last executing test programs: 4m16.631460926s ago: executing program 1 (id=638): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82744, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x5, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b26, &(0x7f0000000000)={'wlan1\x00', @random="0202000400"}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6349363006"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0763707573740153646370750806"], 0x12) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 4m15.735314025s ago: executing program 1 (id=639): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0xc}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000d40)=ANY=[@ANYBLOB="180000000000e3ff000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000e00000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000080), &(0x7f00000003c0)=r1}, 0x20) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 4m15.562908363s ago: executing program 1 (id=641): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x2800000002000000, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x500, 0x4000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x8, 0x5, 0x5, 0x4, 0x0, 0x0, 0xc2dfc, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80000007, 0x1, @perf_config_ext={0x6, 0x10}, 0x2, 0x5, 0x6, 0x7, 0x81, 0x25, 0x3, 0x0, 0xfffffffd, 0x0, 0x400000000005}, 0x0, 0x4000000e, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000080)) 4m13.443196824s ago: executing program 2 (id=649): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)="0383", 0x2}], 0x1}, 0x4011) setsockopt$sock_attach_bpf(r0, 0x1, 0x10, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x2122) sendmsg$inet(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000012c0)="f9", 0x1}], 0x1}, 0x48844) 4m13.256830792s ago: executing program 2 (id=650): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_user\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x50) recvmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x2020) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000000700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000015c0)=ANY=[@ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000a40)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xaf\xcc\xeeR\xf2/\x00\x00E>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xcc\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x10, &(0x7f0000000480), 0x4) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r2 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r1}, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x98, 0x1, 0x0, 0x0, 0x0, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x402, 0x2ad, 0xfffffffe, 0x1, 0x0, 0x40000000}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x20, 0x12506, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000000001, 0x8}, 0x7602, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x6, 0x4, 0x1, 0x1}, 0x50) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000000)=@framed={{0x4e, 0xa, 0xa, 0x0, 0x0, 0x71, 0x10, 0x17}}, 0x0}, 0x94) 4m10.243526602s ago: executing program 0 (id=669): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e40)=@base={0xb, 0xe, 0x200cc, 0x6, 0x5}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) 4m10.162862935s ago: executing program 0 (id=671): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x8596, 0x0, 0x20000, 0x8, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x21}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f00000003c0)=ANY=[@ANYBLOB='+cpu'], 0x5) r6 = openat$cgroup_int(r3, &(0x7f0000000180)='cpu.weight\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f00000001c0)={[{0x2d, 'cpu'}]}, 0x5) write$cgroup_int(r6, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r7, &(0x7f0000000180), 0x13bb711e) bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x8, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="18020000000000000000000000000000850000005500000095"], &(0x7f0000000140)='syzkaller\x00', 0x8, 0xa2, &(0x7f0000000000)=""/162, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) 4m9.11948406s ago: executing program 0 (id=673): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e0000000000000005"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/12, @ANYBLOB], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x9, 0x2, 0x2, 0x4}, 0x50) 4m8.979432077s ago: executing program 0 (id=674): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007"], 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x7b}]}, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) 4m8.883040261s ago: executing program 0 (id=675): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x5, 0x2, 0x7, 0x0, 0x1, 0x8d8c}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x7d}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) 4m8.311372346s ago: executing program 1 (id=676): recvmsg$unix(0xffffffffffffffff, 0x0, 0x40002023) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 4m8.277781557s ago: executing program 2 (id=677): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={r0}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x10, &(0x7f00000014c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000300)='GPL\x00', 0x5, 0xffd, &(0x7f00000004c0)=""/4093, 0x0, 0x1}, 0x94) 4m8.155380832s ago: executing program 0 (id=678): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000f1ffffff000000000000000018150000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007010000f8ffffffb703000008000000b704000002000000850000005400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020702500000000002020207b1a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 4m7.902982053s ago: executing program 32 (id=678): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000f1ffffff000000000000000018150000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007010000f8ffffffb703000008000000b704000002000000850000005400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020702500000000002020207b1a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 4m7.859406874s ago: executing program 1 (id=680): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x6, r0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$ITER_CREATE(0xb, 0x0, 0x0) close(r1) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x20004004) syz_clone(0x1400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000540)=""/228, 0x2e, 0xe4, 0x1}, 0x28) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1, &(0x7f0000000680)=[@cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x88}, 0x10001) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000010000000000000000000000711211000000000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 4m7.477770701s ago: executing program 33 (id=680): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x6, r0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$ITER_CREATE(0xb, 0x0, 0x0) close(r1) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x20004004) syz_clone(0x1400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000540)=""/228, 0x2e, 0xe4, 0x1}, 0x28) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1, &(0x7f0000000680)=[@cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x88}, 0x10001) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000010000000000000000000000711211000000000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 4m7.433863173s ago: executing program 2 (id=681): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xe3}, 0x100002, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 4m7.433041863s ago: executing program 34 (id=681): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xe3}, 0x100002, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 29.362352733s ago: executing program 4 (id=2372): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_user\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x50) recvmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x2020) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000000700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000015c0)=ANY=[], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000a40)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xaf\xcc\xeeR\xf2/\x00\x00E>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xcc\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/29], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x88e}, 0x0, 0x1, 0xffffffffffffffff, 0x0) (async) r6 = socket$kcm(0xa, 0x6, 0x0) close(r6) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r7) r8 = socket$kcm(0x10, 0x2, 0x0) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="05000000050000000200000004"], 0x48) (async) r10 = socket$kcm(0x2a, 0x2, 0x0) sendmsg$kcm(r10, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) (async) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b703000000000000850000002d00000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='tlb_flush\x00', r11}, 0x10) (async) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[@ANYBLOB="563f00001a00599c6d0e000091d028ef80"], 0xfe33) (async) sendmsg$inet(r8, &(0x7f0000000980)={&(0x7f00000006c0)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000880)=[{&(0x7f0000000700)="2c5a3c7884d52dffcb8a10133f1e34d41a4f38b0b3d074e0f7b4954ae8a045661dd801f70a5a481304f2506fc80a63", 0x2f}, {&(0x7f0000000740)="d83a9034f98877e3558e98c64360b6d88ba036606ce978fe6763b7a5a98df5f9cb042e2efbdff62c59e27c44c6363f0831259b48ba494a475d4220af42f393cb4a44c1", 0x43}, {&(0x7f00000007c0)="074b6f39b4a1ba46a00d2b5c70bf7f92ca4193139ed318eff5983205d37c3593f711a8cbe9a258996d86808f579c46ce8e1cafbca9188b16d0c0ff0050a589cac2f42ed80b8b58fbc1b5d0be216ea883ace7b63dfa4a993a62bbed901110f37b72ce0963d00a89c595d6e8012086fc8259432e98910339e513260b86bdf754871aeb33fd77708f216a01", 0x8a}], 0x3, &(0x7f00000008c0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x8}}], 0x18}, 0x0) (async) r12 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r12, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000080)="1c0000006d0081044e81f782db1f4cb9041c1d0800fe007c05e8fe55", 0x1c}], 0x1}, 0x0) (async) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) sendmsg$tipc(r3, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 28.190621843s ago: executing program 4 (id=2383): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0e000000040000000800000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa10000000000000701"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180200009b1aecb60000000000000000850000007500000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af0ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) 28.04975387s ago: executing program 5 (id=2385): r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg(r0, &(0x7f0000002580)={&(0x7f0000000240)=@l2tp={0x2, 0x0, @dev}, 0x80, &(0x7f0000002400)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/196, 0xc4}, {&(0x7f0000000040)=""/44, 0x2c}, {&(0x7f00000013c0)=""/49, 0x31}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x5, &(0x7f0000002480)=""/242, 0xf2}, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)="d8000000180081064e81f782db4c000400110000000a600e41b0000900ac00060411000000040012000a0003000248035c3b61c1d67f6f94007134cf6efb8000a007a290457f01a7cee4090000001fb791ab055ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5ae24e25ccca9e00360db79826835d3a71d95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d938785452a92954b43370e9703920723f9000000008af26c8b7b55f4d2a6823af28fcb1de573f9248a0fdb80c785fe", 0xd5}, {&(0x7f0000000180)="ce8d989ff5be6f966759c66d177fdd9ba3b0b6ec83774e94adfa319bf0bfeba4b89564f3c94452ff36624fcb4c886d8bdd374e071f794f768cc89daebde151d5f6291567a348a8efba01c2", 0x4b}], 0x2}, 0x40495) 27.866252397s ago: executing program 4 (id=2386): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_user\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x50) recvmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x2020) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000000700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000015c0)=ANY=[], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000a40)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xaf\xcc\xeeR\xf2/\x00\x00E>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xcc\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff}) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r5}, 0x10) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003b000b05d25a806c8c6f94f90224fc600e0005000a000200053582c137153e3704000b80fc0b09000300", 0x33fe0}], 0x1}, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000900)={'bond0\x00', @random="000000000100"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpu.stat\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x89a1, &(0x7f0000000180)={'bridge_slave_1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001200)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001180), &(0x7f00000011c0)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000008000000020000000500000000080000", @ANYRES32=0x1, @ANYRESOCT=r8, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000020000000000000000003c00"/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001340)={{}, &(0x7f00000012c0), 0x0}, 0x20) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 27.443363535s ago: executing program 6 (id=2390): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000005640)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x94) (async) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x40000000000009, 0x0, 0x0, 0xfffffffffff7bbfe, 0x1, 0x0, 0x0, 0xfffffffc, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0xa) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100904}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x3ff, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, @perf_bp={0x0, 0xf}, 0x1000, 0x4, 0x0, 0x8, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x40034, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x6}, 0x1b, 0x0, 0x3, 0x8, 0x8, 0xfffffffc, 0x2, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r3 = openat$cgroup_devices(r2, &(0x7f0000000300)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r3, &(0x7f0000000200)=ANY=[@ANYBLOB='c 122'], 0xa) (async) setsockopt$sock_attach_bpf(r1, 0x29, 0x3a, 0x0, 0x2000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) 27.369348369s ago: executing program 3 (id=2391): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1e, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7ff}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_lookup=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000180)=r1, 0x4) bpf$ENABLE_STATS(0x20, 0x0, 0x0) sendmsg$inet(r3, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x7, 0x4, 0x100, 0x4, 0x24}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="09000000030000000400010005"], 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000000400000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)=0x8000) r8 = perf_event_open$cgroup(&(0x7f00000006c0)={0x3, 0x80, 0x6c, 0xd, 0xfe, 0xb, 0x0, 0x7c8d1268, 0x10001, 0x4, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000640), 0x4}, 0x20, 0x9803, 0x2, 0x1, 0x80000001, 0x6, 0x81, 0x0, 0x3, 0x0, 0x6}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00', r6}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0], 0x0, 0x40, &(0x7f00000002c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x90, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000400000000000000", @ANYRES32=r4, @ANYBLOB="ff070000000000", @ANYRES32=r9, @ANYRES32, @ANYBLOB="04000000040000000500"/28], 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x9, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000004000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r10}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)=@o_path={&(0x7f0000000580)='./file0\x00', r4, 0x4000, r4}, 0x18) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 27.221153275s ago: executing program 3 (id=2392): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="186ff0779c3900000001000000000000effffffff202bb0000009500"/37], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'\x00', 0x5}) socket$kcm(0x2d, 0x2, 0x0) 27.023413174s ago: executing program 6 (id=2393): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x1, 0x7, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000380)='neigh_update\x00', r1}, 0x10) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="d80000001c0081044e81f782db44b904021d08020e0000008100e0a1180002000000000200000e1208000f0100810401a8001600200001400300000803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef075c11503c6bbace8017cb090000001fb791643a5ee4001b146218a07445d6d930dfe1d9d322fe7c9fd68775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e0060000000000000080bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd68adbef3d93452a00"/216, 0xd8}], 0x1, 0x0, 0x0, 0x7400}, 0x0) 27.023113733s ago: executing program 5 (id=2394): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0e000000040000000800000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa10000000000000701"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180200009b1aecb60000000000000000850000007500000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af0ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) 26.989481515s ago: executing program 4 (id=2395): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x2, 0x4, 0x7fff, 0xc, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0x14, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002008007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYRESDEC=r2], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000200)='signal_deliver\x00', r3}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.1GB.usage_in_bytes\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r4, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x1f, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000490000000000000000000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', r5, 0x0, r4}, 0x94) (async, rerun: 64) write$cgroup_int(r4, &(0x7f0000000000)=0x8000000000000001, 0x12) (rerun: 64) close(0xffffffffffffffff) (async) r6 = socket$kcm(0x10, 0x2, 0x4) (async) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r7 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r7, &(0x7f0000000680)={&(0x7f0000000000)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x1c, &(0x7f0000000540)=[{&(0x7f0000000240)="f9", 0x1}], 0x1}, 0x4000080) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002400)={&(0x7f0000000340)=ANY=[], 0x0, 0x56}, 0x28) (async) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/420], &(0x7f0000000100)='GPL\x00'}, 0x48) sendmsg$inet(r6, 0x0, 0x0) socket$kcm(0x2, 0x3, 0x2) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) (rerun: 32) 26.977542306s ago: executing program 3 (id=2396): perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x4, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3f, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0xa, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="89a000fe0000000069100c000000000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x100}, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) recvmsg(r6, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x5, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000008000c3a00000e100000095"], &(0x7f0000000580)='syzkaller\x00', 0x1, 0x8f, &(0x7f0000000600)=""/143, 0x0, 0x9}, 0x94) (async) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{}]}) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8941, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0xffff0000, 0x7, 0x0, &(0x7f00000003c0)="2b206d074843b3", 0x0, 0xf000, 0x720e, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) r9 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) ioctl$TUNSETOFFLOAD(r9, 0xc004743e, 0x110e22ffef) (async) syz_clone(0x80001280, 0x0, 0x0, 0x0, 0x0, 0x0) 26.907337759s ago: executing program 6 (id=2397): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0e000000040000000800000007"], 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000002080)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa10000000000000701"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180200009b1aecb60000000000000000850000007500000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af0ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 26.906619418s ago: executing program 5 (id=2398): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x88e}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xe, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xa, 0x4, 0x6, 0xff, 0x42}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000080), 0x619, r0}, 0x38) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001500)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) 26.815541883s ago: executing program 6 (id=2399): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="180200000000000000000000000000008500000005000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000080)='GPL\x00'}, 0x94) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000003780)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="020b0700fc670007e4a17c45c8d260c9", 0x33fe0}], 0x1}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000002480)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x0) (async) r2 = socket$kcm(0x2, 0x5, 0x84) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x3, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffe}, [@printk={@u, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x73}}]}, &(0x7f0000000080)='GPL\x00'}, 0x94) (async) bpf$TOKEN_CREATE(0x24, &(0x7f0000000100)={0x0, r2}, 0x8) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x76, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x10, 0x105}, 0x94) (async, rerun: 64) bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) (async, rerun: 64) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) (async) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/user\x00') ioctl$TUNSETIFF(r5, 0xb701, 0x0) (async, rerun: 32) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000120000000000000000000000850000006d000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000280)='contention_end\x00', r6}, 0x18) (async, rerun: 32) r7 = socket$kcm(0x10, 0x2, 0x0) (rerun: 32) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[@ANYBLOB="33fe00002a0053ea"], 0xfe33) r8 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r10 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r10, &(0x7f0000001ec0)=ANY=[@ANYBLOB="004000003a00913a74067388481f"], 0xfe33) (async) ioctl$SIOCSIFHWADDR(r0, 0x8923, &(0x7f0000000040)={'wlan1\x00', @random="4f33e363a4b1"}) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x5, 0x4, 0xfffffffe}, 0x50) (async, rerun: 64) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7}, 0x0, 0x8, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) 26.783174784s ago: executing program 3 (id=2400): bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1806000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x10, 0x2, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) socketpair(0x1, 0x1, 0x5, &(0x7f0000000180)) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r8, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="694fdde0d7b0eec5d3ff005716a8252176426d4f63160b80cc2a28578910d9510b8224f479f8ee78c4b13023cf3d8bb44ffb9030c13ca33e4329175890e08a29550e662370ec809d35e11a2a03c5950100010000000000a4137adfc6c30f3b0270eaf95e0cecf5b3ddd1818ce415c1de63f9b3afbe3a926e27a71ce75f0ef4e576b175347442ed214e72b4ad653a912cdf0a21d6f4a37fbef5f1550cdb4eac6e023bb06045896646b0adf4c1f7ab77915f8f6b35a86f1fab92afcc983751bbe09134d08e04b3f3edeff0485d4e83af4c1cf8c91c6ff31a11277ee18a6bf483", @ANYRESHEX=0x0], 0x50) r9 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f00000008c0), 0x43) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00\v'], 0x48) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r10 = socket$kcm(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r11, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r10, 0x6, 0x1e, &(0x7f0000000500)=r12, 0x4) openat$cgroup_ro(r12, &(0x7f0000000080)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) 26.695454698s ago: executing program 4 (id=2401): r0 = socket$kcm(0x10, 0x3, 0x0) write$cgroup_subtree(r0, &(0x7f0000001ec0)=ANY=[@ANYBLOB="13120000120091ef04e9befbbd00005c0a"], 0xfe33) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x6, 0x8, &(0x7f0000001f80)=ANY=[@ANYBLOB="7a0af8ff7525732cbfa100000000000007010000f8ffffffb702000005000000bf130000000000008500000006000000b700000000000000950000f700000000b2595285fa97ead0169191d54f8196217fc563e2fc91f6da4dad4fdc2eb1b5956fc4a33ca263e2b5d47b2b00000000b1a297cfddd73f30f2382f6c2d3ffdd45be583823c0f092248a57d48621f3c1c65ee19ee875daf45006a4c4ea5e15b2f9618d547244a22000010000800db583620ce7243d1aebdb638d91dbef6619358399aa9c2acd068c03efefd8bc77edf2d34b12cd48a1b20fb7dd843267e0331759f4ec6b5b0af58e604f494eff289026d5045ef08000000000000007718a09f4886afc26abba34635d0e8b598a51bc742135a6e1d33fe226c944bc70bb30d435aa8b5202db761014b1b999a12df6bee431a6681000000263b6233e1c0fe30e3841bef895c5a637b0bf2eac3cb07b74a72291a1a2b523dd81b6651b1ee29e999bb004823ebcd8c65743f31f84b263ab9b3426692d01ad194f302d7a658e90000000001000000b6b2f25ddb8c640ab321a402058c92cdfbea882b0b18914781ceb10814cf4ee23ddb79fff5eb156e0a000000000000f2bd164a178d86d6935eb8b75bc4eb680d10e8b6a54c6c8674caf63ff76622939a20d4aadf85db40179c2cf83ee07e30a279d8fdf3bc282deb43a03409f8e6972f3f720d045923702cede0f3e91411f3f1b16f065624f280a7dcce8db910f93c49b9e0aa390d0da6972ed719d7e0efb2bb713d1890e317c8de105c3933fd5d5bf38f6b9fc39fc829dcfe4af8ac5fbb7314a7a433e0182767d1376eda2b9c66200349e62d4d0ab1a1dc51907c980000cfb215af2c1a3c22243cce23b00000a857d61b0d66c3f6da8aed31027c33204ea0fa0620111920d3f24980e9995a510bd87b06440a0a26130098b901c53a02cfbfd8bcbdec9f34542c3c9652adefde555ecd28ebc88082bab431ee3e1adb5b0ad14c79dd4411ecc96c512f3b72a9b3a0c3e07ec6b427bdc0bf3963e9f802a5feab82a989db62d8d1339f842b3f593d6c24fe015ec63c658ba7c4fae17514f802709ab4fa5caa932d4b65a5ecfc422899513ddde6ec04974f9981a8c155c26e0da70e524832ab04dec9ce66a62ceffbb15b1857c93666fe043a266a451f9a1e1f054211b9ae566b58f4f356c7a4054ce13f6fcc58912a175bd9cc3c494894ad39b36e34e608f4ac00cf22c27bb8c12bcf4beeb579fc9fa1c9"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0xd}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2800000002000000, 0xe, 0x55, &(0x7f0000000140)="a06ad876d56a0064d082778c3938", &(0x7f0000000380)=""/85, 0x500, 0x4000000}, 0x28) recvmsg$kcm(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000022c0)=""/4114, 0x1012}, {&(0x7f0000000e00)=""/236, 0xec}, {&(0x7f0000000b00)=""/188, 0xbc}, {&(0x7f0000000f00)=""/213, 0xd5}, {&(0x7f0000000880)=""/162, 0xa2}, {&(0x7f0000000a00)=""/224, 0xe0}], 0x6}, 0x12000) 237.23427ms ago: executing program 35 (id=2401): r0 = socket$kcm(0x10, 0x3, 0x0) write$cgroup_subtree(r0, &(0x7f0000001ec0)=ANY=[@ANYBLOB="13120000120091ef04e9befbbd00005c0a"], 0xfe33) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x6, 0x8, &(0x7f0000001f80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0xd}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2800000002000000, 0xe, 0x55, &(0x7f0000000140)="a06ad876d56a0064d082778c3938", &(0x7f0000000380)=""/85, 0x500, 0x4000000}, 0x28) recvmsg$kcm(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000022c0)=""/4114, 0x1012}, {&(0x7f0000000e00)=""/236, 0xec}, {&(0x7f0000000b00)=""/188, 0xbc}, {&(0x7f0000000f00)=""/213, 0xd5}, {&(0x7f0000000880)=""/162, 0xa2}, {&(0x7f0000000a00)=""/224, 0xe0}], 0x6}, 0x12000) 187.580832ms ago: executing program 36 (id=2398): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x88e}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xe, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xa, 0x4, 0x6, 0xff, 0x42}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000080), 0x619, r0}, 0x38) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001500)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) 105.707515ms ago: executing program 37 (id=2399): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="180200000000000000000000000000008500000005000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000080)='GPL\x00'}, 0x94) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000003780)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="020b0700fc670007e4a17c45c8d260c9", 0x33fe0}], 0x1}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000002480)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x0) (async) r2 = socket$kcm(0x2, 0x5, 0x84) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x3, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffe}, [@printk={@u, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x73}}]}, &(0x7f0000000080)='GPL\x00'}, 0x94) (async) bpf$TOKEN_CREATE(0x24, &(0x7f0000000100)={0x0, r2}, 0x8) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x76, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x10, 0x105}, 0x94) (async, rerun: 64) bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) (async, rerun: 64) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) (async) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/user\x00') ioctl$TUNSETIFF(r5, 0xb701, 0x0) (async, rerun: 32) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000120000000000000000000000850000006d000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000280)='contention_end\x00', r6}, 0x18) (async, rerun: 32) r7 = socket$kcm(0x10, 0x2, 0x0) (rerun: 32) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[@ANYBLOB="33fe00002a0053ea"], 0xfe33) r8 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r10 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r10, &(0x7f0000001ec0)=ANY=[@ANYBLOB="004000003a00913a74067388481f"], 0xfe33) (async) ioctl$SIOCSIFHWADDR(r0, 0x8923, &(0x7f0000000040)={'wlan1\x00', @random="4f33e363a4b1"}) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x5, 0x4, 0xfffffffe}, 0x50) (async, rerun: 64) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7}, 0x0, 0x8, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 38 (id=2400): bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="1806000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x10, 0x2, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) socketpair(0x1, 0x1, 0x5, &(0x7f0000000180)) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r8, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="694fdde0d7b0eec5d3ff005716a8252176426d4f63160b80cc2a28578910d9510b8224f479f8ee78c4b13023cf3d8bb44ffb9030c13ca33e4329175890e08a29550e662370ec809d35e11a2a03c5950100010000000000a4137adfc6c30f3b0270eaf95e0cecf5b3ddd1818ce415c1de63f9b3afbe3a926e27a71ce75f0ef4e576b175347442ed214e72b4ad653a912cdf0a21d6f4a37fbef5f1550cdb4eac6e023bb06045896646b0adf4c1f7ab77915f8f6b35a86f1fab92afcc983751bbe09134d08e04b3f3edeff0485d4e83af4c1cf8c91c6ff31a11277ee18a6bf483", @ANYRESHEX=0x0], 0x50) r9 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f00000008c0), 0x43) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00\v'], 0x48) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r10 = socket$kcm(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r11, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r10, 0x6, 0x1e, &(0x7f0000000500)=r12, 0x4) openat$cgroup_ro(r12, &(0x7f0000000080)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) kernel console output (not intermixed with test programs): ][T10255] ? load_image+0x3b0/0x3b0 [ 638.514482][T10255] ? __lock_acquire+0x7c80/0x7c80 [ 638.519869][T10255] should_fail_ex+0x39d/0x4d0 [ 638.524817][T10255] _copy_from_user+0x2f/0xe0 [ 638.529479][T10255] __copy_msghdr+0x3bb/0x580 [ 638.534175][T10255] ___sys_sendmsg+0x1a6/0x290 [ 638.539209][T10255] ? __sys_sendmsg+0x270/0x270 [ 638.544267][T10255] ? __lock_acquire+0x7c80/0x7c80 [ 638.549476][T10255] __se_sys_sendmsg+0x1a5/0x270 [ 638.554540][T10255] ? __x64_sys_sendmsg+0x80/0x80 [ 638.559821][T10255] ? lockdep_hardirqs_on+0x98/0x150 [ 