last executing test programs: 5.78970761s ago: executing program 3 (id=7222): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904, 0xd3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x76}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x4) close(r3) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYBLOB], 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000001"], 0x50) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="03000000040000000400"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="18060000000003000000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x9, &(0x7f0000001d00)=ANY=[@ANYBLOB="80405000080000001826000041df8b004d25bc77f07fc19d2b83f33887dcbe75cedc14fdc9b5651d28122d000beb6b7bb6eef478ca086e3344547b96ee04eb9938b1327c0d36061fe5d73ed19707e48d6e18ff3cb6f7340367105987dfb8afe10da0b8ebbcbfb06fbe2eb6fb0b814cf98d7a604de992a6ca030c92523d306315e43194c2502742a19ac0fcfabe148c0e49704ad789f7a133776ceb67f21cade38666ae5e29066ddc5ea2d1f84263", @ANYRES32=r5, @ANYBLOB="000000007f00000018190000", @ANYRES32=r4, @ANYBLOB="000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7020000000000008500000086000000"], &(0x7f0000000580)='syzkaller\x00', 0x7, 0x9f, &(0x7f0000000a00)=""/159, 0x40f00, 0x35, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x4, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000b40)=[r6, r5], 0x0, 0x10, 0xbcd}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r7, 0xe0, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)=[0x0], 0x0, 0x0, 0x46, &(0x7f0000000700)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x6a, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001c00)={r2, 0xe0, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000001880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8, &(0x7f0000001980)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000019c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x41, &(0x7f0000001a00)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001a40), &(0x7f0000001a80), 0x8, 0x91, 0x8, 0x8, &(0x7f0000001ac0)}}, 0x10) sendmsg$inet(r3, &(0x7f0000000240)={0x0, 0x20, &(0x7f0000000080)=[{&(0x7f0000000780)="5c00000013006bcc9e3be35c6e17aa31076b876c1d0000007ea60864160af36514000cc008001900030002000600010003800000000056a705251e638294ff0051f60a84c9f4d4938037e786a6d072c6c95300"/92, 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 5.504589839s ago: executing program 3 (id=7225): perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x80, 0x18, 0x10, 0x40, 0x0, 0x0, 0x8001, 0x1200, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xc000000000000, 0x78e}, 0xa080, 0x6, 0x8fd, 0x9, 0xfff, 0x8, 0x2, 0x0, 0x5, 0x0, 0x7fff}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xed, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9b2, 0x9}, 0x114581, 0x4, 0x0, 0x1, 0x802, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000680)=""/140, 0x8c}], 0x1, &(0x7f0000002f40)=""/229, 0xe5}, 0x40000004) sendmsg$tipc(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)}, {&(0x7f0000000840)="8d03cab9cbe923f2ab882de5", 0xc}], 0x2, 0x0, 0x0, 0x400c800}, 0x4000000) close(r1) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="d8000000180081054e81f782db4cb904021d0800fe007c05e8fe55a10a0015000200142603600e12080005007f370401a8001600200006000400027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2e98a61e284ce5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e970392", 0xd8}], 0x1}, 0x0) 4.974436426s ago: executing program 3 (id=7230): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x8, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000300)={0x2, 0x4e24, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1c000000000000000001000008000000", @ANYRES32=0x0, @ANYBLOB="ac141411e000000100000000280000000000000000000000070000009404000744"], 0x48}, 0x0) 4.794702382s ago: executing program 3 (id=7233): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904, 0xd3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x76}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x4) close(r3) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYBLOB], 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000001"], 0x50) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="03000000040000000400"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="18060000000003000000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x9, &(0x7f0000001d00)=ANY=[@ANYBLOB="80405000080000001826000041df8b004d25bc77f07fc19d2b83f33887dcbe75cedc14fdc9b5651d28122d000beb6b7bb6eef478ca086e3344547b96ee04eb9938b1327c0d36061fe5d73ed19707e48d6e18ff3cb6f7340367105987dfb8afe10da0b8ebbcbfb06fbe2eb6fb0b814cf98d7a604de992a6ca030c92523d306315e43194c2502742a19ac0fcfabe148c0e49704ad789f7a133776ceb67f21cade38666ae5e29066ddc5ea2d1f84263", @ANYRES32=r5, @ANYBLOB="000000007f00000018190000", @ANYRES32=r4, @ANYBLOB="000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7020000000000008500000086000000"], &(0x7f0000000580)='syzkaller\x00', 0x7, 0x9f, &(0x7f0000000a00)=""/159, 0x40f00, 0x35, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x4, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000b40)=[r6, r5], 0x0, 0x10, 0xbcd}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r7, 0xe0, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)=[0x0], 0x0, 0x0, 0x46, &(0x7f0000000700)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x6a, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001c00)={r2, 0xe0, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000001880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8, &(0x7f0000001980)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000019c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x41, &(0x7f0000001a00)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001a40), &(0x7f0000001a80), 0x8, 0x91, 0x8, 0x8, &(0x7f0000001ac0)}}, 0x10) sendmsg$inet(r3, &(0x7f0000000240)={0x0, 0x20, &(0x7f0000000080)=[{&(0x7f0000000780)="5c00000013006bcc9e3be35c6e17aa31076b876c1d0000007ea60864160af36514000cc008001900030002000600010003800000000056a705251e638294ff0051f60a84c9f4d4938037e786a6d072c6c95300"/92, 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 4.454196054s ago: executing program 3 (id=7236): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0xa, 0x2, 0x11) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') close(r1) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x40200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2420, 0x0, 0x0, 0x3, 0x3, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000004080000000000000002000000000000000000000002000000000000000000000000000002000000000000000000000004"], 0x0, 0x56}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x1, 0xf, 0x2, 0xff, 0x0, 0x0, 0x2, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={0x0, 0x1}, 0x80000, 0xca, 0x0, 0x5, 0xdf1d, 0x400000, 0x0, 0x0, 0xe, 0x0, 0x8}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x6) recvmsg$unix(r0, 0x0, 0x1c0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES8=r1, @ANYBLOB="3eca", @ANYRES8=r2], 0x9a) 4.307263119s ago: executing program 3 (id=7239): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$kcm(0x1e, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x200000e, 0xe, 0x55, &(0x7f0000000140)="a06ad876d56a0064d082778c3938", &(0x7f0000000380)=""/85, 0x600, 0x4000000}, 0x28) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) 3.03131901s ago: executing program 2 (id=7251): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x100000000008, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0xc05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r3 = perf_event_open(&(0x7f0000000500)={0x0, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x1}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x5) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{}, &(0x7f0000000240), &(0x7f0000000280)='%pS \x00'}, 0x20) r5 = perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0xf6, 0x1, 0x8, 0x9, 0x0, 0x9, 0xc080, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x1, 0xf8fe, 0x5, 0x2, 0x332b, 0x9, 0x9, 0x0, 0x2, 0x0, 0x1}, 0x0, 0x8, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x7) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d8, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x3000c041) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000604000000002e"], 0x0, 0x37}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r6, 0x0, 0x0}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) close(r7) ioctl$SIOCSIFHWADDR(r7, 0x8b34, 0x0) write$cgroup_pressure(r7, &(0x7f0000000180)={'full', 0x20, 0x5, 0x20, 0x6}, 0x2f) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e00000003000000070000000400000000000100", @ANYRES32, @ANYBLOB="0200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0400000001000000010000000a00"/24, @ANYRES32=r7, @ANYBLOB="e01b5619f8ff0c0a357b404ce76bfdcc969dfc5dba7dc6d0fc727b2312dfab3c632b5608c495c294fc3b751dc1379912a4095374bfb29f49898bcd2160ba97f3fec77edbefb37bc5ebe273545a5320ad4a9a484bab4b6850ed5947b7e9259b17dc37480cbc2c88f94028"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x84) recvmsg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x102) socket$kcm(0xa, 0x3, 0x3a) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000140)="2e00000010008188040f80ec59acbc0413a1f8480d0000005e140602000000000e000a00100000000580607ee622", 0x2e}], 0x1}, 0x0) 1.985867985s ago: executing program 2 (id=7257): socket$kcm(0x10, 0x3, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000002000000000000000100008400060000000000000300000000000000000000000000000d00000000000000000000000902"], 0x0, 0x4a}, 0x28) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) r1 = socket$kcm(0x2, 0x5, 0x84) socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0xffffffff, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x64, &(0x7f0000000000)=r4, 0x10) r5 = socket$kcm(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) setsockopt$sock_attach_bpf(r5, 0x84, 0x64, &(0x7f0000000000), 0x10) 1.940087506s ago: executing program 1 (id=7258): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0xa, 0x2, 0x11) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') close(r1) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x40200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2420, 0x0, 0x0, 0x3, 0x3, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000004080000000000000002000000000000000000000002000000000000000000000000000002000000000000000000000004"], 0x0, 0x56}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x1, 0xf, 0x2, 0xff, 0x0, 0x0, 0x2, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={0x0, 0x1}, 0x80000, 0xca, 0x0, 0x5, 0xdf1d, 0x400000, 0x0, 0x0, 0xe, 0x0, 0x8}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x6) recvmsg$unix(r0, 0x0, 0x1c0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES8=r1, @ANYBLOB="3eca", @ANYRES8=r2], 0x9a) 1.8353508s ago: executing program 2 (id=7259): perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x80, 0x18, 0x10, 0x40, 0x0, 0x0, 0x8001, 0x1200, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xc000000000000, 0x78e}, 0xa080, 0x6, 0x8fd, 0x9, 0xfff, 0x8, 0x2, 0x0, 0x5, 0x0, 0x7fff}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xed, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9b2, 0x9}, 0x114581, 0x4, 0x0, 0x1, 0x802, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000680)=""/140, 0x8c}], 0x1, &(0x7f0000002f40)=""/229, 0xe5}, 0x40000004) sendmsg$tipc(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="b8d3d8e48974aae5039847936746be1d81a34f9b68100dbf05177b2436f9d642df271fd6b9aa6701365ffc72380000000001000000fcf2fbb053e277a04d3f44e3f9bafec64080", 0x47}, {&(0x7f0000000840)="8d03cab9cbe923f2ab882de5", 0xc}], 0x2, 0x0, 0x0, 0x400c800}, 0x4000000) close(r1) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="d8000000180081054e81f782db4cb904021d0800fe007c05e8fe55a10a0015000200142603600e12080005007f370401a8001600200006000400027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2e98a61e284ce5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e970392", 0xd8}], 0x1}, 0x0) 1.762324032s ago: executing program 1 (id=7260): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$kcm(0x1e, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x200000e, 0xe, 0x55, &(0x7f0000000140)="a06ad876d56a0064d082778c3938", &(0x7f0000000380)=""/85, 0x600, 0x4000000}, 0x28) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) 1.652002616s ago: executing program 0 (id=7261): bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x3a, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="020000000400000008000000010000"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000bc0)={{r1, 0xffffffffffffffff}, &(0x7f0000000c00), &(0x7f0000000080)='%+9llu \x00'}, 0x1c) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2, r1}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x16, 0x10, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000341200007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x6, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r3, 0x0, 0xe, 0x0, &(0x7f0000000040)="f4b84de4115d64244a0e839e8971", 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 1.5253149s ago: executing program 1 (id=7262): r0 = socket$kcm(0x11, 0x3, 0x300) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000740)="2e00000010008188e6b62aa73f72cc9f0ba1f8483d0000005e145802000000000e000a0010000000028000001294", 0x2e}], 0x1}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000003c0)={r2}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xd18c9b35, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030036000b05d25a806c8c6f94f90424fc60100005000a000200053582c137153e37000c0980fc0b10000300", 0x33fe0}], 0x1}, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x22}]}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) sendmsg$inet(r0, &(0x7f0000000340)={&(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000140)="82e5783afb0d5561ecd05421c3b6166abf960d0a9055a782f1b202d299b39356b3892090dbee24068d3c1786df1b790763f938032221455058b57fe6d8b3083a8449f3734b968cd112305088d8b8b6b76d1064294ccc66f492be3dbd1dc63afbac314f812eb5a499a47ab5832a63bd62df04fc3ed39f69958e1c4ade7032c3020418c07e2ef2a05c7ad1c834dd13e9c20f526c38ba22ef3aef056b61cf7bc3412d11da8fb4e472d073604460e8a2a3af7858316295c1a8bbcc", 0xb9}, {&(0x7f0000000200)="1282c1042b6629d999019164eac8baffd16f6d0ce26c67e1244efd6dc006506d7577bdd61d2fbebe11526eb0a587567278a2e5ec8c0d1f95d01194718bbb5b1b33e0df0f39daf0949c490c7802a61aa009d7cc8f02d9d7be5d6624d111c414b1c292757b23d376cf8e510bc9710f4b6fcb6446f4cfae140f5f119fc75b910947e031ef2ba5f012824700df72534afa50b43e6da1001a2f0ec351ec8ea94cacbdf4f0f781d37f824e0593b3afef47e438bfbf948e2034a73f18219b3d202dcee986409ea3d4097a1694da3926d8cb99dd6b828c4c40fff577a16b96d1d61e2e791569cbd0f7c1", 0xe6}], 0x2}, 0x800) r6 = socket$kcm(0x10, 0x5, 0x4) sendmsg$kcm(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000380)="39000000140081ae10003c0005000183110042702fdf236f1f9f660fcf066505acb612f691f3bd3508abca1be6eeb89c44ebb37358582b647d", 0x39}], 0x1}, 0x0) 1.488648121s ago: executing program 0 (id=7263): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904, 0xd3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x76}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x4) close(r3) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYBLOB], 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000001"], 0x50) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="03000000040000000400"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="18060000000003000000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x9, &(0x7f0000001d00)=ANY=[@ANYBLOB="80405000080000001826000041df8b004d25bc77f07fc19d2b83f33887dcbe75cedc14fdc9b5651d28122d000beb6b7bb6eef478ca086e3344547b96ee04eb9938b1327c0d36061fe5d73ed19707e48d6e18ff3cb6f7340367105987dfb8afe10da0b8ebbcbfb06fbe2eb6fb0b814cf98d7a604de992a6ca030c92523d306315e43194c2502742a19ac0fcfabe148c0e49704ad789f7a133776ceb67f21cade38666ae5e29066ddc5ea2d1f84263", @ANYRES32=r5, @ANYBLOB="000000007f00000018190000", @ANYRES32=r4, @ANYBLOB="000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7020000000000008500000086000000"], &(0x7f0000000580)='syzkaller\x00', 0x7, 0x9f, &(0x7f0000000a00)=""/159, 0x40f00, 0x35, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x4, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000b40)=[r6, r5], 0x0, 0x10, 0xbcd}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r7, 0xe0, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)=[0x0], 0x0, 0x0, 0x46, &(0x7f0000000700)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x6a, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001c00)={r2, 0xe0, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000001880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000001980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x41, &(0x7f0000001a00)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001a40), &(0x7f0000001a80), 0x8, 0x91, 0x8, 0x8, &(0x7f0000001ac0)}}, 0x10) sendmsg$inet(r3, &(0x7f0000000240)={0x0, 0x20, &(0x7f0000000080)=[{&(0x7f0000000780)="5c00000013006bcc9e3be35c6e17aa31076b876c1d0000007ea60864160af36514000cc008001900030002000600010003800000000056a705251e638294ff0051f60a84c9f4d4938037e786a6d072c6c95300"/92, 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 1.463151592s ago: executing program 2 (id=7264): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x100000000008, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0xc05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r3 = perf_event_open(&(0x7f0000000500)={0x0, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x1}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r4 = perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x5) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{}, &(0x7f0000000240), &(0x7f0000000280)='%pS \x00'}, 0x20) r5 = perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0xf6, 0x1, 0x8, 0x9, 0x0, 0x9, 0xc080, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x1, 0xf8fe, 0x5, 0x2, 0x332b, 0x9, 0x9, 0x0, 0x2, 0x0, 0x1}, 0x0, 0x8, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x7) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d8, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x3000c041) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000604000000002e"], 0x0, 0x37}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r6, 0x0, 0x0}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) close(r7) ioctl$SIOCSIFHWADDR(r7, 0x8b34, 0x0) write$cgroup_pressure(r7, &(0x7f0000000180)={'full', 0x20, 0x5, 0x20, 0x6}, 0x2f) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e00000003000000070000000400000000000100", @ANYRES32, @ANYBLOB="0200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0400000001000000010000000a00"/24, @ANYRES32=r7, @ANYBLOB="e01b5619f8ff0c0a357b404ce76bfdcc969dfc5dba7dc6d0fc727b2312dfab3c632b5608c495c294fc3b751dc1379912a4095374bfb29f49898bcd2160ba97f3fec77edbefb37bc5ebe273545a5320ad4a9a484bab4b6850ed5947b7e9259b17dc37480cbc2c88f94028"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x84) recvmsg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x102) socket$kcm(0xa, 0x3, 0x3a) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000140)="2e00000010008188040f80ec59acbc0413a1f8480d0000005e140602000000000e000a00100000000580607ee622", 0x2e}], 0x1}, 0x0) 886.764401ms ago: executing program 0 (id=7265): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b40200000000f21f61118c000000000085000000ce0000009500000000000000"], &(0x7f0000000380)='GPL\x00', 0x4, 0xc3, &(0x7f00000003c0)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000100), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x37) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000580)="d8000000140081044e81f782db44b9040a1d08020a0000001b0000a118000200ff11000000000e1208000f0100810401a80016ea1f0008400304000803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef075c0100000000000000cb090000001fb791643a5ee4001b146218a07445d6d930dfe1d9d322fe7c9fd68775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e0060000000000000080bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd68adbef3d93452a00"/216, 0xd8}], 0x1, 0x0, 0x0, 0x7400}, 0x8800) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x9, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200), &(0x7f0000000240)=[0x0], 0x0, 0x1c, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x41, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x6, [@float={0xb, 0x0, 0x0, 0x10, 0x4}, @volatile={0xc}, @decl_tag={0x3, 0x0, 0x0, 0x11, 0x4, 0xa}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x1, 0x9000}}]}, {0x0, [0x5f, 0x5f, 0x0, 0x61]}}, &(0x7f0000000680)=""/212, 0x5e, 0xd4, 0x1, 0x3, 0x10000}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b00)={0xffffffffffffffff, 0xe0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000880)=[0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0], 0x0, 0xc7, &(0x7f0000000900)=[{}], 0x8, 0x10, &(0x7f0000000940), &(0x7f0000000980), 0x8, 0xae, 0x8, 0x8, &(0x7f00000009c0)}}, 0x10) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d00)={0x6, 0x4, &(0x7f0000000b40)=@raw=[@cb_func={0x18, 0xc, 0x4, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}], &(0x7f0000000b80)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x13, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000c00)={0x4, 0xf, 0x1, 0x3}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c40)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000c80)=[{0x4, 