink: 132 bytes leftover after parsing attributes in process `syz.0.6213'. [ 1572.931067][T24864] netlink: 'syz.5.6215': attribute type 10 has an invalid length. [ 1572.942712][T24864] netlink: 55 bytes leftover after parsing attributes in process `syz.5.6215'. [ 1573.105572][T24865] netlink: 'syz.4.6216': attribute type 21 has an invalid length. [ 1573.731751][T24894] syz.4.6222[24894] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1573.731888][T24894] syz.4.6222[24894] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1576.674647][T24589] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1576.721295][ T4619] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1576.731043][ T4619] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1577.386938][T12927] Bluetooth: hci5: ISO packet for unknown connection handle 255 [ 1577.774370][T24934] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1577.904532][T24934] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1578.163037][T24934] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1578.208065][T24934] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1578.580620][T24939] netlink: 'syz.1.6229': attribute type 21 has an invalid length. [ 1578.589824][T24939] netlink: 'syz.1.6229': attribute type 6 has an invalid length. [ 1578.598351][T24939] netlink: 132 bytes leftover after parsing attributes in process `syz.1.6229'. [ 1578.834001][ T4619] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1578.857084][ T4619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1578.911582][ T4619] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1578.922366][ T4619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1578.942251][T24589] device veth0_vlan entered promiscuous mode [ 1578.951193][ T4619] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1578.964233][ T4619] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1581.611557][T24957] team0: Port device team_slave_0 removed [ 1581.640948][T24589] device veth1_vlan entered promiscuous mode [ 1581.671573][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1581.781314][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1581.795251][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1581.832397][T24589] device veth0_macvtap entered promiscuous mode [ 1581.851208][T24974] netlink: 'syz.1.6246': attribute type 21 has an invalid length. [ 1581.867741][T24976] syz.0.6237[24976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1581.867941][T24976] syz.0.6237[24976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1581.928326][T24974] netlink: 'syz.1.6246': attribute type 6 has an invalid length. [ 1582.020112][T24974] netlink: 132 bytes leftover after parsing attributes in process `syz.1.6246'. [ 1582.036834][T24589] device veth1_macvtap entered promiscuous mode [ 1582.430449][T24589] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1582.443371][ T4288] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1582.458457][ T4288] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1582.468451][ T4288] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1582.478394][ T4288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1582.525682][T24589] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1582.541154][ T4288] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1582.556560][ T4288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1582.589268][T24589] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1582.608788][T24589] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1582.639371][T24589] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1582.649568][T24589] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1582.961255][ T11] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1582.981196][ T11] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1583.049295][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1583.123012][ T4619] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1583.177744][ T4619] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1585.005625][ T4342] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1585.270838][T12927] Bluetooth: hci5: ISO packet for unknown connection handle 255 [ 1585.350048][T25016] netlink: 184 bytes leftover after parsing attributes in process `syz.6.6147'. [ 1587.082304][T12927] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 1587.124499][T12927] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 1587.134765][T12927] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 1587.147787][T12927] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 1587.253777][T12927] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 1587.264474][T12927] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 1588.288023][T25019] netlink: 'syz.0.6251': attribute type 21 has an invalid length. [ 1588.304984][T25019] netlink: 'syz.0.6251': attribute type 6 has an invalid length. [ 1588.318504][T25019] netlink: 132 bytes leftover after parsing attributes in process `syz.0.6251'. [ 1588.369041][T25033] netlink: 'syz.5.6249': attribute type 21 has an invalid length. [ 1588.726003][ T4267] Bluetooth: hci5: command 0x0406 tx timeout [ 1588.817898][T25040] FAULT_INJECTION: forcing a failure. [ 1588.817898][T25040] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1588.832748][T25040] CPU: 0 PID: 25040 Comm: syz.1.6254 Not tainted syzkaller #0 [ 1588.840279][T25040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1588.850372][T25040] Call Trace: [ 1588.853695][T25040] [ 1588.856661][T25040] dump_stack_lvl+0x188/0x24e [ 1588.861377][T25040] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 1588.867575][T25040] ? show_regs_print_info+0x12/0x12 [ 1588.872839][T25040] ? load_image+0x400/0x400 [ 1588.877496][T25040] should_fail_ex+0x399/0x4d0 [ 1588.882403][T25040] _copy_from_user+0x2c/0x170 [ 1588.887299][T25040] __sys_bpf+0x2ea/0x780 [ 1588.891655][T25040] ? bpf_link_show_fdinfo+0x380/0x380 [ 1588.897145][T25040] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 1588.903329][T25040] __x64_sys_bpf+0x78/0x90 [ 1588.907763][T25040] do_syscall_64+0x4c/0xa0 [ 1588.912193][T25040] ? clear_bhb_loop+0x60/0xb0 [ 1588.916887][T25040] ? clear_bhb_loop+0x60/0xb0 [ 1588.921580][T25040] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1588.927484][T25040] RIP: 0033:0x7f673cd9c819 [ 1588.931908][T25040] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1588.951549][T25040] RSP: 002b:00007f673dd38028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1588.959987][T25040] RAX: ffffffffffffffda RBX: 00007f673d015fa0 RCX: 00007f673cd9c819 [ 1588.967975][T25040] RDX: 0000000000000050 RSI: 00002000000003c0 RDI: 000000000000000a [ 1588.975962][T25040] RBP: 00007f673dd38090 R08: 0000000000000000 R09: 0000000000000000 [ 1588.984034][T25040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1588.992019][T25040] R13: 00007f673d016038 R14: 00007f673d015fa0 R15: 00007ffda7724be8 [ 1589.000020][T25040] [ 1589.281603][T25029] chnl_net:caif_netlink_parms(): no params data found [ 1589.702277][T25055] netlink: 'syz.0.6257': attribute type 10 has an invalid length. [ 1589.712949][T25055] netlink: 55 bytes leftover after parsing attributes in process `syz.0.6257'. [ 1590.342476][ T4267] Bluetooth: hci0: command 0x0409 tx timeout [ 1590.788143][T25029] bridge0: port 1(bridge_slave_0) entered blocking state [ 1590.798273][T25029] bridge0: port 1(bridge_slave_0) entered disabled state [ 1590.807665][T25029] device bridge_slave_0 entered promiscuous mode [ 1590.912985][T25029] bridge0: port 2(bridge_slave_1) entered blocking state [ 1590.935739][T25029] bridge0: port 2(bridge_slave_1) entered disabled state [ 1590.997944][T25029] device bridge_slave_1 entered promiscuous mode [ 1592.408529][ T4267] Bluetooth: hci0: command 0x041b tx timeout [ 1593.897608][ T4288] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1594.388272][T25029] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1594.468495][ T4288] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1594.492201][ T4267] Bluetooth: hci0: command 0x040f tx timeout [ 