638.565258][T10255] do_syscall_64+0x55/0xb0 [ 638.569940][T10255] ? clear_bhb_loop+0x40/0x90 [ 638.574704][T10255] ? clear_bhb_loop+0x40/0x90 [ 638.579673][T10255] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 638.585809][T10255] RIP: 0033:0x7fd61e18f749 [ 638.590423][T10255] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 638.610462][T10255] RSP: 002b:00007fd61f06a038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 638.619514][T10255] RAX: ffffffffffffffda RBX: 00007fd61e3e6090 RCX: 00007fd61e18f749 [ 638.627742][T10255] RDX: 0000000000008054 RSI: 0000200000000300 RDI: 0000000000000003 [ 638.635751][T10255] RBP: 00007fd61f06a090 R08: 0000000000000000 R09: 0000000000000000 [ 638.643928][T10255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 638.652194][T10255] R13: 00007fd61e3e6128 R14: 00007fd61e3e6090 R15: 00007ffe13956358 [ 638.660280][T10255] [ 638.792556][T10253] hsr_slave_0 (unregistering): left promiscuous mode [ 640.021871][T10288] netlink: 'syz.6.1772': attribute type 2 has an invalid length. [ 640.045135][T10288] netlink: 132 bytes leftover after parsing attributes in process `syz.6.1772'. [ 640.079876][T10290] netlink: 'syz.4.1771': attribute type 21 has an invalid length. [ 640.094846][T10290] netlink: 128 bytes leftover after parsing attributes in process `syz.4.1771'. [ 640.120077][T10290] netlink: 'syz.4.1771': attribute type 4 has an invalid length. [ 640.140427][T10290] netlink: 'syz.4.1771': attribute type 5 has an invalid length. [ 640.175714][T10290] netlink: 3 bytes leftover after parsing attributes in process `syz.4.1771'. [ 640.252067][T10295] netlink: 'syz.6.1774': attribute type 3 has an invalid length. [ 640.261683][T10295] netlink: 130984 bytes leftover after parsing attributes in process `syz.6.1774'. [ 640.639122][T10311] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1782'. [ 640.682495][T10309] netlink: 'syz.6.1780': attribute type 4 has an invalid length. [ 640.714939][T10309] netlink: 152 bytes leftover after parsing attributes in process `syz.6.1780'. [ 640.866626][T10309] A link change request failed with some changes committed already. Interface hsr_slave_1 may have been left with an inconsistent configuration, please check. [ 642.049176][T10339] sit0: entered allmulticast mode [ 642.115689][T10339] sit0: entered promiscuous mode [ 642.279034][T10351] netlink: 'syz.4.1796': attribute type 2 has an invalid length. [ 642.306942][T10351] __nla_validate_parse: 1 callbacks suppressed [ 642.306963][T10351] netlink: 209852 bytes leftover after parsing attributes in process `syz.4.1796'. [ 642.887833][T10346] netlink: 'syz.5.1797': attribute type 4 has an invalid length. [ 642.905925][T10346] netlink: 152 bytes leftover after parsing attributes in process `syz.5.1797'. [ 642.998763][T10346] A link change request failed with some changes committed already. Interface hsr_slave_1 may have been left with an inconsistent configuration, please check. [ 643.140846][T10360] syzkaller0: entered promiscuous mode [ 643.151655][T10360] syzkaller0: entered allmulticast mode [ 643.164289][T10362] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1800'. [ 644.506196][T10381] netlink: 4595 bytes leftover after parsing attributes in process `syz.4.1808'. [ 645.704641][T10396] netlink: 10494 bytes leftover after parsing attributes in process `syz.5.1811'. [ 645.721322][T10392] netlink: 'syz.4.1810': attribute type 4 has an invalid length. [ 645.736814][T10392] netlink: 152 bytes leftover after parsing attributes in process `syz.4.1810'. [ 645.862139][T10392] A link change request failed with some changes committed already. Interface hsr_slave_1 may have been left with an inconsistent configuration, please check. [ 645.914570][T10399] netlink: 132 bytes leftover after parsing attributes in process `syz.6.1813'. [ 646.052713][T10406] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1815'. [ 646.629716][T10422] FAULT_INJECTION: forcing a failure. [ 646.629716][T10422] name failslab, interval 1, probability 0, space 0, times 0 [ 646.652176][T10422] CPU: 0 PID: 10422 Comm: syz.5.1819 Not tainted syzkaller #0 [ 646.659814][T10422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 646.670863][T10422] Call Trace: [ 646.674358][T10422] [ 646.677774][T10422] dump_stack_lvl+0x16c/0x230 [ 646.682612][T10422] ? show_regs_print_info+0x20/0x20 [ 646.688028][T10422] ? load_image+0x3b0/0x3b0 [ 646.693260][T10422] ? __might_sleep+0xe0/0xe0 [ 646.697881][T10422] ? __lock_acquire+0x7c80/0x7c80 [ 646.703022][T10422] ? rcu_is_watching+0x15/0xb0 [ 646.707824][T10422] should_fail_ex+0x39d/0x4d0 [ 646.712715][T10422] should_failslab+0x9/0x20 [ 646.717340][T10422] slab_pre_alloc_hook+0x59/0x310 [ 646.722501][T10422] ? sctp_auth_asoc_copy_shkeys+0x14e/0x5a0 [ 646.728707][T10422] __kmem_cache_alloc_node+0x53/0x260 [ 646.734294][T10422] ? sctp_auth_asoc_copy_shkeys+0x14e/0x5a0 [ 646.740582][T10422] kmalloc_trace+0x2a/0xe0 [ 646.745035][T10422] sctp_auth_asoc_copy_shkeys+0x14e/0x5a0 [ 646.751158][T10422] sctp_association_new+0x15d3/0x25c0 [ 646.756749][T10422] sctp_connect_new_asoc+0x2bf/0x690 [ 646.762414][T10422] ? __sctp_connect+0xd20/0xd20 [ 646.767288][T10422] ? __local_bh_enable_ip+0x12e/0x1c0 [ 646.772774][T10422] ? _local_bh_enable+0xa0/0xa0 [ 646.777749][T10422] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 646.783587][T10422] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 646.789700][T10422] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 646.795282][T10422] ? security_sctp_bind_connect+0x89/0xb0 [ 646.801128][T10422] sctp_sendmsg+0x155c/0x27e0 [ 646.805884][T10422] ? sctp_getsockopt+0xb60/0xb60 [ 646.810862][T10422] ? aa_sk_perm+0x7fc/0x930 [ 646.815505][T10422] ? aa_af_perm+0x2b0/0x2b0 [ 646.820043][T10422] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 646.826934][T10422] ? sock_rps_record_flow+0x19/0x400 [ 646.832352][T10422] ? inet_send_prepare+0x260/0x260 [ 646.837622][T10422] ? inet_sendmsg+0x7c/0x2f0 [ 646.842361][T10422] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 646.847686][T10422] ? security_socket_sendmsg+0x80/0xa0 [ 646.853267][T10422] ? inet_send_prepare+0x260/0x260 [ 646.858498][T10422] ____sys_sendmsg+0x5bf/0x950 [ 646.863309][T10422] ? __asan_memset+0x22/0x40 [ 646.868040][T10422] ? __sys_sendmsg_sock+0x30/0x30 [ 646.873539][T10422] ? __import_iovec+0x5f2/0x860 [ 646.878449][T10422] ? import_iovec+0x73/0xa0 [ 646.883082][T10422] ___sys_sendmsg+0x220/0x290 [ 646.888072][T10422] ? __sys_sendmsg+0x270/0x270 [ 646.893241][T10422] ? __lock_acquire+0x7c80/0x7c80 [ 646.898499][T10422] __se_sys_sendmsg+0x1a5/0x270 [ 646.903486][T10422] ? __x64_sys_sendmsg+0x80/0x80 [ 646.908611][T10422] ? lockdep_hardirqs_on+0x98/0x150 [ 646.914449][T10422] do_syscall_64+0x55/0xb0 [ 646.918908][T10422] ? clear_bhb_loop+0x40/0x90 [ 646.923788][T10422] ? clear_bhb_loop+0x40/0x90 [ 646.928494][T10422] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 646.934517][T10422] RIP: 0033:0x7fd61e18f749 [ 646.938980][T10422] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 646.959151][T10422] RSP: 002b:00007fd61f06a038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 646.967863][T10422] RAX: ffffffffffffffda RBX: 00007fd61e3e6090 RCX: 00007fd61e18f749 [ 646.975967][T10422] RDX: 0000000000008054 RSI: 0000200000000300 RDI: 0000000000000003 [ 646.984052][T10422] RBP: 00007fd61f06a090 R08: 0000000000000000 R09: 0000000000000000 [ 646.992053][T10422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 647.001445][T10422] R13: 00007fd61e3e6128 R14: 00007fd61e3e6090 R15: 00007ffe13956358 [ 647.009460][T10422] [ 647.060777][T10416] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 647.581850][T10441] netlink: 60 bytes leftover after parsing attributes in process `syz.5.1828'. [ 647.593394][T10441] netlink: 60 bytes leftover after parsing attributes in process `syz.5.1828'. [ 647.610564][T10441] netlink: 60 bytes leftover after parsing attributes in process `syz.5.1828'. [ 650.646272][T10459] netlink: 822 bytes leftover after parsing attributes in process `syz.6.1834'. [ 651.078989][T10488] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1844'. [ 652.065011][T10516] FAULT_INJECTION: forcing a failure. [ 652.065011][T10516] name failslab, interval 1, probability 0, space 0, times 0 [ 652.122963][T10516] CPU: 1 PID: 10516 Comm: syz.5.1853 Not tainted syzkaller #0 [ 652.130510][T10516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 652.140619][T10516] Call Trace: [ 652.143927][T10516] [ 652.146903][T10516] dump_stack_lvl+0x16c/0x230 [ 652.151619][T10516] ? sctp_sendmsg+0x155c/0x27e0 [ 652.156497][T10516] ? ___sys_sendmsg+0x220/0x290 [ 652.161559][T10516] ? show_regs_print_info+0x20/0x20 [ 652.166791][T10516] ? load_image+0x3b0/0x3b0 [ 652.171519][T10516] should_fail_ex+0x39d/0x4d0 [ 652.176326][T10516] should_failslab+0x9/0x20 [ 652.180873][T10516] slab_pre_alloc_hook+0x59/0x310 [ 652.185940][T10516] ? sctp_add_bind_addr+0x8c/0x360 [ 652.191086][T10516] __kmem_cache_alloc_node+0x53/0x260 [ 652.196503][T10516] ? sctp_add_bind_addr+0x8c/0x360 [ 652.201665][T10516] kmalloc_trace+0x2a/0xe0 [ 652.206118][T10516] sctp_add_bind_addr+0x8c/0x360 [ 652.211133][T10516] sctp_copy_local_addr_list+0x30c/0x4e0 [ 652.216821][T10516] ? sctp_copy_local_addr_list+0x9c/0x4e0 [ 652.222617][T10516] ? sctp_do_8_2_transport_strike+0x8b0/0x8b0 [ 652.228907][T10516] ? sctp_v4_is_any+0x35/0x60 [ 652.233619][T10516] ? sctp_copy_one_addr+0x8c/0x350 [ 652.238776][T10516] sctp_bind_addr_copy+0xb3/0x3c0 [ 652.243922][T10516] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 652.250284][T10516] sctp_connect_new_asoc+0x2da/0x690 [ 652.255774][T10516] ? __sctp_connect+0xd20/0xd20 [ 652.260656][T10516] ? __local_bh_enable_ip+0x12e/0x1c0 [ 652.266211][T10516] ? _local_bh_enable+0xa0/0xa0 [ 652.271087][T10516] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 652.276931][T10516] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 652.282778][T10516] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 652.288358][T10516] ? security_sctp_bind_connect+0x89/0xb0 [ 652.294286][T10516] sctp_sendmsg+0x155c/0x27e0 [ 652.299029][T10516] ? sctp_getsockopt+0xb60/0xb60 [ 652.304085][T10516] ? aa_sk_perm+0x7fc/0x930 [ 652.308659][T10516] ? aa_af_perm+0x2b0/0x2b0 [ 652.313220][T10516] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 652.319778][T10516] ? sock_rps_record_flow+0x19/0x400 [ 652.325103][T10516] ? inet_send_prepare+0x260/0x260 [ 652.330264][T10516] ? inet_sendmsg+0x7c/0x2f0 [ 652.335154][T10516] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 652.340647][T10516] ? security_socket_sendmsg+0x80/0xa0 [ 652.346233][T10516] ? inet_send_prepare+0x260/0x260 [ 652.351372][T10516] ____sys_sendmsg+0x5bf/0x950 [ 652.356271][T10516] ? __asan_memset+0x22/0x40 [ 652.360897][T10516] ? __sys_sendmsg_sock+0x30/0x30 [ 652.365954][T10516] ? __import_iovec+0x5f2/0x860 [ 652.370851][T10516] ? import_iovec+0x73/0xa0 [ 652.375477][T10516] ___sys_sendmsg+0x220/0x290 [ 652.380204][T10516] ? __sys_sendmsg+0x270/0x270 [ 652.385033][T10516] ? __lock_acquire+0x7c80/0x7c80 [ 652.390300][T10516] __se_sys_sendmsg+0x1a5/0x270 [ 652.395202][T10516] ? __x64_sys_sendmsg+0x80/0x80 [ 652.400229][T10516] ? lockdep_hardirqs_on+0x98/0x150 [ 652.405468][T10516] do_syscall_64+0x55/0xb0 [ 652.410096][T10516] ? clear_bhb_loop+0x40/0x90 [ 652.414805][T10516] ? clear_bhb_loop+0x40/0x90 [ 652.419867][T10516] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 652.425881][T10516] RIP: 0033:0x7fd61e18f749 [ 652.430326][T10516] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 652.449967][T10516] RSP: 002b:00007fd61f06a038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 652.458591][T10516] RAX: ffffffffffffffda RBX: 00007fd61e3e6090 RCX: 00007fd61e18f749 [ 652.466677][T10516] RDX: 0000000000008054 RSI: 0000200000000300 RDI: 0000000000000003 [ 652.474954][T10516] RBP: 00007fd61f06a090 R08: 0000000000000000 R09: 0000000000000000 [ 652.482952][T10516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 652.490952][T10516] R13: 00007fd61e3e6128 R14: 00007fd61e3e6090 R15: 00007ffe13956358 [ 652.499094][T10516] [ 652.703678][T10520] netlink: 61211 bytes leftover after parsing attributes in process `syz.4.1855'. [ 653.200087][T10544] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1865'. [ 653.551134][T10560] FAULT_INJECTION: forcing a failure. [ 653.551134][T10560] name failslab, interval 1, probability 0, space 0, times 0 [ 653.590273][T10560] CPU: 0 PID: 10560 Comm: syz.4.1870 Not tainted syzkaller #0 [ 653.598119][T10560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 653.608376][T10560] Call Trace: [ 653.611955][T10560] [ 653.614935][T10560] dump_stack_lvl+0x16c/0x230 [ 653.619845][T10560] ? sctp_sendmsg+0x155c/0x27e0 [ 653.625013][T10560] ? ___sys_sendmsg+0x220/0x290 [ 653.630006][T10560] ? show_regs_print_info+0x20/0x20 [ 653.635259][T10560] ? load_image+0x3b0/0x3b0 [ 653.639834][T10560] should_fail_ex+0x39d/0x4d0 [ 653.644660][T10560] should_failslab+0x9/0x20 [ 653.649216][T10560] slab_pre_alloc_hook+0x59/0x310 [ 653.654315][T10560] ? sctp_add_bind_addr+0x8c/0x360 [ 653.659733][T10560] __kmem_cache_alloc_node+0x53/0x260 [ 653.665169][T10560] ? sctp_add_bind_addr+0x8c/0x360 [ 653.670419][T10560] kmalloc_trace+0x2a/0xe0 [ 653.674894][T10560] sctp_add_bind_addr+0x8c/0x360 [ 653.679898][T10560] sctp_copy_local_addr_list+0x30c/0x4e0 [ 653.685596][T10560] ? sctp_copy_local_addr_list+0x9c/0x4e0 [ 653.691459][T10560] ? sctp_do_8_2_transport_strike+0x8b0/0x8b0 [ 653.697859][T10560] ? sctp_v4_is_any+0x35/0x60 [ 653.702553][T10560] ? sctp_copy_one_addr+0x8c/0x350 [ 653.707687][T10560] sctp_bind_addr_copy+0xb3/0x3c0 [ 653.712821][T10560] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 653.719340][T10560] sctp_connect_new_asoc+0x2da/0x690 [ 653.724643][T10560] ? __sctp_connect+0xd20/0xd20 [ 653.730215][T10560] ? __local_bh_enable_ip+0x12e/0x1c0 [ 653.735830][T10560] ? _local_bh_enable+0xa0/0xa0 [ 653.740779][T10560] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 653.746691][T10560] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 653.752520][T10560] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 653.758343][T10560] ? security_sctp_bind_connect+0x89/0xb0 [ 653.764078][T10560] sctp_sendmsg+0x155c/0x27e0 [ 653.768784][T10560] ? sctp_getsockopt+0xb60/0xb60 [ 653.773850][T10560] ? aa_sk_perm+0x7fc/0x930 [ 653.778491][T10560] ? aa_af_perm+0x2b0/0x2b0 [ 653.783017][T10560] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 653.789454][T10560] ? sock_rps_record_flow+0x19/0x400 [ 653.794765][T10560] ? inet_send_prepare+0x260/0x260 [ 653.799890][T10560] ? inet_sendmsg+0x7c/0x2f0 [ 653.804493][T10560] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 653.809790][T10560] ? security_socket_sendmsg+0x80/0xa0 [ 653.815260][T10560] ? inet_send_prepare+0x260/0x260 [ 653.820563][T10560] ____sys_sendmsg+0x5bf/0x950 [ 653.825362][T10560] ? __asan_memset+0x22/0x40 [ 653.830203][T10560] ? __sys_sendmsg_sock+0x30/0x30 [ 653.835593][T10560] ? __import_iovec+0x5f2/0x860 [ 653.840556][T10560] ? import_iovec+0x73/0xa0 [ 653.845079][T10560] ___sys_sendmsg+0x220/0x290 [ 653.849776][T10560] ? __sys_sendmsg+0x270/0x270 [ 653.854573][T10560] ? __lock_acquire+0x7c80/0x7c80 [ 653.859731][T10560] __se_sys_sendmsg+0x1a5/0x270 [ 653.864792][T10560] ? __x64_sys_sendmsg+0x80/0x80 [ 653.869764][T10560] ? lockdep_hardirqs_on+0x98/0x150 [ 653.874977][T10560] do_syscall_64+0x55/0xb0 [ 653.879410][T10560] ? clear_bhb_loop+0x40/0x90 [ 653.884098][T10560] ? clear_bhb_loop+0x40/0x90 [ 653.888792][T10560] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 653.894787][T10560] RIP: 0033:0x7f059ed8f749 [ 653.899253][T10560] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 653.918890][T10560] RSP: 002b:00007f059fc88038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 653.927322][T10560] RAX: ffffffffffffffda RBX: 00007f059efe6090 RCX: 00007f059ed8f749 [ 653.935304][T10560] RDX: 0000000000008054 RSI: 0000200000000300 RDI: 0000000000000003 [ 653.943288][T10560] RBP: 00007f059fc88090 