0x5, 0xe, 0xb}, {0x2, 0x4, 0xc, 0x6}, {0x1, 0x4, 0x6, 0x3}, {0x5, 0x3, 0x5, 0x7}, {0x1, 0x3, 0xe, 0x7}], 0x10, 0x8}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000008"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x17}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f00000006c0)=ANY=[@ANYBLOB="8f03000000000060007538e486dd630ace2211052f00fe800000fe800000875a65059ff57b00000000000000000000000000ac1414aa000088a8"], 0xcfa4) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000dc0)={0x0, 0xfff, 0x18}, 0xc) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001140)=r5, 0x4) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xfffffffc}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x7, 0x17, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r10}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{}, {0x27}}, [@printk={@p, {}, {0x5, 0x1, 0xb, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x40007}, {0x56}}], {{0x4, 0x1, 0x2, 0x3}, {0x5, 0x0, 0xb, 0x3}, {0x85, 0x0, 0x0, 0x76}}}, &(0x7f0000001000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0}}, 0x10) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x20, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', r11, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r12, 0x0, 0x22, 0x0, &(0x7f0000000380)="f6f4e9a1d78ad62ceef1884386dd78bb3fb7dbfc8180ca8395ccfda2e499b3dcf581", 0x0, 0xa1b, 0x0, 0x2f, 0x0, &(0x7f0000000700)="010a", 0x0}, 0x50) r13 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000e00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xf, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x50) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e80)={0xffffffffffffffff, 0x60}, 0xc) r15 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x19, 0x4, 0x4, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r15}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10}, {}, {0x4}, {0x6, 0x0, 0xa}, {}, {}, {0x85, 0x0, 0x0, 0x33}}]}, &(0x7f0000000080)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r16 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000ec0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xfffffff8, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000fc0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000f40), &(0x7f0000000f80)='%+9llu \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x10, 0x14, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfa8, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}, @jmp={0x5, 0x0, 0xa, 0xb, 0x1, 0xfffffffffffffffe, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x9}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x4, '\x00', r2, @sk_msg=0x7, r3, 0x8, &(0x7f00000007c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000800)={0x3, 0xc, 0x3, 0x7}, 0x10, r4, r5, 0x1, &(0x7f0000001000)=[r9, r10, 0xffffffffffffffff, r13, r14, r15, r0, r16, r17], &(0x7f0000001040)=[{0x4, 0x5, 0xa, 0x8}], 0x10, 0x70000000}, 0x94) socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2b, 0x2, 0x0) 755.970675ms ago: executing program 1 (id=7266): socket$kcm(0x10, 0x3, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000002000000000000000100008400060000000000000300000000000000000000000000000d00000000000000000000000902"], 0x0, 0x4a}, 0x28) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) r1 = socket$kcm(0x2, 0x5, 0x84) socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0xffffffff, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x64, &(0x7f0000000000)=r4, 0x10) r5 = socket$kcm(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) setsockopt$sock_attach_bpf(r5, 0x84, 0x64, &(0x7f0000000000), 0x10) 593.83636ms ago: executing program 1 (id=7267): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0xa, 0x2, 0x11) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') close(r1) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x40200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2420, 0x0, 0x0, 0x3, 0x3, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000004080000000000000002000000000000000000000002000000000000000000000000000002000000000000000000000004"], 0x0, 0x56}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x1, 0xf, 0x2, 0xff, 0x0, 0x0, 0x2, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={0x0, 0x1}, 0x80000, 0xca, 0x0, 0x5, 0xdf1d, 0x400000, 0x0, 0x0, 0xe, 0x0, 0x8}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x6) recvmsg$unix(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0}, 0x1c0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES8=r1, @ANYBLOB="3eca", @ANYRES8=r2], 0x9a) 582.592371ms ago: executing program 0 (id=7268): r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xfffffffffffffffc}, 0x104101, 0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$kcm(0x10, 0x3, 0x10) socketpair(0x3, 0x5, 0x9, &(0x7f00000000c0)) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030033000b35d25a806c8c6f94f91824fc60100005000a000200053582c137153e37000c0680050003000300", 0x33fe0}], 0x1}, 0x0) 537.373532ms ago: executing program 2 (id=7269): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$kcm(0x1e, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x19, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000dc0)=ANY=[@ANYBLOB="7a0af8ff7525707cbfa100000000000007010000f8ffffffb702000005000000bf130000000000008500000006000000b700000000000000950000ff00000000b2595285faa6ead0169191d54f8196217fc563e2fc91f6da4dad4fdc2eb1b5986fc4a3f611a7c80000040000000000b1a297cfddd73f30f2382f6cda4bfdd45be583823c0f092248a57d48621f3c1c65ee19ee875daf45006a4c4ea5e15b2f9618d547244a22000000000800db583620ce7243d1ae9f2cfe401dbef6619358399aa9c2acd068c03efefd8bc77edf2d34b12cd48a1b20fb7dd843267e0331759f4ec6b5b0af58e604f494eff289026d5045ef08000000000000007718a09f4800afc26abba34635d0e8b598a51bc742135a6e1d33fe226c944bc70bb30d435aa8b5202db761014b1b999a12df6bee431a6681000000263b6233e1c0fe30e384c3cb07b74a72291a1a2b523dd81b6651b1ee48e999bb004823ebcd8c65743f31f84b263ab9b3426692f01ad194f302d7a658e90000000001000000b6b2f25ddb8c640ab321a402058c9221b6870814cf4ee23ddb79fff5eb156e0a000000000000f2bd1d4a178d86d6935eb8b75bc4eb680d10e8b6a54c5c5b011cf63ff76622939a20d4aadf85db40179c2cf83ee07e30a279d8f9f3bc282deb53a03409f8e6972f3f720d045923702cede0f3e91411f3f1b16f065624f280a7dcce8db910f93c49b9e0aa390d0da6972ed719d7e0efb2bb713d1890e317c8de105c3933fd5d5bf38f6b9fc39fc829dcfe4af8"], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x200000e, 0xe, 0x55, &(0x7f0000000140)="a06ad876d56a0064d082778c3938", &(0x7f0000000380)=""/85, 0x600, 0x4000000}, 0x28) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) 212.661263ms ago: executing program 0 (id=7270): bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x3a, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="020000000400000008000000010000"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000bc0)={{r1, 0xffffffffffffffff}, &(0x7f0000000c00), &(0x7f0000000080)='%+9llu \x00'}, 0x1c) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2, r1}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x16, 0x10, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000341200007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x6, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r3, 0x0, 0xe, 0x0, &(0x7f0000000040)="f4b84de4115d64244a0e839e8971", 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 189.786164ms ago: executing program 2 (id=7271): perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x80, 0x18, 0x10, 0x40, 0x0, 0x0, 0x8001, 0x1200, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xc000000000000, 0x78e}, 0xa080, 0x6, 0x8fd, 0x9, 0xfff, 0x8, 0x2, 0x0, 0x5, 0x0, 0x7fff}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xed, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9b2, 0x9}, 0x114581, 0x4, 0x0, 0x1, 0x802, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000680)=""/140, 0x8c}], 0x1, &(0x7f0000002f40)=""/229, 0xe5}, 0x40000004) sendmsg$tipc(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="b8d3d8e48974aae5039847936746be1d81a34f9b68100dbf05177b2436f9d642df271fd6b9aa6701365ffc72380000000001000000fcf2fbb053e277a04d3f44e3f9bafec64080f64f103ee1de769e5e9dd8cbb68869a662eaad499c52a16f40cb3a1f6f3d5f8df14c53b2", 0x6b}, {&(0x7f0000000840)="8d03cab9cbe923f2ab882de5", 0xc}], 0x2, 0x0, 0x0, 0x400c800}, 0x4000000) close(r1) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="d8000000180081054e81f782db4cb904021d0800fe007c05e8fe55a10a0015000200142603600e12080005007f370401a8001600200006000400027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2e98a61e284ce5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e970392", 0xd8}], 0x1}, 0x0) 93.969937ms ago: executing program 1 (id=7272): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904, 0xd3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x76}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x4) close(r3) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYBLOB], 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000001"], 0x50) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="03000000040000000400"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="18060000000003000000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x9, &(0x7f0000001d00)=ANY=[@ANYBLOB="80405000080000001826000041df8b004d25bc77f07fc19d2b83f33887dcbe75cedc14fdc9b5651d28122d000beb6b7bb6eef478ca086e3344547b96ee04eb9938b1327c0d36061fe5d73ed19707e48d6e18ff3cb6f7340367105987dfb8afe10da0b8ebbcbfb06fbe2eb6fb0b814cf98d7a604de992a6ca030c92523d306315e43194c2502742a19ac0fcfabe148c0e49704ad789f7a133776ceb67f21cade38666ae5e29066ddc5ea2d1f84263", @ANYRES32=r5, @ANYBLOB="000000007f00000018190000", @ANYRES32=r4, @ANYBLOB="000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7020000000000008500000086000000"], &(0x7f0000000580)='syzkaller\x00', 0x7, 0x9f, &(0x7f0000000a00)=""/159, 0x40f00, 0x35, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x4, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000b40)=[r6, r5], 0x0, 0x10, 0xbcd}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r7, 0xe0, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)=[0x0], 0x0, 0x0, 0x46, &(0x7f0000000700)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x6a, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001c00)={r2, 0xe0, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000001880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000001980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000019c0), 0x0, 0x41, &(0x7f0000001a00)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001a40), &(0x7f0000001a80), 0x8, 0x91, 0x8, 0x8, &(0x7f0000001ac0)}}, 0x10) sendmsg$inet(r3, &(0x7f0000000240)={0x0, 0x20, &(0x7f0000000080)=[{&(0x7f0000000780)="5c00000013006bcc9e3be35c6e17aa31076b876c1d0000007ea60864160af36514000cc008001900030002000600010003800000000056a705251e638294ff0051f60a84c9f4d4938037e786a6d072c6c95300"/92, 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 0s ago: executing program 0 (id=7273): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x20000001) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000000c0)="6880a642beaf34317f0dd3122a90ad0d2b", 0x11}], 0x2d}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x4) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff274, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = openat$cgroup_int(r0, &(0x7f0000000680)='blkio.throttle.write_iops_device\x00', 0x2, 0x0) r4 = syz_clone(0x48400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x420}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$unix(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000040)="f1beab7c2152ffe988948b7258b993bd33e1bd2ac8aa574711e1cb56105cd212658d6a29a952780f6ea2e5f1721ac46a54eba7899dd0a842d370e832eac5ce2437c1ea", 0x43}, {&(0x7f0000000100)="ac6e36ad293da303af3dc00525b2322a186badc2f68af728ba0330f10d38edaff4e7cb820eba4d0bf928998dc8d03585e35dfb545ffa4415ba9b5550303928496568105c654e3949a3214688fe754c6b16e49ab728e8a65e74e2ff359b58556943feee676d1c8e5fb96f1e374ce8c1ccf014e4b24a5b42c4f8ce44306efb19a6ba9d2088ca08b8f8cf50df348a2de42a761aa19148dbb9116d1955d365b1ddd54de0626dbda95b5c61588c6f0f3e1d9068f5b21aac99fc1227bbdebc4e89533174", 0xc1}, {&(0x7f0000000200)="932ecb0352fa4d735b34f6e0477d7c3c7c5d7598da62f9044219fd70c852cf8c9fc198f9e48ec950d9645fbb47019613d63d4e51ef5e35d2f303b9ac10a02fbb1823ff3bfdc379f376a716cc4bf16e7c9f2c43833cbf06aed95587f8625561033ae60f14f0c874ad0682c17915b833a761eab19ea296", 0x76}, {&(0x7f00000002c0)="ac01325539c321733b49946a3293c4cf2b12d54eeb151e255d6cfe03d3c57b735f1bc8543ef9e75a", 0x28}, {&(0x7f0000000380)="7154c257e64db80de72b2dc28bd739d895d5aebcd3500069f5b6fc2dbfb6b67ead1ca6d023b4b15cf46007578d33ace2dfa08d8b6dc168983af12cf6db1505cdb707e6f0160bee144152290952d57f7e5809f26c5056aab3b37b38f93119ac812ff9b76879ccaf56349fde00c4dd97a66077c14e06110da997b6d478b23b2e62b638036b3917bd4e158ab84a9fef8022f465d6aeddaf481a38e1e2426eaa657841aef5b137b3c982c293e1db368d1ca17eef82256f97f916b5d485f9eff7e5d64170a1c4d9a1ffde3f73372c594a42e1265556ded6afd53a", 0xd8}, {&(0x7f0000000580)="1999d3057608f7814a3bc57da97428aaab545d0018b9a1f37e5169edbf4385993e5cc9611b3bc3d8eb2da58a34330201f0725173ebdba245cf90d3fdacf4b3ae3b7cd8e333002f63768d09d6e3c7f00b5b2804cb7019036cd60a4c", 0x5b}], 0x6, &(0x7f00000007c0)=[@cred={{0x1c, 0x1, 0x2, {r2, 0xee01, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r3, r1]}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee00, 0xee01}}}], 0x58, 0xc0}, 0x40800) r5 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x5}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000000540)={0x0, 0xc027, &(0x7f0000000340)=[{&(0x7f00000000c0)="97eb000014006bcd9e", 0xeb97}], 0x1, 0x0, 0x0, 0x1f000000}, 0x600) kernel console output (not intermixed with test programs): 376.731951][T26145] ? perf_trace_lock_acquire+0x104/0x410 [ 1376.737654][T26145] should_fail_ex+0x39d/0x4d0 [ 1376.742397][T26145] should_failslab+0x9/0x20 [ 1376.746957][T26145] slab_pre_alloc_hook+0x59/0x310 [ 1376.752053][T26145] ? bpf_prog_test_run_skb+0x238/0x12b0 [ 1376.757659][T26145] ? bpf_prog_test_run_skb+0x238/0x12b0 [ 1376.763277][T26145] __kmem_cache_alloc_node+0x53/0x250 [ 1376.768720][T26145] ? bpf_prog_test_run_skb+0x238/0x12b0 [ 1376.774325][T26145] __kmalloc+0xa4/0x230 [ 1376.778581][T26145] bpf_prog_test_run_skb+0x238/0x12b0 [ 1376.784012][T26145] ? lockdep_hardirqs_on+0x98/0x150 [ 1376.789261][T26145] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1376.795463][T26145] ? cpu_online+0x60/0x60 [ 1376.799821][T26145] bpf_prog_test_run+0x321/0x390 [ 1376.804789][T26145] __sys_bpf+0x49d/0x890 [ 1376.809064][T26145] ? bpf_link_show_fdinfo+0x390/0x390 [ 1376.814482][T26145] __x64_sys_bpf+0x7c/0x90 [ 1376.818927][T26145] do_syscall_64+0x55/0xa0 [ 1376.823389][T26145] ? clear_bhb_loop+0x40/0x90 [ 1376.828124][T26145] ? clear_bhb_loop+0x40/0x90 [ 1376.832851][T26145] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1376.838789][T26145] RIP: 0033:0x7f601e79ce59 [ 1376.843237][T26145] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1376.862877][T26145] RSP: 002b:00007f601c9f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1376.871327][T26145] RAX: ffffffffffffffda RBX: 00007f601ea15fa0 RCX: 00007f601e79ce59 [ 1376.879325][T26145] RDX: 0000000000000050 RSI: 00002000000003c0 RDI: 000000000000000a [ 1376.887315][T26145] RBP: 00007f601c9f6090 R08: 0000000000000000 R09: 0000000000000000 [ 1376.895311][T26145] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1376.903306][T26145] R13: 00007f601ea16038 R14: 00007f601ea15fa0 R15: 00007ffe33fca7e8 [ 1376.911323][T26145] [ 1377.026156][T26154] netlink: 9286 bytes leftover after parsing attributes in process `syz.3.6381'. [ 1378.118795][T26168] netlink: 144 bytes leftover after parsing attributes in process `syz.3.6385'. [ 1378.576365][T26168] team0: Port device team_slave_0 removed [ 1378.615217][T26168] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 1378.676802][T26172] netlink: 'syz.0.6386': attribute type 21 has an invalid length. [ 1378.732032][T26172] netlink: 'syz.0.6386': attribute type 6 has an invalid length. [ 1378.761974][T26172] netlink: 132 bytes leftover after parsing attributes in process `syz.0.6386'. [ 1378.897825][T26180] netlink: 'syz.2.6387': attribute type 10 has an invalid length. [ 1378.916431][T26180] netlink: 184348 bytes leftover after parsing attributes in process `syz.2.6387'. [ 1378.942290][T26180] openvswitch: netlink: Flow key attr not present in new flow. [ 1379.896143][T26191] netlink: 'syz.3.6391': attribute type 10 has an invalid length. [ 1380.280627][T26204] netlink: 'syz.2.6397': attribute type 2 has an invalid length. [ 1380.312075][T26204] netlink: 132 bytes leftover after parsing attributes in process `syz.2.6397'. [ 1380.693955][T26206] netlink: 'syz.1.6398': attribute type 21 has an invalid length. [ 1380.725880][T26206] netlink: 'syz.1.6398': attribute type 6 has an invalid length. [ 1380.764234][T26206] netlink: 132 bytes leftover after parsing attributes in process `syz.1.6398'. [ 1381.042677][T26220] netlink: 'syz.2.6403': attribute type 10 has an invalid length. [ 1381.878251][T26232] netlink: 'syz.3.6408': attribute type 1 has an invalid length. [ 1381.903631][T26232] netlink: 168864 bytes leftover after parsing attributes in process `syz.3.6408'. [ 1382.425549][T26246] netlink: 'syz.3.6413': attribute type 2 has an invalid length. [ 1382.440027][T26246] netlink: 132 bytes leftover after parsing attributes in process `syz.3.6413'. [ 1382.522934][T26246] netlink: 48 bytes leftover after parsing attributes in process `syz.3.6413'. [ 1382.589630][T26244] netlink: 132 bytes leftover after parsing attributes in process `syz.1.6412'. [ 1383.898435][T26268] validate_nla: 3 callbacks suppressed [ 1383.898457][T26268] netlink: 'syz.3.6422': attribute type 29 has an invalid length. [ 1383.953246][T26268] netlink: 'syz.3.6422': attribute type 29 has an invalid length. [ 1383.989968][T26268] netlink: 'syz.3.6422': attribute type 29 has an invalid length. [ 1384.105821][T26276] netlink: 'syz.0.6424': attribute type 2 has an invalid length. [ 1384.132484][T26276] netlink: 'syz.0.6424': attribute type 8 has an invalid length. [ 1384.154631][T26276] netlink: 132 bytes leftover after parsing attributes in process `syz.0.6424'. [ 1384.209355][T26273] netlink: 48 bytes leftover after parsing attributes in process `syz.0.6424'. [ 1384.279674][T26268] netlink: 208092 bytes leftover after parsing attributes in process `syz.3.6422'. [ 1384.313339][T26268] netlink: 'syz.3.6422': attribute type 1 has an invalid length. [ 1384.338744][T26268] netlink: 'syz.3.6422': attribute type 2 has an invalid length. [ 1384.353582][T26268] netlink: 'syz.3.6422': attribute type 3 has an invalid length. [ 1384.367912][T26280] netlink: 'syz.2.6425': attribute type 21 has an invalid length. [ 1384.371564][T26268] netlink: 'syz.3.6422': attribute type 4 has an invalid length. [ 1384.395459][T26280] netlink: 132 bytes leftover after parsing attributes in process `syz.2.6425'. [ 1384.848293][T26289] hsr0: entered promiscuous mode [ 1384.855707][T26289] hsr0: left allmulticast mode [ 1384.860561][T26289] hsr_slave_0: left allmulticast mode [ 1384.878794][T26289] hsr_slave_1: left allmulticast mode [ 1384.889733][T26289] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 1385.355373][T26299] FAULT_INJECTION: forcing a failure. [ 1385.355373][T26299] name failslab, interval 1, probability 0, space 0, times 0 [ 1385.391266][T26299] CPU: 0 PID: 26299 Comm: syz.1.6432 Not tainted syzkaller #0 [ 1385.398831][T26299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1385.408942][T26299] Call Trace: [ 1385.412272][T26299] [ 1385.415239][T26299] dump_stack_lvl+0x18c/0x250 [ 1385.419986][T26299] ? show_regs_print_info+0x20/0x20 [ 1385.425248][T26299] ? load_image+0x420/0x420 [ 1385.429822][T26299] ? __might_sleep+0xe0/0xe0 [ 1385.434469][T26299] ? __lock_acquire+0x7d40/0x7d40 [ 1385.439568][T26299] should_fail_ex+0x39d/0x4d0 [ 1385.444314][T26299] should_failslab+0x9/0x20 [ 1385.448870][T26299] slab_pre_alloc_hook+0x59/0x310 [ 1385.453965][T26299] ? tomoyo_encode+0x28b/0x540 [ 1385.458775][T26299] ? tomoyo_encode+0x28b/0x540 [ 1385.463590][T26299] __kmem_cache_alloc_node+0x53/0x250 [ 1385.469030][T26299] ? tomoyo_encode+0x28b/0x540 [ 1385.473844][T26299] __kmalloc+0xa4/0x230 [ 1385.478065][T26299] tomoyo_encode+0x28b/0x540 [ 1385.482712][T26299] tomoyo_realpath_from_path+0x592/0x5d0 [ 1385.488411][T26299] tomoyo_path_number_perm+0x248/0x620 [ 1385.493938][T26299] ? tomoyo_path_number_perm+0x217/0x620 [ 1385.499635][T26299] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 1385.505166][T26299] ? ksys_write+0x1c4/0x260 [ 1385.509763][T26299] ? __fget_files+0x28/0x4b0 [ 1385.514413][T26299] ? __fget_files+0x28/0x4b0 [ 1385.519080][T26299] security_file_ioctl+0x70/0xa0 [ 1385.524089][T26299] __se_sys_ioctl+0x48/0x170 [ 1385.528738][T26299] do_syscall_64+0x55/0xa0 [ 1385.533203][T26299] ? clear_bhb_loop+0x40/0x90 [ 1385.537932][T26299] ? clear_bhb_loop+0x40/0x90 [ 1385.542672][T26299] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1385.548617][T26299] RIP: 0033:0x7f601e79ce59 [ 1385.553076][T26299] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1385.572746][T26299] RSP: 002b:00007f601c9f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1385.581217][T26299] RAX: ffffffffffffffda RBX: 00007f601ea15fa0 RCX: 00007f601e79ce59 [ 1385.589289][T26299] RDX: 0000200000000040 RSI: 0000000000008915 RDI: 0000000000000006 [ 1385.597318][T26299] RBP: 00007f601c9f6090 R08: 0000000000000000 R09: 0000000000000000 [ 