1594.528293][T25029] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1594.556683][T25089] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1594.578147][T25089] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1594.604754][T25089] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1594.615712][T25089] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1596.514814][T25093] netlink: 'syz.6.6265': attribute type 21 has an invalid length. [ 1596.523298][T25093] netlink: 'syz.6.6265': attribute type 6 has an invalid length. [ 1596.534285][T25093] netlink: 132 bytes leftover after parsing attributes in process `syz.6.6265'. [ 1596.553533][T25029] team0: Port device team_slave_0 added [ 1596.575776][ T4267] Bluetooth: hci0: command 0x0419 tx timeout [ 1596.640415][ T4288] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1596.674149][T25029] team0: Port device team_slave_1 added [ 1598.354391][ T4288] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1598.416419][T25029] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1598.430243][T25029] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1598.464080][T25029] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1601.521773][T25029] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1601.534205][T25029] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1601.617006][T25029] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1601.712401][ T4267] Bluetooth: hci1: ISO packet for unknown connection handle 255 [ 1601.790338][T25029] device hsr_slave_0 entered promiscuous mode [ 1601.881175][T25029] device hsr_slave_1 entered promiscuous mode [ 1602.052544][T25151] FAULT_INJECTION: forcing a failure. [ 1602.052544][T25151] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1602.085487][T25151] CPU: 1 PID: 25151 Comm: syz.1.6282 Not tainted syzkaller #0 [ 1602.093011][T25151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1602.103273][T25151] Call Trace: [ 1602.106599][T25151] [ 1602.109559][T25151] dump_stack_lvl+0x188/0x24e [ 1602.114307][T25151] ? show_regs_print_info+0x12/0x12 [ 1602.119645][T25151] ? load_image+0x400/0x400 [ 1602.124362][T25151] ? __lock_acquire+0x7d10/0x7d10 [ 1602.129428][T25151] ? snprintf+0xe5/0x140 [ 1602.133724][T25151] should_fail_ex+0x399/0x4d0 [ 1602.138460][T25151] _copy_to_user+0x2c/0x130 [ 1602.143207][T25151] simple_read_from_buffer+0xe3/0x150 [ 1602.148614][T25151] proc_fail_nth_read+0x1a6/0x220 [ 1602.153687][T25151] ? proc_fault_inject_write+0x310/0x310 [ 1602.159497][T25151] ? fsnotify_perm+0x248/0x550 [ 1602.164310][T25151] ? proc_fault_inject_write+0x310/0x310 [ 1602.169995][T25151] vfs_read+0x2de/0xa00 [ 1602.174235][T25151] ? kernel_read+0x1e0/0x1e0 [ 1602.178865][T25151] ? __fget_files+0x28/0x4b0 [ 1602.183492][T25151] ? __fget_files+0x28/0x4b0 [ 1602.188126][T25151] ? __fget_files+0x43d/0x4b0 [ 1602.192850][T25151] ? __fdget_pos+0x2ae/0x360 [ 1602.197478][T25151] ? ksys_read+0x71/0x250 [ 1602.201848][T25151] ksys_read+0x14c/0x250 [ 1602.206128][T25151] ? vfs_write+0xa30/0xa30 [ 1602.210585][T25151] ? lockdep_hardirqs_on+0x94/0x140 [ 1602.215829][T25151] do_syscall_64+0x4c/0xa0 [ 1602.220295][T25151] ? clear_bhb_loop+0x60/0xb0 [ 1602.225010][T25151] ? clear_bhb_loop+0x60/0xb0 [ 1602.229741][T25151] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1602.235670][T25151] RIP: 0033:0x7f673cd5d04e [ 1602.240111][T25151] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1602.259764][T25151] RSP: 002b:00007f673dd16fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1602.268234][T25151] RAX: ffffffffffffffda RBX: 00007f673dd176c0 RCX: 00007f673cd5d04e [ 1602.276439][T25151] RDX: 000000000000000f RSI: 00007f673dd170a0 RDI: 0000000000000015 [ 1602.284454][T25151] RBP: 00007f673dd17090 R08: 0000000000000000 R09: 0000000000000000 [ 1602.292462][T25151] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1602.300466][T25151] R13: 00007f673d016128 R14: 00007f673d016090 R15: 00007ffda7724be8 [ 1602.308493][T25151] [ 1602.541242][T25029] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1602.555433][T25029] Cannot create hsr debugfs directory [ 1603.190551][T25169] netlink: 'syz.0.6288': attribute