R08: 0000000000000000 R09: 0000000000000000 [ 653.951443][T10560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 653.959602][T10560] R13: 00007f059efe6128 R14: 00007f059efe6090 R15: 00007ffc3ba25f68 [ 653.967686][T10560] [ 654.352792][T10584] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1880'. [ 654.483426][T10578] netlink: 'syz.6.1877': attribute type 10 has an invalid length. [ 655.026744][T10600] netlink: 14556 bytes leftover after parsing attributes in process `syz.3.1886'. [ 655.078215][T10603] netlink: 'syz.4.1887': attribute type 21 has an invalid length. [ 655.100792][T10603] IPv6: NLM_F_CREATE should be specified when creating new route [ 655.125352][T10603] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 655.132779][T10603] IPv6: NLM_F_CREATE should be set when creating new route [ 655.140326][T10603] IPv6: NLM_F_CREATE should be set when creating new route [ 655.281118][T10610] pim6reg1: entered promiscuous mode [ 655.293828][T10610] pim6reg1: entered allmulticast mode [ 655.361792][T10616] FAULT_INJECTION: forcing a failure. [ 655.361792][T10616] name failslab, interval 1, probability 0, space 0, times 0 [ 655.391312][T10616] CPU: 1 PID: 10616 Comm: syz.6.1892 Not tainted syzkaller #0 [ 655.398868][T10616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 655.408964][T10616] Call Trace: [ 655.412285][T10616] [ 655.415254][T10616] dump_stack_lvl+0x16c/0x230 [ 655.419980][T10616] ? sctp_sendmsg+0x155c/0x27e0 [ 655.424879][T10616] ? ___sys_sendmsg+0x220/0x290 [ 655.429786][T10616] ? show_regs_print_info+0x20/0x20 [ 655.435634][T10616] ? load_image+0x3b0/0x3b0 [ 655.440188][T10616] should_fail_ex+0x39d/0x4d0 [ 655.445290][T10616] should_failslab+0x9/0x20 [ 655.449928][T10616] slab_pre_alloc_hook+0x59/0x310 [ 655.455092][T10616] ? sctp_add_bind_addr+0x8c/0x360 [ 655.460250][T10616] __kmem_cache_alloc_node+0x53/0x260 [ 655.465653][T10616] ? sctp_add_bind_addr+0x8c/0x360 [ 655.470876][T10616] kmalloc_trace+0x2a/0xe0 [ 655.475396][T10616] sctp_add_bind_addr+0x8c/0x360 [ 655.480615][T10616] sctp_copy_local_addr_list+0x30c/0x4e0 [ 655.486367][T10616] ? sctp_copy_local_addr_list+0x9c/0x4e0 [ 655.492277][T10616] ? sctp_do_8_2_transport_strike+0x8b0/0x8b0 [ 655.498374][T10616] ? sctp_v4_is_any+0x35/0x60 [ 655.503095][T10616] ? sctp_copy_one_addr+0x8c/0x350 [ 655.508230][T10616] sctp_bind_addr_copy+0xb3/0x3c0 [ 655.513627][T10616] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 655.520257][T10616] sctp_connect_new_asoc+0x2da/0x690 [ 655.525730][T10616] ? __sctp_connect+0xd20/0xd20 [ 655.530597][T10616] ? __local_bh_enable_ip+0x12e/0x1c0 [ 655.536066][T10616] ? _local_bh_enable+0xa0/0xa0 [ 655.541014][T10616] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 655.547009][T10616] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 655.553348][T10616] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 655.559004][T10616] ? security_sctp_bind_connect+0x89/0xb0 [ 655.564750][T10616] sctp_sendmsg+0x155c/0x27e0 [ 655.569454][T10616] ? sctp_getsockopt+0xb60/0xb60 [ 655.574577][T10616] ? aa_sk_perm+0x7fc/0x930 [ 655.579101][T10616] ? aa_af_perm+0x2b0/0x2b0 [ 655.583619][T10616] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 655.590315][T10616] ? sock_rps_record_flow+0x19/0x400 [ 655.595615][T10616] ? inet_send_prepare+0x260/0x260 [ 655.601005][T10616] ? inet_sendmsg+0x7c/0x2f0 [ 655.605608][T10616] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 655.611189][T10616] ? security_socket_sendmsg+0x80/0xa0 [ 655.616697][T10616] ? inet_send_prepare+0x260/0x260 [ 655.622705][T10616] ____sys_sendmsg+0x5bf/0x950 [ 655.627596][T10616] ? __asan_memset+0x22/0x40 [ 655.632234][T10616] ? __sys_sendmsg_sock+0x30/0x30 [ 655.637275][T10616] ? __import_iovec+0x5f2/0x860 [ 655.642325][T10616] ? import_iovec+0x73/0xa0 [ 655.646933][T10616] ___sys_sendmsg+0x220/0x290 [ 655.651726][T10616] ? __sys_sendmsg+0x270/0x270 [ 655.656621][T10616] ? __lock_acquire+0x7c80/0x7c80 [ 655.661804][T10616] __se_sys_sendmsg+0x1a5/0x270 [ 655.666716][T10616] ? __x64_sys_sendmsg+0x80/0x80 [ 655.671780][T10616] ? lockdep_hardirqs_on+0x98/0x150 [ 655.677224][T10616] do_syscall_64+0x55/0xb0 [ 655.681740][T10616] ? clear_bhb_loop+0x40/0x90 [ 655.686603][T10616] ? clear_bhb_loop+0x40/0x90 [ 655.691306][T10616] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 655.697450][T10616] RIP: 0033:0x7fc07df8f749 [ 655.701882][T10616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 655.721607][T10616] RSP: 002b:00007fc07ee40038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 655.730122][T10616] RAX: ffffffffffffffda RBX: 00007fc07e1e6090 RCX: 00007fc07df8f749 [ 655.738719][T10616] RDX: 0000000000008054 RSI: 0000200000000300 RDI: 0000000000000003 [ 655.746791][T10616] RBP: 00007fc07ee40090 R08: 0000000000000000 R09: 0000000000000000 [ 655.754882][T10616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 655.762862][T10616] R13: 00007fc07e1e6128 R14: 00007fc07e1e6090 R15: 00007ffd62c2c038 [ 655.770969][T10616] [ 655.972543][T10623] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1895'. [ 656.273974][T10641] netlink: 'syz.6.1901': attribute type 1 has an invalid length. [ 656.419950][T10646] netlink: 'syz.6.1901': attribute type 3 has an invalid length. [ 656.428881][T10646] netlink: 130984 bytes leftover after parsing attributes in process `syz.6.1901'. [ 656.574612][T10651] TCP: TCP_TX_DELAY enabled [ 656.943068][T10653] netlink: 'syz.3.1906': attribute type 13 has an invalid length. [ 656.951396][T10653] netlink: 168 bytes leftover after parsing attributes in process `syz.3.1906'. [ 656.961940][T10653] netlink: 164 bytes leftover after parsing attributes in process `syz.3.1906'. [ 656.973934][T10653] netlink: 'syz.3.1906': attribute type 23 has an invalid length. [ 657.031659][T10655] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1907'. [ 657.271092][T10663] FAULT_INJECTION: forcing a failure. [ 657.271092][T10663] name failslab, interval 1, probability 0, space 0, times 0 [ 657.284489][T10663] CPU: 0 PID: 10663 Comm: syz.6.1910 Not tainted syzkaller #0 [ 657.292094][T10663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 657.302731][T10663] Call Trace: [ 657.306197][T10663] [ 657.309245][T10663] dump_stack_lvl+0x16c/0x230 [ 657.313963][T10663] ? sctp_sendmsg+0x155c/0x27e0 [ 657.319022][T10663] ? ___sys_sendmsg+0x220/0x290 [ 657.323915][T10663] ? show_regs_print_info+0x20/0x20 [ 657.329156][T10663] ? load_image+0x3b0/0x3b0 [ 657.333802][T10663] should_fail_ex+0x39d/0x4d0 [ 657.338578][T10663] should_failslab+0x9/0x20 [ 657.343381][T10663] slab_pre_alloc_hook+0x59/0x310 [ 657.348552][T10663] ? sctp_add_bind_addr+0x8c/0x360 [ 657.353805][T10663] __kmem_cache_alloc_node+0x53/0x260 [ 657.359394][T10663] ? sctp_add_bind_addr+0x8c/0x360 [ 657.364717][T10663] kmalloc_trace+0x2a/0xe0 [ 657.369172][T10663] sctp_add_bind_addr+0x8c/0x360 [ 657.374243][T10663] sctp_copy_local_addr_list+0x30c/0x4e0 [ 657.380183][T10663] ? sctp_copy_local_addr_list+0x9c/0x4e0 [ 657.386133][T10663] ? sctp_do_8_2_transport_strike+0x8b0/0x8b0 [ 657.392250][T10663] ? sctp_v4_is_any+0x35/0x60 [ 657.396963][T10663] ? sctp_copy_one_addr+0x8c/0x350 [ 657.402251][T10663] sctp_bind_addr_copy+0xb3/0x3c0 [ 657.407405][T10663] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 657.413771][T10663] sctp_connect_new_asoc+0x2da/0x690 [ 657.419197][T10663] ? __sctp_connect+0xd20/0xd20 [ 657.424249][T10663] ? __local_bh_enable_ip+0x12e/0x1c0 [ 657.429659][T10663] ? _local_bh_enable+0xa0/0xa0 [ 657.434546][T10663] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 657.440482][T10663] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 657.446324][T10663] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 657.452076][T10663] ? security_sctp_bind_connect+0x89/0xb0 [ 657.457850][T10663] sctp_sendmsg+0x155c/0x27e0 [ 657.462575][T10663] ? sctp_getsockopt+0xb60/0xb60 [ 657.467550][T10663] ? aa_sk_perm+0x7fc/0x930 [ 657.472187][T10663] ? aa_af_perm+0x2b0/0x2b0 [ 657.476900][T10663] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 657.483360][T10663] ? sock_rps_record_flow+0x19/0x400 [ 657.488768][T10663] ? inet_send_prepare+0x260/0x260 [ 657.494029][T10663] ? inet_sendmsg+0x7c/0x2f0 [ 657.498686][T10663] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 657.504014][T10663] ? security_socket_sendmsg+0x80/0xa0 [ 657.509516][T10663] ? inet_send_prepare+0x260/0x260 [ 657.514871][T10663] ____sys_sendmsg+0x5bf/0x950 [ 657.519866][T10663] ? __asan_memset+0x22/0x40 [ 657.524495][T10663] ? __sys_sendmsg_sock+0x30/0x30 [ 657.529648][T10663] ? __import_iovec+0x5f2/0x860 [ 657.534551][T10663] ? import_iovec+0x73/0xa0 [ 657.539100][T10663] ___sys_sendmsg+0x220/0x290 [ 657.543919][T10663] ? __sys_sendmsg+0x270/0x270 [ 657.548780][T10663] ? __lock_acquire+0x7c80/0x7c80 [ 657.553899][T10663] __se_sys_sendmsg+0x1a5/0x270 [ 657.558822][T10663] ? __x64_sys_sendmsg+0x80/0x80 [ 657.563834][T10663] ? lockdep_hardirqs_on+0x98/0x150 [ 657.569080][T10663] do_syscall_64+0x55/0xb0 [ 657.573600][T10663] ? clear_bhb_loop+0x40/0x90 [ 657.578490][T10663] ? clear_bhb_loop+0x40/0x90 [ 657.583199][T10663] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 657.589389][T10663] RIP: 0033:0x7fc07df8f749 [ 657.593974][T10663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 657.614331][T10663] RSP: 002b:00007fc07ee40038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 657.623120][T10663] RAX: ffffffffffffffda RBX: 00007fc07e1e6090 RCX: 00007fc07df8f749 [ 657.631144][T10663] RDX: 0000000000008054 RSI: 0000200000000300 RDI: 0000000000000003 [ 657.639152][T10663] RBP: 00007fc07ee40090 R08: 0000000000000000 R09: 0000000000000000 [ 657.647180][T10663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 657.655212][T10663] R13: 00007fc07e1e6128 R14: 00007fc07e1e6090 R15: 00007ffd62c2c038 [ 657.663343][T10663] [ 659.152902][T10716] FAULT_INJECTION: forcing a failure. [ 659.152902][T10716] name failslab, interval 1, probability 0, space 0, times 0 [ 659.169704][T10716] CPU: 0 PID: 10716 Comm: syz.3.1930 Not tainted syzkaller #0 [ 659.177293][T10716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 659.187580][T10716] Call Trace: [ 659.190880][T10716] [ 659.193843][T10716] dump_stack_lvl+0x16c/0x230 [ 659.198561][T10716] ? sctp_sendmsg+0x155c/0x27e0 [ 659.203472][T10716] ? ___sys_sendmsg+0x220/0x290 [ 659.208408][T10716] ? show_regs_print_info+0x20/0x20 [ 659.213769][T10716] ? load_image+0x3b0/0x3b0 [ 659.218445][T10716] should_fail_ex+0x39d/0x4d0 [ 659.223430][T10716] should_failslab+0x9/0x20 [ 659.227962][T10716] slab_pre_alloc_hook+0x59/0x310 [ 659.233167][T10716] ? sctp_add_bind_addr+0x8c/0x360 [ 659.238308][T10716] __kmem_cache_alloc_node+0x53/0x260 [ 659.243814][T10716] ? sctp_add_bind_addr+0x8c/0x360 [ 659.249038][T10716] kmalloc_trace+0x2a/0xe0 [ 659.253537][T10716] sctp_add_bind_addr+0x8c/0x360 [ 659.258530][T10716] sctp_copy_local_addr_list+0x30c/0x4e0 [ 659.264285][T10716] ? sctp_copy_local_addr_list+0x9c/0x4e0 [ 659.270124][T10716] ? sctp_do_8_2_transport_strike+0x8b0/0x8b0 [ 659.276248][T10716] ? sctp_v4_is_any+0x35/0x60 [ 659.281196][T10716] ? sctp_copy_one_addr+0x8c/0x350 [ 659.286527][T10716] sctp_bind_addr_copy+0xb3/0x3c0 [ 659.291787][T10716] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 659.298320][T10716] sctp_connect_new_asoc+0x2da/0x690 [ 659.303810][T10716] ? __sctp_connect+0xd20/0xd20 [ 659.308705][T10716] ? __local_bh_enable_ip+0x12e/0x1c0 [ 659.314222][T10716] ? _local_bh_enable+0xa0/0xa0 [ 659.319411][T10716] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 659.325260][T10716] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 659.331109][T10716] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 659.336697][T10716] ? security_sctp_bind_connect+0x89/0xb0 [ 659.342648][T10716] sctp_sendmsg+0x155c/0x27e0 [ 659.347469][T10716] ? sctp_getsockopt+0xb60/0xb60 [ 659.352465][T10716] ? aa_sk_perm+0x7fc/0x930 [ 659.357049][T10716] ? aa_af_perm+0x2b0/0x2b0 [ 659.361703][T10716] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 659.368289][T10716] ? sock_rps_record_flow+0x19/0x400 [ 659.373623][T10716] ? inet_send_prepare+0x260/0x260 [ 659.378761][T10716] ? inet_sendmsg+0x7c/0x2f0 [ 659.383370][T10716] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 659.388690][T10716] ? security_socket_sendmsg+0x80/0xa0 [ 659.394240][T10716] ? inet_send_prepare+0x260/0x260 [ 659.399383][T10716] ____sys_sendmsg+0x5bf/0x950 [ 659.404171][T10716] ? __asan_memset+0x22/0x40 [ 659.408867][T10716] ? __sys_sendmsg_sock+0x30/0x30 [ 659.413947][T10716] ? __import_iovec+0x5f2/0x860 [ 659.418963][T10716] ? import_iovec+0x73/0xa0 [ 659.423484][T10716] ___sys_sendmsg+0x220/0x290 [ 659.428201][T10716] ? __sys_sendmsg+0x270/0x270 [ 659.433117][T10716] ? __lock_acquire+0x7c80/0x7c80 [ 659.438290][T10716] __se_sys_sendmsg+0x1a5/0x270 [ 659.443257][T10716] ? perf_trace_preemptirq_template+0x281/0x340 [ 659.449561][T10716] ? __x64_sys_sendmsg+0x80/0x80 [ 659.454752][T10716] ? lockdep_hardirqs_on+0x98/0x150 [ 659.460005][T10716] do_syscall_64+0x55/0xb0 [ 659.464795][T10716] ? clear_bhb_loop+0x40/0x90 [ 659.469513][T10716] ? clear_bhb_loop+0x40/0x90 [ 659.474331][T10716] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 659.480304][T10716] RIP: 0033:0x7fe628d8f749 [ 659.484758][T10716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 659.504695][T10716] RSP: 002b:00007fe629c60038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 659.513513][T10716] RAX: ffffffffffffffda RBX: 00007fe628fe6090 RCX: 00007fe628d8f749 [ 659.521712][T10716] RDX: 0000000000008054 RSI: 0000200000000300 RDI: 0000000000000003 [ 659.530251][T10716] RBP: 00007fe629c60090 R08: 0000000000000000 R09: 0000000000000000 [ 659.538634][T10716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 659.546744][T10716] R13: 00007fe628fe6128 R14: 00007fe628fe6090 R15: 00007ffeca9e0ab8 [ 659.554955][T10716] [ 660.767940][T10760] netlink: 4083 bytes leftover after parsing attributes in process `syz.4.1948'. [ 661.346474][T10765] FAULT_INJECTION: forcing a failure. [ 661.346474][T10765] name failslab, interval 1, probability 0, space 0, times 0 [ 661.359729][T10765] CPU: 1 PID: 10765 Comm: syz.3.1949 Not tainted syzkaller #0 [ 661.367345][T10765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 661.377780][T10765] Call Trace: [ 661.381103][T10765] [ 661.384061][T10765] dump_stack_lvl+0x16c/0x230 [ 661.388863][T10765] ? sctp_sendmsg+0x155c/0x27e0 [ 661.393833][T10765] ? ___sys_sendmsg+0x220/0x290 [ 661.398739][T10765] ? show_regs_print_info+0x20/0x20 [ 661.403950][T10765] ? load_image+0x3b0/0x3b0 [ 661.408611][T10765] should_fail_ex+0x39d/0x4d0 [ 661.413326][T10765] should_failslab+0x9/0x20 [ 661.417856][T10765] slab_pre_alloc_hook+0x59/0x310 [ 661.422935][T10765] ? sctp_add_bind_addr+0x8c/0x360 [ 661.428058][T10765] __kmem_cache_alloc_node+0x53/0x260 [ 661.433513][T10765] ? sctp_add_bind_addr+0x8c/0x360 [ 661.438726][T10765] kmalloc_trace+0x2a/0xe0 [ 661.443162][T10765] sctp_add_bind_addr+0x8c/0x360 [ 661.448164][T10765] sctp_copy_local_addr_list+0x30c/0x4e0 [ 661.453919][T10765] ? sctp_copy_local_addr_list+0x9c/0x4e0 [ 661.459748][T10765] ? sctp_do_8_2_transport_strike+0x8b0/0x8b0 [ 661.465864][T10765] ? sctp_v4_is_any+0x35/0x60 [ 661.470756][T10765] ? sctp_copy_one_addr+0x8c/0x350 [ 661.476156][T10765] sctp_bind_addr_copy+0xb3/0x3c0 [ 661.481311][T10765] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 661.487662][T10765] sctp_connect_new_asoc+0x2da/0x690 [ 661.492956][T10765] ? __sctp_connect+0xd20/0xd20 [ 661.497817][T10765] ? __local_bh_enable_ip+0x12e/0x1c0 [ 661.503213][T10765] ? _local_bh_enable+0xa0/0xa0 [ 661.508078][T10765] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 661.513948][T10765] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 661.520117][T10765] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 661.526033][T10765] ? security_sctp_bind_connect+0x89/0xb0 [ 661.532123][T10765] sctp_sendmsg+0x155c/0x27e0 [ 661.536843][T10765] ? sctp_getsockopt+0xb60/0xb60 [ 661.541813][T10765] ? aa_sk_perm+0x7fc/0x930 [ 661.546352][T10765] ? aa_af_perm+0x2b0/0x2b0 [ 661.550978][T10765] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 661.557426][T10765] ? sock_rps_record_flow+0x19/0x400 [ 661.562749][T10765] ? inet_send_prepare+0x260/0x260 [ 661.568042][T10765] ? inet_sendmsg+0x7c/0x2f0 [ 661.572733][T10765] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 661.578064][T10765] ? security_socket_sendmsg+0x80/0xa0 [ 661.583653][T10765] ? inet_send_prepare+0x260/0x260 [ 661.589500][T10765] ____sys_sendmsg+0x5bf/0x950 [ 661.594628][T10765] ? __asan_memset+0x22/0x40 [ 661.599329][T10765] ? __sys_sendmsg_sock+0x30/0x30 [ 661.604374][T10765] ? __import_iovec+0x5f2/0x860 [ 661.609254][T10765] ? import_iovec+0x73/0xa0 [ 661.614032][T10765] ___sys_sendmsg+0x220/0x290 [ 661.618730][T10765] ? __sys_sendmsg+0x270/0x270 [ 661.623689][T10765] ? __lock_acquire+0x7c80/0x7c80 [ 661.628752][T10765] __se_sys_sendmsg+0x1a5/0x270 [ 661.633709][T10765] ? __x64_sys_sendmsg+0x80/0x80 [ 661.638694][T10765] ? lockdep_hardirqs_on+0x98/0x150 [ 661.643925][T10765] do_syscall_64+0x55/0xb0 [ 661.648354][T10765] ? clear_bhb_loop+0x40/0x90 [ 661.653036][T10765] ? clear_bhb_loop+0x40/0x90 [ 661.657774][T10765] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 661.663784][T10765] RIP: 0033:0x7fe628d8f749 [ 661.668300][T10765] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 661.688449][T10765] RSP: 002b:00007fe629c60038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 661.697503][T10765] RAX: ffffffffffffffda RBX: 00007fe628fe6090 RCX: 00007fe628d8f749 [ 661.706196][T10765] RDX: 0000000000008054 RSI: 0000200000000300 RDI: 0000000000000003 [ 661.714347][T10765] RBP: 00007fe629c60090 R08: 0000000000000000 R09: 0000000000000000 [ 661.722521][T10765] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 661.730684][T10765] R13: 00007fe628fe6128 R14: 00007fe628fe6090 R15: 00007ffeca9e0ab8 [ 661.738781][T10765] [ 663.094191][T10755] netlink: 14601 bytes leftover after parsing attributes in process `syz.5.1946'. [ 663.105309][T10760] netlink: 4083 bytes leftover after parsing attributes in process `syz.4.1948'. [ 663.502968][T10795] netlink: 'syz.3.1959': attribute type 8 has an invalid length. [ 663.554894][T10795] A link change request failed with some changes committed already. Interface C may have been left with an inconsistent configuration, please check. [ 663.767313][T10802] FAULT_INJECTION: forcing a failure. [ 663.767313][T10802] name failslab, interval 1, probability 0, space 0, times 0 [ 663.801413][T10802] CPU: 0 PID: 10802 Comm: syz.6.1961 Not tainted syzkaller #0 [ 663.809115][T10802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 663.819308][T10802] Call Trace: [ 663.822634][T10802] [ 663.825698][T10802] dump_stack_lvl+0x16c/0x230 [ 663.830601][T10802] ? sctp_sendmsg+0x155c/0x27e0 [ 663.835509][T10802] ? ___sys_sendmsg+0x220/0x290 [ 663.840412][T10802] ? show_regs_print_info+0x20/0x20 [ 663.845665][T10802] ? load_image+0x3b0/0x3b0 [ 663.850234][T10802] should_fail_ex+0x39d/0x4d0 [ 663.854969][T10802] should_failslab+0x9/0x20 [ 663.859636][T10802] slab_pre_alloc_hook+0x59/0x310 [ 663.864718][T10802] ? sctp_add_bind_addr+0x8c/0x360 [ 663.869976][T10802] __kmem_cache_alloc_node+0x53/0x260 [ 663.875502][T10802] ? sctp_add_bind_addr+0x8c/0x360 [ 663.880667][T10802] kmalloc_trace+0x2a/0xe0 [ 663.885131][T10802] sctp_add_bind_addr+0x8c/0x360 [ 663.890136][T10802] sctp_copy_local_addr_list+0x30c/0x4e0 [ 663.895919][T10802] ? sctp_copy_local_addr_list+0x9c/0x4e0 [ 663.901683][T10802] ? sctp_do_8_2_transport_strike+0x8b0/0x8b0 [ 663.907993][T10802] ? sctp_v4_is_any+0x35/0x60 [ 663.912692][T10802] ? sctp_copy_one_addr+0x8c/0x350 [ 663.917832][T10802] sctp_bind_addr_copy+0xb3/0x3c0 [ 663.923231][T10802] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 663.929576][T10802] sctp_connect_new_asoc+0x2da/0x690 [ 663.934886][T10802] ? __sctp_connect+0xd20/0xd20 [ 663.939743][T10802] ? __local_bh_enable_ip+0x12e/0x1c0 [ 663.945130][T10802] ? _local_bh_enable+0xa0/0xa0 [ 663.949991][T10802] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 663.955811][T10802] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 663.961630][T10802] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 663.967290][T10802] ? security_sctp_bind_connect+0x89/0xb0 [ 663.973207][T10802] sctp_sendmsg+0x155c/0x27e0 [ 663.978009][T10802] ? sctp_getsockopt+0xb60/0xb60 [ 663.983312][T10802] ? perf_trace_lock_acquire+0xfb/0x3e0 [ 663.989180][T10802] ? aa_sk_perm+0x7fc/0x930 [ 663.993718][T10802] ? aa_af_perm+0x2b0/0x2b0 [ 663.998427][T10802] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 664.004959][T10802] ? sock_rps_record_flow+0x19/0x400 [ 664.010260][T10802] ? inet_send_prepare+0x260/0x260 [ 664.015563][T10802] ? inet_sendmsg+0x7c/0x2f0 [ 664.020169][T10802] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 664.025524][T10802] ? security_socket_sendmsg+0x80/0xa0 [ 664.031087][T10802] ? inet_send_prepare+0x260/0x260 [ 664.036325][T10802] ____sys_sendmsg+0x5bf/0x950 [ 664.041551][T10802] ? __asan_memset+0x22/0x40 [ 664.046172][T10802] ? __sys_sendmsg_sock+0x30/0x30 [ 664.051299][T10802] ? __import_iovec+0x5f2/0x860 [ 664.056381][T10802] ? import_iovec+0x73/0xa0 [ 664.060904][T10802] ___sys_sendmsg+0x220/0x290 [ 664.065720][T10802] ? __sys_sendmsg+0x270/0x270 [ 664.070546][T10802] ? __lock_acquire+0x7c80/0x7c80 [ 664.075711][T10802] __se_sys_sendmsg+0x1a5/0x270 [ 664.080590][T10802] ? __x64_sys_sendmsg+0x80/0x80 [ 664.085650][T10802] ? lockdep_hardirqs_on+0x98/0x150 [ 664.090863][T10802] do_syscall_64+0x55/0xb0 [ 664.095295][T10802] ? clear_bhb_loop+0x40/0x90 [ 664.100071][T10802] ? clear_bhb_loop+0x40/0x90 [ 664.104864][T10802] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 664.110875][T10802] RIP: 0033:0x7fc07df8f749 [ 664.115306][T10802] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 664.135535][T10802] RSP: 002b:00007fc07ee40038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 664.144317][T10802] RAX: ffffffffffffffda RBX: 00007fc07e1e6090 RCX: 00007fc07df8f749 [ 664.152399][T10802] RDX: 0000000000008054 RSI: 0000200000000300 RDI: 0000000000000003 [ 664.160647][T10802] RBP: 00007fc07ee40090 R08: 0000000000000000 R09: 0000000000000000 [ 664.168720][T10802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 664.176960][T10802] R13: 00007fc07e1e6128 R14: 00007fc07e1e6090 R15: 00007ffd62c2c038 [ 664.185221][T10802] [ 666.443350][T10822] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1970'. [ 666.697102][T10837] syzkaller0: entered allmulticast mode [ 667.063332][T10852] FAULT_INJECTION: forcing a failure. [ 667.063332][T10852] name failslab, interval 1, probability 0, space 0, times 0 [ 667.083118][T10852] CPU: 1 PID: 10852 Comm: syz.4.1980 Not tainted syzkaller #0 [ 667.090676][T10852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 667.100976][T10852] Call Trace: [ 667.104382][T10852] [ 667.107348][T10852] dump_stack_lvl+0x16c/0x230 [ 667.112097][T10852] ? sctp_sendmsg+0x155c/0x27e0 [ 667.117008][T10852] ? ___sys_sendmsg+0x220/0x290 [ 667.121904][T10852] ? show_regs_print_info+0x20/0x20 [ 667.127161][T10852] ? load_image+0x3b0/0x3b0 [ 667.132041][T10852] should_fail_ex+0x39d/0x4d0 [ 667.136834][T10852] should_failslab+0x9/0x20 [ 667.141708][T10852] slab_pre_alloc_hook+0x59/0x310 [ 667.146839][T10852] ? sctp_add_bind_addr+0x8c/0x360 [ 667.152082][T10852] __kmem_cache_alloc_node+0x53/0x260 [ 667.157579][T10852] ? sctp_add_bind_addr+0x8c/0x360 [ 667.162704][T10852] kmalloc_trace+0x2a/0xe0 [ 667.167237][T10852] sctp_add_bind_addr+0x8c/0x360 [ 667.172887][T10852] sctp_copy_local_addr_list+0x30c/0x4e0 [ 667.178817][T10852] ? sctp_copy_local_addr_list+0x9c/0x4e0 [ 667.184645][T10852] ? sctp_do_8_2_transport_strike+0x8b0/0x8b0 [ 667.190920][T10852] ? sctp_v4_is_any+0x35/0x60 [ 667.195707][T10852] ? sctp_copy_one_addr+0x8c/0x350 [ 667.201021][T10852] sctp_bind_addr_copy+0xb3/0x3c0 [ 667.206089][T10852] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 667.212543][T10852] sctp_connect_new_asoc+0x2da/0x690 [ 667.217876][T10852] ? __sctp_connect+0xd20/0xd20 [ 667.222835][T10852] ? __local_bh_enable_ip+0x12e/0x1c0 [ 667.228318][T10852] ? _local_bh_enable+0xa0/0xa0 [ 667.233264][T10852] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 667.239079][T10852] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 667.244987][T10852] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 667.250555][T10852] ? security_sctp_bind_connect+0x89/0xb0 [ 667.256462][T10852] sctp_sendmsg+0x155c/0x27e0 [ 667.261164][T10852] ? sctp_getsockopt+0xb60/0xb60 [ 667.266295][T10852] ? aa_sk_perm+0x7fc/0x930 [ 667.270915][T10852] ? aa_af_perm+0x2b0/0x2b0 [ 667.275433][T10852] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 667.281869][T10852] ? sock_rps_record_flow+0x19/0x400 [ 667.287285][T10852] ? inet_send_prepare+0x260/0x260 [ 667.292431][T10852] ? inet_sendmsg+0x7c/0x2f0 [ 667.297049][T10852] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 667.302525][T10852] ? security_socket_sendmsg+0x80/0xa0 [ 667.308008][T10852] ? inet_send_prepare+0x260/0x260 [ 667.313236][T10852] ____sys_sendmsg+0x5bf/0x950 [ 667.318027][T10852] ? __asan_memset+0x22/0x40 [ 667.322632][T10852] ? __sys_sendmsg_sock+0x30/0x30 [ 667.327854][T10852] ? __import_iovec+0x5f2/0x860 [ 667.332894][T10852] ? import_iovec+0x73/0xa0 [ 667.337509][T10852] ___sys_sendmsg+0x220/0x290 [ 667.342295][T10852] ? __sys_sendmsg+0x270/0x270 [ 667.347094][T10852] ? __lock_acquire+0x7c80/0x7c80 [ 667.352155][T10852] __se_sys_sendmsg+0x1a5/0x270 [ 667.357376][T10852] ? __x64_sys_sendmsg+0x80/0x80 [ 667.362606][T10852] ? lockdep_hardirqs_on+0x98/0x150 [ 667.368488][T10852] do_syscall_64+0x55/0xb0 [ 667.373274][T10852] ? clear_bhb_loop+0x40/0x90 [ 667.378084][T10852] ? clear_bhb_loop+0x40/0x90 [ 667.382964][T10852] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 667.389131][T10852] RIP: 0033:0x7f059ed8f749 [ 667.393646][T10852] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 667.413965][T10852] RSP: 002b:00007f059fc88038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 667.422481][T10852] RAX: ffffffffffffffda RBX: 00007f059efe6090 RCX: 00007f059ed8f749 [ 667.430728][T10852] RDX: 0000000000008054 RSI: 0000200000000300 RDI: 0000000000000003 [ 667.438744][T10852] RBP: 00007f059fc88090 R08: 0000000000000000 R09: 0000000000000000 [ 667.446995][T10852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 667.455100][T10852] R13: 00007f059efe6128 R14: 00007f059efe6090 R15: 00007ffc3ba25f68 [ 667.463189][T10852] [ 667.602877][T10854] netlink: 9286 bytes leftover after parsing attributes in process `syz.5.1981'. [ 667.689775][T10863] netlink: 132 bytes leftover after parsing attributes in process `syz.6.1984'. [ 668.614581][T10878] can: request_module (can-proto-5) failed. [ 670.868751][T10877] netlink: 'syz.4.1990': attribute type 39 has an invalid length. [ 670.916995][T10884] netlink: 132 bytes leftover after parsing attributes in process `syz.5.1991'. [ 671.735470][T10899] netlink: 'syz.5.1997': attribute type 4 has an invalid length. [ 671.743605][T10899] netlink: 199836 bytes leftover after parsing attributes in process `syz.5.1997'. [ 673.101777][T10935] FAULT_INJECTION: forcing a failure. [ 673.101777][T10935] name failslab, interval 1, probability 0, space 0, times 0 [ 673.115571][T10935] CPU: 1 PID: 10935 Comm: syz.3.2010 Not tainted syzkaller #0 [ 673.123329][T10935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 673.133482][T10935] Call Trace: [ 673.137037][T10935] [ 673.140268][T10935] dump_stack_lvl+0x16c/0x230 [ 673.144972][T10935] ? sctp_sendmsg+0x155c/0x27e0 [ 673.149909][T10935] ? ___sys_sendmsg+0x220/0x290 [ 673.154920][T10935] ? show_regs_print_info+0x20/0x20 [ 673.160218][T10935] ? load_image+0x3b0/0x3b0 [ 673.164761][T10935] should_fail_ex+0x39d/0x4d0 [ 673.169473][T10935] should_failslab+0x9/0x20 [ 673.174023][T10935] slab_pre_alloc_hook+0x59/0x310 [ 673.179093][T10935] ? sctp_add_bind_addr+0x8c/0x360 [ 673.184344][T10935] __kmem_cache_alloc_node+0x53/0x260 [ 673.189746][T10935] ? sctp_add_bind_addr+0x8c/0x360 [ 673.194879][T10935] kmalloc_trace+0x2a/0xe0 [ 673.199358][T10935] sctp_add_bind_addr+0x8c/0x360 [ 673.204343][T10935] sctp_copy_local_addr_list+0x30c/0x4e0 [ 673.210121][T10935] ? sctp_copy_local_addr_list+0x9c/0x4e0 [ 673.216009][T10935] ? sctp_do_8_2_transport_strike+0x8b0/0x8b0 [ 673.222366][T10935] ? sctp_v4_is_any+0x35/0x60 [ 673.227073][T10935] ? sctp_copy_one_addr+0x8c/0x350 [ 673.232293][T10935] sctp_bind_addr_copy+0xb3/0x3c0 [ 673.237424][T10935] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 673.243769][T10935] sctp_connect_new_asoc+0x2da/0x690 [ 673.249080][T10935] ? __sctp_connect+0xd20/0xd20 [ 673.253944][T10935] ? __local_bh_enable_ip+0x12e/0x1c0 [ 673.259484][T10935] ? _local_bh_enable+0xa0/0xa0 [ 673.264493][T10935] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 673.270487][T10935] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 673.276483][T10935] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 673.282045][T10935] ? security_sctp_bind_connect+0x89/0xb0 [ 673.287974][T10935] sctp_sendmsg+0x155c/0x27e0 [ 673.292806][T10935] ? sctp_getsockopt+0xb60/0xb60 [ 673.297946][T10935] ? aa_sk_perm+0x7fc/0x930 [ 673.302506][T10935] ? aa_af_perm+0x2b0/0x2b0 [ 673.307205][T10935] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 673.313827][T10935] ? sock_rps_record_flow+0x19/0x400 [ 673.319313][T10935] ? inet_send_prepare+0x260/0x260 [ 673.324716][T10935] ? inet_sendmsg+0x7c/0x2f0 [ 673.329417][T10935] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 673.334722][T10935] ? security_socket_sendmsg+0x80/0xa0 [ 673.340284][T10935] ? inet_send_prepare+0x260/0x260 [ 673.345616][T10935] ____sys_sendmsg+0x5bf/0x950 [ 673.350601][T10935] ? __asan_memset+0x22/0x40 [ 673.355220][T10935] ? __sys_sendmsg_sock+0x30/0x30 [ 673.360621][T10935] ? __import_iovec+0x5f2/0x860 [ 673.365589][T10935] ? import_iovec+0x73/0xa0 [ 673.370126][T10935] ___sys_sendmsg+0x220/0x290 [ 673.375440][T10935] ? __sys_sendmsg+0x270/0x270 [ 673.380269][T10935] ? __lock_acquire+0x7c80/0x7c80 [ 673.385420][T10935] __se_sys_sendmsg+0x1a5/0x270 [ 673.390303][T10935] ? __x64_sys_sendmsg+0x80/0x80 [ 673.395358][T10935] ? lockdep_hardirqs_on+0x98/0x150 [ 673.400672][T10935] do_syscall_64+0x55/0xb0 [ 673.405190][T10935] ? clear_bhb_loop+0x40/0x90 [ 673.409905][T10935] ? clear_bhb_loop+0x40/0x90 [ 673.414703][T10935] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 673.420624][T10935] RIP: 0033:0x7fe628d8f749 [ 673.425093][T10935] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 673.445142][T10935] RSP: 002b:00007fe629c60038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 673.453795][T10935] RAX: ffffffffffffffda RBX: 00007fe628fe6090 RCX: 00007fe628d8f749 [ 673.462054][T10935] RDX: 0000000000008054 RSI: 0000200000000300 RDI: 0000000000000003 [ 673.470063][T10935] RBP: 00007fe629c60090 R08: 0000000000000000 R09: 0000000000000000 [ 673.478232][T10935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 673.486397][T10935] R13: 00007fe628fe6128 R14: 00007fe628fe6090 R15: 00007ffeca9e0ab8 [ 673.494691][T10935] [ 673.978360][T10939] FAULT_INJECTION: forcing a failure. [ 673.978360][T10939] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 673.993444][T10939] CPU: 1 PID: 10939 Comm: syz.3.2012 Not tainted syzkaller #0 [ 674.001001][T10939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 674.011196][T10939] Call Trace: [ 674.014484][T10939] [ 674.017432][T10939] dump_stack_lvl+0x16c/0x230 [ 674.022150][T10939] ? show_regs_print_info+0x20/0x20 [ 674.027349][T10939] ? load_image+0x3b0/0x3b0 [ 674.032033][T10939] ? __lock_acquire+0x7c80/0x7c80 [ 674.037091][T10939] ? snprintf+0xdb/0x120 [ 674.041349][T10939] should_fail_ex+0x39d/0x4d0 [ 674.046066][T10939] _copy_to_user+0x2f/0xa0 [ 674.050598][T10939] simple_read_from_buffer+0xe7/0x150 [ 674.056004][T10939] proc_fail_nth_read+0x1e3/0x250 [ 674.061153][T10939] ? proc_fault_inject_write+0x340/0x340 [ 674.066891][T10939] ? fsnotify_perm+0x271/0x5e0 [ 674.071696][T10939] ? proc_fault_inject_write+0x340/0x340 [ 674.077343][T10939] vfs_read+0x27e/0x920 [ 674.081520][T10939] ? kernel_read+0x1e0/0x1e0 [ 674.086129][T10939] ? __fget_files+0x28/0x4d0 [ 674.090905][T10939] ? __fget_files+0x44a/0x4d0 [ 674.095602][T10939] ? __fdget_pos+0x2a3/0x330 [ 674.100204][T10939] ? ksys_read+0x75/0x250 [ 674.104552][T10939] ksys_read+0x147/0x250 [ 674.108814][T10939] ? vfs_write+0x940/0x940 [ 674.113248][T10939] ? lockdep_hardirqs_on+0x98/0x150 [ 674.118462][T10939] do_syscall_64+0x55/0xb0 [ 674.122895][T10939] ? clear_bhb_loop+0x40/0x90 [ 674.127584][T10939] ? clear_bhb_loop+0x40/0x90 [ 674.132279][T10939] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 674.138185][T10939] RIP: 0033:0x7fe628d8e15c [ 674.142617][T10939] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 674.162414][T10939] RSP: 002b:00007fe629c81030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 674.170851][T10939] RAX: ffffffffffffffda RBX: 00007fe628fe5fa0 RCX: 00007fe628d8e15c [ 674.179100][T10939] RDX: 000000000000000f RSI: 00007fe629c810a0 RDI: 0000000000000006 [ 674.187170][T10939] RBP: 00007fe629c81090 R08: 0000000000000000 R09: 0000000000000000 [ 674.195152][T10939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 674.203411][T10939] R13: 00007fe628fe6038 R14: 00007fe628fe5fa0 R15: 00007ffeca9e0ab8 [ 674.211407][T10939] [ 674.481648][T10942] netlink: 9286 bytes leftover after parsing attributes in process `syz.3.2013'. [ 675.250714][T10913] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2001'. [ 675.615799][T10976] FAULT_INJECTION: forcing a failure. [ 675.615799][T10976] name failslab, interval 1, probability 0, space 0, times 0 [ 675.638815][T10976] CPU: 0 PID: 10976 Comm: syz.6.2023 Not tainted syzkaller #0 [ 675.646468][T10976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 675.656739][T10976] Call Trace: [ 675.660055][T10976] [ 675.663143][T10976] dump_stack_lvl+0x16c/0x230 [ 675.668063][T10976] ? sctp_sendmsg+0x155c/0x27e0 [ 675.673058][T10976] ? ___sys_sendmsg+0x220/0x290 [ 675.678142][T10976] ? show_regs_print_info+0x20/0x20 [ 675.683647][T10976] ? load_image+0x3b0/0x3b0 [ 675.688184][T10976] should_fail_ex+0x39d/0x4d0 [ 675.693148][T10976] should_failslab+0x9/0x20 [ 675.697687][T10976] slab_pre_alloc_hook+0x59/0x310 [ 675.702817][T10976] ? sctp_add_bind_addr+0x8c/0x360 [ 675.708219][T10976] __kmem_cache_alloc_node+0x53/0x260 [ 675.713799][T10976] ? sctp_add_bind_addr+0x8c/0x360 [ 675.719109][T10976] kmalloc_trace+0x2a/0xe0 [ 675.723551][T10976] sctp_add_bind_addr+0x8c/0x360 [ 675.728528][T10976] sctp_copy_local_addr_list+0x30c/0x4e0 [ 675.734304][T10976] ? sctp_copy_local_addr_list+0x9c/0x4e0 [ 675.740510][T10976] ? sctp_do_8_2_transport_strike+0x8b0/0x8b0 [ 675.746961][T10976] ? sctp_v4_is_any+0x35/0x60 [ 675.751655][T10976] ? sctp_copy_one_addr+0x8c/0x350 [ 675.756879][T10976] sctp_bind_addr_copy+0xb3/0x3c0 [ 675.762030][T10976] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 675.768377][T10976] sctp_connect_new_asoc+0x2da/0x690 [ 675.773684][T10976] ? __sctp_connect+0xd20/0xd20 [ 675.778895][T10976] ? __local_bh_enable_ip+0x12e/0x1c0 [ 675.784386][T10976] ? _local_bh_enable+0xa0/0xa0 [ 675.789428][T10976] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 675.795273][T10976] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 675.801096][T10976] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 675.806841][T10976] ? security_sctp_bind_connect+0x89/0xb0 [ 675.812671][T10976] sctp_sendmsg+0x155c/0x27e0 [ 675.817378][T10976] ? sctp_getsockopt+0xb60/0xb60 [ 675.822505][T10976] ? perf_trace_lock+0xf7/0x380 [ 675.827640][T10976] ? aa_sk_perm+0x7fc/0x930 [ 675.832254][T10976] ? aa_af_perm+0x2b0/0x2b0 [ 675.836967][T10976] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 675.843492][T10976] ? sock_rps_record_flow+0x19/0x400 [ 675.849140][T10976] ? inet_send_prepare+0x260/0x260 [ 675.854265][T10976] ? inet_sendmsg+0x7c/0x2f0 [ 675.858954][T10976] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 675.864340][T10976] ? security_socket_sendmsg+0x80/0xa0 [ 675.870076][T10976] ? inet_send_prepare+0x260/0x260 [ 675.875291][T10976] ____sys_sendmsg+0x5bf/0x950 [ 675.880197][T10976] ? __asan_memset+0x22/0x40 [ 675.884979][T10976] ? __sys_sendmsg_sock+0x30/0x30 [ 675.890018][T10976] ? __import_iovec+0x5f2/0x860 [ 675.895070][T10976] ? import_iovec+0x73/0xa0 [ 675.899772][T10976] ___sys_sendmsg+0x220/0x290 [ 675.904561][T10976] ? __sys_sendmsg+0x270/0x270 [ 675.909380][T10976] ? __lock_acquire+0x7c80/0x7c80 [ 675.914532][T10976] __se_sys_sendmsg+0x1a5/0x270 [ 675.919419][T10976] ? __x64_sys_sendmsg+0x80/0x80 [ 675.924750][T10976] ? lockdep_hardirqs_on+0x98/0x150 [ 675.930317][T10976] do_syscall_64+0x55/0xb0 [ 675.934855][T10976] ? clear_bhb_loop+0x40/0x90 [ 675.939557][T10976] ? clear_bhb_loop+0x40/0x90 [ 675.944251][T10976] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 675.950342][T10976] RIP: 0033:0x7fc07df8f749 [ 675.954796][T10976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 675.974691][T10976] RSP: 002b:00007fc07ee40038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 675.984262][T10976] RAX: ffffffffffffffda RBX: 00007fc07e1e6090 RCX: 00007fc07df8f749 [ 675.992438][T10976] RDX: 0000000000008054 RSI: 0000200000000300 RDI: 0000000000000003 [ 676.000686][T10976] RBP: 00007fc07ee40090 R08: 0000000000000000 R09: 0000000000000000 [ 676.009021][T10976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 676.017178][T10976] R13: 00007fc07e1e6128 R14: 00007fc07e1e6090 R15: 00007ffd62c2c038 [ 676.025275][T10976] [ 676.073098][T10977] netlink: 'syz.4.2024': attribute type 4 has an invalid length. [ 676.082479][T10977] netlink: 199836 bytes leftover after parsing attributes in process `syz.4.2024'. [ 676.193746][T10982] netlink: 188 bytes leftover after parsing attributes in process `syz.4.2026'. [ 676.211243][T10982] netlink: 188 bytes leftover after parsing attributes in process `syz.4.2026'. [ 676.490414][T10998] netlink: 703 bytes leftover after parsing attributes in process `syz.3.2031'. [ 676.728499][T11010] netlink: 'syz.3.2035': attribute type 12 has an invalid length. [ 676.736965][T11010] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2035'. [ 677.103719][T11033] FAULT_INJECTION: forcing a failure. [ 677.103719][T11033] name failslab, interval 1, probability 0, space 0, times 0 [ 677.132601][T11033] CPU: 0 PID: 11033 Comm: syz.6.2041 Not tainted syzkaller #0 [ 677.140420][T11033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 677.150612][T11033] Call Trace: [ 677.153941][T11033] [ 677.156917][T11033] dump_stack_lvl+0x16c/0x230 [ 677.161911][T11033] ? sctp_sendmsg+0x155c/0x27e0 [ 677.166896][T11033] ? ___sys_sendmsg+0x220/0x290 [ 677.171992][T11033] ? show_regs_print_info+0x20/0x20 [ 677.177524][T11033] ? load_image+0x3b0/0x3b0 [ 677.182103][T11033] should_fail_ex+0x39d/0x4d0 [ 677.186906][T11033] should_failslab+0x9/0x20 [ 677.191474][T11033] slab_pre_alloc_hook+0x59/0x310 [ 677.196555][T11033] ? sctp_add_bind_addr+0x8c/0x360 [ 677.201729][T11033] __kmem_cache_alloc_node+0x53/0x260 [ 677.207169][T11033] ? sctp_add_bind_addr+0x8c/0x360 [ 677.212338][T11033] kmalloc_trace+0x2a/0xe0 [ 677.217353][T11033] sctp_add_bind_addr+0x8c/0x360 [ 677.222750][T11033] sctp_copy_local_addr_list+0x30c/0x4e0 [ 677.228465][T11033] ? sctp_copy_local_addr_list+0x9c/0x4e0 [ 677.234643][T11033] ? sctp_do_8_2_transport_strike+0x8b0/0x8b0 [ 677.241037][T11033] ? sctp_v4_is_any+0x35/0x60 [ 677.245945][T11033] ? sctp_copy_one_addr+0x8c/0x350 [ 677.251117][T11033] sctp_bind_addr_copy+0xb3/0x3c0 [ 677.256201][T11033] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 677.262582][T11033] sctp_connect_new_asoc+0x2da/0x690 [ 677.268110][T11033] ? __sctp_connect+0xd20/0xd20 [ 677.271695][T11031] netlink: 'syz.3.2042': attribute type 1 has an invalid length. [ 677.273037][T11033] ? __local_bh_enable_ip+0x12e/0x1c0 [ 677.273095][T11033] ? _local_bh_enable+0xa0/0xa0 [ 677.284118][T11031] netlink: 193500 bytes leftover after parsing attributes in process `syz.3.2042'. [ 677.286408][T11033] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 677.286437][T11033] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 677.286458][T11033] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 677.286482][T11033] ? security_sctp_bind_connect+0x89/0xb0 [ 677.286512][T11033] sctp_sendmsg+0x155c/0x27e0 [ 677.286549][T11033] ? sctp_getsockopt+0xb60/0xb60 [ 677.286567][T11033] ? perf_trace_lock+0xf7/0x380 [ 677.286600][T11033] ? aa_sk_perm+0x7fc/0x930 [ 677.286636][T11033] ? aa_af_perm+0x2b0/0x2b0 [ 677.348671][T11033] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 677.355226][T11033] ? sock_rps_record_flow+0x19/0x400 [ 677.360534][T11033] ? inet_send_prepare+0x260/0x260 [ 677.365676][T11033] ? inet_sendmsg+0x7c/0x2f0 [ 677.370369][T11033] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 677.375800][T11033] ? security_socket_sendmsg+0x80/0xa0 [ 677.381280][T11033] ? inet_send_prepare+0x260/0x260 [ 677.386614][T11033] ____sys_sendmsg+0x5bf/0x950 [ 677.391419][T11033] ? __asan_memset+0x22/0x40 [ 677.396037][T11033] ? __sys_sendmsg_sock+0x30/0x30 [ 677.401084][T11033] ? __import_iovec+0x5f2/0x860 [ 677.405973][T11033] ? import_iovec+0x73/0xa0 [ 677.410509][T11033] ___sys_sendmsg+0x220/0x290 [ 677.415479][T11033] ? __sys_sendmsg+0x270/0x270 [ 677.420299][T11033] ? __lock_acquire+0x7c80/0x7c80 [ 677.425391][T11033] __se_sys_sendmsg+0x1a5/0x270 [ 677.430566][T11033] ? __x64_sys_sendmsg+0x80/0x80 [ 677.435726][T11033] ? lockdep_hardirqs_on+0x98/0x150 [ 677.440988][T11033] do_syscall_64+0x55/0xb0 [ 677.445435][T11033] ? clear_bhb_loop+0x40/0x90 [ 677.450141][T11033] ? clear_bhb_loop+0x40/0x90 [ 677.454915][T11033] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 677.461044][T11033] RIP: 0033:0x7fc07df8f749 [ 677.465753][T11033] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 677.486183][T11033] RSP: 002b:00007fc07ee40038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 677.494722][T11033] RAX: ffffffffffffffda RBX: 00007fc07e1e6090 RCX: 00007fc07df8f749 [ 677.503094][T11033] RDX: 0000000000008054 RSI: 0000200000000300 RDI: 0000000000000003 [ 677.511096][T11033] RBP: 00007fc07ee40090 R08: 0000000000000000 R09: 0000000000000000 [ 677.519354][T11033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 677.527362][T11033] R13: 00007fc07e1e6128 R14: 00007fc07e1e6090 R15: 00007ffd62c2c038 [ 677.535556][T11033] [ 677.618905][T11041] netlink: 'syz.5.2044': attribute type 33 has an invalid length. [ 677.627846][T11041] netlink: 152 bytes leftover after parsing attributes in process `syz.5.2044'. [ 677.737702][T11048] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2045'. [ 678.243293][T11071] netlink: 'syz.6.2053': attribute type 21 has an invalid length. [ 678.253482][T11071] netlink: 156 bytes leftover after parsing attributes in process `syz.6.2053'. [ 678.554396][T11084] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2057'. [ 678.641000][T11082] netlink: 'syz.6.2056': attribute type 15 has an invalid length. [ 679.544780][T11100] netlink: 'syz.4.2062': attribute type 27 has an invalid length. [ 679.678677][T11100] bond0: (slave bond_slave_0): Releasing backup interface [ 679.688645][T11105] FAULT_INJECTION: forcing a failure. [ 679.688645][T11105] name failslab, interval 1, probability 0, space 0, times 0 [ 679.702618][T11105] CPU: 1 PID: 11105 Comm: syz.5.2064 Not tainted syzkaller #0 [ 679.710325][T11105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 679.720528][T11105] Call Trace: [ 679.724033][T11105] [ 679.727017][T11105] dump_stack_lvl+0x16c/0x230 [ 679.731768][T11105] ? show_regs_print_info+0x20/0x20 [ 679.737200][T11105] ? load_image+0x3b0/0x3b0 [ 679.741775][T11105] ? __might_sleep+0xe0/0xe0 [ 679.746508][T11105] ? __lock_acquire+0x7c80/0x7c80 [ 679.751761][T11105] should_fail_ex+0x39d/0x4d0 [ 679.756595][T11105] should_failslab+0x9/0x20 [ 679.761161][T11105] slab_pre_alloc_hook+0x59/0x310 [ 679.766453][T11105] ? __get_vm_area_node+0x125/0x370 [ 679.771666][T11105] __kmem_cache_alloc_node+0x53/0x260 [ 679.777071][T11105] ? __get_vm_area_node+0x125/0x370 [ 679.782292][T11105] kmalloc_node_trace+0x26/0xe0 [ 679.787166][T11105] __get_vm_area_node+0x125/0x370 [ 679.792380][T11105] __vmalloc_node_range+0x36e/0x1320 [ 679.797892][T11105] ? netlink_sendmsg+0x5f3/0xbe0 [ 679.802843][T11105] ? netlink_insert+0x106a/0x1370 [ 679.807984][T11105] ? netlink_insert+0x2b3/0x1370 [ 679.812952][T11105] ? netlink_data_ready+0x10/0x10 [ 679.818020][T11105] ? free_vm_area+0x50/0x50 [ 679.822662][T11105] ? netlink_sendmsg+0x5f3/0xbe0 [ 679.827630][T11105] vmalloc+0x79/0x90 [ 679.831543][T11105] ? netlink_sendmsg+0x5f3/0xbe0 [ 679.836497][T11105] netlink_sendmsg+0x5f3/0xbe0 [ 679.841288][T11105] ? netlink_getsockopt+0x580/0x580 [ 679.846506][T11105] ? aa_sock_msg_perm+0x94/0x150 [ 679.851541][T11105] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 679.856847][T11105] ? security_socket_sendmsg+0x80/0xa0 [ 679.862319][T11105] sock_write_iter+0x2bb/0x3f0 [ 679.867103][T11105] ? sock_read_iter+0x3b0/0x3b0 [ 679.872062][T11105] ? common_file_perm+0x198/0x1f0 [ 679.877106][T11105] vfs_write+0x43b/0x940 [ 679.881367][T11105] ? file_end_write+0x250/0x250 [ 679.886418][T11105] ? __fget_files+0x44a/0x4d0 [ 679.891203][T11105] ? __fdget_pos+0x1d8/0x330 [ 679.895891][T11105] ? ksys_write+0x75/0x250 [ 679.900322][T11105] ksys_write+0x147/0x250 [ 679.904759][T11105] ? __ia32_sys_read+0x90/0x90 [ 679.909537][T11105] ? lockdep_hardirqs_on+0x98/0x150 [ 679.914928][T11105] do_syscall_64+0x55/0xb0 [ 679.919357][T11105] ? clear_bhb_loop+0x40/0x90 [ 679.924043][T11105] ? clear_bhb_loop+0x40/0x90 [ 679.928760][T11105] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 679.934792][T11105] RIP: 0033:0x7fd61e18f749 [ 679.939307][T11105] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 679.959111][T11105] RSP: 002b:00007fd61f08b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 679.967540][T11105] RAX: ffffffffffffffda RBX: 00007fd61e3e5fa0 RCX: 00007fd61e18f749 [ 679.975524][T11105] RDX: 000000000000fe33 RSI: 0000200000000000 RDI: 000000000000000e [ 679.983503][T11105] RBP: 00007fd61f08b090 R08: 0000000000000000 R09: 0000000000000000 [ 679.991501][T11105] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 679.999573][T11105] R13: 00007fd61e3e6038 R14: 00007fd61e3e5fa0 R15: 00007ffe13956358 [ 680.007574][T11105] [ 680.022072][T11105] syz.5.2064: vmalloc error: size 65408, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz5,mems_allowed=0-1 [ 680.040547][T11105] CPU: 1 PID: 11105 Comm: syz.5.2064 Not tainted syzkaller #0 [ 680.048600][T11105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 680.058883][T11105] Call Trace: [ 680.062206][T11105] [ 680.065185][T11105] dump_stack_lvl+0x16c/0x230 [ 680.070184][T11105] ? show_regs_print_info+0x20/0x20 [ 680.075441][T11105] ? load_image+0x3b0/0x3b0 [ 680.080007][T11105] ? cpuset_print_current_mems_allowed+0x1f/0x360 [ 680.086616][T11105] ? cpuset_print_current_mems_allowed+0x2e3/0x360 [ 680.093144][T11105] warn_alloc+0x210/0x300 [ 680.097487][T11105] ? __get_vm_area_node+0x125/0x370 [ 680.102695][T11105] ? zone_watermark_ok_safe+0x230/0x230 [ 680.108542][T11105] ? rcu_is_watching+0x15/0xb0 [ 680.113331][T11105] ? __get_vm_area_node+0x356/0x370 [ 680.118665][T11105] __vmalloc_node_range+0x393/0x1320 [ 680.124066][T11105] ? netlink_insert+0x106a/0x1370 [ 680.129386][T11105] ? netlink_insert+0x2b3/0x1370 [ 680.134430][T11105] ? netlink_data_ready+0x10/0x10 [ 680.139653][T11105] ? free_vm_area+0x50/0x50 [ 680.144297][T11105] ? netlink_sendmsg+0x5f3/0xbe0 [ 680.149255][T11105] vmalloc+0x79/0x90 [ 680.153162][T11105] ? netlink_sendmsg+0x5f3/0xbe0 [ 680.158120][T11105] netlink_sendmsg+0x5f3/0xbe0 [ 680.163179][T11105] ? netlink_getsockopt+0x580/0x580 [ 680.168761][T11105] ? aa_sock_msg_perm+0x94/0x150 [ 680.174544][T11105] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 680.180290][T11105] ? security_socket_sendmsg+0x80/0xa0 [ 