1385.605340][T26299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1385.613363][T26299] R13: 00007f601ea16038 R14: 00007f601ea15fa0 R15: 00007ffe33fca7e8 [ 1385.621408][T26299] [ 1385.978650][T26299] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1386.218841][T26308] netlink: 132 bytes leftover after parsing attributes in process `syz.3.6435'. [ 1387.007724][T26335] netlink: 9286 bytes leftover after parsing attributes in process `syz.3.6443'. [ 1387.847804][T26342] netlink: 132 bytes leftover after parsing attributes in process `syz.2.6445'. [ 1388.604426][T26366] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6453'. [ 1388.654024][T26372] netlink: 60 bytes leftover after parsing attributes in process `syz.2.6456'. [ 1388.726227][T26372] netlink: 60 bytes leftover after parsing attributes in process `syz.2.6456'. [ 1388.846793][T26370] openvswitch: netlink: ufid size 3064 bytes exceeds the range (1, 16) [ 1388.868621][T26370] openvswitch: netlink: Flow set message rejected, Key attribute missing. [ 1389.116714][T26387] validate_nla: 10 callbacks suppressed [ 1389.116735][T26387] netlink: 'syz.2.6460': attribute type 10 has an invalid length. [ 1389.754774][T26409] netlink: 'syz.1.6467': attribute type 21 has an invalid length. [ 1389.765104][T26409] netlink: 'syz.1.6467': attribute type 6 has an invalid length. [ 1389.782789][T26409] __nla_validate_parse: 4 callbacks suppressed [ 1389.782806][T26409] netlink: 132 bytes leftover after parsing attributes in process `syz.1.6467'. [ 1390.405858][T26424] netlink: 'syz.0.6471': attribute type 10 has an invalid length. [ 1391.355404][T26448] netlink: 'syz.2.6480': attribute type 21 has an invalid length. [ 1391.382063][T26448] netlink: 'syz.2.6480': attribute type 6 has an invalid length. [ 1391.402072][T26448] netlink: 132 bytes leftover after parsing attributes in process `syz.2.6480'. [ 1391.509659][T26459] netlink: 'syz.1.6485': attribute type 64 has an invalid length. [ 1391.653518][T26467] netlink: 'syz.0.6484': attribute type 10 has an invalid length. [ 1392.805987][T26499] netlink: 'syz.1.6495': attribute type 21 has an invalid length. [ 1392.841285][T26499] netlink: 'syz.1.6495': attribute type 6 has an invalid length. [ 1392.851353][T26499] netlink: 132 bytes leftover after parsing attributes in process `syz.1.6495'. [ 1392.862089][T20720] Bluetooth: hci3: ISO packet for unknown connection handle 12 [ 1393.813900][T26537] netlink: 132 bytes leftover after parsing attributes in process `syz.3.6506'. [ 1394.012201][T26535] netlink: 40 bytes leftover after parsing attributes in process `syz.1.6505'. [ 1394.049745][T26535] A link change request failed with some changes committed already. Interface veth1_virt_wifi may have been left with an inconsistent configuration, please check. [ 1394.447941][T26543] netlink: 763 bytes leftover after parsing attributes in process `syz.3.6507'. [ 1395.101566][T26564] validate_nla: 10 callbacks suppressed [ 1395.101590][T26564] netlink: 'syz.0.6515': attribute type 21 has an invalid length. [ 1395.120058][T26560] FAULT_INJECTION: forcing a failure. [ 1395.120058][T26560] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1395.126294][T26564] netlink: 'syz.0.6515': attribute type 6 has an invalid length. [ 1395.144494][T26560] CPU: 1 PID: 26560 Comm: syz.3.6514 Not tainted syzkaller #0 [ 1395.152060][T26560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1395.162197][T26560] Call Trace: [ 1395.164352][T26564] netlink: 132 bytes leftover after parsing attributes in process `syz.0.6515'. [ 1395.165521][T26560] [ 1395.165538][T26560] dump_stack_lvl+0x18c/0x250 [ 1395.182352][T26560] ? show_regs_print_info+0x20/0x20 [ 1395.187661][T26560] ? load_image+0x420/0x420 [ 1395.192275][T26560] ? __might_fault+0xaa/0x120 [ 1395.197057][T26560] ? __lock_acquire+0x7d40/0x7d40 [ 1395.202192][T26560] should_fail_ex+0x39d/0x4d0 [ 1395.206987][T26560] _copy_from_user+0x2f/0xe0 [ 1395.211677][T26560] ___sys_sendmsg+0x1c7/0x360 [ 1395.216465][T26560] ? __sys_sendmsg+0x2a0/0x2a0 [ 1395.221392][T26560] ? __lock_acquire+0x7d40/0x7d40 [ 1395.226614][T26560] __se_sys_sendmsg+0x1c2/0x2b0 [ 1395.231576][T26560] ? __x64_sys_sendmsg+0x80/0x80 [ 1395.236662][T26560] ? lockdep_hardirqs_on+0x98/0x150 [ 1395.241971][T26560] do_syscall_64+0x55/0xa0 [ 1395.246477][T26560] ? clear_bhb_loop+0x40/0x90 [ 1395.251245][T26560] ? clear_bhb_loop+0x40/0x90 [ 1395.256018][T26560] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1395.262006][T26560] RIP: 0033:0x7fdb0199ce59 [ 1395.266495][T26560] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1395.286193][T26560] RSP: 002b:00007fdb027ae028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1395.294714][T26560] RAX: ffffffffffffffda RBX: 00007fdb01c15fa0 RCX: 00007fdb0199ce59 [ 1395.302780][T26560] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000007 [ 1395.310824][T26560] RBP: 00007fdb027ae090 R08: 0000000000000000 R09: 0000000000000000 [ 1395.318880][T26560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1395.326932][T26560] R13: 00007fdb01c16038 R14: 00007fdb01c15fa0 R15: 00007ffe85e0f308 [ 1395.335059][T26560] [ 1395.733930][T26580] netlink: 'syz.2.6517': attribute type 64 has an invalid length. [ 1396.045209][T26587] netlink: 209852 bytes leftover after parsing attributes in process `syz.1.6520'. [ 1396.123064][T26587] openvswitch: netlink: ufid size 3064 bytes exceeds the range (1, 16) [ 1396.131423][T26587] openvswitch: netlink: Flow set message rejected, Key attribute missing. [ 1396.223250][T26599] netlink: 'syz.0.6524': attribute type 27 has an invalid length. [ 1396.231608][T26599] netlink: 'syz.0.6524': attribute type 3 has an invalid length. [ 1396.257624][T26599] netlink: 132 bytes leftover after parsing attributes in process `syz.0.6524'. [ 1396.789161][T26610] netlink: 'syz.1.6526': attribute type 21 has an invalid length. [ 1396.826111][T26610] netlink: 'syz.1.6526': attribute type 6 has an invalid length. [ 1396.853135][T26610] netlink: 132 bytes leftover after parsing attributes in process `syz.1.6526'. [ 1397.352342][T26622] netlink: 'syz.0.6530': attribute type 10 has an invalid length. [ 1397.620595][T26625] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1398.055627][T26641] netlink: 'syz.0.6537': attribute type 7 has an invalid length. [ 1398.107550][T26640] netlink: 209852 bytes leftover after parsing attributes in process `syz.3.6536'. [ 1398.140341][T26640] openvswitch: netlink: ufid size 3064 bytes exceeds the range (1, 16) [ 1398.203538][T26640] openvswitch: netlink: Flow set message rejected, Key attribute missing. [ 1398.293473][T26646] netlink: 'syz.0.6539': attribute type 21 has an invalid length. [ 1398.312723][T26646] netlink: 132 bytes leftover after parsing attributes in process `syz.0.6539'. [ 1398.650343][T26653] netlink: 152 bytes leftover after parsing attributes in process `syz.3.6541'. [ 1398.768522][T26653] netlink: 152 bytes leftover after parsing attributes in process `syz.3.6541'. [ 1398.813233][T26656] netlink: 12 bytes leftover after parsing attributes in process `syz.0.6540'. [ 1399.221057][T20720] Bluetooth: hci0: unexpected event 0x05 length: 15 > 4 [ 1400.069461][T26686] netlink: 164 bytes leftover after parsing attributes in process `syz.0.6551'. [ 1400.133213][T26681] validate_nla: 6 callbacks suppressed [ 1400.133235][T26681] netlink: 'syz.1.6548': attribute type 21 has an invalid length. [ 1400.192178][T26681] netlink: 'syz.1.6548': attribute type 6 has an invalid length. [ 1400.217528][T26681] netlink: 132 bytes leftover after parsing attributes in process `syz.1.6548'. [ 1400.244763][T26685] FAULT_INJECTION: forcing a failure. [ 1400.244763][T26685] name failslab, interval 1, probability 0, space 0, times 0 [ 1400.303669][T26685] CPU: 1 PID: 26685 Comm: syz.3.6550 Not tainted syzkaller #0 [ 1400.311242][T26685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1400.321366][T26685] Call Trace: [ 1400.324709][T26685] [ 1400.327687][T26685] dump_stack_lvl+0x18c/0x250 [ 1400.332439][T26685] ? show_regs_print_info+0x20/0x20 [ 1400.337703][T26685] ? load_image+0x420/0x420 [ 1400.342278][T26685] ? __might_sleep+0xe0/0xe0 [ 1400.346934][T26685] ? __lock_acquire+0x7d40/0x7d40 [ 1400.352029][T26685] should_fail_ex+0x39d/0x4d0 [ 1400.356786][T26685] should_failslab+0x9/0x20 [ 1400.361356][T26685] slab_pre_alloc_hook+0x59/0x310 [ 1400.366452][T26685] ? fib6_info_alloc+0x30/0xf0 [ 1400.371291][T26685] ? fib6_info_alloc+0x30/0xf0 [ 1400.376112][T26685] __kmem_cache_alloc_node+0x53/0x250 [ 1400.381544][T26685] ? fib6_get_table+0x39/0x260 [ 1400.386377][T26685] ? fib6_info_alloc+0x30/0xf0 [ 1400.391200][T26685] __kmalloc+0xa4/0x230 [ 1400.395421][T26685] fib6_info_alloc+0x30/0xf0 [ 1400.400091][T26685] ip6_route_info_create+0x44f/0x1240 [ 1400.405522][T26685] ? nla_memcpy+0x59/0xb0 [ 1400.409910][T26685] ? nla_find+0x12a/0x150 [ 1400.414299][T26685] inet6_rtm_newroute+0x5ae/0x1c90 [ 1400.419484][T26685] ? ipv6_route_sysctl_table_size+0x50/0x50 [ 1400.425472][T26685] ? do_raw_spin_unlock+0x121/0x230 [ 1400.430743][T26685] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 1400.435910][T26685] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 1400.441077][T26685] ? ipv6_route_sysctl_table_size+0x50/0x50 [ 1400.447021][T26685] rtnetlink_rcv_msg+0x869/0xfa0 [ 1400.452012][T26685] ? rtnetlink_bind+0x80/0x80 [ 1400.456729][T26685] ? perf_trace_preemptirq_template+0xac/0x330 [ 1400.462929][T26685] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 1400.468954][T26685] ? lock_chain_count+0x20/0x20 [ 1400.473844][T26685] ? __local_bh_enable_ip+0x13a/0x1c0 [ 1400.479263][T26685] ? lockdep_hardirqs_on+0x98/0x150 [ 1400.484494][T26685] ? __local_bh_enable_ip+0x13a/0x1c0 [ 1400.489892][T26685] ? _local_bh_enable+0xa0/0xa0 [ 1400.494784][T26685] ? __dev_queue_xmit+0x265/0x3660 [ 1400.499929][T26685] ? __dev_queue_xmit+0x265/0x3660 [ 1400.505082][T26685] ? __dev_queue_xmit+0x1b2c/0x3660 [ 1400.510330][T26685] ? __dev_queue_xmit+0x265/0x3660 [ 1400.515495][T26685] ? perf_trace_lock+0xfc/0x3b0 [ 1400.520386][T26685] netlink_rcv_skb+0x241/0x4d0 [ 1400.525190][T26685] ? rtnetlink_bind+0x80/0x80 [ 1400.529911][T26685] ? netlink_ack+0x1180/0x1180 [ 1400.534712][T26685] ? __lock_acquire+0x7d40/0x7d40 [ 1400.539781][T26685] ? netlink_deliver_tap+0x2e/0x1b0 [ 1400.545037][T26685] netlink_unicast+0x751/0x8d0 [ 1400.549847][T26685] netlink_sendmsg+0x8d0/0xbf0 [ 1400.554657][T26685] ? netlink_getsockopt+0x590/0x590 [ 1400.559891][T26685] ? aa_sock_msg_perm+0x94/0x150 [ 1400.564864][T26685] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 1400.570176][T26685] ? security_socket_sendmsg+0x80/0xa0 [ 1400.575672][T26685] ? netlink_getsockopt+0x590/0x590 [ 1400.580906][T26685] ____sys_sendmsg+0x5ba/0x960 [ 1400.585702][T26685] ? __asan_memset+0x22/0x40 [ 1400.590400][T26685] ? __sys_sendmsg_sock+0x30/0x30 [ 1400.595464][T26685] ? __import_iovec+0x5f2/0x850 [ 1400.600362][T26685] ? import_iovec+0x73/0xa0 [ 1400.604890][T26685] ___sys_sendmsg+0x2a6/0x360 [ 1400.609602][T26685] ? __sys_sendmsg+0x2a0/0x2a0 [ 1400.614410][T26685] ? __lock_acquire+0x7d40/0x7d40 [ 1400.619484][T26685] __se_sys_sendmsg+0x1c2/0x2b0 [ 1400.624363][T26685] ? __x64_sys_sendmsg+0x80/0x80 [ 1400.629344][T26685] ? lockdep_hardirqs_on+0x98/0x150 [ 1400.634575][T26685] do_syscall_64+0x55/0xa0 [ 1400.639015][T26685] ? clear_bhb_loop+0x40/0x90 [ 1400.643723][T26685] ? clear_bhb_loop+0x40/0x90 [ 1400.648444][T26685] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1400.654371][T26685] RIP: 0033:0x7fdb0199ce59 [ 1400.658807][T26685] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1400.678467][T26685] RSP: 002b:00007fdb027ae028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1400.686928][T26685] RAX: ffffffffffffffda RBX: 00007fdb01c15fa0 RCX: 00007fdb0199ce59 [ 1400.694959][T26685] RDX: 0000000004000004 RSI: 0000200000000300 RDI: 0000000000000003 [ 1400.702987][T26685] RBP: 00007fdb027ae090 R08: 0000000000000000 R09: 0000000000000000 [ 1400.710992][T26685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1400.718998][T26685] R13: 00007fdb01c16038 R14: 00007fdb01c15fa0 R15: 00007ffe85e0f308 [ 1400.727022][T26685] [ 1400.993964][T26698] netlink: 14 bytes leftover after parsing attributes in process `syz.0.6555'. [ 1401.200412][T26702] sctp: [Deprecated]: syz.0.6555 (pid 26702) Use of int in maxseg socket option. [ 1401.200412][T26702] Use struct sctp_assoc_value instead [ 1402.982293][T26725] netlink: 'syz.2.6562': attribute type 21 has an invalid length. [ 1403.041188][T26725] netlink: 'syz.2.6562': attribute type 6 has an invalid length. [ 1403.132711][T26725] netlink: 132 bytes leftover after parsing attributes in process `syz.2.6562'. [ 1403.423345][T26735] netlink: 'syz.0.6574': attribute type 21 has an invalid length. [ 1403.452037][T26735] netlink: 'syz.0.6574': attribute type 6 has an invalid length. [ 1403.460016][T26735] netlink: 132 bytes leftover after parsing attributes in process `syz.0.6574'. [ 1403.829341][T26742] netlink: 'syz.1.6568': attribute type 3 has an invalid length. [ 1403.865021][T26742] netlink: 201372 bytes leftover after parsing attributes in process `syz.1.6568'. [ 1403.918774][T26741] delete_channel: no stack [ 1404.092965][T26747] FAULT_INJECTION: forcing a failure. [ 1404.092965][T26747] name failslab, interval 1, probability 0, space 0, times 0 [ 1404.125555][T26747] CPU: 1 PID: 26747 Comm: syz.2.6569 Not tainted syzkaller #0 [ 1404.133118][T26747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1404.143221][T26747] Call Trace: [ 1404.146547][T26747] [ 1404.149519][T26747] dump_stack_lvl+0x18c/0x250 [ 1404.154268][T26747] ? show_regs_print_info+0x20/0x20 [ 1404.159529][T26747] ? load_image+0x420/0x420 [ 1404.164098][T26747] ? __might_sleep+0xe0/0xe0 [ 1404.168743][T26747] ? __lock_acquire+0x7d40/0x7d40 [ 1404.173848][T26747] should_fail_ex+0x39d/0x4d0 [ 1404.178587][T26747] should_failslab+0x9/0x20 [ 1404.183145][T26747] slab_pre_alloc_hook+0x59/0x310 [ 1404.188231][T26747] ? bpf_insn_prepare_dump+0xb1/0x850 [ 1404.193658][T26747] ? bpf_insn_prepare_dump+0xb1/0x850 [ 1404.199104][T26747] __kmem_cache_alloc_node+0x53/0x250 [ 1404.204554][T26747] ? bpf_insn_prepare_dump+0xb1/0x850 [ 1404.209980][T26747] __kmalloc_node_track_caller+0xa2/0x230 [ 1404.215756][T26747] ? aa_get_newest_label+0xfd/0x5c0 [ 1404.221009][T26747] kmemdup+0x2b/0x70 [ 1404.224962][T26747] bpf_insn_prepare_dump+0xb1/0x850 [ 1404.230263][T26747] ? bpf_prog_attach_check_attach_type+0x440/0x440 [ 1404.236819][T26747] ? bpf_lsm_capable+0x9/0x10 [ 1404.241546][T26747] ? security_capable+0x89/0xb0 [ 1404.246458][T26747] bpf_obj_get_info_by_fd+0x18e1/0x3080 [ 1404.252064][T26747] ? bpf_map_get_fd_by_id+0x310/0x310 [ 1404.257495][T26747] ? trace_event_raw_event_lock_acquire+0x2c0/0x2c0 [ 1404.264158][T26747] ? get_pid_task+0x20/0x1e0 [ 1404.268841][T26747] ? file_end_write+0x159/0x250 [ 1404.273747][T26747] ? __might_fault+0xaa/0x120 [ 1404.278495][T26747] ? __might_fault+0xc6/0x120 [ 1404.283221][T26747] ? __might_fault+0xaa/0x120 [ 1404.287945][T26747] ? bpf_lsm_bpf+0x9/0x10 [ 1404.292334][T26747] ? security_bpf+0x7e/0xa0 [ 1404.296895][T26747] __sys_bpf+0x7eb/0x890 [ 1404.301187][T26747] ? bpf_link_show_fdinfo+0x390/0x390 [ 1404.306646][T26747] ? lock_chain_count+0x20/0x20 [ 1404.311564][T26747] __x64_sys_bpf+0x7c/0x90 [ 1404.316031][T26747] do_syscall_64+0x55/0xa0 [ 1404.320491][T26747] ? clear_bhb_loop+0x40/0x90 [ 1404.325220][T26747] ? clear_bhb_loop+0x40/0x90 [ 1404.329952][T26747] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1404.335897][T26747] RIP: 0033:0x7f47d819ce59 [ 1404.340370][T26747] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1404.360038][T26747] RSP: 002b:00007f47d90f1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1404.368507][T26747] RAX: ffffffffffffffda RBX: 00007f47d8415fa0 RCX: 00007f47d819ce59 [ 1404.376547][T26747] RDX: 0000000000000010 RSI: 00002000000005c0 RDI: 000000000000000f [ 1404.384566][T26747] RBP: 00007f47d90f1090 R08: 0000000000000000 R09: 0000000000000000 [ 1404.392578][T26747] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1404.400597][T26747] R13: 00007f47d8416038 R14: 00007f47d8415fa0 R15: 00007ffd8daed798 [ 1404.408628][T26747] [ 1404.958424][T26762] netlink: 'syz.2.6576': attribute type 21 has an invalid length. [ 1404.967485][T26762] netlink: 'syz.2.6576': attribute type 6 has an invalid length. [ 1404.975906][T26762] netlink: 132 bytes leftover after parsing attributes in process `syz.2.6576'. [ 1405.105676][T26766] netlink: 'syz.1.6577': attribute type 10 has an invalid length. [ 1405.270339][T26769] netlink: 14 bytes leftover after parsing attributes in process `syz.0.6578'. [ 1405.334076][T26769] veth0_macvtap: left promiscuous mode [ 1406.403763][T26790] netlink: 'syz.1.6586': attribute type 27 has an invalid length. [ 1406.515777][T26790] netlink: 'syz.1.6586': attribute type 3 has an invalid length. [ 1406.532138][T26790] netlink: 132 bytes leftover after parsing attributes in process `syz.1.6586'. [ 1406.557861][T26794] netlink: 'syz.3.6589': attribute type 29 has an invalid length. [ 1406.582607][T26794] netlink: 'syz.3.6589': attribute type 29 has an invalid length. [ 1406.597787][T26794] netlink: 'syz.3.6589': attribute type 29 has an invalid length. [ 1406.612844][T26794] netlink: 'syz.3.6589': attribute type 29 has an invalid length. [ 1406.624842][T26794] netlink: 'syz.3.6589': attribute type 29 has an invalid length. [ 1406.707831][T26796] netlink: 'syz.2.6588': attribute type 21 has an invalid length. [ 1406.761381][T26796] netlink: 'syz.2.6588': attribute type 6 has an invalid length. [ 1406.783195][T26796] netlink: 132 bytes leftover after parsing attributes in process `syz.2.6588'. [ 1407.464374][T26819] FAULT_INJECTION: forcing a failure. [ 1407.464374][T26819] name failslab, interval 1, probability 0, space 0, times 0 [ 1407.491961][T26819] CPU: 0 PID: 26819 Comm: syz.0.6598 Not tainted syzkaller #0 [ 1407.499514][T26819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1407.509598][T26819] Call Trace: [ 1407.512904][T26819] [ 1407.515868][T26819] dump_stack_lvl+0x18c/0x250 [ 1407.520583][T26819] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1407.526773][T26819] ? show_regs_print_info+0x20/0x20 [ 1407.532014][T26819] ? load_image+0x420/0x420 [ 1407.536564][T26819] should_fail_ex+0x39d/0x4d0 [ 1407.541284][T26819] should_failslab+0x9/0x20 [ 1407.545835][T26819] slab_pre_alloc_hook+0x59/0x310 [ 1407.550901][T26819] ? bpf_test_init+0x9f/0x140 [ 1407.555606][T26819] ? bpf_test_init+0x9f/0x140 [ 1407.560308][T26819] __kmem_cache_alloc_node+0x53/0x250 [ 1407.565718][T26819] ? bpf_test_init+0x9f/0x140 [ 1407.570417][T26819] __kmalloc+0xa4/0x230 [ 1407.574609][T26819] bpf_test_init+0x9f/0x140 [ 1407.579164][T26819] bpf_prog_test_run_xdp+0x4d1/0x10e0 [ 1407.584586][T26819] ? dev_put+0x80/0x80 [ 1407.588757][T26819] ? dev_put+0x80/0x80 [ 1407.592856][T26819] bpf_prog_test_run+0x321/0x390 [ 1407.597836][T26819] __sys_bpf+0x49d/0x890 [ 1407.602112][T26819] ? bpf_link_show_fdinfo+0x390/0x390 [ 1407.607529][T26819] ? lock_chain_count+0x20/0x20 [ 1407.612420][T26819] __x64_sys_bpf+0x7c/0x90 [ 1407.616894][T26819] do_syscall_64+0x55/0xa0 [ 1407.621345][T26819] ? clear_bhb_loop+0x40/0x90 [ 1407.626053][T26819] ? clear_bhb_loop+0x40/0x90 [ 1407.630769][T26819] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1407.636693][T26819] RIP: 0033:0x7f661319ce59 [ 1407.641135][T26819] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1407.660768][T26819] RSP: 002b:00007f6613f73028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1407.669211][T26819] RAX: ffffffffffffffda RBX: 00007f6613415fa0 RCX: 00007f661319ce59 [ 1407.677215][T26819] RDX: 0000000000000050 RSI: 0000200000000c80 RDI: 000000000000000a [ 1407.685218][T26819] RBP: 00007f6613f73090 R08: 0000000000000000 R09: 0000000000000000 [ 1407.693224][T26819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1407.701218][T26819] R13: 00007f6613416038 R14: 00007f6613415fa0 R15: 00007ffd9357c938 [ 1407.709228][T26819] [ 1407.896310][T26829] netlink: 'syz.0.6602': attribute type 21 has an invalid length. [ 1407.913153][T26829] netlink: 132 bytes leftover after parsing attributes in process `syz.0.6602'. [ 1407.950838][T20720] Bluetooth: hci0: Malformed LE Event: 0x0d [ 1408.346966][T26846] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1408.429872][T26843] netlink: 16186 bytes leftover after parsing attributes in process `syz.2.6605'. [ 1408.458916][T26846] netlink: 126332 bytes leftover after parsing attributes in process `syz.0.6607'. [ 1408.729827][T26863] netlink: 132 bytes leftover after parsing attributes in process `syz.2.6612'. [ 1408.839128][T20720] Bluetooth: hci2: Malformed LE Event: 0x0d [ 1409.113881][T26878] geneve1: left promiscuous mode [ 1409.138516][T26878] geneve1: left allmulticast mode [ 1409.227852][T26878] team0: Port device geneve1 added [ 1409.297517][T26880] netlink: 132 bytes leftover after parsing attributes in process `syz.2.6620'. [ 1409.405540][T26892] netlink: 132 bytes leftover after parsing attributes in process `syz.0.6624'. [ 1409.528670][T26896] FAULT_INJECTION: forcing a failure. [ 1409.528670][T26896] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1409.542236][T26896] CPU: 1 PID: 26896 Comm: syz.2.6625 Not tainted syzkaller #0 [ 1409.549771][T26896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1409.559890][T26896] Call Trace: [ 1409.563211][T26896] [ 1409.566191][T26896] dump_stack_lvl+0x18c/0x250 [ 1409.570937][T26896] ? show_regs_print_info+0x20/0x20 [ 1409.576198][T26896] ? load_image+0x420/0x420 [ 1409.580765][T26896] ? __might_fault+0xaa/0x120 [ 1409.585475][T26896] ? __lock_acquire+0x7d40/0x7d40 [ 1409.590557][T26896] should_fail_ex+0x39d/0x4d0 [ 1409.595276][T26896] _copy_from_iter+0x1d9/0x12e0 [ 1409.600159][T26896] ? __virt_addr_valid+0x18c/0x540 [ 1409.605311][T26896] ? __lock_acquire+0x7d40/0x7d40 [ 1409.610373][T26896] ? copyout_mc+0x70/0x70 [ 1409.614737][T26896] ? __virt_addr_valid+0x18c/0x540 [ 1409.619880][T26896] ? __virt_addr_valid+0x18c/0x540 [ 1409.625022][T26896] ? __virt_addr_valid+0x469/0x540 [ 1409.630184][T26896] ? __check_object_size+0x506/0xa20 [ 1409.635500][T26896] kernfs_fop_write_iter+0x1a4/0x520 [ 1409.640842][T26896] vfs_write+0x46c/0x990 [ 1409.645127][T26896] ? file_end_write+0x250/0x250 [ 1409.650027][T26896] ? __fget_files+0x43d/0x4b0 [ 1409.654760][T26896] ? __fdget_pos+0x2a3/0x330 [ 1409.659412][T26896] ? ksys_write+0x75/0x260 [ 1409.663869][T26896] ksys_write+0x150/0x260 [ 1409.668233][T26896] ? __ia32_sys_read+0x90/0x90 [ 1409.673033][T26896] ? lockdep_hardirqs_on+0x98/0x150 [ 1409.678267][T26896] do_syscall_64+0x55/0xa0 [ 1409.682712][T26896] ? clear_bhb_loop+0x40/0x90 [ 1409.687426][T26896] ? clear_bhb_loop+0x40/0x90 [ 1409.692133][T26896] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1409.698061][T26896] RIP: 0033:0x7f47d819ce59 [ 1409.702527][T26896] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1409.722162][T26896] RSP: 002b:00007f47d90f1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1409.730604][T26896] RAX: ffffffffffffffda RBX: 00007f47d8415fa0 RCX: 00007f47d819ce59 [ 1409.738605][T26896] RDX: 0000000000000012 RSI: 0000200000000040 RDI: 0000000000000004 [ 1409.746604][T26896] RBP: 00007f47d90f1090 R08: 0000000000000000 R09: 0000000000000000 [ 1409.754603][T26896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1409.762595][T26896] R13: 00007f47d8416038 R14: 00007f47d8415fa0 R15: 00007ffd8daed798 [ 1409.770603][T26896] [ 1409.830503][T20720] Bluetooth: hci3: Malformed LE Event: 0x0d [ 1409.945628][T26902] netlink: 61967 bytes leftover after parsing attributes in process `syz.3.6627'. [ 1410.357908][T26921] __nla_validate_parse: 2 callbacks suppressed [ 1410.357949][T26921] netlink: 132 bytes leftover after parsing attributes in process `syz.3.6636'. [ 1411.016174][T20720] Bluetooth: hci3: unexpected event 0x05 length: 15 > 4 [ 1412.447711][T26953] validate_nla: 17 callbacks suppressed [ 1412.447745][T26953] netlink: 'syz.0.6646': attribute type 21 has an invalid length. [ 1412.470602][T26953] netlink: 'syz.0.6646': attribute type 6 has an invalid length. [ 1412.479560][T26953] netlink: 132 bytes leftover after parsing attributes in process `syz.0.6646'. [ 1412.669528][T26963] netlink: 'syz.3.6650': attribute type 10 has an invalid length. [ 1412.908319][T26971] netlink: 'syz.0.6659': attribute type 10 has an invalid length. [ 1413.031367][T20720] Bluetooth: hci2: unexpected event 0x05 length: 15 > 4 [ 1413.041337][T26977] netlink: 14 bytes leftover after parsing attributes in process `syz.1.6653'. [ 1413.189328][T26977] veth0_macvtap: left promiscuous mode [ 1413.333778][T26985] FAULT_INJECTION: forcing a failure. [ 1413.333778][T26985] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1413.362127][T26985] CPU: 1 PID: 26985 Comm: syz.0.6656 Not tainted syzkaller #0 [ 1413.369682][T26985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1413.379791][T26985] Call Trace: [ 1413.383110][T26985] [ 1413.386089][T26985] dump_stack_lvl+0x18c/0x250 [ 1413.390834][T26985] ? show_regs_print_info+0x20/0x20 [ 1413.396094][T26985] ? load_image+0x420/0x420 [ 1413.400629][T26985] ? __lock_acquire+0x7d40/0x7d40 [ 1413.405695][T26985] should_fail_ex+0x39d/0x4d0 [ 1413.410436][T26985] prepare_alloc_pages+0x1e2/0x5f0 [ 1413.415615][T26985] __alloc_pages+0x134/0x460 [ 1413.420275][T26985] ? rcu_is_watching+0x15/0xb0 [ 1413.425106][T26985] ? zone_statistics+0x170/0x170 [ 1413.430100][T26985] ? __build_skb_around+0x255/0x3d0 [ 1413.435377][T26985] alloc_skb_with_frags+0x23c/0x7b0 [ 1413.440649][T26985] sock_alloc_send_pskb+0x883/0x9a0 [ 1413.445927][T26985] ? sock_kzfree_s+0x50/0x50 [ 1413.450613][T26985] tun_get_user+0x82c/0x3ca0 [ 1413.455272][T26985] ? aa_file_perm+0x11b/0xee0 [ 1413.460082][T26985] ? rcu_read_unlock+0xa0/0xa0 [ 1413.464924][T26985] ? tun_get+0x1c/0x2e0 [ 1413.469153][T26985] ? __lock_acquire+0x7d40/0x7d40 [ 1413.474234][T26985] ? tun_get+0x1c/0x2e0 [ 1413.478446][T26985] tun_chr_write_iter+0x119/0x200 [ 1413.483525][T26985] vfs_write+0x46c/0x990 [ 1413.487801][T26985] ? file_end_write+0x250/0x250 [ 1413.492685][T26985] ? __fget_files+0x43d/0x4b0 [ 1413.497401][T26985] ? __fdget_pos+0x1d8/0x330 [ 1413.502020][T26985] ? ksys_write+0x75/0x260 [ 1413.506475][T26985] ksys_write+0x150/0x260 [ 1413.510843][T26985] ? __ia32_sys_read+0x90/0x90 [ 1413.515679][T26985] ? lockdep_hardirqs_on+0x98/0x150 [ 1413.520913][T26985] do_syscall_64+0x55/0xa0 [ 1413.525364][T26985] ? clear_bhb_loop+0x40/0x90 [ 1413.530074][T26985] ? clear_bhb_loop+0x40/0x90 [ 1413.534781][T26985] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1413.540705][T26985] RIP: 0033:0x7f661319ce59 [ 1413.545144][T26985] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1413.564785][T26985] RSP: 002b:00007f6613f73028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1413.573234][T26985] RAX: ffffffffffffffda RBX: 00007f6613415fa0 RCX: 00007f661319ce59 [ 1413.581233][T26985] RDX: 000000000000fdef RSI: 0000200000000180 RDI: 00000000000000c8 [ 1413.589233][T26985] RBP: 00007f6613f73090 R08: 0000000000000000 R09: 0000000000000000 [ 1413.597229][T26985] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1413.605222][T26985] R13: 00007f6613416038 R14: 00007f6613415fa0 R15: 00007ffd9357c938 [ 1413.613238][T26985] [ 1413.984417][T26980] ±ÿ: renamed from lo (while UP) [ 1414.602937][T27010] netlink: 'syz.1.6664': attribute type 10 has an invalid length. [ 1414.718619][T27011] macvlan1: entered promiscuous mode [ 1414.734064][T27011] macvlan1: entered allmulticast mode [ 1414.739956][T27011] veth1_vlan: entered allmulticast mode [ 1414.913810][T27023] netlink: 'syz.2.6669': attribute type 17 has an invalid length. [ 1414.922336][T27023] netlink: 'syz.2.6669': attribute type 16 has an invalid length. [ 1414.930477][T27023] netlink: 152 bytes leftover after parsing attributes in process `syz.2.6669'. [ 1415.086942][T27026] FAULT_INJECTION: forcing a failure. [ 1415.086942][T27026] name failslab, interval 1, probability 0, space 0, times 0 [ 1415.100579][T27026] CPU: 0 PID: 27026 Comm: syz.2.6670 Not tainted syzkaller #0 [ 1415.108110][T27026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1415.118233][T27026] Call Trace: [ 1415.121575][T27026] [ 1415.124547][T27026] dump_stack_lvl+0x18c/0x250 [ 1415.129296][T27026] ? show_regs_print_info+0x20/0x20 [ 1415.134557][T27026] ? load_image+0x420/0x420 [ 1415.139118][T27026] ? __might_sleep+0xe0/0xe0 [ 1415.143774][T27026] ? __lock_acquire+0x7d40/0x7d40 [ 1415.148838][T27026] should_fail_ex+0x39d/0x4d0 [ 1415.153574][T27026] should_failslab+0x9/0x20 [ 1415.158129][T27026] slab_pre_alloc_hook+0x59/0x310 [ 1415.163194][T27026] kmem_cache_alloc_node+0x60/0x320 [ 1415.168433][T27026] ? __alloc_skb+0x103/0x2c0 [ 1415.173053][T27026] __alloc_skb+0x103/0x2c0 [ 1415.177497][T27026] rtmsg_ifinfo_build_skb+0x8c/0x260 [ 1415.182816][T27026] rtnetlink_event+0x1b7/0x260 [ 1415.187614][T27026] notifier_call_chain+0x197/0x380 [ 1415.192767][T27026] dev_set_mtu_ext+0x463/0x680 [ 1415.197573][T27026] ? dev_validate_mtu+0x170/0x170 [ 1415.202636][T27026] ? __mutex_trylock_common+0x159/0x260 [ 1415.208209][T27026] ? trace_raw_output_contention_end+0xd0/0xd0 [ 1415.214407][T27026] dev_set_mtu+0xec/0x1c0 [ 1415.218776][T27026] ? dev_set_mtu_ext+0x680/0x680 [ 1415.223777][T27026] ? __dev_get_by_name+0xe5/0x130 [ 1415.228831][T27026] ? dev_ifsioc+0x4f9/0xc40 [ 1415.233368][T27026] dev_ioctl+0x7b4/0x1140 [ 1415.237748][T27026] sock_do_ioctl+0x239/0x310 [ 1415.242372][T27026] ? sock_show_fdinfo+0xb0/0xb0 [ 1415.247265][T27026] sock_ioctl+0x5ba/0x7e0 [ 1415.251631][T27026] ? sock_poll+0x3e0/0x3e0 [ 1415.256090][T27026] ? bpf_lsm_file_ioctl+0x9/0x10 [ 1415.261046][T27026] ? security_file_ioctl+0x80/0xa0 [ 1415.266186][T27026] ? sock_poll+0x3e0/0x3e0 [ 1415.270632][T27026] __se_sys_ioctl+0xfd/0x170 [ 1415.275256][T27026] do_syscall_64+0x55/0xa0 [ 1415.279708][T27026] ? clear_bhb_loop+0x40/0x90 [ 1415.284416][T27026] ? clear_bhb_loop+0x40/0x90 [ 1415.289124][T27026] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1415.295051][T27026] RIP: 0033:0x7f47d819ce59 [ 1415.299497][T27026] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1415.319138][T27026] RSP: 002b:00007f47d90f1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1415.327582][T27026] RAX: ffffffffffffffda RBX: 00007f47d8415fa0 RCX: 00007f47d819ce59 [ 1415.335580][T27026] RDX: 0000200000000080 RSI: 0000000000008922 RDI: 000000000000000b [ 1415.343572][T27026] RBP: 00007f47d90f1090 R08: 0000000000000000 R09: 0000000000000000 [ 1415.351567][T27026] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1415.359559][T27026] R13: 00007f47d8416038 R14: 00007f47d8415fa0 R15: 00007ffd8daed798 [ 1415.367572][T27026] [ 1415.536400][T27034] netlink: 14 bytes leftover after parsing attributes in process `syz.3.6671'. [ 1415.608956][T27034] veth0_macvtap: left promiscuous mode [ 1415.967741][T27045] ip6gre0: entered allmulticast mode [ 1416.259784][T27059] netlink: 'syz.1.6676': attribute type 10 has an invalid length. [ 1416.702223][T27061] ±ÿ: renamed from lo (while UP) [ 1417.420189][T27092] netlink: 'syz.2.6690': attribute type 10 has an invalid length. [ 1417.968964][T27117] FAULT_INJECTION: forcing a failure. [ 1417.968964][T27117] name failslab, interval 1, probability 0, space 0, times 0 [ 1417.983950][T27117] CPU: 0 PID: 27117 Comm: syz.1.6699 Not tainted syzkaller #0 [ 1417.991466][T27117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1418.001575][T27117] Call Trace: [ 1418.004883][T27117] [ 1418.007864][T27117] dump_stack_lvl+0x18c/0x250 [ 1418.012605][T27117] ? show_regs_print_info+0x20/0x20 [ 1418.017881][T27117] ? load_image+0x420/0x420 [ 1418.022433][T27117] ? __might_sleep+0xe0/0xe0 [ 1418.027074][T27117] ? __lock_acquire+0x7d40/0x7d40 [ 1418.032131][T27117] should_fail_ex+0x39d/0x4d0 [ 1418.036857][T27117] should_failslab+0x9/0x20 [ 1418.041388][T27117] slab_pre_alloc_hook+0x59/0x310 [ 1418.046458][T27117] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 1418.052227][T27117] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 1418.057989][T27117] __kmem_cache_alloc_node+0x53/0x250 [ 1418.063432][T27117] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 1418.069210][T27117] __kmalloc+0xa4/0x230 [ 1418.073450][T27117] tomoyo_realpath_from_path+0xe3/0x5d0 [ 1418.079060][T27117] tomoyo_path_number_perm+0x248/0x620 [ 1418.084567][T27117] ? tomoyo_path_number_perm+0x217/0x620 [ 1418.090269][T27117] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 1418.095796][T27117] ? ksys_write+0x1c4/0x260 [ 1418.100391][T27117] ? __fget_files+0x28/0x4b0 [ 1418.105039][T27117] ? __fget_files+0x28/0x4b0 [ 1418.109689][T27117] security_file_ioctl+0x70/0xa0 [ 1418.114684][T27117] __se_sys_ioctl+0x48/0x170 [ 1418.119370][T27117] do_syscall_64+0x55/0xa0 [ 1418.123826][T27117] ? clear_bhb_loop+0x40/0x90 [ 1418.128559][T27117] ? clear_bhb_loop+0x40/0x90 [ 1418.133265][T27117] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1418.139184][T27117] RIP: 0033:0x7f601e79ce59 [ 1418.143628][T27117] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1418.163297][T27117] RSP: 002b:00007f601c9f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1418.171797][T27117] RAX: ffffffffffffffda RBX: 00007f601ea15fa0 RCX: 00007f601e79ce59 [ 1418.179811][T27117] RDX: 0000200000000040 RSI: 00000000000089fd RDI: 0000000000000003 [ 1418.187811][T27117] RBP: 00007f601c9f6090 R08: 0000000000000000 R09: 0000000000000000 [ 1418.195820][T27117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1418.203855][T27117] R13: 00007f601ea16038 R14: 00007f601ea15fa0 R15: 00007ffe33fca7e8 [ 1418.211898][T27117] [ 1418.218452][T27117] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1418.314975][T25477] tipc: Subscription rejected, illegal request [ 1418.393333][T27123] netlink: 'syz.1.6701': attribute type 10 has an invalid length. [ 1419.085100][T27140] A link change request failed with some changes committed already. Interface 26±ÿ may have been left with an inconsistent configuration, please check. [ 1419.142806][T27141] ±ÿ: renamed from lo (while UP) [ 1419.686778][T27156] netlink: 'syz.2.6711': attribute type 2 has an invalid length. [ 1419.702148][T27156] netlink: 1045 bytes leftover after parsing attributes in process `syz.2.6711'. [ 1419.746356][T27158] netlink: 'syz.1.6710': attribute type 10 has an invalid length. [ 1419.850384][T27163] Dead loop on virtual device ip6_vti0, fix it urgently! [ 1420.131728][T27178] FAULT_INJECTION: forcing a failure. [ 1420.131728][T27178] name failslab, interval 1, probability 0, space 0, times 0 [ 1420.164108][T27178] CPU: 1 PID: 27178 Comm: syz.2.6718 Not tainted syzkaller #0 [ 1420.171738][T27178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1420.181877][T27178] Call Trace: [ 1420.185210][T27178] [ 1420.188197][T27178] dump_stack_lvl+0x18c/0x250 [ 1420.192954][T27178] ? show_regs_print_info+0x20/0x20 [ 1420.198224][T27178] ? load_image+0x420/0x420 [ 1420.202791][T27178] ? verify_lock_unused+0x140/0x140 [ 1420.208050][T27178] ? perf_trace_lock+0xfc/0x3b0 [ 1420.212956][T27178] should_fail_ex+0x39d/0x4d0 [ 1420.217704][T27178] should_failslab+0x9/0x20 [ 1420.222270][T27178] slab_pre_alloc_hook+0x59/0x310 [ 1420.227363][T27178] kmem_cache_alloc+0x5a/0x2d0 [ 1420.232208][T27178] ? skb_clone+0x1eb/0x370 [ 1420.236678][T27178] skb_clone+0x1eb/0x370 [ 1420.240965][T27178] __netlink_deliver_tap+0x41c/0x830 [ 1420.246309][T27178] ? netlink_deliver_tap+0x2e/0x1b0 [ 1420.251601][T27178] netlink_deliver_tap+0x19c/0x1b0 [ 1420.256755][T27178] __netlink_sendskb+0x4b/0x90 [ 1420.261556][T27178] netlink_dump+0xa75/0xe50 [ 1420.266113][T27178] ? netlink_lookup+0x200/0x200 [ 1420.271017][T27178] ? ns_capable+0x89/0xe0 [ 1420.275386][T27178] ? __inet_diag_dump_start+0x886/0x9f0 [ 1420.280983][T27178] __netlink_dump_start+0x5f1/0x810 [ 1420.286227][T27178] inet_diag_rcv_msg_compat+0x215/0x440 [ 1420.291823][T27178] ? __inet_diag_dump+0x380/0x380 [ 1420.296890][T27178] ? sock_diag_rcv_msg+0xd1/0x600 [ 1420.301946][T27178] ? inet_diag_rcv_msg_compat+0x440/0x440 [ 1420.307701][T27178] ? inet_diag_dump_start_compat+0x20/0x20 [ 1420.313548][T27178] ? inet_diag_dump+0x50/0x50 [ 1420.318273][T27178] ? __inet_diag_dump+0x380/0x380 [ 1420.323335][T27178] sock_diag_rcv_msg+0x3d8/0x600 [ 1420.328314][T27178] netlink_rcv_skb+0x241/0x4d0 [ 1420.333120][T27178] ? sock_diag_bind+0xb0/0xb0 [ 1420.337839][T27178] ? netlink_ack+0x1180/0x1180 [ 1420.342657][T27178] ? __lock_acquire+0x7d40/0x7d40 [ 1420.347726][T27178] ? __rcu_read_unlock+0x7c/0xd0 [ 1420.352701][T27178] ? netlink_deliver_tap+0x2e/0x1b0 [ 1420.357945][T27178] sock_diag_rcv+0x2a/0x40 [ 1420.362394][T27178] netlink_unicast+0x751/0x8d0 [ 1420.367205][T27178] netlink_sendmsg+0x8d0/0xbf0 [ 1420.372013][T27178] ? netlink_getsockopt+0x590/0x590 [ 1420.377261][T27178] ? aa_sock_msg_perm+0x94/0x150 [ 1420.382234][T27178] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 1420.387554][T27178] ? security_socket_sendmsg+0x80/0xa0 [ 1420.393039][T27178] ? netlink_getsockopt+0x590/0x590 [ 1420.398283][T27178] ____sys_sendmsg+0x5ba/0x960 [ 1420.403086][T27178] ? __asan_memset+0x22/0x40 [ 1420.407720][T27178] ? __sys_sendmsg_sock+0x30/0x30 [ 1420.412766][T27178] ? __import_iovec+0x5f2/0x850 [ 1420.417653][T27178] ? import_iovec+0x73/0xa0 [ 1420.422186][T27178] ___sys_sendmsg+0x2a6/0x360 [ 1420.426895][T27178] ? __sys_sendmsg+0x2a0/0x2a0 [ 1420.431704][T27178] ? __lock_acquire+0x7d40/0x7d40 [ 1420.436784][T27178] __se_sys_sendmsg+0x1c2/0x2b0 [ 1420.441665][T27178] ? __x64_sys_sendmsg+0x80/0x80 [ 1420.446661][T27178] ? lockdep_hardirqs_on+0x98/0x150 [ 1420.451899][T27178] do_syscall_64+0x55/0xa0 [ 1420.456345][T27178] ? clear_bhb_loop+0x40/0x90 [ 1420.461094][T27178] ? clear_bhb_loop+0x40/0x90 [ 1420.465812][T27178] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1420.471737][T27178] RIP: 0033:0x7f47d819ce59 [ 1420.476181][T27178] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1420.495820][T27178] RSP: 002b:00007f47d90f1028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1420.504267][T27178] RAX: ffffffffffffffda RBX: 00007f47d8415fa0 RCX: 00007f47d819ce59 [ 1420.512268][T27178] RDX: 0000000000028044 RSI: 0000200000000080 RDI: 0000000000000003 [ 1420.520265][T27178] RBP: 00007f47d90f1090 R08: 0000000000000000 R09: 0000000000000000 [ 1420.528263][T27178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1420.536263][T27178] R13: 00007f47d8416038 R14: 00007f47d8415fa0 R15: 00007ffd8daed798 [ 1420.544287][T27178] [ 1420.694881][T27189] FAULT_INJECTION: forcing a failure. [ 1420.694881][T27189] name failslab, interval 1, probability 0, space 0, times 0 [ 1420.711145][T27189] CPU: 1 PID: 27189 Comm: syz.2.6722 Not tainted syzkaller #0 [ 1420.718695][T27189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1420.728801][T27189] Call Trace: [ 1420.732135][T27189] [ 1420.735116][T27189] dump_stack_lvl+0x18c/0x250 [ 1420.739867][T27189] ? show_regs_print_info+0x20/0x20 [ 1420.745135][T27189] ? load_image+0x420/0x420 [ 1420.749699][T27189] ? __might_sleep+0xe0/0xe0 [ 1420.754347][T27189] ? __lock_acquire+0x7d40/0x7d40 [ 1420.759430][T27189] should_fail_ex+0x39d/0x4d0 [ 1420.764172][T27189] should_failslab+0x9/0x20 [ 1420.768732][T27189] slab_pre_alloc_hook+0x59/0x310 [ 1420.773823][T27189] ? fib6_info_alloc+0x30/0xf0 [ 1420.778648][T27189] ? fib6_info_alloc+0x30/0xf0 [ 1420.783462][T27189] __kmem_cache_alloc_node+0x53/0x250 [ 1420.788894][T27189] ? fib6_get_table+0x39/0x260 [ 1420.793722][T27189] ? fib6_info_alloc+0x30/0xf0 [ 1420.798544][T27189] __kmalloc+0xa4/0x230 [ 1420.802773][T27189] fib6_info_alloc+0x30/0xf0 [ 1420.807436][T27189] ip6_route_info_create+0x44f/0x1240 [ 1420.812875][T27189] ? nla_memcpy+0x59/0xb0 [ 1420.817264][T27189] ? nla_find+0x12a/0x150 [ 1420.821645][T27189] inet6_rtm_newroute+0x5ae/0x1c90 [ 1420.826831][T27189] ? ipv6_route_sysctl_table_size+0x50/0x50 [ 1420.832784][T27189] ? perf_trace_contention_begin+0xac/0x300 [ 1420.838720][T27189] ? rcu_is_watching+0x15/0xb0 [ 1420.843517][T27189] ? trace_contention_end+0x39/0xe0 [ 1420.848756][T27189] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 1420.853905][T27189] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 1420.859040][T27189] ? ipv6_route_sysctl_table_size+0x50/0x50 [ 1420.864971][T27189] rtnetlink_rcv_msg+0x869/0xfa0 [ 1420.869944][T27189] ? lockdep_hardirqs_on+0x98/0x150 [ 1420.875175][T27189] ? rtnetlink_bind+0x80/0x80 [ 1420.879888][T27189] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 1420.885902][T27189] ? lock_chain_count+0x20/0x20 [ 1420.890781][T27189] ? __local_bh_enable_ip+0x13a/0x1c0 [ 1420.896178][T27189] ? lockdep_hardirqs_on+0x98/0x150 [ 1420.901427][T27189] ? __local_bh_enable_ip+0x13a/0x1c0 [ 1420.906840][T27189] ? _local_bh_enable+0xa0/0xa0 [ 1420.911754][T27189] ? __dev_queue_xmit+0x265/0x3660 [ 1420.916920][T27189] ? __dev_queue_xmit+0x265/0x3660 [ 1420.922084][T27189] ? __dev_queue_xmit+0x1b2c/0x3660 [ 1420.927342][T27189] ? __dev_queue_xmit+0x265/0x3660 [ 1420.932497][T27189] ? ref_tracker_free+0x690/0x840 [ 1420.937557][T27189] netlink_rcv_skb+0x241/0x4d0 [ 1420.942357][T27189] ? rtnetlink_bind+0x80/0x80 [ 1420.947063][T27189] ? netlink_ack+0x1180/0x1180 [ 1420.951870][T27189] ? __lock_acquire+0x7d40/0x7d40 [ 1420.956929][T27189] ? netlink_deliver_tap+0x2e/0x1b0 [ 1420.962176][T27189] netlink_unicast+0x751/0x8d0 [ 1420.966995][T27189] netlink_sendmsg+0x8d0/0xbf0 [ 1420.971806][T27189] ? netlink_getsockopt+0x590/0x590 [ 1420.977057][T27189] ? aa_sock_msg_perm+0x94/0x150 [ 1420.982033][T27189] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 1420.987348][T27189] ? security_socket_sendmsg+0x80/0xa0 [ 1420.992835][T27189] ? netlink_getsockopt+0x590/0x590 [ 1420.998070][T27189] ____sys_sendmsg+0x5ba/0x960 [ 1421.002872][T27189] ? __asan_memset+0x22/0x40 [ 1421.007493][T27189] ? __sys_sendmsg_sock+0x30/0x30 [ 1421.012541][T27189] ? __import_iovec+0x5f2/0x850 [ 1421.017425][T27189] ? import_iovec+0x73/0xa0 [ 1421.021957][T27189] ___sys_sendmsg+0x2a6/0x360 [ 1421.026666][T27189] ? get_pid_task+0x20/0x1e0 [ 1421.031292][T27189] ? __sys_sendmsg+0x2a0/0x2a0 [ 1421.036098][T27189] ? __lock_acquire+0x7d40/0x7d40 [ 1421.041177][T27189] __se_sys_sendmsg+0x1c2/0x2b0 [ 1421.046069][T27189] ? __x64_sys_sendmsg+0x80/0x80 [ 1421.051045][T27189] ? lockdep_hardirqs_on+0x98/0x150 [ 1421.056282][T27189] do_syscall_64+0x55/0xa0 [ 1421.060721][T27189] ? clear_bhb_loop+0x40/0x90 [ 1421.065434][T27189] ? clear_bhb_loop+0x40/0x90 [ 1421.070152][T27189] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1421.076077][T27189] RIP: 0033:0x7f47d819ce59 [ 1421.080519][T27189] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1421.100158][T27189] RSP: 002b:00007f47d90f1028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1421.108624][T27189] RAX: ffffffffffffffda RBX: 00007f47d8415fa0 RCX: 00007f47d819ce59 [ 1421.116630][T27189] RDX: 0000000004000004 RSI: 0000200000000300 RDI: 0000000000000003 [ 1421.124629][T27189] RBP: 00007f47d90f1090 R08: 0000000000000000 R09: 0000000000000000 [ 