type 2 has an invalid length. [ 1603.414836][T25169] device 0 entered promiscuous mode [ 1603.570691][T25173] netlink: 44 bytes leftover after parsing attributes in process `syz.0.6288'. [ 1604.132760][ T4267] Bluetooth: hci1: ISO packet for unknown connection handle 255 [ 1607.135741][ T1277] ieee802154 phy0 wpan0: encryption failed: -22 [ 1607.142107][ T1277] ieee802154 phy1 wpan1: encryption failed: -22 [ 1609.097987][T25029] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1612.277375][T25244] netlink: 132 bytes leftover after parsing attributes in process `syz.1.6300'. [ 1612.326888][T25029] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1612.359249][T25029] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1615.974576][T25029] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1616.298258][ T4288] device hsr_slave_0 left promiscuous mode [ 1617.250370][ T4267] Bluetooth: hci3: ISO packet for unknown connection handle 255 [ 1619.263746][ T4288] device bridge_slave_1 left promiscuous mode [ 1619.283313][ T4288] bridge0: port 2(bridge_slave_1) entered disabled state [ 1619.347788][ T4288] device bridge_slave_0 left promiscuous mode [ 1619.358680][ T4288] bridge0: port 1(bridge_slave_0) entered disabled state [ 1619.440309][ T4288] device veth1_macvtap left promiscuous mode [ 1619.477111][ T4288] device veth0_macvtap left promiscuous mode [ 1619.483406][ T4288] device veth1_vlan left promiscuous mode [ 1619.836386][T25313] FAULT_INJECTION: forcing a failure. [ 1619.836386][T25313] name failslab, interval 1, probability 0, space 0, times 0 [ 1619.850782][T25313] CPU: 1 PID: 25313 Comm: syz.6.6315 Not tainted syzkaller #0 [ 1619.858298][T25313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1619.868570][T25313] Call Trace: [ 1619.871878][T25313] [ 1619.874860][T25313] dump_stack_lvl+0x188/0x24e [ 1619.879593][T25313] ? show_regs_print_info+0x12/0x12 [ 1619.884831][T25313] ? load_image+0x400/0x400 [ 1619.889382][T25313] ? __might_sleep+0xd0/0xd0 [ 1619.894042][T25313] ? __lock_acquire+0x7d10/0x7d10 [ 1619.899230][T25313] should_fail_ex+0x399/0x4d0 [ 1619.903973][T25313] should_failslab+0x5/0x20 [ 1619.908520][T25313] slab_pre_alloc_hook+0x59/0x310 [ 1619.913601][T25313] ? sctp_association_new+0x86/0x25d0 [ 1619.919023][T25313] __kmem_cache_alloc_node+0x4f/0x260 [ 1619.924490][T25313] ? sctp_association_new+0x86/0x25d0 [ 1619.929912][T25313] kmalloc_trace+0x26/0xe0 [ 1619.934373][T25313] sctp_association_new+0x86/0x25d0 [ 1619.939609][T25313] ? sctp_do_bind+0x6bd/0x990 [ 1619.944413][T25313] ? __ipv6_addr_type+0x24f/0x2f0 [ 1619.949489][T25313] sctp_connect_new_asoc+0x2da/0x6a0 [ 1619.954815][T25313] ? __sctp_connect+0xd80/0xd80 [ 1619.959707][T25313] ? __local_bh_enable_ip+0x136/0x1c0 [ 1619.965124][T25313] ? bpf_lsm_sctp_bind_connect+0x5/0x10 [ 1619.970703][T25313] ? security_sctp_bind_connect+0x85/0xb0 [ 1619.976723][T25313] sctp_sendmsg+0x15b0/0x2940 [ 1619.981457][T25313] ? aa_sk_perm+0x791/0x950 [ 1619.986014][T25313] ? sctp_getsockopt+0x8a0/0x8a0 [ 1619.991004][T25313] ? __might_fault+0xa6/0x120 [ 1619.995716][T25313] ? aa_af_perm+0x340/0x340 [ 1620.000262][T25313] ? tomoyo_socket_sendmsg_permission+0x1dd/0x2f0 [ 1620.006746][T25313] ? inet_sendmsg+0xe5/0x2f0 [ 1620.011402][T25313] ? inet_send_prepare+0x260/0x260 [ 1620.016557][T25313] ____sys_sendmsg+0x5be/0x970 [ 1620.021379][T25313] ? __sys_sendmsg_sock+0x30/0x30 [ 1620.026446][T25313] ? __import_iovec+0x315/0x500 [ 1620.031437][T25313] ? import_iovec+0x6f/0xa0 [ 1620.035989][T25313] ___sys_sendmsg+0x2a2/0x360 [ 1620.040721][T25313] ? __sys_sendmsg+0x290/0x290 [ 1620.045561][T25313] ? __lock_acquire+0x7d10/0x7d10 [ 1620.050660][T25313] __se_sys_sendmsg+0x1bb/0x2a0 [ 1620.055645][T25313] ? __x64_sys_sendmsg+0x80/0x80 [ 1620.060651][T25313] ? lockdep_hardirqs_on+0x94/0x140 [ 1620.065897][T25313] do_syscall_64+0x4c/0xa0 [ 1620.070359][T25313] ? clear_bhb_loop+0x60/0xb0 [ 1620.075183][T25313] ? clear_bhb_loop+0x60/0xb0 [ 1620.079950][T25313] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1620.085887][T25313] RIP: 0033:0x7f491a79c819 [ 