680.186044][T11105] sock_write_iter+0x2bb/0x3f0 [ 680.190879][T11105] ? sock_read_iter+0x3b0/0x3b0 [ 680.195944][T11105] ? common_file_perm+0x198/0x1f0 [ 680.200999][T11105] vfs_write+0x43b/0x940 [ 680.205354][T11105] ? file_end_write+0x250/0x250 [ 680.210235][T11105] ? __fget_files+0x44a/0x4d0 [ 680.215038][T11105] ? __fdget_pos+0x1d8/0x330 [ 680.219636][T11105] ? ksys_write+0x75/0x250 [ 680.224104][T11105] ksys_write+0x147/0x250 [ 680.228548][T11105] ? __ia32_sys_read+0x90/0x90 [ 680.233329][T11105] ? lockdep_hardirqs_on+0x98/0x150 [ 680.238559][T11105] do_syscall_64+0x55/0xb0 [ 680.243131][T11105] ? clear_bhb_loop+0x40/0x90 [ 680.247935][T11105] ? clear_bhb_loop+0x40/0x90 [ 680.252684][T11105] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 680.258857][T11105] RIP: 0033:0x7fd61e18f749 [ 680.263475][T11105] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 680.283466][T11105] RSP: 002b:00007fd61f08b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 680.291922][T11105] RAX: ffffffffffffffda RBX: 00007fd61e3e5fa0 RCX: 00007fd61e18f749 [ 680.299910][T11105] RDX: 000000000000fe33 RSI: 0000200000000000 RDI: 000000000000000e [ 680.307973][T11105] RBP: 00007fd61f08b090 R08: 0000000000000000 R09: 0000000000000000 [ 680.315947][T11105] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 680.324198][T11105] R13: 00007fd61e3e6038 R14: 00007fd61e3e5fa0 R15: 00007ffe13956358 [ 680.332185][T11105] [ 680.352446][T11105] Mem-Info: [ 680.355954][T11105] active_anon:4334 inactive_anon:0 isolated_anon:0 [ 680.355954][T11105] active_file:16857 inactive_file:39983 isolated_file:0 [ 680.355954][T11105] unevictable:768 dirty:429 writeback:0 [ 680.355954][T11105] slab_reclaimable:10631 slab_unreclaimable:93701 [ 680.355954][T11105] mapped:24578 shmem:1361 pagetables:504 [ 680.355954][T11105] sec_pagetables:0 bounce:0 [ 680.355954][T11105] kernel_misc_reclaimable:0 [ 680.355954][T11105] free:1347705 free_pcp:12422 free_cma:0 [ 680.410584][T11105] Node 0 active_anon:17336kB inactive_anon:0kB active_file:67428kB inactive_file:159732kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:98312kB dirty:1716kB writeback:0kB shmem:3908kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:11256kB pagetables:1916kB sec_pagetables:0kB all_unreclaimable? no [ 680.450592][T11105] Node 1 active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:200kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:1536kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:16kB pagetables:0kB sec_pagetables:0kB all_unreclaimable? no [ 680.485452][T11105] Node 0 DMA free:15360kB boost:0kB min:204kB low:252kB high:300kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 680.514145][T11105] lowmem_reserve[]: 0 2525 2526 2526 2526 [ 680.521349][T11105] Node 0 DMA32 free:1482972kB boost:0kB min:34676kB low:43344kB high:52012kB reserved_highatomic:0KB active_anon:17288kB inactive_anon:0kB active_file:67428kB inactive_file:158412kB unevictable:1536kB writepending:1716kB present:3129332kB managed:2589596kB mlocked:0kB bounce:0kB free_pcp:33572kB local_pcp:14176kB free_cma:0kB [ 680.523579][T11113] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2068'. [ 680.554038][T11105] lowmem_reserve[]: 0 0 1 1 1 [ 680.554099][T11105] Node 0 Normal free:16kB boost:0kB min:16kB low:20kB high:24kB reserved_highatomic:0KB active_anon:48kB inactive_anon:0kB active_file:0kB inactive_file:1320kB unevictable:0kB writepending:0kB present:1048576kB managed:1384kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 680.554159][T11105] lowmem_reserve[]: 0 0 0 0 0 [ 680.554204][T11105] Node 1 Normal free:3892220kB boost:0kB min:55208kB low:69008kB high:82808kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:200kB unevictable:1536kB writepending:0kB present:4194304kB managed:4117312kB mlocked:0kB bounce:0kB free_pcp:16552kB local_pcp:6048kB free_cma:0kB [ 680.554263][T11105] lowmem_reserve[]: 0 0 0 0 0 [ 680.554307][T11105] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 680.554452][T11105] Node 0 DMA32: 755*4kB (UME) 1094*8kB (UME) 1204*16kB (UME) 827*32kB (UME) 169*64kB (UME) 138*128kB (UME) 75*256kB (UME) 37*512kB (UME) 23*1024kB (UM) 8*2048kB (UM) 322*4096kB (M) = 1482972kB [ 680.668767][T11105] Node 0 Normal: 0*4kB 0*8kB 1*16kB (M) 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 16kB [ 680.680933][T11105] Node 1 Normal: 237*4kB (UME) 53*8kB (UME) 50*16kB (UME) 90*32kB (UME) 29*64kB (UME) 6*128kB (UE) 0*256kB 1*512kB (M) 1*1024kB (E) 2*2048kB (UE) 947*4096kB (M) = 3892220kB [ 680.703217][T11105] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 680.713472][T11105] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 680.723427][T11105] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 680.774774][T11105] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 680.780603][T11120] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2070'. [ 680.784348][T11105] 58201 total pagecache pages [ 680.814753][T11105] 0 pages in swap cache [ 680.818998][T11105] Free swap = 124996kB [ 680.823272][T11105] Total swap = 124996kB [ 680.837741][T11105] 2097051 pages RAM [ 680.841929][T11105] 0 pages HighMem/MovableOnly [ 680.847005][T11105] 416138 pages reserved [ 680.851198][T11105] 0 pages cma reserved [ 681.011006][T11131] FAULT_INJECTION: forcing a failure. [ 681.011006][T11131] name failslab, interval 1, probability 0, space 0, times 0 [ 681.024956][T11131] CPU: 0 PID: 11131 Comm: syz.6.2072 Not tainted syzkaller #0 [ 681.032556][T11131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 681.042834][T11131] Call Trace: [ 681.046156][T11131] [ 681.049228][T11131] dump_stack_lvl+0x16c/0x230 [ 681.054138][T11131] ? sctp_sendmsg+0x155c/0x27e0 [ 681.059210][T11131] ? ___sys_sendmsg+0x220/0x290 [ 681.064202][T11131] ? show_regs_print_info+0x20/0x20 [ 681.069736][T11131] ? load_image+0x3b0/0x3b0 [ 681.074495][T11131] should_fail_ex+0x39d/0x4d0 [ 681.079226][T11131] should_failslab+0x9/0x20 [ 681.083764][T11131] slab_pre_alloc_hook+0x59/0x310 [ 681.088889][T11131] ? sctp_add_bind_addr+0x8c/0x360 [ 681.094105][T11131] __kmem_cache_alloc_node+0x53/0x260 [ 681.099499][T11131] ? sctp_add_bind_addr+0x8c/0x360 [ 681.104722][T11131] kmalloc_trace+0x2a/0xe0 [ 681.109286][T11131] sctp_add_bind_addr+0x8c/0x360 [ 681.114268][T11131] sctp_copy_local_addr_list+0x30c/0x4e0 [ 681.120045][T11131] ? sctp_copy_local_addr_list+0x9c/0x4e0 [ 681.125957][T11131] ? sctp_do_8_2_transport_strike+0x8b0/0x8b0 [ 681.132232][T11131] ? sctp_v4_is_any+0x35/0x60 [ 681.137105][T11131] ? sctp_copy_one_addr+0x8c/0x350 [ 681.142331][T11131] sctp_bind_addr_copy+0xb3/0x3c0 [ 681.147375][T11131] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 681.153808][T11131] sctp_connect_new_asoc+0x2da/0x690 [ 681.159195][T11131] ? __sctp_connect+0xd20/0xd20 [ 681.164154][T11131] ? __local_bh_enable_ip+0x12e/0x1c0 [ 681.169808][T11131] ? _local_bh_enable+0xa0/0xa0 [ 681.174762][T11131] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 681.180925][T11131] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 681.186925][T11131] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 681.192486][T11131] ? security_sctp_bind_connect+0x89/0xb0 [ 681.198410][T11131] sctp_sendmsg+0x155c/0x27e0 [ 681.203238][T11131] ? sctp_getsockopt+0xb60/0xb60 [ 681.208190][T11131] ? aa_sk_perm+0x7fc/0x930 [ 681.213064][T11131] ? aa_af_perm+0x2b0/0x2b0 [ 681.217854][T11131] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 681.224651][T11131] ? sock_rps_record_flow+0x19/0x400 [ 681.230049][T11131] ? inet_send_prepare+0x260/0x260 [ 681.235271][T11131] ? inet_sendmsg+0x7c/0x2f0 [ 681.240058][T11131] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 681.245450][T11131] ? security_socket_sendmsg+0x80/0xa0 [ 681.250956][T11131] ? inet_send_prepare+0x260/0x260 [ 681.256302][T11131] ____sys_sendmsg+0x5bf/0x950 [ 681.261108][T11131] ? __asan_memset+0x22/0x40 [ 681.265723][T11131] ? __sys_sendmsg_sock+0x30/0x30 [ 681.270768][T11131] ? __import_iovec+0x5f2/0x860 [ 681.275643][T11131] ? import_iovec+0x73/0xa0 [ 681.280171][T11131] ___sys_sendmsg+0x220/0x290 [ 681.284870][T11131] ? __sys_sendmsg+0x270/0x270 [ 681.289675][T11131] ? __lock_acquire+0x7c80/0x7c80 [ 681.294738][T11131] __se_sys_sendmsg+0x1a5/0x270 [ 681.299614][T11131] ? __x64_sys_sendmsg+0x80/0x80 [ 681.304583][T11131] ? lockdep_hardirqs_on+0x98/0x150 [ 681.309800][T11131] do_syscall_64+0x55/0xb0 [ 681.314245][T11131] ? clear_bhb_loop+0x40/0x90 [ 681.319024][T11131] ? clear_bhb_loop+0x40/0x90 [ 681.323805][T11131] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 681.329803][T11131] RIP: 0033:0x7fc07df8f749 [ 681.334322][T11131] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 681.354204][T11131] RSP: 002b:00007fc07ee40038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 681.362816][T11131] RAX: ffffffffffffffda RBX: 00007fc07e1e6090 RCX: 00007fc07df8f749 [ 681.370828][T11131] RDX: 0000000000008054 RSI: 0000200000000300 RDI: 0000000000000003 [ 681.378815][T11131] RBP: 00007fc07ee40090 R08: 0000000000000000 R09: 0000000000000000 [ 681.386798][T11131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 681.394786][T11131] R13: 00007fc07e1e6128 R14: 00007fc07e1e6090 R15: 00007ffd62c2c038 [ 681.402787][T11131] [ 682.363005][T11146] netlink: 'syz.6.2078': attribute type 27 has an invalid length. [ 682.497130][T11146] bond0: (slave bond_slave_0): Releasing backup interface [ 682.509358][T11146] bond_slave_0 (unregistering): left promiscuous mode [ 682.566995][T11148] netlink: 132 bytes leftover after parsing attributes in process `syz.5.2079'. [ 683.018880][T11166] netlink: 132 bytes leftover after parsing attributes in process `syz.5.2087'. [ 683.045364][T11169] netlink: 'syz.4.2088': attribute type 29 has an invalid length. [ 683.068603][T11169] netlink: 'syz.4.2088': attribute type 29 has an invalid length. [ 683.095113][T11170] netlink: 'syz.4.2088': attribute type 29 has an invalid length. [ 683.113875][T11169] netlink: 'syz.4.2088': attribute type 29 has an invalid length. [ 683.438080][T11181] netlink: 132 bytes leftover after parsing attributes in process `syz.5.2092'. [ 684.262882][T11203] delete_channel: no stack [ 684.272015][T11203] delete_channel: no stack [ 684.454055][T11203] netlink: 16399 bytes leftover after parsing attributes in process `syz.3.2099'. [ 684.465147][T11204] netlink: 144 bytes leftover after parsing attributes in process `syz.5.2098'. [ 684.857731][T11217] netlink: 2407 bytes leftover after parsing attributes in process `syz.6.2101'. [ 684.879212][T11216] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2103'. [ 684.938151][T11217] netlink: 2407 bytes leftover after parsing attributes in process `syz.6.2101'. [ 684.982035][T11214] netlink: 2407 bytes leftover after parsing attributes in process `syz.6.2101'. [ 685.035004][T11219] netlink: 2407 bytes leftover after parsing attributes in process `syz.6.2101'. [ 685.556864][T11234] FAULT_INJECTION: forcing a failure. [ 685.556864][T11234] name failslab, interval 1, probability 0, space 0, times 0 [ 685.583771][T11234] CPU: 1 PID: 11234 Comm: syz.3.2110 Not tainted syzkaller #0 [ 685.591577][T11234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 685.601857][T11234] Call Trace: [ 685.605172][T11234] [ 685.608327][T11234] dump_stack_lvl+0x16c/0x230 [ 685.613251][T11234] ? sctp_sendmsg+0x155c/0x27e0 [ 685.618415][T11234] ? ___sys_sendmsg+0x220/0x290 [ 685.623525][T11234] ? show_regs_print_info+0x20/0x20 [ 685.629111][T11234] ? load_image+0x3b0/0x3b0 [ 685.634030][T11234] should_fail_ex+0x39d/0x4d0 [ 685.638877][T11234] should_failslab+0x9/0x20 [ 685.644188][T11234] slab_pre_alloc_hook+0x59/0x310 [ 685.650149][T11234] ? sctp_add_bind_addr+0x8c/0x360 [ 685.655842][T11234] __kmem_cache_alloc_node+0x53/0x260 [ 685.661249][T11234] ? sctp_add_bind_addr+0x8c/0x360 [ 685.666493][T11234] kmalloc_trace+0x2a/0xe0 [ 685.671242][T11234] sctp_add_bind_addr+0x8c/0x360 [ 685.677209][T11234] sctp_copy_local_addr_list+0x30c/0x4e0 [ 685.683325][T11234] ? sctp_copy_local_addr_list+0x9c/0x4e0 [ 685.689273][T11234] ? sctp_do_8_2_transport_strike+0x8b0/0x8b0 [ 685.695677][T11234] ? sctp_v4_is_any+0x35/0x60 [ 685.700493][T11234] ? sctp_copy_one_addr+0x8c/0x350 [ 685.705626][T11234] sctp_bind_addr_copy+0xb3/0x3c0 [ 685.710867][T11234] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 685.717742][T11234] sctp_connect_new_asoc+0x2da/0x690 [ 685.723403][T11234] ? __sctp_connect+0xd20/0xd20 [ 685.728720][T11234] ? __local_bh_enable_ip+0x12e/0x1c0 [ 685.734470][T11234] ? _local_bh_enable+0xa0/0xa0 [ 685.739719][T11234] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 685.745863][T11234] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 685.752261][T11234] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 685.758401][T11234] ? security_sctp_bind_connect+0x89/0xb0 [ 685.764440][T11234] sctp_sendmsg+0x155c/0x27e0 [ 685.769536][T11234] ? sctp_getsockopt+0xb60/0xb60 [ 685.775936][T11234] ? aa_sk_perm+0x7fc/0x930 [ 685.780861][T11234] ? aa_af_perm+0x2b0/0x2b0 [ 685.786290][T11234] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 685.793377][T11234] ? sock_rps_record_flow+0x19/0x400 [ 685.798897][T11234] ? inet_send_prepare+0x260/0x260 [ 685.804149][T11234] ? inet_sendmsg+0x7c/0x2f0 [ 685.809210][T11234] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 685.814835][T11234] ? security_socket_sendmsg+0x80/0xa0 [ 685.820583][T11234] ? inet_send_prepare+0x260/0x260 [ 685.825754][T11234] ____sys_sendmsg+0x5bf/0x950 [ 685.830831][T11234] ? __asan_memset+0x22/0x40 [ 685.835441][T11234] ? __sys_sendmsg_sock+0x30/0x30 [ 685.840484][T11234] ? __import_iovec+0x5f2/0x860 [ 685.845369][T11234] ? import_iovec+0x73/0xa0 [ 685.850067][T11234] ___sys_sendmsg+0x220/0x290 [ 685.854781][T11234] ? __sys_sendmsg+0x270/0x270 [ 685.859583][T11234] ? __lock_acquire+0x7c80/0x7c80 [ 685.864641][T11234] __se_sys_sendmsg+0x1a5/0x270 [ 685.869521][T11234] ? __x64_sys_sendmsg+0x80/0x80 [ 685.874926][T11234] ? lockdep_hardirqs_on+0x98/0x150 [ 685.880146][T11234] do_syscall_64+0x55/0xb0 [ 685.884579][T11234] ? clear_bhb_loop+0x40/0x90 [ 685.889624][T11234] ? clear_bhb_loop+0x40/0x90 [ 685.894575][T11234] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 685.900746][T11234] RIP: 0033:0x7fe628d8f749 [ 685.905813][T11234] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 685.925700][T11234] RSP: 002b:00007fe629c60038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 685.934454][T11234] RAX: ffffffffffffffda RBX: 00007fe628fe6090 RCX: 00007fe628d8f749 [ 685.943295][T11234] RDX: 0000000000008054 RSI: 0000200000000300 RDI: 0000000000000003 [ 685.952090][T11234] RBP: 00007fe629c60090 R08: 0000000000000000 R09: 0000000000000000 [ 685.960163][T11234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 685.968324][T11234] R13: 00007fe628fe6128 R14: 00007fe628fe6090 R15: 00007ffeca9e0ab8 [ 685.976458][T11234] [ 686.018734][ T5105] Bluetooth: hci0: unexpected event 0x06 length: 15 > 3 [ 686.160282][ T1287] ieee802154 phy0 wpan0: encryption failed: -22 [ 686.176396][ T1287] ieee802154 phy1 wpan1: encryption failed: -22 [ 689.188295][T11296] FAULT_INJECTION: forcing a failure. [ 689.188295][T11296] name failslab, interval 1, probability 0, space 0, times 0 [ 689.204804][T11296] CPU: 1 PID: 11296 Comm: syz.5.2130 Not tainted syzkaller #0 [ 689.212698][T11296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 689.223582][T11296] Call Trace: [ 689.226913][T11296] [ 689.229966][T11296] dump_stack_lvl+0x16c/0x230 [ 689.234793][T11296] ? sctp_sendmsg+0x155c/0x27e0 [ 689.239715][T11296] ? ___sys_sendmsg+0x220/0x290 [ 689.244708][T11296] ? show_regs_print_info+0x20/0x20 [ 689.249960][T11296] ? load_image+0x3b0/0x3b0 [ 689.254604][T11296] should_fail_ex+0x39d/0x4d0 [ 689.259339][T11296] should_failslab+0x9/0x20 [ 689.264069][T11296] slab_pre_alloc_hook+0x59/0x310 [ 689.269150][T11296] ? sctp_add_bind_addr+0x8c/0x360 [ 689.274295][T11296] __kmem_cache_alloc_node+0x53/0x260 [ 689.279675][T11296] ? sctp_add_bind_addr+0x8c/0x360 [ 689.284824][T11296] kmalloc_trace+0x2a/0xe0 [ 