1421.132632][T27189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1421.140628][T27189] R13: 00007f47d8416038 R14: 00007f47d8415fa0 R15: 00007ffd8daed798 [ 1421.148651][T27189] [ 1421.301702][T27195] netlink: 'syz.2.6723': attribute type 29 has an invalid length. [ 1421.324530][T27195] netlink: 'syz.2.6723': attribute type 29 has an invalid length. [ 1421.337135][T27195] netlink: 'syz.2.6723': attribute type 29 has an invalid length. [ 1421.351380][T27195] netlink: 'syz.2.6723': attribute type 29 has an invalid length. [ 1421.416123][T27195] netlink: 'syz.2.6723': attribute type 29 has an invalid length. [ 1421.509789][T27202] netlink: 4595 bytes leftover after parsing attributes in process `syz.1.6726'. [ 1421.511005][T27203] netlink: 'syz.0.6724': attribute type 10 has an invalid length. [ 1421.582162][T27202] netlink: 4595 bytes leftover after parsing attributes in process `syz.1.6726'. [ 1421.627287][T27206] netlink: 4595 bytes leftover after parsing attributes in process `syz.1.6726'. [ 1421.794117][T27211] netlink: 'syz.0.6729': attribute type 21 has an invalid length. [ 1421.812080][T27211] netlink: 16166 bytes leftover after parsing attributes in process `syz.0.6729'. [ 1421.823813][T27219] netlink: 4595 bytes leftover after parsing attributes in process `syz.0.6729'. [ 1421.836465][T27219] netlink: 4595 bytes leftover after parsing attributes in process `syz.0.6729'. [ 1421.903770][T27211] netlink: 4595 bytes leftover after parsing attributes in process `syz.0.6729'. [ 1421.978238][T27221] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.6731'. [ 1422.062464][T27225] netlink: 14 bytes leftover after parsing attributes in process `syz.1.6732'. [ 1422.154538][T27225] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1422.164735][T27225] bond_slave_0: left promiscuous mode [ 1422.170571][T27225] bond_slave_0: left allmulticast mode [ 1422.193438][T27225] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1422.203542][T27225] bond_slave_1: left promiscuous mode [ 1422.209408][T27225] bond_slave_1: left allmulticast mode [ 1422.232712][T27225] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 1422.242565][T27225] dummy0: left promiscuous mode [ 1422.248000][T27225] dummy0: left allmulticast mode [ 1422.260452][T27225] bond0 (unregistering): Released all slaves [ 1422.293053][T27227] netlink: 14 bytes leftover after parsing attributes in process `syz.0.6734'. [ 1422.449108][T27227] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1422.465819][T27227] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1422.486461][T27227] bond0 (unregistering): Released all slaves [ 1423.282617][ T1289] ieee802154 phy0 wpan0: encryption failed: -22 [ 1423.289063][ T1289] ieee802154 phy1 wpan1: encryption failed: -22 [ 1423.582819][T27263] validate_nla: 3 callbacks suppressed [ 1423.582859][T27263] netlink: 'syz.3.6747': attribute type 33 has an invalid length. [ 1423.918025][T27279] netlink: 'syz.3.6751': attribute type 10 has an invalid length. [ 1424.654748][T27312] netlink: 'syz.1.6763': attribute type 10 has an invalid length. [ 1424.697095][T27311] netlink: 'syz.0.6764': attribute type 10 has an invalid length. [ 1425.460906][T27336] openvswitch: netlink: Key type 29 is not supported [ 1425.557243][T27336] netlink: 'syz.2.6774': attribute type 3 has an invalid length. [ 1425.592114][T27336] netlink: 'syz.2.6774': attribute type 1 has an invalid length. [ 1425.608817][T27341] netlink: 'syz.0.6775': attribute type 10 has an invalid length. [ 1425.896671][T27347] syzkaller0: entered promiscuous mode [ 1425.905758][T27347] syzkaller0: entered allmulticast mode [ 1428.613799][T27378] netlink: 'syz.0.6787': attribute type 10 has an invalid length. [ 1428.678088][T27385] netlink: 'syz.2.6789': attribute type 29 has an invalid length. [ 1428.692586][T27385] netlink: 'syz.2.6789': attribute type 29 has an invalid length. [ 1428.841374][T27389] tap0: tun_chr_ioctl cmd 99999999 [ 1428.875893][T20720] Bluetooth: hci0: Malformed LE Event: 0x0d [ 1428.948306][T27397] netlink: 'syz.0.6794': attribute type 21 has an invalid length. [ 1428.956617][T27397] netlink: 'syz.0.6794': attribute type 6 has an invalid length. [ 1428.964537][T27397] __nla_validate_parse: 5 callbacks suppressed [ 1428.964553][T27397] netlink: 132 bytes leftover after parsing attributes in process `syz.0.6794'. [ 1429.031187][T27395] netlink: 40 bytes leftover after parsing attributes in process `syz.1.6793'. [ 1429.050189][T27395] netlink: 40 bytes leftover after parsing attributes in process `syz.1.6793'. [ 1429.077454][T27395] netlink: 13 bytes leftover after parsing attributes in process `syz.1.6793'. [ 1429.341915][T20720] Bluetooth: hci2: ISO packet for unknown connection handle 12 [ 1430.063294][T27418] netlink: 'syz.0.6798': attribute type 10 has an invalid length. [ 1430.293141][T20720] Bluetooth: hci3: Malformed LE Event: 0x0d [ 1430.631680][T27439] netlink: 'syz.1.6806': attribute type 21 has an invalid length. [ 1430.658143][T27439] netlink: 'syz.1.6806': attribute type 6 has an invalid length. [ 1430.683640][T27439] netlink: 132 bytes leftover after parsing attributes in process `syz.1.6806'. [ 1430.828177][T27455] netlink: 'syz.0.6811': attribute type 10 has an invalid length. [ 1430.898608][T20720] Bluetooth: hci2: ISO packet for unknown connection handle 11 [ 1431.038561][T20720] Bluetooth: hci4: Malformed LE Event: 0x0d [ 1431.665426][T27479] netlink: 'syz.3.6821': attribute type 21 has an invalid length. [ 1431.685741][T20720] Bluetooth: hci0: unexpected subevent 0x0c length: 150 > 5 [ 1431.699816][T27479] netlink: 132 bytes leftover after parsing attributes in process `syz.3.6821'. [ 1431.963763][T20720] Bluetooth: hci4: ISO packet for unknown connection handle 11 [ 1432.710662][T20720] Bluetooth: hci0: unexpected subevent 0x0c length: 150 > 5 [ 1432.836774][T27518] netlink: 132 bytes leftover after parsing attributes in process `syz.3.6835'. [ 1433.466273][T27538] netlink: 2 bytes leftover after parsing attributes in process `syz.2.6840'. [ 1433.610596][T20720] Bluetooth: hci2: ISO packet for unknown connection handle 12 [ 1433.722283][T20720] Bluetooth: hci4: unexpected subevent 0x0c length: 150 > 5 [ 1433.918047][T27559] validate_nla: 6 callbacks suppressed [ 1433.918068][T27559] netlink: 'syz.1.6847': attribute type 21 has an invalid length. [ 1433.952146][T27559] netlink: 'syz.1.6847': attribute type 6 has an invalid length. [ 1433.960036][T27559] netlink: 132 bytes leftover after parsing attributes in process `syz.1.6847'. [ 1434.140202][T27574] netlink: 'syz.2.6850': attribute type 10 has an invalid length. [ 1434.544815][T20720] Bluetooth: hci0: ISO packet for unknown connection handle 11 [ 1434.976250][T27595] netlink: 'syz.3.6860': attribute type 21 has an invalid length. [ 1434.994598][T27595] netlink: 'syz.3.6860': attribute type 6 has an invalid length. [ 1435.012402][T27595] netlink: 132 bytes leftover after parsing attributes in process `syz.3.6860'. [ 1437.787702][T27611] netlink: 'syz.0.6864': attribute type 10 has an invalid length. [ 1438.176126][T27626] netlink: 'syz.2.6871': attribute type 21 has an invalid length. [ 1438.186835][T27626] netlink: 'syz.2.6871': attribute type 6 has an invalid length. [ 1438.195795][T27626] netlink: 132 bytes leftover after parsing attributes in process `syz.2.6871'. [ 1438.463247][T20720] Bluetooth: hci3: ISO packet for unknown connection handle 11 [ 1439.172421][T27650] netlink: 'syz.1.6878': attribute type 10 has an invalid length. [ 1439.555206][T27661] netlink: 'syz.2.6883': attribute type 21 has an invalid length. [ 1439.611902][T27661] netlink: 'syz.2.6883': attribute type 6 has an invalid length. [ 1439.619740][T27661] netlink: 132 bytes leftover after parsing attributes in process `syz.2.6883'. [ 1440.052633][T27677] FAULT_INJECTION: forcing a failure. [ 1440.052633][T27677] name failslab, interval 1, probability 0, space 0, times 0 [ 1440.133208][T27677] CPU: 1 PID: 27677 Comm: syz.2.6888 Not tainted syzkaller #0 [ 1440.140772][T27677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1440.150878][T27677] Call Trace: [ 1440.154231][T27677] [ 1440.157202][T27677] dump_stack_lvl+0x18c/0x250 [ 1440.161926][T27677] ? show_regs_print_info+0x20/0x20 [ 1440.167188][T27677] ? load_image+0x420/0x420 [ 1440.171758][T27677] ? __lock_acquire+0x7d40/0x7d40 [ 1440.176849][T27677] should_fail_ex+0x39d/0x4d0 [ 1440.181606][T27677] should_failslab+0x9/0x20 [ 1440.186180][T27677] slab_pre_alloc_hook+0x59/0x310 [ 1440.191280][T27677] ? bpf_test_init+0x9f/0x140 [ 1440.196013][T27677] ? bpf_test_init+0x9f/0x140 [ 1440.200754][T27677] __kmem_cache_alloc_node+0x53/0x250 [ 1440.206204][T27677] ? bpf_test_init+0x9f/0x140 [ 1440.210941][T27677] __kmalloc+0xa4/0x230 [ 1440.215165][T27677] bpf_test_init+0x9f/0x140 [ 1440.219740][T27677] bpf_prog_test_run_xdp+0x4d1/0x10e0 [ 1440.225191][T27677] ? dev_put+0x80/0x80 [ 1440.229336][T27677] ? dev_put+0x80/0x80 [ 1440.233468][T27677] bpf_prog_test_run+0x321/0x390 [ 1440.238481][T27677] __sys_bpf+0x49d/0x890 [ 1440.242797][T27677] ? bpf_link_show_fdinfo+0x390/0x390 [ 1440.248258][T27677] ? lock_chain_count+0x20/0x20 [ 1440.253186][T27677] __x64_sys_bpf+0x7c/0x90 [ 1440.257659][T27677] do_syscall_64+0x55/0xa0 [ 1440.262117][T27677] ? clear_bhb_loop+0x40/0x90 [ 1440.266835][T27677] ? clear_bhb_loop+0x40/0x90 [ 1440.271557][T27677] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1440.277486][T27677] RIP: 0033:0x7f47d819ce59 [ 1440.281939][T27677] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1440.301581][T27677] RSP: 002b:00007f47d90d0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1440.310057][T27677] RAX: ffffffffffffffda RBX: 00007f47d8416090 RCX: 00007f47d819ce59 [ 1440.318065][T27677] RDX: 0000000000000050 RSI: 0000200000000c80 RDI: 000000000000000a [ 1440.326072][T27677] RBP: 00007f47d90d0090 R08: 0000000000000000 R09: 0000000000000000 [ 1440.334072][T27677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1440.342076][T27677] R13: 00007f47d8416128 R14: 00007f47d8416090 R15: 00007ffd8daed798 [ 1440.350099][T27677] [ 1440.657995][T27692] netlink: 'syz.1.6892': attribute type 10 has an invalid length. [ 1440.737538][T20720] Bluetooth: hci2: ISO packet for unknown connection handle 11 [ 1441.100975][T27702] netlink: 'syz.0.6896': attribute type 21 has an invalid length. [ 1441.123176][T27702] netlink: 'syz.0.6896': attribute type 6 has an invalid length. [ 1441.131671][T27702] netlink: 132 bytes leftover after parsing attributes in process `syz.0.6896'. [ 1441.636969][T20720] Bluetooth: hci3: ISO packet for unknown connection handle 11 [ 1441.923623][T27739] netlink: 'syz.1.6906': attribute type 10 has an invalid length. [ 1441.939602][T27735] netlink: 'syz.3.6908': attribute type 21 has an invalid length. [ 1441.949256][T27735] netlink: 'syz.3.6908': attribute type 6 has an invalid length. [ 1441.957336][T27735] netlink: 132 bytes leftover after parsing attributes in process `syz.3.6908'. [ 1442.383987][T27755] FAULT_INJECTION: forcing a failure. [ 1442.383987][T27755] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1442.409040][T27755] CPU: 1 PID: 27755 Comm: syz.2.6915 Not tainted syzkaller #0 [ 1442.416608][T27755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1442.426718][T27755] Call Trace: [ 1442.430045][T27755] [ 1442.433019][T27755] dump_stack_lvl+0x18c/0x250 [ 1442.437762][T27755] ? show_regs_print_info+0x20/0x20 [ 1442.443023][T27755] ? load_image+0x420/0x420 [ 1442.447593][T27755] ? __might_fault+0xaa/0x120 [ 1442.452335][T27755] ? __lock_acquire+0x7d40/0x7d40 [ 1442.457415][T27755] should_fail_ex+0x39d/0x4d0 [ 1442.462153][T27755] _copy_from_user+0x2f/0xe0 [ 1442.466806][T27755] ___sys_recvmsg+0x176/0x590 [ 1442.471543][T27755] ? __sys_recvmsg+0x2a0/0x2a0 [ 1442.473187][T27760] netlink: 68 bytes leftover after parsing attributes in process `syz.1.6916'. [ 1442.476370][T27755] ? __fget_files+0x43d/0x4b0 [ 1442.490035][T27755] __x64_sys_recvmsg+0x20c/0x2e0 [ 1442.495041][T27755] ? ___sys_recvmsg+0x590/0x590 [ 1442.499952][T27755] ? syscall_enter_from_user_mode+0x2e/0x80 [ 1442.505906][T27755] do_syscall_64+0x55/0xa0 [ 1442.510374][T27755] ? clear_bhb_loop+0x40/0x90 [ 1442.515107][T27755] ? clear_bhb_loop+0x40/0x90 [ 1442.519835][T27755] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1442.525788][T27755] RIP: 0033:0x7f47d819ce59 [ 1442.530252][T27755] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1442.549907][T27755] RSP: 002b:00007f47d90f1028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1442.558381][T27755] RAX: ffffffffffffffda RBX: 00007f47d8415fa0 RCX: 00007f47d819ce59 [ 1442.566405][T27755] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000004 [ 1442.574430][T27755] RBP: 00007f47d90f1090 R08: 0000000000000000 R09: 0000000000000000 [ 1442.582448][T27755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1442.590477][T27755] R13: 00007f47d8416038 R14: 00007f47d8415fa0 R15: 00007ffd8daed798 [ 1442.598529][T27755] [ 1442.627104][T20720] Bluetooth: hci3: unexpected event 0x08 length: 15 > 4 [ 1442.782884][T20720] Bluetooth: hci4: ISO packet for unknown connection handle 11 [ 1442.888134][T27774] netlink: 'syz.2.6921': attribute type 10 has an invalid length. [ 1442.932263][T27769] netlink: 132 bytes leftover after parsing attributes in process `syz.0.6920'. [ 1443.770825][T27806] netlink: 132 bytes leftover after parsing attributes in process `syz.2.6933'. [ 1443.796361][T20720] Bluetooth: hci2: ISO packet for unknown connection handle 11 [ 1444.722749][T27845] validate_nla: 5 callbacks suppressed [ 1444.722771][T27845] netlink: 'syz.1.6945': attribute type 21 has an invalid length. [ 1444.738835][T27845] netlink: 'syz.1.6945': attribute type 6 has an invalid length. [ 1444.766008][T27845] netlink: 132 bytes leftover after parsing attributes in process `syz.1.6945'. [ 1444.974126][T27852] netlink: 'syz.0.6946': attribute type 10 has an invalid length. [ 1446.001579][T27877] netlink: 209852 bytes leftover after parsing attributes in process `syz.2.6956'. [ 1446.023761][T27874] netlink: 'syz.0.6955': attribute type 21 has an invalid length. [ 1446.062154][T27874] netlink: 'syz.0.6955': attribute type 6 has an invalid length. [ 1446.070017][T27874] netlink: 132 bytes leftover after parsing attributes in process `syz.0.6955'. [ 1446.389223][T27888] netlink: 'syz.3.6957': attribute type 10 has an invalid length. [ 1446.812964][T27906] netlink: 'syz.3.6965': attribute type 21 has an invalid length. [ 1446.820904][T27906] netlink: 'syz.3.6965': attribute type 4 has an invalid length. [ 1446.877484][T27906] netlink: 156 bytes leftover after parsing attributes in process `syz.3.6965'. [ 1446.987541][T27914] netlink: 'syz.1.6968': attribute type 21 has an invalid length. [ 1447.004016][T27914] netlink: 'syz.1.6968': attribute type 6 has an invalid length. [ 1447.020407][T27906] netlink: 193500 bytes leftover after parsing attributes in process `syz.3.6965'. [ 1447.032037][T27914] netlink: 132 bytes leftover after parsing attributes in process `syz.1.6968'. [ 1448.212300][T27953] netlink: 132 bytes leftover after parsing attributes in process `syz.3.6979'. [ 1448.484288][T20720] Bluetooth: hci4: ISO packet for unknown connection handle 255 [ 1449.003393][T27981] FAULT_INJECTION: forcing a failure. [ 1449.003393][T27981] name failslab, interval 1, probability 0, space 0, times 0 [ 1449.037269][T27981] CPU: 1 PID: 27981 Comm: syz.2.6990 Not tainted syzkaller #0 [ 1449.044834][T27981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1449.054955][T27981] Call Trace: [ 1449.058285][T27981] [ 1449.061258][T27981] dump_stack_lvl+0x18c/0x250 [ 1449.066004][T27981] ? show_regs_print_info+0x20/0x20 [ 1449.071268][T27981] ? load_image+0x420/0x420 [ 1449.075828][T27981] ? verify_lock_unused+0x140/0x140 [ 1449.081080][T27981] ? perf_trace_lock+0xfc/0x3b0 [ 1449.085993][T27981] should_fail_ex+0x39d/0x4d0 [ 1449.090744][T27981] should_failslab+0x9/0x20 [ 1449.095321][T27981] slab_pre_alloc_hook+0x59/0x310 [ 1449.100428][T27981] kmem_cache_alloc+0x5a/0x2d0 [ 1449.105265][T27981] ? skb_clone+0x1eb/0x370 [ 1449.109763][T27981] skb_clone+0x1eb/0x370 [ 1449.114086][T27981] __netlink_deliver_tap+0x41c/0x830 [ 1449.119451][T27981] ? netlink_deliver_tap+0x2e/0x1b0 [ 1449.124727][T27981] netlink_deliver_tap+0x19c/0x1b0 [ 1449.129906][T27981] netlink_sendskb+0x68/0x130 [ 1449.134660][T27981] netlink_ack+0xce1/0x1180 [ 1449.139255][T27981] ? netlink_dump+0xe50/0xe50 [ 1449.143995][T27981] ? perf_trace_lock+0xfc/0x3b0 [ 1449.148912][T27981] netlink_rcv_skb+0x2c5/0x4d0 [ 1449.153762][T27981] ? rtnetlink_bind+0x80/0x80 [ 1449.158500][T27981] ? netlink_ack+0x1180/0x1180 [ 1449.163348][T27981] ? __lock_acquire+0x7d40/0x7d40 [ 1449.168432][T27981] ? netlink_deliver_tap+0x2e/0x1b0 [ 1449.173715][T27981] netlink_unicast+0x751/0x8d0 [ 1449.178546][T27981] netlink_sendmsg+0x8d0/0xbf0 [ 1449.183400][T27981] ? netlink_getsockopt+0x590/0x590 [ 1449.188661][T27981] ? aa_sock_msg_perm+0x94/0x150 [ 1449.193658][T27981] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 1449.198998][T27981] ? security_socket_sendmsg+0x80/0xa0 [ 1449.204513][T27981] ? netlink_getsockopt+0x590/0x590 [ 1449.209800][T27981] ____sys_sendmsg+0x5ba/0x960 [ 1449.214663][T27981] ? __asan_memset+0x22/0x40 [ 1449.219305][T27981] ? __sys_sendmsg_sock+0x30/0x30 [ 1449.224371][T27981] ? __import_iovec+0x5f2/0x850 [ 1449.229274][T27981] ? import_iovec+0x73/0xa0 [ 1449.233834][T27981] ___sys_sendmsg+0x2a6/0x360 [ 1449.238585][T27981] ? __sys_sendmsg+0x2a0/0x2a0 [ 1449.243434][T27981] ? __lock_acquire+0x7d40/0x7d40 [ 1449.248544][T27981] __se_sys_sendmsg+0x1c2/0x2b0 [ 1449.253453][T27981] ? __x64_sys_sendmsg+0x80/0x80 [ 1449.258463][T27981] ? lockdep_hardirqs_on+0x98/0x150 [ 1449.263721][T27981] do_syscall_64+0x55/0xa0 [ 1449.268186][T27981] ? clear_bhb_loop+0x40/0x90 [ 1449.272920][T27981] ? clear_bhb_loop+0x40/0x90 [ 1449.277658][T27981] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1449.283611][T27981] RIP: 0033:0x7f47d819ce59 [ 1449.288093][T27981] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1449.307755][T27981] RSP: 002b:00007f47d90f1028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1449.316241][T27981] RAX: ffffffffffffffda RBX: 00007f47d8415fa0 RCX: 00007f47d819ce59 [ 1449.324264][T27981] RDX: 0000000020004080 RSI: 0000200000000040 RDI: 0000000000000003 [ 1449.332290][T27981] RBP: 00007f47d90f1090 R08: 0000000000000000 R09: 0000000000000000 [ 1449.340318][T27981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1449.348342][T27981] R13: 00007f47d8416038 R14: 00007f47d8415fa0 R15: 00007ffd8daed798 [ 1449.356383][T27981] [ 1449.447959][T27988] netlink: 132 bytes leftover after parsing attributes in process `syz.1.6991'. [ 1450.211592][T28017] validate_nla: 8 callbacks suppressed [ 1450.211611][T28017] netlink: 'syz.2.7000': attribute type 10 has an invalid length. [ 1450.245618][T28018] netlink: 'syz.1.7002': attribute type 21 has an invalid length. [ 1450.265101][T28018] netlink: 'syz.1.7002': attribute type 6 has an invalid length. [ 1450.287939][T28018] netlink: 132 bytes leftover after parsing attributes in process `syz.1.7002'. [ 1451.345787][T28047] netlink: 'syz.0.7012': attribute type 10 has an invalid length. [ 1451.393157][T28051] netlink: 'syz.1.7013': attribute type 21 has an invalid length. [ 1451.416323][T28051] netlink: 'syz.1.7013': attribute type 6 has an invalid length. [ 1451.440104][T28051] netlink: 132 bytes leftover after parsing attributes in process `syz.1.7013'. [ 1451.454571][T28055] FAULT_INJECTION: forcing a failure. [ 1451.454571][T28055] name failslab, interval 1, probability 0, space 0, times 0 [ 1451.479600][T28055] CPU: 1 PID: 28055 Comm: syz.2.7014 Not tainted syzkaller #0 [ 1451.487158][T28055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1451.497300][T28055] Call Trace: [ 1451.500631][T28055] [ 1451.503613][T28055] dump_stack_lvl+0x18c/0x250 [ 1451.508370][T28055] ? show_regs_print_info+0x20/0x20 [ 1451.513661][T28055] ? load_image+0x420/0x420 [ 1451.518253][T28055] ? __lock_acquire+0x7d40/0x7d40 [ 1451.523350][T28055] should_fail_ex+0x39d/0x4d0 [ 1451.528106][T28055] should_failslab+0x9/0x20 [ 1451.532675][T28055] slab_pre_alloc_hook+0x59/0x310 [ 1451.537776][T28055] ? bpf_test_init+0x9f/0x140 [ 1451.542510][T28055] ? bpf_test_init+0x9f/0x140 [ 1451.547253][T28055] __kmem_cache_alloc_node+0x53/0x250 [ 1451.552696][T28055] ? bpf_test_init+0x9f/0x140 [ 1451.557439][T28055] __kmalloc+0xa4/0x230 [ 1451.561664][T28055] bpf_test_init+0x9f/0x140 [ 1451.566230][T28055] bpf_prog_test_run_xdp+0x4d1/0x10e0 [ 1451.571684][T28055] ? dev_put+0x80/0x80 [ 1451.575828][T28055] ? dev_put+0x80/0x80 [ 1451.579951][T28055] bpf_prog_test_run+0x321/0x390 [ 1451.584952][T28055] __sys_bpf+0x49d/0x890 [ 1451.589276][T28055] ? bpf_link_show_fdinfo+0x390/0x390 [ 1451.594687][T28055] ? lock_chain_count+0x20/0x20 [ 1451.599595][T28055] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 1451.605620][T28055] __x64_sys_bpf+0x7c/0x90 [ 1451.610099][T28055] do_syscall_64+0x55/0xa0 [ 1451.614563][T28055] ? clear_bhb_loop+0x40/0x90 [ 1451.619292][T28055] ? clear_bhb_loop+0x40/0x90 [ 1451.624020][T28055] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1451.629956][T28055] RIP: 0033:0x7f47d819ce59 [ 1451.634405][T28055] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1451.654089][T28055] RSP: 002b:00007f47d90f1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1451.662558][T28055] RAX: ffffffffffffffda RBX: 00007f47d8415fa0 RCX: 00007f47d819ce59 [ 1451.670578][T28055] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 