1620.090342][T25313] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1620.110173][T25313] RSP: 002b:00007f491b728028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1620.118824][T25313] RAX: ffffffffffffffda RBX: 00007f491aa16090 RCX: 00007f491a79c819 [ 1620.126839][T25313] RDX: 0000000000000060 RSI: 0000200000000380 RDI: 000000000000000a [ 1620.134941][T25313] RBP: 00007f491b728090 R08: 0000000000000000 R09: 0000000000000000 [ 1620.143040][T25313] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1620.151048][T25313] R13: 00007f491aa16128 R14: 00007f491aa16090 R15: 00007fffa5a12c28 [ 1620.159259][T25313] [ 1620.792830][ T4288] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1621.006628][ T4288] bond0 (unregistering): Released all slaves [ 1621.094149][T25029] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1621.134426][T25029] 8021q: adding VLAN 0 to HW filter on device team0 [ 1621.216023][ T4619] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1621.232150][ T4619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1621.304687][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1621.336937][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1621.362640][ T56] bridge0: port 1(bridge_slave_0) entered blocking state [ 1621.369855][ T56] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1621.428855][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1621.492427][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1621.537556][ T56] bridge0: port 2(bridge_slave_1) entered blocking state [ 1621.544793][ T56] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1621.587836][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1621.598970][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1621.726089][ T56] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1621.755479][T25317] netlink: 'syz.6.6316': attribute type 10 has an invalid length. [ 1621.824004][T25317] netlink: 40 bytes leftover after parsing attributes in process `syz.6.6316'. [ 1621.954270][T25317] device ipvlan1 entered promiscuous mode [ 1622.406571][T25317] bridge0: port 3(ipvlan1) entered blocking state [ 1622.447528][T25317] bridge0: port 3(ipvlan1) entered disabled state [ 1622.479696][ T4267] Bluetooth: hci1: ISO packet for unknown connection handle 255 [ 1622.526732][T25317] A link change request failed with some changes committed already. Interface ipvlan1 may have been left with an inconsistent configuration, please check. [ 1622.643516][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1622.671770][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1622.738583][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1622.776501][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1622.833732][T25029] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1622.854491][T25029] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1622.905528][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1622.923787][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1622.952620][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1622.981929][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1623.016234][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1623.073036][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1624.565524][ T4267] Bluetooth: hci1: command 0x0406 tx timeout [ 1625.659300][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1625.668926][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1625.692685][T25029] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1629.344881][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1629.355085][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1629.388139][T25029] device veth0_vlan entered promiscuous mode [ 1629.408015][T25029] device veth1_vlan entered promiscuous mode [ 1629.421420][T18393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1629.429782][T18393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1629.438551][T18393] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1629.468160][T18393] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1629.479337][T18393] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1629.514994][ T4288] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1629.532139][ T4288] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1629.542086][ T4288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1629.562705][T25029] device veth0_macvtap entered promiscuous mode [ 1629.579280][T25029] device veth1_macvtap entered promiscuous mode [ 1629.611001][T25029] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1629.626732][ T4288] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1629.640568][ T4288] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1629.652071][ T4288] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1629.666804][ T4288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1629.684714][T25029] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1629.696879][T18393] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1629.713029][T18393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1629.727412][T25029] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1629.738035][T25029] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1629.754115][T25029] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1629.769959][T25029] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1630.054144][ T48] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1630.072868][ T48] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1630.126131][ T4288] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1630.207701][ T4288] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1630.227774][ C1] [ 1630.227786][ C1] ================================ [ 1630.227791][ C1] WARNING: inconsistent lock state [ 1630.227797][ C1] syzkaller #0 Not tainted [ 1630.227809][ C1] -------------------------------- [ 1630.227814][ C1] inconsistent {INITIAL USE} -> {IN-NMI} usage. [ 1630.227824][ C1] syz.5.6338/25417 [HC1[1]:SC0[0]:HE0:SE1] takes: [ 1630.227844][ C1] ffff88805a233a18 (&htab->lockdep_key){....}-{2:2}, at: htab_lock_bucket+0x179/0x2f0 [ 1630.227894][ C1] {INITIAL USE} state was registered at: [ 1630.227901][ C1] lock_acquire+0x1bb/0x4a0 [ 1630.227923][ C1] _raw_spin_lock+0x2a/0x40 [ 1630.227949][ C1] htab_lock_bucket+0x179/0x2f0 [ 1630.227967][ C1] htab_map_update_elem+0x226/0xb00 [ 1630.227983][ C1] bpf_map_update_value+0x59e/0x670 [ 1630.228003][ C1] generic_map_update_batch+0x54b/0x810 [ 1630.228022][ C1] bpf_map_do_batch+0x466/0x600 [ 1630.228042][ C1] __sys_bpf+0x6f7/0x780 [ 1630.228061][ C1] __x64_sys_bpf+0x78/0x90 [ 1630.228080][ C1] do_syscall_64+0x4c/0xa0 [ 1630.228103][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1630.228122][ C1] irq event stamp: 1746 [ 1630.228129][ C1] hardirqs last enabled at (1745): [] exc_debug+0xf0/0x130 [ 1630.228148][ C1] hardirqs last disabled at (1746): [] exc_debug+0x6e/0x130 [ 1630.228166][ C1] softirqs last enabled at (1660): [] sctp_setsockopt+0x964/0xf90 [ 1630.228194][ C1] softirqs last disabled at (1658): [] release_sock+0x2b/0x1b0 [ 1630.228215][ C1] [ 1630.228215][ C1] other info that might help us debug this: [ 1630.228221][ C1] Possible unsafe locking scenario: [ 1630.228221][ C1] [ 1630.228226][ C1] CPU0 [ 1630.228230][ C1] ---- [ 1630.228234][ C1] lock(&htab->lockdep_key); [ 1630.228245][ C1] [ 1630.228249][ C1] lock(&htab->lockdep_key); [ 1630.228260][ C1] [ 1630.228260][ C1] *** DEADLOCK *** [ 1630.228260][ C1] [ 1630.228265][ C1] no locks held by syz.5.6338/25417. [ 1630.228273][ C1] [ 1630.228273][ C1] stack backtrace: [ 1630.228285][ C1] CPU: 1 PID: 25417 Comm: syz.5.6338 Not tainted syzkaller #0 [ 1630.228302][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1630.228312][ C1] Call Trace: [ 1630.228319][ C1] <#DB> [ 1630.228326][ C1] dump_stack_lvl+0x188/0x24e [ 1630.228352][ C1] ? show_regs_print_info+0x12/0x12 [ 1630.228379][ C1] ? print_usage_bug+0x42a/0x690 [ 1630.228402][ C1] ? verify_lock_unused+0x18/0x140 [ 1630.228427][ C1] lock_acquire+0x2df/0x4a0 [ 1630.228451][ C1] ? htab_lock_bucket+0x179/0x2f0 [ 1630.228470][ C1] ? read_lock_is_recursive+0x10/0x10 [ 1630.228496][ C1] _raw_spin_lock+0x2a/0x40 [ 1630.228513][ C1] ? htab_lock_bucket+0x179/0x2f0 [ 1630.228531][ C1] htab_lock_bucket+0x179/0x2f0 [ 1630.228553][ C1] ? htab_lru_map_delete_node+0x630/0x630 [ 1630.228572][ C1] ? look_up_lock_class+0x75/0x140 [ 1630.228591][ C1] ? verify_lock_unused+0x18/0x140 [ 1630.228613][ C1] ? htab_map_hash+0x301/0x6d0 [ 1630.228632][ C1] htab_map_delete_elem+0x19e/0x5b0 [ 1630.228651][ C1] ? bpf_overflow_handler+0xd9/0x7c0 [ 1630.228671][ C1] ? htab_map_update_elem+0xb00/0xb00 [ 1630.228687][ C1] ? perf_trace_buf_update+0xa8/0x230 [ 1630.228705][ C1] ? perf_tp_event+0xc30/0xc30 [ 1630.228728][ C1] ? perf_trace_buf_alloc+0x300/0x300 [ 1630.228748][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0x3e [ 1630.228768][ C1] bpf_overflow_handler+0x522/0x7c0 [ 1630.228788][ C1] ? bpf_overflow_handler+0xd9/0x7c0 [ 1630.228805][ C1] ? perf_swevent_overflow+0x230/0x230 [ 1630.228826][ C1] ? __perf_event_account_interrupt+0x187/0x280 [ 1630.228850][ C1] __perf_event_overflow+0x448/0x610 [ 1630.228875][ C1] perf_swevent_overflow+0x19b/0x230 [ 1630.228895][ C1] perf_swevent_event+0x458/0x570 [ 1630.228918][ C1] ? perf_tp_event+0xc30/0xc30 [ 1630.228954][ C1] perf_bp_event+0x312/0x3f0 [ 1630.228980][ C1] ? perf_event_free_bpf_prog+0x110/0x110 [ 1630.229014][ C1] ? atomic_notifier_call_chain+0x2c/0x2b0 [ 1630.229033][ C1] ? read_lock_is_recursive+0x10/0x10 [ 1630.229055][ C1] hw_breakpoint_exceptions_notify+0x152/0x470 [ 1630.229080][ C1] atomic_notifier_call_chain+0x17a/0x2b0 [ 1630.229098][ C1] ? atomic_notifier_call_chain+0x2c/0x2b0 [ 1630.229118][ C1] notify_die+0x141/0x1a0 [ 1630.229136][ C1] ? srcu_init_notifier_head+0x90/0x90 [ 1630.229160][ C1] notify_debug+0x20/0x30 [ 1630.229179][ C1] exc_debug+0xd9/0x130 [ 1630.229195][ C1] asm_exc_debug+0x1a/0x40 [ 1630.229214][ C1] RIP: 0010:copy_user_enhanced_fast_string+0xa/0x40 [ 1630.229239][ C1] Code: ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 8d 0c ca 89 ca eb 20 0f 01 cb 83 fa 40 72 38 89 d1 a4 31 c0 0f 01 ca c3 89 ca eb 0a 90 90 90 90 90 90 90 90 90 90 [ 1630.229254][ C1] RSP: 0018:ffffc9000481fd48 EFLAGS: 00050206 [ 1630.229269][ C1] RAX: ffffffff84114d01 RBX: 0000000000000090 RCX: 000000000000008d [ 1630.229281][ C1] RDX: 0000000000000090 RSI: 0000200000000303 RDI: ffffc9000481fdc3 [ 1630.229292][ C1] RBP: 0000000000000000 R08: ffffc9000481fe4f R09: 1ffff92000903fc9 [ 1630.229304][ C1] R10: dffffc0000000000 R11: fffff52000903fca R12: 00007fffffffef70 [ 1630.229317][ C1] R13: 0000000000000090 R14: ffffc9000481fdc0 R15: 0000200000000300 [ 1630.229332][ C1] ? _copy_from_user+0x31/0x170 [ 1630.229356][ C1] [ 1630.229361][ C1] [ 1630.229366][ C1] _copy_from_user+0xf4/0x170 [ 1630.229386][ C1] __sys_bpf+0x2ea/0x780 [ 1630.229408][ C1] ? bpf_link_show_fdinfo+0x380/0x380 [ 1630.229435][ C1] ? lock_chain_count+0x20/0x20 [ 1630.229460][ C1] __x64_sys_bpf+0x78/0x90 [ 1630.229480][ C1] do_syscall_64+0x4c/0xa0 [ 1630.229501][ C1] ? clear_bhb_loop+0x60/0xb0 [ 1630.229520][ C1] ? clear_bhb_loop+0x60/0xb0 [ 1630.229541][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1630.229560][ C1] RIP: 0033:0x7fa5e1b9c819 [ 1630.229572][ C1] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1630.229586][ C1] RSP: 002b:00007fa5e29e5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1630.229601][ C1] RAX: ffffffffffffffda RBX: 00007fa5e1e15fa0 RCX: 00007fa5e1b9c819 [ 1630.229613][ C1] RDX: 0000000000000094 RSI: 0000200000000300 RDI: 0000000000000005 [ 1630.229624][ C1] RBP: 00007fa5e1c32c91 R08: 0000000000000000 R09: 0000000000000000 [ 1630.229636][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1630.229645][ C1] R13: 00007fa5e1e16038 R14: 00007fa5e1e15fa0 R15: 00007ffc1e9b3d08 [ 1630.229664][ C1] [ 1630.255786][ T4288] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1630.396331][T25423] netlink: 60 bytes leftover after parsing attributes in process `syz.0.6335'. [ 1633.165402][ T34] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1633.220112][T25423] netlink: 60 bytes leftover after parsing attributes in process `syz.0.6335'.