1451.678604][T28055] RBP: 00007f47d90f1090 R08: 0000000000000000 R09: 0000000000000000 [ 1451.686629][T28055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1451.694649][T28055] R13: 00007f47d8416038 R14: 00007f47d8415fa0 R15: 00007ffd8daed798 [ 1451.702697][T28055] [ 1451.961777][T28068] netlink: 'syz.2.7019': attribute type 9 has an invalid length. [ 1451.990024][T28068] netlink: 209836 bytes leftover after parsing attributes in process `syz.2.7019'. [ 1452.269723][T28071] netlink: 'syz.2.7019': attribute type 9 has an invalid length. [ 1452.291916][T28071] netlink: 209836 bytes leftover after parsing attributes in process `syz.2.7019'. [ 1452.401521][T28084] netlink: 'syz.3.7024': attribute type 21 has an invalid length. [ 1452.440980][T28084] netlink: 'syz.3.7024': attribute type 6 has an invalid length. [ 1452.465311][T28084] netlink: 132 bytes leftover after parsing attributes in process `syz.3.7024'. [ 1452.891307][T28110] FAULT_INJECTION: forcing a failure. [ 1452.891307][T28110] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1452.912112][T28110] CPU: 0 PID: 28110 Comm: syz.1.7034 Not tainted syzkaller #0 [ 1452.919665][T28110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1452.929776][T28110] Call Trace: [ 1452.933117][T28110] [ 1452.936106][T28110] dump_stack_lvl+0x18c/0x250 [ 1452.940839][T28110] ? show_regs_print_info+0x20/0x20 [ 1452.946086][T28110] ? load_image+0x420/0x420 [ 1452.950636][T28110] ? __might_fault+0xaa/0x120 [ 1452.955348][T28110] should_fail_ex+0x39d/0x4d0 [ 1452.960067][T28110] copyin+0x1a/0x90 [ 1452.963918][T28110] _copy_from_iter+0x54f/0x12e0 [ 1452.968813][T28110] ? __virt_addr_valid+0x18c/0x540 [ 1452.973969][T28110] ? copyout_mc+0x70/0x70 [ 1452.978334][T28110] ? __virt_addr_valid+0x18c/0x540 [ 1452.983483][T28110] ? __virt_addr_valid+0x18c/0x540 [ 1452.988663][T28110] ? __virt_addr_valid+0x469/0x540 [ 1452.993814][T28110] ? __check_object_size+0x506/0xa20 [ 1452.999129][T28110] skb_copy_datagram_from_iter+0xf4/0x6e0 [ 1453.004888][T28110] ? __sanitizer_cov_trace_cmp4+0x36/0x90 [ 1453.010642][T28110] ? skb_put+0x11b/0x210 [ 1453.014930][T28110] packet_sendmsg+0x33ff/0x4c30 [ 1453.019836][T28110] ? perf_trace_run_bpf_submit+0xf4/0x1c0 [ 1453.025590][T28110] ? perf_trace_preemptirq_template+0x269/0x330 [ 1453.031896][T28110] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 1453.037936][T28110] ? lock_chain_count+0x20/0x20 [ 1453.042816][T28110] ? aa_sk_perm+0x83c/0x970 [ 1453.047364][T28110] ? packet_getsockopt+0xad0/0xad0 [ 1453.052512][T28110] ? lockdep_hardirqs_on+0x98/0x150 [ 1453.057749][T28110] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1453.063934][T28110] ? packet_getsockopt+0xad0/0xad0 [ 1453.069091][T28110] ? packet_getsockopt+0xad0/0xad0 [ 1453.074238][T28110] ____sys_sendmsg+0x5ba/0x960 [ 1453.079030][T28110] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1453.085217][T28110] ? __asan_memset+0x22/0x40 [ 1453.089843][T28110] ? __sys_sendmsg_sock+0x30/0x30 [ 1453.094888][T28110] ? __import_iovec+0x3fa/0x850 [ 1453.099769][T28110] ? import_iovec+0x73/0xa0 [ 1453.104301][T28110] ___sys_sendmsg+0x2a6/0x360 [ 1453.109007][T28110] ? __sys_sendmsg+0x2a0/0x2a0 [ 1453.113841][T28110] __se_sys_sendmsg+0x1c2/0x2b0 [ 1453.118752][T28110] ? __x64_sys_sendmsg+0x80/0x80 [ 1453.123756][T28110] ? syscall_enter_from_user_mode+0x2e/0x80 [ 1453.129695][T28110] do_syscall_64+0x55/0xa0 [ 1453.134156][T28110] ? clear_bhb_loop+0x40/0x90 [ 1453.138857][T28110] ? clear_bhb_loop+0x40/0x90 [ 1453.143566][T28110] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1453.149501][T28110] RIP: 0033:0x7f601e79ce59 [ 1453.153943][T28110] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1453.173575][T28110] RSP: 002b:00007f601c9f6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1453.182027][T28110] RAX: ffffffffffffffda RBX: 00007f601ea15fa0 RCX: 00007f601e79ce59 [ 1453.190031][T28110] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 1453.198047][T28110] RBP: 00007f601c9f6090 R08: 0000000000000000 R09: 0000000000000000 [ 1453.206047][T28110] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1453.214039][T28110] R13: 00007f601ea16038 R14: 00007f601ea15fa0 R15: 00007ffe33fca7e8 [ 1453.222051][T28110] [ 1453.503717][T28126] netlink: 132 bytes leftover after parsing attributes in process `syz.3.7039'. [ 1453.626380][T20720] Bluetooth: hci0: ISO packet for unknown connection handle 255 [ 1453.920523][T28153] netlink: 132 bytes leftover after parsing attributes in process `syz.3.7046'. [ 1454.083157][T28159] netlink: 152 bytes leftover after parsing attributes in process `syz.1.7045'. [ 1454.754507][T28169] netlink: 132 bytes leftover after parsing attributes in process `syz.2.7051'. [ 1454.895629][T20720] Bluetooth: hci3: ISO packet for unknown connection handle 255 [ 1455.948428][T28206] netlink: 14 bytes leftover after parsing attributes in process `syz.1.7063'. [ 1455.957946][T28206] netlink: del zone limit has 4 unknown bytes [ 1456.378811][T28209] validate_nla: 10 callbacks suppressed [ 1456.378833][T28209] netlink: 'syz.2.7064': attribute type 1 has an invalid length. [ 1456.411904][T28209] netlink: 16150 bytes leftover after parsing attributes in process `syz.2.7064'. [ 1456.464802][T28213] netlink: 'syz.0.7066': attribute type 21 has an invalid length. [ 1456.477134][T28213] netlink: 'syz.0.7066': attribute type 6 has an invalid length. [ 1456.485637][T28213] netlink: 132 bytes leftover after parsing attributes in process `syz.0.7066'. [ 1456.580244][T20720] Bluetooth: hci2: ISO packet for unknown connection handle 255 [ 1456.897802][T28236] netlink: 'syz.1.7072': attribute type 10 has an invalid length. [ 1457.125657][T28247] FAULT_INJECTION: forcing a failure. [ 1457.125657][T28247] name failslab, interval 1, probability 0, space 0, times 0 [ 1457.140885][T28247] CPU: 0 PID: 28247 Comm: syz.0.7078 Not tainted syzkaller #0 [ 1457.148414][T28247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1457.157554][T28245] netlink: 'syz.2.7079': attribute type 21 has an invalid length. [ 1457.158477][T28247] Call Trace: [ 1457.158490][T28247] [ 1457.158500][T28247] dump_stack_lvl+0x18c/0x250 [ 1457.172290][T28245] netlink: 'syz.2.7079': attribute type 6 has an invalid length. [ 1457.172643][T28247] ? show_regs_print_info+0x20/0x20 [ 1457.178400][T28245] netlink: 132 bytes leftover after parsing attributes in process `syz.2.7079'. [ 1457.185057][T28247] ? load_image+0x420/0x420 [ 1457.185095][T28247] ? __lock_acquire+0x7d40/0x7d40 [ 1457.185126][T28247] should_fail_ex+0x39d/0x4d0 [ 1457.185164][T28247] should_failslab+0x9/0x20 [ 1457.218292][T28247] slab_pre_alloc_hook+0x59/0x310 [ 1457.223390][T28247] ? __build_skb_around+0x255/0x3d0 [ 1457.228655][T28247] kmem_cache_alloc+0x5a/0x2d0 [ 1457.233485][T28247] ? _sctp_make_chunk+0x14e/0x420 [ 1457.238568][T28247] _sctp_make_chunk+0x14e/0x420 [ 1457.243482][T28247] sctp_make_datafrag_empty+0x12b/0x240 [ 1457.249099][T28247] ? sctp_make_ecne+0x340/0x340 [ 1457.254012][T28247] ? sctp_user_addto_chunk+0xb0/0x220 [ 1457.259447][T28247] sctp_datamsg_from_user+0x722/0xee0 [ 1457.264893][T28247] sctp_sendmsg_to_asoc+0x107f/0x1830 [ 1457.270324][T28247] ? __asan_memcpy+0x40/0x70 [ 1457.274980][T28247] ? sctp_assoc_add_peer+0xcf3/0x1390 [ 1457.280422][T28247] ? sctp_sendmsg_check_sflags+0x2d0/0x2d0 [ 1457.286290][T28247] ? __sctp_connect+0xd80/0xd80 [ 1457.291198][T28247] ? __local_bh_enable_ip+0x13a/0x1c0 [ 1457.296621][T28247] ? _local_bh_enable+0xa0/0xa0 [ 1457.301528][T28247] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 1457.307388][T28247] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 1457.313250][T28247] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 1457.318855][T28247] ? security_sctp_bind_connect+0x89/0xb0 [ 1457.324649][T28247] sctp_sendmsg+0x1b83/0x28c0 [ 1457.329408][T28247] ? sctp_getsockopt+0xb60/0xb60 [ 1457.334409][T28247] ? aa_sk_perm+0x83c/0x970 [ 1457.338982][T28247] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1457.345235][T28247] ? lockdep_hardirqs_on+0x98/0x150 [ 1457.350504][T28247] ? aa_af_perm+0x330/0x330 [ 1457.355084][T28247] ? sock_rps_record_flow+0x19/0x3f0 [ 1457.360477][T28247] ? inet_sendmsg+0x7c/0x2f0 [ 1457.365144][T28247] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 1457.370499][T28247] ? security_socket_sendmsg+0x80/0xa0 [ 1457.376013][T28247] ? inet_send_prepare+0x260/0x260 [ 1457.381186][T28247] ____sys_sendmsg+0x5ba/0x960 [ 1457.386008][T28247] ? __lock_acquire+0x7d40/0x7d40 [ 1457.391096][T28247] ? __asan_memset+0x22/0x40 [ 1457.395758][T28247] ? __sys_sendmsg_sock+0x30/0x30 [ 1457.400821][T28247] ? __import_iovec+0x5f2/0x850 [ 1457.405707][T28247] ? import_iovec+0x73/0xa0 [ 1457.410246][T28247] ___sys_sendmsg+0x2a6/0x360 [ 1457.415022][T28247] ? __sys_sendmsg+0x2a0/0x2a0 [ 1457.419858][T28247] ? seqcount_lockdep_reader_access+0x17b/0x1d0 [ 1457.426179][T28247] __se_sys_sendmsg+0x1c2/0x2b0 [ 1457.431080][T28247] ? __x64_sys_sendmsg+0x80/0x80 [ 1457.436092][T28247] ? lockdep_hardirqs_on+0x98/0x150 [ 1457.441361][T28247] do_syscall_64+0x55/0xa0 [ 1457.445828][T28247] ? clear_bhb_loop+0x40/0x90 [ 1457.450563][T28247] ? clear_bhb_loop+0x40/0x90 [ 1457.455304][T28247] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1457.461258][T28247] RIP: 0033:0x7f661319ce59 [ 1457.465722][T28247] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1457.485385][T28247] RSP: 002b:00007f6613f73028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1457.493861][T28247] RAX: ffffffffffffffda RBX: 00007f6613415fa0 RCX: 00007f661319ce59 [ 1457.501889][T28247] RDX: 00000000000080d1 RSI: 0000200000000140 RDI: 0000000000000005 [ 1457.509922][T28247] RBP: 00007f6613f73090 R08: 0000000000000000 R09: 0000000000000000 [ 1457.517957][T28247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1457.525989][T28247] R13: 00007f6613416038 R14: 00007f6613415fa0 R15: 00007ffd9357c938 [ 1457.534041][T28247] [ 1457.702385][T28259] netlink: 60 bytes leftover after parsing attributes in process `syz.0.7083'. [ 1457.719013][T28259] netlink: 60 bytes leftover after parsing attributes in process `syz.0.7083'. [ 1457.729333][T28259] netlink: 60 bytes leftover after parsing attributes in process `syz.0.7083'. [ 1457.739285][T28259] netlink: 60 bytes leftover after parsing attributes in process `syz.0.7083'. [ 1457.862480][T20720] Bluetooth: hci4: ISO packet for unknown connection handle 255 [ 1458.153983][T28276] netlink: 'syz.0.7088': attribute type 21 has an invalid length. [ 1458.179694][T28276] netlink: 'syz.0.7088': attribute type 6 has an invalid length. [ 1458.200140][T28276] netlink: 132 bytes leftover after parsing attributes in process `syz.0.7088'. [ 1458.304973][T28288] netlink: 'syz.1.7089': attribute type 10 has an invalid length. [ 1459.236251][T20720] Bluetooth: hci0: ISO packet for unknown connection handle 255 [ 1459.726451][T28322] netlink: 'syz.0.7101': attribute type 21 has an invalid length. [ 1459.761677][T28322] netlink: 132 bytes leftover after parsing attributes in process `syz.0.7101'. [ 1459.892177][T28332] netlink: 60 bytes leftover after parsing attributes in process `syz.2.7105'. [ 1459.901291][T28332] netlink: 60 bytes leftover after parsing attributes in process `syz.2.7105'. [ 1459.921107][T28334] netlink: 60 bytes leftover after parsing attributes in process `syz.0.7106'. [ 1459.975446][T28334] FAULT_INJECTION: forcing a failure. [ 1459.975446][T28334] name failslab, interval 1, probability 0, space 0, times 0 [ 1460.037523][T28334] CPU: 0 PID: 28334 Comm: syz.0.7106 Not tainted syzkaller #0 [ 1460.045086][T28334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1460.055197][T28334] Call Trace: [ 1460.058526][T28334] [ 1460.061528][T28334] dump_stack_lvl+0x18c/0x250 [ 1460.066285][T28334] ? show_regs_print_info+0x20/0x20 [ 1460.071557][T28334] ? load_image+0x420/0x420 [ 1460.076130][T28334] ? __might_sleep+0xe0/0xe0 [ 1460.080779][T28334] ? __lock_acquire+0x7d40/0x7d40 [ 1460.085864][T28334] should_fail_ex+0x39d/0x4d0 [ 1460.090632][T28334] should_failslab+0x9/0x20 [ 1460.095194][T28334] slab_pre_alloc_hook+0x59/0x310 [ 1460.100288][T28334] ? sctp_transport_new+0x7e/0x630 [ 1460.105469][T28334] __kmem_cache_alloc_node+0x53/0x250 [ 1460.110901][T28334] ? sctp_transport_new+0x7e/0x630 [ 1460.116059][T28334] kmalloc_trace+0x2a/0xe0 [ 1460.120544][T28334] sctp_transport_new+0x7e/0x630 [ 1460.125540][T28334] sctp_assoc_add_peer+0x259/0x1390 [ 1460.130795][T28334] ? sctp_bind_addr_copy+0x37b/0x3c0 [ 1460.136123][T28334] sctp_connect_new_asoc+0x323/0x6a0 [ 1460.141430][T28334] ? __sctp_connect+0xd80/0xd80 [ 1460.146310][T28334] ? __local_bh_enable_ip+0x13a/0x1c0 [ 1460.151745][T28334] ? _local_bh_enable+0xa0/0xa0 [ 1460.156653][T28334] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 1460.162511][T28334] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 1460.168343][T28334] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 1460.173913][T28334] ? security_sctp_bind_connect+0x89/0xb0 [ 1460.179690][T28334] sctp_sendmsg+0x1575/0x28c0 [ 1460.184395][T28334] ? sctp_getsockopt+0xb60/0xb60 [ 1460.189352][T28334] ? aa_sk_perm+0x83c/0x970 [ 1460.193898][T28334] ? perf_trace_preemptirq_template+0x269/0x330 [ 1460.200205][T28334] ? aa_af_perm+0x330/0x330 [ 1460.204779][T28334] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 1460.211249][T28334] ? lock_chain_count+0x20/0x20 [ 1460.216156][T28334] ? sock_rps_record_flow+0x19/0x3f0 [ 1460.221522][T28334] ? inet_sendmsg+0x7c/0x2f0 [ 1460.226171][T28334] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 1460.231513][T28334] ? security_socket_sendmsg+0x80/0xa0 [ 1460.237024][T28334] ? inet_send_prepare+0x260/0x260 [ 1460.242200][T28334] ____sys_sendmsg+0x5ba/0x960 [ 1460.247017][T28334] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1460.253242][T28334] ? __asan_memset+0x22/0x40 [ 1460.257899][T28334] ? __sys_sendmsg_sock+0x30/0x30 [ 1460.262974][T28334] ? __import_iovec+0x5f2/0x850 [ 1460.267885][T28334] ? import_iovec+0x73/0xa0 [ 1460.272425][T28334] ___sys_sendmsg+0x2a6/0x360 [ 1460.277155][T28334] ? __sys_sendmsg+0x2a0/0x2a0 [ 1460.282008][T28334] __se_sys_sendmsg+0x1c2/0x2b0 [ 1460.286895][T28334] ? __x64_sys_sendmsg+0x80/0x80 [ 1460.291878][T28334] do_syscall_64+0x55/0xa0 [ 1460.296327][T28334] ? clear_bhb_loop+0x40/0x90 [ 1460.301033][T28334] ? clear_bhb_loop+0x40/0x90 [ 1460.305738][T28334] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1460.311667][T28334] RIP: 0033:0x7f661319ce59 [ 1460.316122][T28334] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1460.335767][T28334] RSP: 002b:00007f6613f73028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1460.344221][T28334] RAX: ffffffffffffffda RBX: 00007f6613415fa0 RCX: 00007f661319ce59 [ 1460.352234][T28334] RDX: 00000000000080d1 RSI: 0000200000000140 RDI: 000000000000000a [ 1460.360233][T28334] RBP: 00007f6613f73090 R08: 0000000000000000 R09: 0000000000000000 [ 1460.368239][T28334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1460.376237][T28334] R13: 00007f6613416038 R14: 00007f6613415fa0 R15: 00007ffd9357c938 [ 1460.384253][T28334] [ 1460.508879][T20720] Bluetooth: hci4: ISO packet for unknown connection handle 255 [ 1460.744602][T28356] FAULT_INJECTION: forcing a failure. [ 1460.744602][T28356] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1460.781943][T28356] CPU: 0 PID: 28356 Comm: syz.1.7111 Not tainted syzkaller #0 [ 1460.789536][T28356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1460.799655][T28356] Call Trace: [ 1460.802983][T28356] [ 1460.805960][T28356] dump_stack_lvl+0x18c/0x250 [ 1460.810709][T28356] ? show_regs_print_info+0x20/0x20 [ 1460.815973][T28356] ? load_image+0x420/0x420 [ 1460.820548][T28356] ? __lock_acquire+0x7d40/0x7d40 [ 1460.825662][T28356] ? snprintf+0xe9/0x140 [ 1460.829973][T28356] should_fail_ex+0x39d/0x4d0 [ 1460.834742][T28356] _copy_to_user+0x2f/0xa0 [ 1460.839226][T28356] simple_read_from_buffer+0xe7/0x150 [ 1460.844674][T28356] proc_fail_nth_read+0x1e8/0x260 [ 1460.849764][T28356] ? proc_fault_inject_write+0x360/0x360 [ 1460.855484][T28356] ? fsnotify_perm+0x271/0x5e0 [ 1460.860309][T28356] ? proc_fault_inject_write+0x360/0x360 [ 1460.866008][T28356] vfs_read+0x28b/0x970 [ 1460.870234][T28356] ? kernel_read+0x1e0/0x1e0 [ 1460.874902][T28356] ? __fget_files+0x28/0x4b0 [ 1460.879530][T28356] ? __fget_files+0x28/0x4b0 [ 1460.884157][T28356] ? __fget_files+0x43d/0x4b0 [ 1460.888882][T28356] ? __fdget_pos+0x2a3/0x330 [ 1460.893508][T28356] ? ksys_read+0x75/0x260 [ 1460.897875][T28356] ksys_read+0x150/0x260 [ 1460.902161][T28356] ? vfs_write+0x990/0x990 [ 1460.906617][T28356] ? lockdep_hardirqs_on+0x98/0x150 [ 1460.911856][T28356] do_syscall_64+0x55/0xa0 [ 1460.916300][T28356] ? clear_bhb_loop+0x40/0x90 [ 1460.921013][T28356] ? clear_bhb_loop+0x40/0x90 [ 1460.925733][T28356] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1460.931666][T28356] RIP: 0033:0x7f601e75d68e [ 1460.936109][T28356] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1460.955757][T28356] RSP: 002b:00007f601c9d4fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1460.964213][T28356] RAX: ffffffffffffffda RBX: 00007f601c9d56c0 RCX: 00007f601e75d68e [ 1460.972233][T28356] RDX: 000000000000000f RSI: 00007f601c9d50a0 RDI: 0000000000000007 [ 1460.980244][T28356] RBP: 00007f601c9d5090 R08: 0000000000000000 R09: 0000000000000000 [ 1460.988260][T28356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1460.996286][T28356] R13: 00007f601ea16128 R14: 00007f601ea16090 R15: 00007ffe33fca7e8 [ 1461.004315][T28356] [ 1461.383485][T20720] Bluetooth: hci2: ISO packet for unknown connection handle 255 [ 1461.544299][T28393] validate_nla: 4 callbacks suppressed [ 1461.544318][T28393] netlink: 'syz.2.7122': attribute type 10 has an invalid length. [ 1461.793754][T28402] netlink: 'syz.0.7127': attribute type 21 has an invalid length. [ 1461.809265][T28402] netlink: 'syz.0.7127': attribute type 6 has an invalid length. [ 1462.037700][T28412] netlink: 'syz.3.7131': attribute type 9 has an invalid length. [ 1462.188482][T28418] netlink: 'syz.3.7131': attribute type 9 has an invalid length. [ 1462.221882][T28418] __nla_validate_parse: 7 callbacks suppressed [ 1462.221902][T28418] netlink: 209836 bytes leftover after parsing attributes in process `syz.3.7131'. [ 1462.222323][T20720] Bluetooth: hci3: ISO packet for unknown connection handle 255 [ 1462.535783][T28428] netlink: 'syz.1.7136': attribute type 2 has an invalid length. [ 1462.544677][T28428] netlink: 14 bytes leftover after parsing attributes in process `syz.1.7136'. [ 1462.737902][T28434] netlink: 'syz.0.7138': attribute type 21 has an invalid length. [ 1462.746072][T28434] netlink: 'syz.0.7138': attribute type 6 has an invalid length. [ 1462.777048][T28434] netlink: 132 bytes leftover after parsing attributes in process `syz.0.7138'. [ 1462.875862][T28438] netlink: 'syz.3.7140': attribute type 64 has an invalid length. [ 1463.060621][T20720] Bluetooth: hci3: ISO packet for unknown connection handle 255 [ 1463.200772][T28454] netlink: 'syz.1.7143': attribute type 10 has an invalid length. [ 1463.630500][T28466] netlink: 132 bytes leftover after parsing attributes in process `syz.2.7150'. [ 1463.674351][T28471] netlink: 14 bytes leftover after parsing attributes in process `syz.0.7152'. [ 1463.692110][T28471] FAULT_INJECTION: forcing a failure. [ 1463.692110][T28471] name failslab, interval 1, probability 0, space 0, times 0 [ 1463.717776][T28471] CPU: 0 PID: 28471 Comm: syz.0.7152 Not tainted syzkaller #0 [ 1463.725344][T28471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1463.735449][T28471] Call Trace: [ 1463.738756][T28471] [ 1463.741711][T28471] dump_stack_lvl+0x18c/0x250 [ 1463.746441][T28471] ? show_regs_print_info+0x20/0x20 [ 1463.751675][T28471] ? load_image+0x420/0x420 [ 1463.756210][T28471] ? __might_sleep+0xe0/0xe0 [ 1463.760836][T28471] ? __lock_acquire+0x7d40/0x7d40 [ 1463.765888][T28471] should_fail_ex+0x39d/0x4d0 [ 1463.770609][T28471] should_failslab+0x9/0x20 [ 1463.775152][T28471] slab_pre_alloc_hook+0x59/0x310 [ 1463.780218][T28471] ? lockdep_hardirqs_on+0x98/0x150 [ 1463.785449][T28471] kmem_cache_alloc_node+0x60/0x320 [ 1463.790678][T28471] ? __alloc_skb+0x103/0x2c0 [ 1463.795301][T28471] __alloc_skb+0x103/0x2c0 [ 1463.799748][T28471] netlink_ack+0x376/0x1180 [ 1463.804288][T28471] ? __dev_queue_xmit+0x265/0x3660 [ 1463.809473][T28471] ? netlink_dump+0xe50/0xe50 [ 1463.814197][T28471] ? ref_tracker_free+0x690/0x840 [ 1463.819257][T28471] netlink_rcv_skb+0x2c5/0x4d0 [ 1463.824065][T28471] ? rtnetlink_bind+0x80/0x80 [ 1463.828782][T28471] ? netlink_ack+0x1180/0x1180 [ 1463.833611][T28471] ? __lock_acquire+0x7d40/0x7d40 [ 1463.838672][T28471] ? netlink_deliver_tap+0x2e/0x1b0 [ 1463.843931][T28471] netlink_unicast+0x751/0x8d0 [ 1463.848747][T28471] netlink_sendmsg+0x8d0/0xbf0 [ 1463.853554][T28471] ? netlink_getsockopt+0x590/0x590 [ 1463.858799][T28471] ? aa_sock_msg_perm+0x94/0x150 [ 1463.863776][T28471] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 1463.869086][T28471] ? security_socket_sendmsg+0x80/0xa0 [ 1463.874573][T28471] ? netlink_getsockopt+0x590/0x590 [ 1463.879816][T28471] ____sys_sendmsg+0x5ba/0x960 [ 1463.884612][T28471] ? __asan_memset+0x22/0x40 [ 1463.889249][T28471] ? __sys_sendmsg_sock+0x30/0x30 [ 1463.894297][T28471] ? __import_iovec+0x5f2/0x850 [ 1463.899181][T28471] ? import_iovec+0x73/0xa0 [ 1463.903735][T28471] ___sys_sendmsg+0x2a6/0x360 [ 1463.908441][T28471] ? get_pid_task+0x20/0x1e0 [ 1463.913066][T28471] ? __sys_sendmsg+0x2a0/0x2a0 [ 1463.917912][T28471] ? __lock_acquire+0x7d40/0x7d40 [ 1463.922997][T28471] __se_sys_sendmsg+0x1c2/0x2b0 [ 1463.927881][T28471] ? __x64_sys_sendmsg+0x80/0x80 [ 1463.932867][T28471] ? lockdep_hardirqs_on+0x98/0x150 [ 1463.938103][T28471] do_syscall_64+0x55/0xa0 [ 1463.942543][T28471] ? clear_bhb_loop+0x40/0x90 [ 1463.947255][T28471] ? clear_bhb_loop+0x40/0x90 [ 1463.951968][T28471] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1463.957895][T28471] RIP: 0033:0x7f661319ce59 [ 1463.962344][T28471] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1463.981986][T28471] RSP: 002b:00007f6613f73028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1463.990438][T28471] RAX: ffffffffffffffda RBX: 00007f6613415fa0 RCX: 00007f661319ce59 [ 1463.998442][T28471] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 1464.006442][T28471] RBP: 00007f6613f73090 R08: 0000000000000000 R09: 0000000000000000 [ 1464.014435][T28471] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1464.022431][T28471] R13: 00007f6613416038 R14: 00007f6613415fa0 R15: 00007ffd9357c938 [ 1464.030447][T28471] [ 1464.191249][T20720] Bluetooth: hci0: ISO packet for unknown connection handle 255 [ 1464.627722][T28497] netlink: 132 bytes leftover after parsing attributes in process `syz.3.7162'. [ 1464.736006][T28501] FAULT_INJECTION: forcing a failure. [ 1464.736006][T28501] name failslab, interval 1, probability 0, space 0, times 0 [ 1464.749676][T28501] CPU: 1 PID: 28501 Comm: syz.0.7163 Not tainted syzkaller #0 [ 1464.757204][T28501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1464.767337][T28501] Call Trace: [ 1464.770667][T28501] [ 1464.773643][T28501] dump_stack_lvl+0x18c/0x250 [ 1464.778393][T28501] ? show_regs_print_info+0x20/0x20 [ 1464.783655][T28501] ? load_image+0x420/0x420 [ 1464.788227][T28501] ? __might_sleep+0xe0/0xe0 [ 1464.792888][T28501] ? __lock_acquire+0x7d40/0x7d40 [ 1464.797981][T28501] should_fail_ex+0x39d/0x4d0 [ 1464.802734][T28501] should_failslab+0x9/0x20 [ 1464.807297][T28501] slab_pre_alloc_hook+0x59/0x310 [ 1464.812430][T28501] kmem_cache_alloc_node+0x60/0x320 [ 1464.817696][T28501] ? __alloc_skb+0x103/0x2c0 [ 1464.822353][T28501] __alloc_skb+0x103/0x2c0 [ 1464.826835][T28501] rtmsg_ifinfo_build_skb+0x8c/0x260 [ 1464.832178][T28501] ? __dev_close_many+0x23d/0x2b0 [ 1464.837273][T28501] rtmsg_ifinfo+0x8c/0x1a0 [ 1464.841759][T28501] dev_close_many+0x27f/0x410 [ 1464.846501][T28501] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1464.852724][T28501] ? __dev_open+0x430/0x430 [ 1464.857286][T28501] ? rtnl_is_locked+0x9/0x20 [ 1464.861940][T28501] ? mutex_is_locked+0x12/0x40 [ 1464.866783][T28501] unregister_netdevice_many_notify+0x4c4/0x1900 [ 1464.873177][T28501] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 1464.879227][T28501] ? unregister_netdevice_many+0x20/0x20 [ 1464.884911][T28501] ? unregister_netdevice_queue+0x1ae/0x370 [ 1464.890876][T28501] ? list_netdevice+0x730/0x730 [ 1464.895774][T28501] ? __dev_get_by_index+0x9f/0x110 [ 1464.900934][T28501] ? __dev_get_by_index+0xef/0x110 [ 1464.906080][T28501] ? xfrmi_changelink+0x7d0/0x7d0 [ 1464.911251][T28501] rtnl_dellink+0x500/0x7c0 [ 1464.915801][T28501] ? rtnl_newlink+0x20a0/0x20a0 [ 1464.920699][T28501] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1464.926907][T28501] ? lockdep_hardirqs_on+0x98/0x150 [ 1464.932164][T28501] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1464.938451][T28501] ? mutex_lock_nested+0x20/0x20 [ 1464.943469][T28501] ? rtnl_newlink+0x20a0/0x20a0 [ 1464.948387][T28501] rtnetlink_rcv_msg+0x869/0xfa0 [ 1464.953389][T28501] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 1464.958576][T28501] ? rtnetlink_bind+0x80/0x80 [ 1464.963327][T28501] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1464.969554][T28501] ? lockdep_hardirqs_on+0x98/0x150 [ 1464.974827][T28501] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1464.981059][T28501] ? __dev_queue_xmit+0x265/0x3660 [ 1464.986270][T28501] ? __local_bh_enable_ip+0x142/0x1c0 [ 1464.991706][T28501] ? _local_bh_enable+0xa0/0xa0 [ 1464.996623][T28501] ? __dev_queue_xmit+0x265/0x3660 [ 1465.001804][T28501] ? __dev_queue_xmit+0x265/0x3660 [ 1465.006991][T28501] ? __dev_queue_xmit+0x1b2c/0x3660 [ 1465.012266][T28501] ? __dev_queue_xmit+0x265/0x3660 [ 1465.017454][T28501] ? perf_trace_lock+0xfc/0x3b0 [ 1465.022383][T28501] netlink_rcv_skb+0x241/0x4d0 [ 1465.027216][T28501] ? rtnetlink_bind+0x80/0x80 [ 1465.031982][T28501] ? netlink_ack+0x1180/0x1180 [ 1465.036824][T28501] ? __lock_acquire+0x7d40/0x7d40 [ 1465.041913][T28501] ? netlink_deliver_tap+0x2e/0x1b0 [ 1465.047188][T28501] netlink_unicast+0x751/0x8d0 [ 1465.052029][T28501] netlink_sendmsg+0x8d0/0xbf0 [ 1465.056863][T28501] ? lockdep_hardirqs_on+0x98/0x150 [ 1465.062130][T28501] ? netlink_getsockopt+0x590/0x590 [ 1465.067441][T28501] ? aa_sock_msg_perm+0x94/0x150 [ 1465.072444][T28501] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 1465.077787][T28501] ? security_socket_sendmsg+0x80/0xa0 [ 1465.083305][T28501] ? netlink_getsockopt+0x590/0x590 [ 1465.088584][T28501] ____sys_sendmsg+0x5ba/0x960 [ 1465.093417][T28501] ? __asan_memset+0x22/0x40 [ 1465.098067][T28501] ? __sys_sendmsg_sock+0x30/0x30 [ 1465.103148][T28501] ? __import_iovec+0x5f2/0x850 [ 1465.108070][T28501] ? import_iovec+0x73/0xa0 [ 1465.112642][T28501] ___sys_sendmsg+0x2a6/0x360 [ 1465.117378][T28501] ? __sys_sendmsg+0x2a0/0x2a0 [ 1465.122225][T28501] __se_sys_sendmsg+0x1c2/0x2b0 [ 1465.127122][T28501] ? __x64_sys_sendmsg+0x80/0x80 [ 1465.132127][T28501] ? syscall_enter_from_user_mode+0x2e/0x80 [ 1465.138064][T28501] do_syscall_64+0x55/0xa0 [ 1465.142521][T28501] ? clear_bhb_loop+0x40/0x90 [ 1465.147233][T28501] ? clear_bhb_loop+0x40/0x90 [ 1465.151968][T28501] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1465.157911][T28501] RIP: 0033:0x7f661319ce59 [ 1465.162361][T28501] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1465.182012][T28501] RSP: 002b:00007f6613f73028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1465.190461][T28501] RAX: ffffffffffffffda RBX: 00007f6613415fa0 RCX: 00007f661319ce59 [ 1465.198461][T28501] RDX: 0000000000000000 RSI: 0000200000000600 RDI: 000000000000000f [ 1465.206479][T28501] RBP: 00007f6613f73090 R08: 0000000000000000 R09: 0000000000000000 [ 1465.214496][T28501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1465.222500][T28501] R13: 00007f6613416038 R14: 00007f6613415fa0 R15: 00007ffd9357c938 [ 1465.230518][T28501] [ 1465.619220][T28526] FAULT_INJECTION: forcing a failure. [ 1465.619220][T28526] name failslab, interval 1, probability 0, space 0, times 0 [ 1465.633613][T28526] CPU: 0 PID: 28526 Comm: syz.2.7170 Not tainted syzkaller #0 [ 1465.641145][T28526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1465.651262][T28526] Call Trace: [ 1465.654603][T28526] [ 1465.657562][T28526] dump_stack_lvl+0x18c/0x250 [ 1465.662291][T28526] ? show_regs_print_info+0x20/0x20 [ 1465.667538][T28526] ? load_image+0x420/0x420 [ 1465.672082][T28526] ? __might_sleep+0xe0/0xe0 [ 1465.676701][T28526] ? __lock_acquire+0x7d40/0x7d40 [ 1465.681775][T28526] should_fail_ex+0x39d/0x4d0 [ 1465.686495][T28526] should_failslab+0x9/0x20 [ 1465.691036][T28526] slab_pre_alloc_hook+0x59/0x310 [ 1465.696104][T28526] ? apparmor_sk_alloc_security+0x77/0x100 [ 1465.701948][T28526] __kmem_cache_alloc_node+0x53/0x250 [ 1465.707379][T28526] ? apparmor_sk_alloc_security+0x77/0x100 [ 1465.713219][T28526] kmalloc_trace+0x2a/0xe0 [ 1465.717668][T28526] apparmor_sk_alloc_security+0x77/0x100 [ 1465.723338][T28526] security_sk_alloc+0x6e/0xa0 [ 1465.728157][T28526] sk_prot_alloc+0x101/0x210 [ 1465.732807][T28526] ? sk_alloc+0x24/0x360 [ 1465.737103][T28526] sk_alloc+0x3a/0x360 [ 1465.741222][T28526] ? bpf_ctx_init+0x163/0x1a0 [ 1465.745946][T28526] ? bpf_prog_test_run_skb+0x273/0x12b0 [ 1465.751533][T28526] bpf_prog_test_run_skb+0x3a5/0x12b0 [ 1465.756937][T28526] ? __fget_files+0x28/0x4b0 [ 1465.761560][T28526] ? __fget_files+0x28/0x4b0 [ 1465.766185][T28526] ? __fget_files+0x43d/0x4b0 [ 1465.770906][T28526] ? cpu_online+0x60/0x60 [ 1465.775264][T28526] bpf_prog_test_run+0x321/0x390 [ 1465.780231][T28526] __sys_bpf+0x49d/0x890 [ 1465.784500][T28526] ? bpf_link_show_fdinfo+0x390/0x390 [ 1465.789904][T28526] ? lock_chain_count+0x20/0x20 [ 1465.794796][T28526] __x64_sys_bpf+0x7c/0x90 [ 1465.799247][T28526] do_syscall_64+0x55/0xa0 [ 1465.803693][T28526] ? clear_bhb_loop+0x40/0x90 [ 1465.808407][T28526] ? clear_bhb_loop+0x40/0x90 [ 1465.813121][T28526] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1465.819046][T28526] RIP: 0033:0x7f47d819ce59 [ 1465.823488][T28526] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1465.843124][T28526] RSP: 002b:00007f47d90f1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1465.851568][T28526] RAX: ffffffffffffffda RBX: 00007f47d8415fa0 RCX: 00007f47d819ce59 [ 1465.859569][T28526] RDX: 0000000000000024 RSI: 0000200000000640 RDI: 000000000000000a [ 1465.867573][T28526] RBP: 00007f47d90f1090 R08: 0000000000000000 R09: 0000000000000000 [ 1465.875568][T28526] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1465.883559][T28526] R13: 00007f47d8416038 R14: 00007f47d8415fa0 R15: 00007ffd8daed798 [ 1465.891567][T28526] [ 1465.906048][T20720] Bluetooth: hci4: ISO packet for unknown connection handle 255 [ 1466.100665][T28534] netlink: 132 bytes leftover after parsing attributes in process `syz.2.7173'. [ 1466.328454][T28547] netlink: 14 bytes leftover after parsing attributes in process `syz.2.7177'. [ 1466.572487][T28547] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1466.594625][T28547] bond_slave_0: left promiscuous mode [ 1466.608117][T28547] bond_slave_0: left allmulticast mode [ 1466.654481][T28547] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1466.680486][T28547] bond_slave_1: left promiscuous mode [ 1466.689618][T28547] bond_slave_1: left allmulticast mode [ 1466.804185][T28547] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 1466.822897][T28547] dummy0: left promiscuous mode [ 1466.828033][T28547] dummy0: left allmulticast mode [ 1466.854560][T28547] bond0 (unregistering): Released all slaves [ 1466.881267][T26936] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 1466.896562][T26936] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 1466.906524][T26936] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 1466.929336][T26936] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 1466.941633][T26936] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 1466.950772][T26936] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 1467.274444][T28566] validate_nla: 9 callbacks suppressed [ 1467.274463][T28566] netlink: 'syz.3.7180': attribute type 10 has an invalid length. [ 1467.415103][T26936] Bluetooth: hci4: ISO packet for unknown connection handle 255 [ 1467.601551][T28551] chnl_net:caif_netlink_parms(): no params data found [ 1467.737506][T28551] bridge0: port 1(bridge_slave_0) entered blocking state [ 1467.744956][T28551] bridge0: port 1(bridge_slave_0) entered disabled state [ 1467.752822][T28551] bridge_slave_0: entered allmulticast mode [ 1467.760780][T28551] bridge_slave_0: entered promiscuous mode [ 1467.770263][T28582] netlink: 'syz.1.7185': attribute type 21 has an invalid length. [ 1467.782184][T28582] netlink: 'syz.1.7185': attribute type 6 has an invalid length. [ 1467.790602][T28582] netlink: 132 bytes leftover after parsing attributes in process `syz.1.7185'. [ 1467.802571][T28551] bridge0: port 2(bridge_slave_1) entered blocking state [ 1467.811354][T28551] bridge0: port 2(bridge_slave_1) entered disabled state [ 1467.819307][T28551] bridge_slave_1: entered allmulticast mode [ 1467.835348][T28551] bridge_slave_1: entered promiscuous mode [ 1467.901082][T28551] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1467.920372][T28551] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1468.027626][T28551] team0: Port device team_slave_0 added [ 1468.056510][T28551] team0: Port device team_slave_1 added [ 1468.143541][T28551] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1468.160776][T28551] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1468.218754][T28551] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1468.266830][T28551] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1468.281873][T28551] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1468.340455][T28551] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1468.478445][T28551] hsr_slave_0: entered promiscuous mode [ 1468.498204][T28551] hsr_slave_1: entered promiscuous mode [ 1468.514908][T28551] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1468.535545][T28551] Cannot create hsr debugfs directory [ 1468.592253][T26936] Bluetooth: hci4: ISO packet for unknown connection handle 255 [ 1468.881389][T28608] netlink: 'syz.1.7194': attribute type 21 has an invalid length. [ 1468.892530][T28608] netlink: 'syz.1.7194': attribute type 6 has an invalid length. [ 1468.900376][T28608] netlink: 132 bytes leftover after parsing attributes in process `syz.1.7194'. [ 1469.030136][T28551] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1469.045368][T26936] Bluetooth: hci1: command tx timeout [ 1469.157963][T28620] netlink: 'syz.3.7195': attribute type 10 has an invalid length. [ 1469.195231][T28622] netlink: 'syz.1.7198': attribute type 46 has an invalid length. [ 1469.254391][T28551] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1469.277047][T28622] netlink: 'syz.1.7198': attribute type 46 has an invalid length. [ 1469.356886][T28551] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1469.446801][T28551] netdevsim netdevsim0 ÿÿÿÿÿÿ (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1469.588732][T26936] Bluetooth: hci4: ISO packet for unknown connection handle 255 [ 1469.717183][T28551] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1469.736443][T28551] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1469.757543][T28551] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1469.777168][T28551] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1469.944400][T28640] netlink: 'syz.1.7204': attribute type 21 has an invalid length. [ 1469.955272][T28640] netlink: 'syz.1.7204': attribute type 6 has an invalid length. [ 1469.966495][T28640] netlink: 132 bytes leftover after parsing attributes in process `syz.1.7204'. [ 1469.978463][T28642] netlink: 4 bytes leftover after parsing attributes in process `syz.3.7206'. [ 1470.188062][T28551] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1470.236705][T28551] 8021q: adding VLAN 0 to HW filter on device team0 [ 1470.255178][T25471] bridge0: port 1(bridge_slave_0) entered blocking state [ 1470.262434][T25471] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1470.296953][T25471] bridge0: port 2(bridge_slave_1) entered blocking state [ 1470.304226][T25471] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1470.356833][T28551] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1470.369610][T28551] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1470.404369][T26936] Bluetooth: hci2: ISO packet for unknown connection handle 255 [ 1470.575231][T28663] netlink: 152 bytes leftover after parsing attributes in process `syz.1.7212'. [ 1470.612238][T28663] : renamed from team_slave_0 [ 1470.919512][T28551] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1470.989443][T28551] veth0_vlan: entered promiscuous mode [ 1470.996354][T28679] netlink: 132 bytes leftover after parsing attributes in process `syz.1.7216'. [ 1471.017042][T28551] veth1_vlan: entered promiscuous mode [ 1471.079089][T28551] veth0_macvtap: entered promiscuous mode [ 1471.091964][T28551] veth1_macvtap: entered promiscuous mode [ 1471.122167][T26936] Bluetooth: hci1: command tx timeout [ 1471.131350][T28551] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1471.142594][T28551] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1471.155525][T28551] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1471.175206][T28551] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1471.187089][T28551] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1471.200918][T28551] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1471.245022][T28551] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1471.255609][T28551] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1471.266842][T28551] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1471.279158][T28551] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1471.296445][T28684] netlink: 703 bytes leftover after parsing attributes in process `syz.1.7218'. [ 1471.441167][T25458] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1471.467113][T25458] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1471.554936][T25470] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1471.584189][T25470] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1471.644856][T26936] Bluetooth: hci0: ISO packet for unknown connection handle 255 [ 1471.979476][T28703] netlink: 132 bytes leftover after parsing attributes in process `syz.3.7225'. [ 1472.027240][T28706] FAULT_INJECTION: forcing a failure. [ 1472.027240][T28706] name failslab, interval 1, probability 0, space 0, times 0 [ 1472.048235][T28706] CPU: 0 PID: 28706 Comm: syz.0.7227 Not tainted syzkaller #0 [ 1472.055818][T28706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1472.065940][T28706] Call Trace: [ 1472.069295][T28706] [ 1472.072296][T28706] dump_stack_lvl+0x18c/0x250 [ 1472.077076][T28706] ? show_regs_print_info+0x20/0x20 [ 1472.082370][T28706] ? load_image+0x420/0x420 [ 1472.086970][T28706] ? verify_lock_unused+0x140/0x140 [ 1472.092257][T28706] ? perf_trace_lock+0x304/0x3b0 [ 1472.097295][T28706] should_fail_ex+0x39d/0x4d0 [ 1472.102111][T28706] should_failslab+0x9/0x20 [ 1472.106711][T28706] slab_pre_alloc_hook+0x59/0x310 [ 1472.111853][T28706] kmem_cache_alloc+0x5a/0x2d0 [ 1472.116708][T28706] ? skb_clone+0x1eb/0x370 [ 1472.121223][T28706] skb_clone+0x1eb/0x370 [ 1472.125556][T28706] __netlink_deliver_tap+0x41c/0x830 [ 1472.130992][T28706] ? netlink_deliver_tap+0x2e/0x1b0 [ 1472.136284][T28706] netlink_deliver_tap+0x19c/0x1b0 [ 1472.141487][T28706] netlink_unicast+0x72c/0x8d0 [ 1472.146381][T28706] netlink_sendmsg+0x8d0/0xbf0 [ 1472.151236][T28706] ? perf_trace_lock+0x304/0x3b0 [ 1472.156285][T28706] ? netlink_getsockopt+0x590/0x590 [ 1472.161591][T28706] ? aa_sock_msg_perm+0x94/0x150 [ 1472.166664][T28706] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 1472.172040][T28706] ? security_socket_sendmsg+0x80/0xa0 [ 1472.177569][T28706] ? netlink_getsockopt+0x590/0x590 [ 1472.182881][T28706] ____sys_sendmsg+0x5ba/0x960 [ 1472.187755][T28706] ? __asan_memset+0x22/0x40 [ 1472.192432][T28706] ? __sys_sendmsg_sock+0x30/0x30 [ 1472.197528][T28706] ? __import_iovec+0x5f2/0x850 [ 1472.202492][T28706] ? import_iovec+0x73/0xa0 [ 1472.207093][T28706] ___sys_sendmsg+0x2a6/0x360 [ 1472.211878][T28706] ? __sys_sendmsg+0x2a0/0x2a0 [ 1472.216807][T28706] ? __lock_acquire+0x7d40/0x7d40 [ 1472.222033][T28706] __se_sys_sendmsg+0x1c2/0x2b0 [ 1472.226979][T28706] ? __x64_sys_sendmsg+0x80/0x80 [ 1472.232064][T28706] ? lockdep_hardirqs_on+0x98/0x150 [ 1472.237358][T28706] do_syscall_64+0x55/0xa0 [ 1472.241852][T28706] ? clear_bhb_loop+0x40/0x90 [ 1472.246613][T28706] ? clear_bhb_loop+0x40/0x90 [ 1472.251391][T28706] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1472.257370][T28706] RIP: 0033:0x7fb95cb9ce59 [ 1472.261868][T28706] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1472.281561][T28706] RSP: 002b:00007fb95db29028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1472.290086][T28706] RAX: ffffffffffffffda RBX: 00007fb95ce15fa0 RCX: 00007fb95cb9ce59 [ 1472.298149][T28706] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000006 [ 1472.306250][T28706] RBP: 00007fb95db29090 R08: 0000000000000000 R09: 0000000000000000 [ 1472.314307][T28706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1472.322370][T28706] R13: 00007fb95ce16038 R14: 00007fb95ce15fa0 R15: 00007fff300a1838 [ 1472.330570][T28706] [ 1472.578757][T28721] validate_nla: 6 callbacks suppressed [ 1472.578775][T28721] netlink: 'syz.1.7229': attribute type 10 has an invalid length. [ 1472.649759][T26936] Bluetooth: hci1: ISO packet for unknown connection handle 255 [ 1472.661517][T28718] netlink: 'syz.2.7231': attribute type 2 has an invalid length. [ 1472.675241][T28718] netlink: 199836 bytes leftover after parsing attributes in process `syz.2.7231'. [ 1472.849059][T28726] netlink: 55631 bytes leftover after parsing attributes in process `syz.0.7234'. [ 1473.056198][T28734] netlink: 'syz.2.7238': attribute type 21 has an invalid length. [ 1473.065191][T28734] netlink: 'syz.2.7238': attribute type 6 has an invalid length. [ 1473.074176][T28734] netlink: 132 bytes leftover after parsing attributes in process `syz.2.7238'. [ 1473.192379][T26936] Bluetooth: hci1: command tx timeout [ 1473.543507][T28754] netlink: 'syz.0.7243': attribute type 46 has an invalid length. [ 1473.570196][T28754] netlink: 'syz.0.7243': attribute type 46 has an invalid length. [ 1474.024947][T20720] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 1474.054590][T20720] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 1474.063334][T20720] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 1474.073905][T20720] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 1474.083028][T20720] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 1474.091555][T20720] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 1474.173327][T28766] netlink: 'syz.0.7248': attribute type 21 has an invalid length. [ 1474.181296][T28766] netlink: 'syz.0.7248': attribute type 6 has an invalid length. [ 1474.193789][T28766] netlink: 132 bytes leftover after parsing attributes in process `syz.0.7248'. [ 1474.290211][T25458] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1474.441732][T25458] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1474.589523][T25458] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1474.620680][T28781] netlink: 'syz.2.7251': attribute type 10 has an invalid length. [ 1474.722016][T25458] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1474.785490][T28788] netlink: 'syz.1.7255': attribute type 46 has an invalid length. [ 1474.796433][T28788] FAULT_INJECTION: forcing a failure. [ 1474.796433][T28788] name failslab, interval 1, probability 0, space 0, times 0 [ 1474.810131][T28784] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1474.831698][T28788] CPU: 0 PID: 28788 Comm: syz.1.7255 Not tainted syzkaller #0 [ 1474.839267][T28788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1474.849376][T28788] Call Trace: [ 1474.852693][T28788] [ 1474.855726][T28788] dump_stack_lvl+0x18c/0x250 [ 1474.860493][T28788] ? show_regs_print_info+0x20/0x20 [ 1474.865768][T28788] ? load_image+0x420/0x420 [ 1474.870354][T28788] ? __might_sleep+0xe0/0xe0 [ 1474.875016][T28788] ? __lock_acquire+0x7d40/0x7d40 [ 1474.880123][T28788] should_fail_ex+0x39d/0x4d0 [ 1474.884895][T28788] should_failslab+0x9/0x20 [ 1474.889470][T28788] slab_pre_alloc_hook+0x59/0x310 [ 1474.894584][T28788] kmem_cache_alloc_node+0x60/0x320 [ 1474.899862][T28788] ? __alloc_skb+0x103/0x2c0 [ 1474.904502][T28788] __alloc_skb+0x103/0x2c0 [ 1474.908945][T28788] netlink_dump+0x1ec/0xe50 [ 1474.913530][T28788] ? __mutex_lock+0x315/0xcc0 [ 1474.918231][T28788] ? netlink_lookup+0x200/0x200 [ 1474.923160][T28788] ? netlink_autobind+0x300/0x300 [ 1474.928278][T28788] ? netlink_lookup+0x30/0x200 [ 1474.933104][T28788] ? netlink_lookup+0x30/0x200 [ 1474.937918][T28788] __netlink_dump_start+0x5f1/0x810 [ 1474.943174][T28788] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 1474.948336][T28788] rtnetlink_rcv_msg+0xe1d/0xfa0 [ 1474.953310][T28788] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 1474.958490][T28788] ? rtnl_getlink+0xd20/0xd20 [ 1474.963213][T28788] ? rtnetlink_bind+0x80/0x80 [ 1474.967986][T28788] ? perf_trace_run_bpf_submit+0xf4/0x1c0 [ 1474.973779][T28788] ? perf_trace_run_bpf_submit+0xf4/0x1c0 [ 1474.979566][T28788] ? rtnl_getlink+0xd20/0xd20 [ 1474.984332][T28788] ? perf_trace_lock+0x304/0x3b0 [ 1474.989364][T28788] netlink_rcv_skb+0x241/0x4d0 [ 1474.994230][T28788] ? rtnetlink_bind+0x80/0x80 [ 1474.999001][T28788] ? netlink_ack+0x1180/0x1180 [ 1475.003877][T28788] ? __lock_acquire+0x7d40/0x7d40 [ 1475.008996][T28788] ? net_generic+0x1e/0x240 [ 1475.013591][T28788] ? netlink_deliver_tap+0x2e/0x1b0 [ 1475.018892][T28788] netlink_unicast+0x751/0x8d0 [ 1475.023765][T28788] netlink_sendmsg+0x8d0/0xbf0 [ 1475.028604][T28788] ? perf_trace_lock+0x304/0x3b0 [ 1475.033626][T28788] ? netlink_getsockopt+0x590/0x590 [ 1475.038923][T28788] ? aa_sock_msg_perm+0x94/0x150 [ 1475.043959][T28788] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 1475.049312][T28788] ? security_socket_sendmsg+0x80/0xa0 [ 1475.054836][T28788] ? netlink_getsockopt+0x590/0x590 [ 1475.060122][T28788] ____sys_sendmsg+0x5ba/0x960 [ 1475.064975][T28788] ? __asan_memset+0x22/0x40 [ 1475.069643][T28788] ? __sys_sendmsg_sock+0x30/0x30 [ 1475.074733][T28788] ? __import_iovec+0x5f2/0x850 [ 1475.079671][T28788] ? import_iovec+0x73/0xa0 [ 1475.084247][T28788] ___sys_sendmsg+0x2a6/0x360 [ 1475.089005][T28788] ? __sys_sendmsg+0x2a0/0x2a0 [ 1475.093889][T28788] ? __lock_acquire+0x7d40/0x7d40 [ 1475.099046][T28788] __se_sys_sendmsg+0x1c2/0x2b0 [ 1475.103974][T28788] ? __x64_sys_sendmsg+0x80/0x80 [ 1475.109019][T28788] ? lockdep_hardirqs_on+0x98/0x150 [ 1475.114288][T28788] do_syscall_64+0x55/0xa0 [ 1475.118763][T28788] ? clear_bhb_loop+0x40/0x90 [ 1475.123529][T28788] ? clear_bhb_loop+0x40/0x90 [ 1475.128278][T28788] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1475.134232][T28788] RIP: 0033:0x7f601e79ce59 [ 1475.138712][T28788] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1475.158385][T28788] RSP: 002b:00007f601c9f6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1475.166880][T28788] RAX: ffffffffffffffda RBX: 00007f601ea15fa0 RCX: 00007f601e79ce59 [ 1475.174925][T28788] RDX: 000000000000c000 RSI: 0000200000000040 RDI: 0000000000000004 [ 1475.182954][T28788] RBP: 00007f601c9f6090 R08: 0000000000000000 R09: 0000000000000000 [ 1475.190987][T28788] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1475.199030][T28788] R13: 00007f601ea16038 R14: 00007f601ea15fa0 R15: 00007ffe33fca7e8 [ 1475.207115][T28788] [ 1475.281868][T26936] Bluetooth: hci1: command tx timeout [ 1475.400808][T28764] chnl_net:caif_netlink_parms(): no params data found [ 1475.748565][T28807] netlink: 132 bytes leftover after parsing attributes in process `syz.2.7259'. [ 1475.902971][T28815] netlink: 209852 bytes leftover after parsing attributes in process `syz.1.7262'. [ 1475.943633][T28812] team0: Device veth1_macvtap failed to register rx_handler [ 1476.136955][T28764] bridge0: port 1(bridge_slave_0) entered blocking state [ 1476.153280][T26936] Bluetooth: hci2: command tx timeout [ 1476.174575][T28764] bridge0: port 1(bridge_slave_0) entered disabled state [ 1476.196003][T28764] bridge_slave_0: entered allmulticast mode [ 1476.210278][T28764] bridge_slave_0: entered promiscuous mode [ 1476.336618][T28818] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1476.346205][T28764] bridge0: port 2(bridge_slave_1) entered blocking state [ 1476.356947][T28764] bridge0: port 2(bridge_slave_1) entered disabled state [ 1476.369097][T28764] bridge_slave_1: entered allmulticast mode [ 1476.389188][T28764] bridge_slave_1: entered promiscuous mode [ 1476.593782][T28764] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1476.610169][T28764] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1476.624233][T28839] netlink: 132 bytes leftover after parsing attributes in process `syz.0.7265'. [ 1476.843069][T28764] team0: Port device team_slave_0 added [ 1476.859266][T28848] netlink: 209852 bytes leftover after parsing attributes in process `syz.0.7268'. [ 1476.887969][T28764] team0: Port device team_slave_1 added [ 1477.080314][T28764] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1477.088459][T28764] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1477.124255][T28764] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1477.146710][T28764] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1477.153874][T28764] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1477.179916][T28764] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1477.383612][T28855] netlink: 132 bytes leftover after parsing attributes in process `syz.2.7271'. [ 1477.415781][T25458] [ 1477.418197][T25458] ====================================================== [ 1477.425251][T25458] WARNING: possible circular locking dependency detected SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1477.432332][T25458] syzkaller #0 Not tainted [ 1477.436780][T25458] ------------------------------------------------------ [ 1477.443838][T25458] kworker/u4:6/25458 is trying to acquire lock: [ 1477.450117][T25458] ffff88807baa0d00 (team->team_lock_key#9){+.+.}-{3:3}, at: team_del_slave+0x32/0x1c0 [ 1477.459793][T25458] [ 1477.459793][T25458] but task is already holding lock: [ 1477.467207][T25458] ffff88807e1e0768 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: ieee80211_remove_interfaces+0x29a/0x690 [ 1477.477638][T25458] [ 1477.477638][T25458] which lock already depends on the new lock. [ 1477.477638][T25458] [ 1477.488083][T25458] [ 1477.488083][T25458] the existing dependency chain (in reverse order) is: [ 1477.497140][T25458] [ 1477.497140][T25458] -> #1 (&rdev->wiphy.mtx){+.+.}-{3:3}: [ 1477.504942][T25458] __mutex_lock+0x136/0xcc0 [ 1477.510025][T25458] ieee80211_open+0x144/0x200 [ 1477.515272][T25458] __dev_open+0x2cb/0x430 [ 1477.520174][T25458] dev_open+0xab/0x190 [ 1477.524810][T25458] team_add_slave+0x75f/0x29a0 [ 1477.530156][T25458] do_setlink+0xdfe/0x4130 [ 1477.535138][T25458] rtnl_newlink+0x17da/0x20a0 [ 1477.540390][T25458] rtnetlink_rcv_msg+0x869/0xfa0 [ 1477.545893][T25458] netlink_rcv_skb+0x241/0x4d0 [ 1477.551247][T25458] netlink_unicast+0x751/0x8d0 [ 1477.556585][T25458] netlink_sendmsg+0x8d0/0xbf0 [ 1477.561928][T25458] ____sys_sendmsg+0x5ba/0x960 [ 1477.567260][T25458] ___sys_sendmsg+0x2a6/0x360 [ 1477.572495][T25458] __se_sys_sendmsg+0x1c2/0x2b0 [ 1477.577908][T25458] do_syscall_64+0x55/0xa0 [ 1477.582884][T25458] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1477.589330][T25458] [ 1477.589330][T25458] -> #0 (team->team_lock_key#9){+.+.}-{3:3}: [ 1477.597647][T25458] __lock_acquire+0x2df1/0x7d40 [ 1477.603052][T25458] lock_acquire+0x19e/0x420 [ 1477.608103][T25458] __mutex_lock+0x136/0xcc0 [ 1477.613150][T25458] team_del_slave+0x32/0x1c0 [ 1477.618293][T25458] team_device_event+0x28d/0xa20 [ 1477.623778][T25458] notifier_call_chain+0x197/0x380 [ 1477.629434][T25458] unregister_netdevice_many_notify+0x100d/0x1900 [ 1477.636394][T25458] unregister_netdevice_queue+0x32c/0x370 [ 1477.642658][T25458] _cfg80211_unregister_wdev+0x16b/0x580 [ 1477.648846][T25458] ieee80211_remove_interfaces+0x49e/0x690 [ 1477.655196][T25458] ieee80211_unregister_hw+0x5d/0x2a0 [ 1477.661111][T25458] mac80211_hwsim_del_radio+0x289/0x480 [ 1477.667211][T25458] hwsim_exit_net+0x58d/0x650 [ 1477.672438][T25458] cleanup_net+0x70a/0xbb0 [ 1477.677402][T25458] process_scheduled_works+0xa5d/0x15d0 [ 1477.683499][T25458] worker_thread+0xa55/0xfc0 [ 1477.688636][T25458] kthread+0x2fa/0x390 [ 1477.693256][T25458] ret_from_fork+0x48/0x80 [ 1477.698214][T25458] ret_from_fork_asm+0x11/0x20 [ 1477.703627][T25458] [ 1477.703627][T25458] other info that might help us debug this: [ 1477.703627][T25458] [ 1477.713871][T25458] Possible unsafe locking scenario: [ 1477.713871][T25458] [ 1477.721341][T25458] CPU0 CPU1 [ 1477.726729][T25458] ---- ---- [ 1477.732111][T25458] lock(&rdev->wiphy.mtx); [ 1477.736636][T25458] lock(team->team_lock_key#9); [ 1477.744116][T25458] lock(&rdev->wiphy.mtx); [ 1477.751156][T25458] lock(team->team_lock_key#9); [ 1477.756123][T25458] [ 1477.756123][T25458] *** DEADLOCK *** [ 1477.756123][T25458] [ 1477.764283][T25458] 5 locks held by kworker/u4:6/25458: [ 1477.769683][T25458] #0: ffff888140044938 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x96f/0x15d0 [ 1477.780600][T25458] #1: ffffc900046cfd00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x96f/0x15d0 [ 1477.791167][T25458] #2: ffffffff8e3b5a90 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x14c/0xbb0 [ 1477.800608][T25458] #3: ffffffff8e3c2ac8 (rtnl_mutex){+.+.}-{3:3}, at: ieee80211_unregister_hw+0x55/0x2a0 [ 1477.810471][T25458] #4: ffff88807e1e0768 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: ieee80211_remove_interfaces+0x29a/0x690 [ 1477.821289][T25458] [ 1477.821289][T25458] stack backtrace: [ 1477.827195][T25458] CPU: 1 PID: 25458 Comm: kworker/u4:6 Not tainted syzkaller #0 [ 1477.834845][T25458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1477.844926][T25458] Workqueue: netns cleanup_net [ 1477.849732][T25458] Call Trace: [ 1477.853032][T25458] [ 1477.855991][T25458] dump_stack_lvl+0x18c/0x250 [ 1477.860703][T25458] ? load_image+0x420/0x420 [ 1477.865241][T25458] ? show_regs_print_info+0x20/0x20 [ 1477.870478][T25458] ? print_circular_bug+0x12b/0x1a0 [ 1477.875720][T25458] check_noncircular+0x2fc/0x400 [ 1477.880693][T25458] ? print_deadlock_bug+0x5d0/0x5d0 [ 1477.885935][T25458] ? lockdep_lock+0xf5/0x230 [ 1477.890563][T25458] ? _find_first_zero_bit+0xd3/0x100 [ 1477.895885][T25458] __lock_acquire+0x2df1/0x7d40 [ 1477.900797][T25458] ? verify_lock_unused+0x140/0x140 [ 1477.906031][T25458] ? verify_lock_unused+0x140/0x140 [ 1477.911268][T25458] lock_acquire+0x19e/0x420 [ 1477.915804][T25458] ? team_del_slave+0x32/0x1c0 [ 1477.920595][T25458] ? __might_sleep+0xe0/0xe0 [ 1477.925254][T25458] ? read_lock_is_recursive+0x20/0x20 [ 1477.931025][T25458] __mutex_lock+0x136/0xcc0 [ 1477.935557][T25458] ? team_del_slave+0x32/0x1c0 [ 1477.940350][T25458] ? __lock_acquire+0x7d40/0x7d40 [ 1477.945432][T25458] ? rcu_is_watching+0x15/0xb0 [ 1477.950253][T25458] ? trace_contention_end+0x39/0xe0 [ 1477.955513][T25458] ? __mutex_lock+0x315/0xcc0 [ 1477.960226][T25458] ? team_del_slave+0x32/0x1c0 [ 1477.965023][T25458] ? mutex_lock_nested+0x20/0x20 [ 1477.969989][T25458] ? bond_netdev_event+0xeb/0xf20 [ 1477.975050][T25458] ? __mutex_unlock_slowpath+0x1b4/0x6c0 [ 1477.980729][T25458] team_del_slave+0x32/0x1c0 [ 1477.985346][T25458] team_device_event+0x28d/0xa20 [ 1477.990312][T25458] notifier_call_chain+0x197/0x380 [ 1477.995457][T25458] unregister_netdevice_many_notify+0x100d/0x1900 [ 1478.001899][T25458] ? trace_event_raw_event_lock+0x250/0x250 [ 1478.007833][T25458] ? unregister_netdevice_many+0x20/0x20 [ 1478.013516][T25458] ? kernfs_remove_by_name_ns+0x117/0x150 [ 1478.019288][T25458] ? __lock_acquire+0x7d40/0x7d40 [ 1478.024364][T25458] unregister_netdevice_queue+0x32c/0x370 [ 1478.030118][T25458] ? list_netdevice+0x730/0x730 [ 1478.035005][T25458] ? kernfs_remove_by_name_ns+0x117/0x150 [ 1478.040776][T25458] _cfg80211_unregister_wdev+0x16b/0x580 [ 1478.046442][T25458] ieee80211_remove_interfaces+0x49e/0x690 [ 1478.052286][T25458] ? ieee80211_do_stop+0x1e20/0x1e20 [ 1478.057598][T25458] ? rcu_is_watching+0x15/0xb0 [ 1478.062399][T25458] ieee80211_unregister_hw+0x5d/0x2a0 [ 1478.067797][T25458] mac80211_hwsim_del_radio+0x289/0x480 [ 1478.073365][T25458] ? rhashtable_remove_fast+0xc00/0xc00 [ 1478.078938][T25458] hwsim_exit_net+0x58d/0x650 [ 1478.083643][T25458] ? hwsim_init_net+0x90/0x90 [ 1478.088348][T25458] ? __ip_vs_dev_cleanup_batch+0x238/0x250 [ 1478.094264][T25458] cleanup_net+0x70a/0xbb0 [ 1478.098717][T25458] ? ops_free_list+0x3b0/0x3b0 [ 1478.103514][T25458] ? _raw_spin_unlock_irq+0x23/0x50 [ 1478.108741][T25458] ? process_scheduled_works+0x96f/0x15d0 [ 1478.114492][T25458] ? process_scheduled_works+0x96f/0x15d0 [ 1478.120250][T25458] process_scheduled_works+0xa5d/0x15d0 [ 1478.125837][T25458] ? worker_attach_to_pool+0x380/0x380 [ 1478.131372][T25458] ? assign_work+0x3d2/0x5d0 [ 1478.135995][T25458] worker_thread+0xa55/0xfc0 [ 1478.140635][T25458] kthread+0x2fa/0x390 [ 1478.144726][T25458] ? pr_cont_work+0x560/0x560 [ 1478.149433][T25458] ? kthread_blkcg+0xd0/0xd0 [ 1478.154048][T25458] ret_from_fork+0x48/0x80 [ 1478.158492][T25458] ? kthread_blkcg+0xd0/0xd0 [ 1478.163150][T25458] ret_from_fork_asm+0x11/0x20 [ 1478.167949][T25458] [ 1478.232142][T26936] Bluetooth: hci2: command tx timeout [ 1478.292394][T25458] team0: Port device wlan1 removed [ 1478.387275][T28764] hsr_slave_0: entered promiscuous mode [ 1478.413414][T28764] hsr_slave_1: entered promiscuous mode [ 1478.419770][T28764] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1478.436993][T28764] Cannot create hsr debugfs directory [ 1478.673311][T25458] hsr_slave_0: left promiscuous mode [ 1478.751908][T25458] hsr_slave_1: left promiscuous mode [ 1479.002221][T25458] veth1_macvtap: left promiscuous mode [ 1479.007827][T25458] veth1_vlan: left allmulticast mode [ 1479.021991][T25458] veth1_vlan: left promiscuous mode [ 1479.027384][T25458] veth0_vlan: left promiscuous mode [ 1479.177151][T25458] team0 (unregistering): Port device geneve1 removed [ 1479.356433][T25458] team0 (unregistering): Port device team_slave_1 removed [ 1479.410783][T25458] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1479.419785][T25458] bond_slave_1 (unregistering): left promiscuous mode [ 1479.426642][T25458] bond_slave_1 (unregistering): left allmulticast mode [ 1479.459220][T25458] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1479.468711][T25458] bond_slave_0 (unregistering): left promiscuous mode [ 1479.475559][T25458] bond_slave_0 (unregistering): left allmulticast mode [ 1479.638185][T25458] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 1479.655895][T25458] dummy0 (unregistering): left promiscuous mode [ 1479.662286][T25458] dummy0 (unregistering): left allmulticast mode [ 1479.691913][T25458] bond0 (unregistering): Released all slaves [ 1480.295679][T25458] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1480.367820][T25458] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1480.440592][T25458] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1480.519929][T25458] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1480.657498][T25458] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1480.709048][T25458] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1480.781387][T25458] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1480.844370][T25458] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1480.956165][T25458] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1481.053278][T25458] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1481.119869][T25458] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1481.159596][T25458] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1482.276144][T25458] mac80211_hwsim hwsim42 wlan1 (unregistering): left allmulticast mode [ 1482.287099][T25458] team0: Port device wlan1 removed [ 1482.674678][T25458] mac80211_hwsim hwsim44 wlan1 (unregistering): left allmulticast mode [ 1482.686685][T25458] team0: Port device wlan1 removed [ 1482.841018][T25458] hsr_slave_0: left promiscuous mode [ 1482.850376][T25458] hsr_slave_1: left promiscuous mode [ 1482.857362][T25458] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1482.871392][T25458] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1482.879951][T25458] bridge_slave_1: left allmulticast mode [ 1482.887072][T25458] bridge_slave_1: left promiscuous mode [ 1482.894104][T25458] bridge0: port 2(bridge_slave_1) entered disabled state [ 1482.904242][T25458] bridge_slave_0: left allmulticast mode [ 1482.909943][T25458] bridge_slave_0: left promiscuous mode [ 1482.916427][T25458] bridge0: port 1(bridge_slave_0) entered disabled state [ 1482.928435][T25458] hsr0: left allmulticast mode [ 1482.933396][T25458] hsr_slave_0: left allmulticast mode [ 1482.938815][T25458] hsr_slave_1: left allmulticast mode [ 1482.945832][T25458] hsr0: left promiscuous mode [ 1482.950715][T25458] nr0: port 1(hsr0) entered disabled state [ 1482.960200][T25458] hsr_slave_0: left promiscuous mode [ 1482.970377][T25458] hsr_slave_1: left promiscuous mode [ 1482.980037][T25458] hsr_slave_0: left promiscuous mode [ 1482.989273][T25458] hsr_slave_1: left promiscuous mode [ 1482.995719][T25458] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1483.006447][T25458] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1483.014691][T25458] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1483.023624][T25458] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1483.032149][T25458] bridge_slave_1: left allmulticast mode [ 1483.037846][T25458] bridge_slave_1: left promiscuous mode [ 1483.045119][T25458] bridge0: port 2(bridge_slave_1) entered disabled state [ 1483.054584][T25458] bridge_slave_0: left allmulticast mode [ 1483.060281][T25458] bridge_slave_0: left promiscuous mode [ 1483.067690][T25458] bridge0: port 1(bridge_slave_0) entered disabled state [ 1483.079938][T25458] hsr_slave_0: left promiscuous mode [ 1483.087262][T25458] hsr_slave_1: left promiscuous mode [ 1483.095634][T25458] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1483.104456][T25458] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1483.113506][T25458] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1483.120966][T25458] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1483.136473][T25458] veth1_macvtap: left promiscuous mode [ 1483.143283][T25458] veth0_macvtap: left promiscuous mode [ 1483.148925][T25458] veth1_vlan: left promiscuous mode [ 1483.154475][T25458] veth0_vlan: left promiscuous mode [ 1483.161395][T25458] veth1_macvtap: left promiscuous mode [ 1483.168501][T25458] veth0_macvtap: left promiscuous mode [ 1483.440398][T25458] team0 (unregistering): Port device team_slave_1 removed [ 1483.475261][T25458] team0 (unregistering): Port device team_slave_0 removed [ 1483.503549][T25458] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1483.535422][T25458] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1483.597838][T25458] bond0 (unregistering): Released all slaves [ 1483.761140][T25458] geneve1 (unregistering): left allmulticast mode [ 1483.768651][T25458] team0 (unregistering): Port device geneve1 removed [ 1483.902639][T25458] team_slave_1 (unregistering): left allmulticast mode [ 1483.910562][T25458] team0 (unregistering): Port device team_slave_1 removed [ 1484.269441][T25458] team0 (unregistering): Port device team_slave_1 removed [ 1484.283977][T25458] team0 (unregistering): Port device team_slave_0 removed [ 1484.321276][T25458] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1484.357444][T25458] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1484.439689][T25458] bond0 (unregistering): Released all slaves [ 1484.603506][T25458] team_slave_1 (unregistering): left allmulticast mode [ 1484.611104][T25458] team0 (unregistering): Port device team_slave_1 removed [ 1484.638733][T25458] team_slave_0 (unregistering): left allmulticast mode [ 1484.647341][T25458] team0 (unregistering): Port device team_slave_0 removed [ 1484.716797][ T1289] ieee802154 phy0 wpan0: encryption failed: -22 [ 1484.724287][ T1289] ieee802154 phy1 wpan1: encryption failed: -22