689.289248][T11296] sctp_add_bind_addr+0x8c/0x360 [ 689.294216][T11296] sctp_copy_local_addr_list+0x30c/0x4e0 [ 689.299864][T11296] ? sctp_copy_local_addr_list+0x9c/0x4e0 [ 689.305764][T11296] ? sctp_do_8_2_transport_strike+0x8b0/0x8b0 [ 689.311841][T11296] ? sctp_v4_is_any+0x35/0x60 [ 689.316616][T11296] ? sctp_copy_one_addr+0x8c/0x350 [ 689.322013][T11296] sctp_bind_addr_copy+0xb3/0x3c0 [ 689.327060][T11296] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 689.333402][T11296] sctp_connect_new_asoc+0x2da/0x690 [ 689.338713][T11296] ? __sctp_connect+0xd20/0xd20 [ 689.343744][T11296] ? __local_bh_enable_ip+0x12e/0x1c0 [ 689.349319][T11296] ? _local_bh_enable+0xa0/0xa0 [ 689.354180][T11296] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 689.360173][T11296] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 689.365993][T11296] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 689.371729][T11296] ? security_sctp_bind_connect+0x89/0xb0 [ 689.377587][T11296] sctp_sendmsg+0x155c/0x27e0 [ 689.382466][T11296] ? sctp_getsockopt+0xb60/0xb60 [ 689.387418][T11296] ? aa_sk_perm+0x7fc/0x930 [ 689.391950][T11296] ? aa_af_perm+0x2b0/0x2b0 [ 689.396560][T11296] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 689.403010][T11296] ? sock_rps_record_flow+0x19/0x400 [ 689.408313][T11296] ? inet_send_prepare+0x260/0x260 [ 689.413434][T11296] ? inet_sendmsg+0x7c/0x2f0 [ 689.418037][T11296] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 689.423337][T11296] ? security_socket_sendmsg+0x80/0xa0 [ 689.428816][T11296] ? inet_send_prepare+0x260/0x260 [ 689.433940][T11296] ____sys_sendmsg+0x5bf/0x950 [ 689.438727][T11296] ? __asan_memset+0x22/0x40 [ 689.443333][T11296] ? __sys_sendmsg_sock+0x30/0x30 [ 689.448457][T11296] ? __import_iovec+0x5f2/0x860 [ 689.453508][T11296] ? import_iovec+0x73/0xa0 [ 689.458206][T11296] ___sys_sendmsg+0x220/0x290 [ 689.462903][T11296] ? __sys_sendmsg+0x270/0x270 [ 689.467990][T11296] ? __lock_acquire+0x7c80/0x7c80 [ 689.473049][T11296] __se_sys_sendmsg+0x1a5/0x270 [ 689.478006][T11296] ? __x64_sys_sendmsg+0x80/0x80 [ 689.483008][T11296] ? lockdep_hardirqs_on+0x98/0x150 [ 689.488224][T11296] do_syscall_64+0x55/0xb0 [ 689.492763][T11296] ? clear_bhb_loop+0x40/0x90 [ 689.497555][T11296] ? clear_bhb_loop+0x40/0x90 [ 689.502368][T11296] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 689.508279][T11296] RIP: 0033:0x7fd61e18f749 [ 689.512799][T11296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 689.533382][T11296] RSP: 002b:00007fd61f06a038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 689.541821][T11296] RAX: ffffffffffffffda RBX: 00007fd61e3e6090 RCX: 00007fd61e18f749 [ 689.549978][T11296] RDX: 0000000000008054 RSI: 0000200000000300 RDI: 0000000000000003 [ 689.558120][T11296] RBP: 00007fd61f06a090 R08: 0000000000000000 R09: 0000000000000000 [ 689.566190][T11296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 689.574296][T11296] R13: 00007fd61e3e6128 R14: 00007fd61e3e6090 R15: 00007ffe13956358 [ 689.582488][T11296] [ 690.187768][T11312] bridge0: port 2(bridge_slave_1) entered disabled state [ 690.197281][T11312] bridge0: port 1(bridge_slave_0) entered disabled state [ 690.321634][T11312] bridge0: entered allmulticast mode [ 690.380948][T11317] __nla_validate_parse: 1 callbacks suppressed [ 690.380971][T11317] netlink: 167776 bytes leftover after parsing attributes in process `syz.5.2136'. [ 690.483525][T11318] netlink: 144 bytes leftover after parsing attributes in process `syz.3.2135'. [ 693.685970][T11345] FAULT_INJECTION: forcing a failure. [ 693.685970][T11345] name failslab, interval 1, probability 0, space 0, times 0 [ 693.705302][T11345] CPU: 0 PID: 11345 Comm: syz.6.2143 Not tainted syzkaller #0 [ 693.712859][T11345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 693.723044][T11345] Call Trace: [ 693.726794][T11345] [ 693.729762][T11345] dump_stack_lvl+0x16c/0x230 [ 693.735007][T11345] ? sctp_sendmsg+0x155c/0x27e0 [ 693.740080][T11345] ? ___sys_sendmsg+0x220/0x290 [ 693.745076][T11345] ? show_regs_print_info+0x20/0x20 [ 693.750506][T11345] ? load_image+0x3b0/0x3b0 [ 693.755356][T11345] should_fail_ex+0x39d/0x4d0 [ 693.760278][T11345] should_failslab+0x9/0x20 [ 693.764843][T11345] slab_pre_alloc_hook+0x59/0x310 [ 693.770107][T11345] ? sctp_add_bind_addr+0x8c/0x360 [ 693.775434][T11345] __kmem_cache_alloc_node+0x53/0x260 [ 693.781386][T11345] ? sctp_add_bind_addr+0x8c/0x360 [ 693.786830][T11345] kmalloc_trace+0x2a/0xe0 [ 693.791268][T11345] sctp_add_bind_addr+0x8c/0x360 [ 693.796237][T11345] sctp_copy_local_addr_list+0x30c/0x4e0 [ 693.802014][T11345] ? sctp_copy_local_addr_list+0x9c/0x4e0 [ 693.808024][T11345] ? sctp_do_8_2_transport_strike+0x8b0/0x8b0 [ 693.814120][T11345] ? sctp_v4_is_any+0x35/0x60 [ 693.818842][T11345] ? sctp_copy_one_addr+0x8c/0x350 [ 693.824011][T11345] sctp_bind_addr_copy+0xb3/0x3c0 [ 693.829151][T11345] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 693.835610][T11345] sctp_connect_new_asoc+0x2da/0x690 [ 693.840930][T11345] ? __sctp_connect+0xd20/0xd20 [ 693.845975][T11345] ? __local_bh_enable_ip+0x12e/0x1c0 [ 693.851725][T11345] ? _local_bh_enable+0xa0/0xa0 [ 693.856584][T11345] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 693.862414][T11345] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 693.868365][T11345] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 693.873964][T11345] ? security_sctp_bind_connect+0x89/0xb0 [ 693.879893][T11345] sctp_sendmsg+0x155c/0x27e0 [ 693.884613][T11345] ? sctp_getsockopt+0xb60/0xb60 [ 693.890021][T11345] ? perf_trace_lock_acquire+0xfb/0x3e0 [ 693.895622][T11345] ? aa_sk_perm+0x7fc/0x930 [ 693.900958][T11345] ? aa_af_perm+0x2b0/0x2b0 [ 693.905477][T11345] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 693.911920][T11345] ? sock_rps_record_flow+0x19/0x400 [ 693.917211][T11345] ? inet_send_prepare+0x260/0x260 [ 693.922344][T11345] ? inet_sendmsg+0x7c/0x2f0 [ 693.927125][T11345] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 693.932426][T11345] ? security_socket_sendmsg+0x80/0xa0 [ 693.938006][T11345] ? inet_send_prepare+0x260/0x260 [ 693.943155][T11345] ____sys_sendmsg+0x5bf/0x950 [ 693.948022][T11345] ? __asan_memset+0x22/0x40 [ 693.952637][T11345] ? __sys_sendmsg_sock+0x30/0x30 [ 693.957674][T11345] ? __import_iovec+0x5f2/0x860 [ 693.962564][T11345] ? import_iovec+0x73/0xa0 [ 693.967250][T11345] ___sys_sendmsg+0x220/0x290 [ 693.971943][T11345] ? __sys_sendmsg+0x270/0x270 [ 693.976991][T11345] ? __lock_acquire+0x7c80/0x7c80 [ 693.982160][T11345] __se_sys_sendmsg+0x1a5/0x270 [ 693.987076][T11345] ? __x64_sys_sendmsg+0x80/0x80 [ 693.992270][T11345] ? lockdep_hardirqs_on+0x98/0x150 [ 693.997619][T11345] do_syscall_64+0x55/0xb0 [ 694.002089][T11345] ? clear_bhb_loop+0x40/0x90 [ 694.006836][T11345] ? clear_bhb_loop+0x40/0x90 [ 694.011628][T11345] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 694.017525][T11345] RIP: 0033:0x7fc07df8f749 [ 694.022004][T11345] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 694.042255][T11345] RSP: 002b:00007fc07ee40038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 694.050873][T11345] RAX: ffffffffffffffda RBX: 00007fc07e1e6090 RCX: 00007fc07df8f749 [ 694.058906][T11345] RDX: 0000000000008054 RSI: 0000200000000300 RDI: 0000000000000003 [ 694.067070][T11345] RBP: 00007fc07ee40090 R08: 0000000000000000 R09: 0000000000000000 [ 694.075378][T11345] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 694.083919][T11345] R13: 00007fc07e1e6128 R14: 00007fc07e1e6090 R15: 00007ffd62c2c038 [ 694.092457][T11345] [ 694.262072][T11351] syz.5.2146[11351] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 694.550605][T11364] netlink: 132 bytes leftover after parsing attributes in process `syz.5.2150'. [ 694.636877][T11368] netlink: 188 bytes leftover after parsing attributes in process `syz.5.2153'. [ 694.966345][T11383] syz.3.2157[11383] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 695.071251][T11388] FAULT_INJECTION: forcing a failure. [ 695.071251][T11388] name failslab, interval 1, probability 0, space 0, times 0 [ 695.100094][T11388] CPU: 0 PID: 11388 Comm: syz.5.2159 Not tainted syzkaller #0 [ 695.107886][T11388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 695.118431][T11388] Call Trace: [ 695.121743][T11388] [ 695.124798][T11388] dump_stack_lvl+0x16c/0x230 [ 695.129829][T11388] ? sctp_sendmsg+0x155c/0x27e0 [ 695.134760][T11388] ? ___sys_sendmsg+0x220/0x290 [ 695.139749][T11388] ? show_regs_print_info+0x20/0x20 [ 695.148756][T11388] ? load_image+0x3b0/0x3b0 [ 695.153309][T11388] should_fail_ex+0x39d/0x4d0 [ 695.158034][T11388] should_failslab+0x9/0x20 [ 695.162560][T11388] slab_pre_alloc_hook+0x59/0x310 [ 695.167606][T11388] ? sctp_add_bind_addr+0x8c/0x360 [ 695.172911][T11388] __kmem_cache_alloc_node+0x53/0x260 [ 695.178399][T11388] ? sctp_add_bind_addr+0x8c/0x360 [ 695.183821][T11388] kmalloc_trace+0x2a/0xe0 [ 695.188690][T11388] sctp_add_bind_addr+0x8c/0x360 [ 695.193749][T11388] sctp_copy_local_addr_list+0x30c/0x4e0 [ 695.199789][T11388] ? sctp_copy_local_addr_list+0x9c/0x4e0 [ 695.205615][T11388] ? sctp_do_8_2_transport_strike+0x8b0/0x8b0 [ 695.211795][T11388] ? sctp_v4_is_any+0x35/0x60 [ 695.216604][T11388] ? sctp_copy_one_addr+0x8c/0x350 [ 695.221832][T11388] sctp_bind_addr_copy+0xb3/0x3c0 [ 695.227241][T11388] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 695.233853][T11388] sctp_connect_new_asoc+0x2da/0x690 [ 695.239155][T11388] ? __sctp_connect+0xd20/0xd20 [ 695.244449][T11388] ? __local_bh_enable_ip+0x12e/0x1c0 [ 695.249836][T11388] ? _local_bh_enable+0xa0/0xa0 [ 695.254719][T11388] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 695.260536][T11388] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 695.266355][T11388] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 695.272156][T11388] ? security_sctp_bind_connect+0x89/0xb0 [ 695.278508][T11388] sctp_sendmsg+0x155c/0x27e0 [ 695.283301][T11388] ? sctp_getsockopt+0xb60/0xb60 [ 695.288345][T11388] ? aa_sk_perm+0x7fc/0x930 [ 695.292956][T11388] ? aa_af_perm+0x2b0/0x2b0 [ 695.297480][T11388] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 695.304484][T11388] ? sock_rps_record_flow+0x19/0x400 [ 695.310231][T11388] ? inet_send_prepare+0x260/0x260 [ 695.315380][T11388] ? inet_sendmsg+0x7c/0x2f0 [ 695.320096][T11388] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 695.325498][T11388] ? security_socket_sendmsg+0x80/0xa0 [ 695.330983][T11388] ? inet_send_prepare+0x260/0x260 [ 695.336113][T11388] ____sys_sendmsg+0x5bf/0x950 [ 695.341165][T11388] ? __asan_memset+0x22/0x40 [ 695.345950][T11388] ? __sys_sendmsg_sock+0x30/0x30 [ 695.351103][T11388] ? __import_iovec+0x5f2/0x860 [ 695.356157][T11388] ? import_iovec+0x73/0xa0 [ 695.360695][T11388] ___sys_sendmsg+0x220/0x290 [ 695.365457][T11388] ? __sys_sendmsg+0x270/0x270 [ 695.370297][T11388] ? __lock_acquire+0x7c80/0x7c80 [ 695.375368][T11388] __se_sys_sendmsg+0x1a5/0x270 [ 695.380270][T11388] ? perf_trace_preemptirq_template+0x281/0x340 [ 695.386533][T11388] ? __x64_sys_sendmsg+0x80/0x80 [ 695.391509][T11388] ? lockdep_hardirqs_on+0x98/0x150 [ 695.396803][T11388] do_syscall_64+0x55/0xb0 [ 695.401248][T11388] ? clear_bhb_loop+0x40/0x90 [ 695.405972][T11388] ? clear_bhb_loop+0x40/0x90 [ 695.410664][T11388] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 695.416665][T11388] RIP: 0033:0x7fd61e18f749 [ 695.421106][T11388] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 695.441302][T11388] RSP: 002b:00007fd61f06a038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 695.450021][T11388] RAX: ffffffffffffffda RBX: 00007fd61e3e6090 RCX: 00007fd61e18f749 [ 695.458454][T11388] RDX: 0000000000008054 RSI: 0000200000000300 RDI: 0000000000000003 [ 695.466476][T11388] RBP: 00007fd61f06a090 R08: 0000000000000000 R09: 0000000000000000 [ 695.474728][T11388] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 695.482976][T11388] R13: 00007fd61e3e6128 R14: 00007fd61e3e6090 R15: 00007ffe13956358 [ 695.491063][T11388] [ 696.048746][T11398] netlink: 132 bytes leftover after parsing attributes in process `syz.6.2163'. [ 696.417903][T11414] FAULT_INJECTION: forcing a failure. [ 696.417903][T11414] name failslab, interval 1, probability 0, space 0, times 0 [ 696.447591][T11413] netlink: 60243 bytes leftover after parsing attributes in process `syz.3.2168'. [ 696.464405][T11413] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2168'. [ 696.523552][T11414] CPU: 0 PID: 11414 Comm: syz.6.2169 Not tainted syzkaller #0 [ 696.531476][T11414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 696.541845][T11414] Call Trace: [ 696.545168][T11414] [ 696.548404][T11414] dump_stack_lvl+0x16c/0x230 [ 696.553138][T11414] ? sctp_sendmsg+0x155c/0x27e0 [ 696.558324][T11414] ? ___sys_sendmsg+0x220/0x290 [ 696.563339][T11414] ? show_regs_print_info+0x20/0x20 [ 696.568610][T11414] ? load_image+0x3b0/0x3b0 [ 696.573340][T11414] should_fail_ex+0x39d/0x4d0 [ 696.578221][T11414] should_failslab+0x9/0x20 [ 696.582833][T11414] slab_pre_alloc_hook+0x59/0x310 [ 696.587964][T11414] ? sctp_add_bind_addr+0x8c/0x360 [ 696.593105][T11414] __kmem_cache_alloc_node+0x53/0x260 [ 696.598762][T11414] ? sctp_add_bind_addr+0x8c/0x360 [ 696.603990][T11414] kmalloc_trace+0x2a/0xe0 [ 696.608435][T11414] sctp_add_bind_addr+0x8c/0x360 [ 696.613484][T11414] sctp_copy_local_addr_list+0x30c/0x4e0 [ 696.619406][T11414] ? sctp_copy_local_addr_list+0x9c/0x4e0 [ 696.625525][T11414] ? sctp_do_8_2_transport_strike+0x8b0/0x8b0 [ 696.632084][T11414] ? sctp_v4_is_any+0x35/0x60 [ 696.637187][T11414] ? sctp_copy_one_addr+0x8c/0x350 [ 696.642525][T11414] sctp_bind_addr_copy+0xb3/0x3c0 [ 696.647659][T11414] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 696.654120][T11414] sctp_connect_new_asoc+0x2da/0x690 [ 696.659548][T11414] ? __sctp_connect+0xd20/0xd20 [ 696.664582][T11414] ? __local_bh_enable_ip+0x12e/0x1c0 [ 696.670064][T11414] ? _local_bh_enable+0xa0/0xa0 [ 696.675120][T11414] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 696.681332][T11414] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 696.687169][T11414] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 696.692751][T11414] ? security_sctp_bind_connect+0x89/0xb0 [ 696.698752][T11414] sctp_sendmsg+0x155c/0x27e0 [ 696.703719][T11414] ? sctp_getsockopt+0xb60/0xb60 [ 696.708927][T11414] ? perf_trace_lock_acquire+0xfb/0x3e0 [ 696.714494][T11414] ? aa_sk_perm+0x7fc/0x930 [ 696.719192][T11414] ? aa_af_perm+0x2b0/0x2b0 [ 696.723742][T11414] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 696.730208][T11414] ? sock_rps_record_flow+0x19/0x400 [ 696.735625][T11414] ? inet_send_prepare+0x260/0x260 [ 696.741102][T11414] ? inet_sendmsg+0x7c/0x2f0 [ 696.745965][T11414] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 696.751273][T11414] ? security_socket_sendmsg+0x80/0xa0 [ 696.757095][T11414] ? inet_send_prepare+0x260/0x260 [ 696.762573][T11414] ____sys_sendmsg+0x5bf/0x950 [ 696.767548][T11414] ? __asan_memset+0x22/0x40 [ 696.772152][T11414] ? __sys_sendmsg_sock+0x30/0x30 [ 696.777282][T11414] ? __import_iovec+0x5f2/0x860 [ 696.782245][T11414] ? import_iovec+0x73/0xa0 [ 696.786769][T11414] ___sys_sendmsg+0x220/0x290 [ 696.791471][T11414] ? __sys_sendmsg+0x270/0x270 [ 696.796374][T11414] ? __lock_acquire+0x7c80/0x7c80 [ 696.801697][T11414] __se_sys_sendmsg+0x1a5/0x270 [ 696.806928][T11414] ? __x64_sys_sendmsg+0x80/0x80 [ 696.812017][T11414] ? lockdep_hardirqs_on+0x98/0x150 [ 696.817347][T11414] do_syscall_64+0x55/0xb0 [ 696.822062][T11414] ? clear_bhb_loop+0x40/0x90 [ 696.827021][T11414] ? clear_bhb_loop+0x40/0x90 [ 696.831973][T11414] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 696.838088][T11414] RIP: 0033:0x7fc07df8f749 [ 696.842631][T11414] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 696.862779][T11414] RSP: 002b:00007fc07ee40038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 696.871306][T11414] RAX: ffffffffffffffda RBX: 00007fc07e1e6090 RCX: 00007fc07df8f749 [ 696.879561][T11414] RDX: 0000000000008054 RSI: 0000200000000300 RDI: 0000000000000003 [ 696.888168][T11414] RBP: 00007fc07ee40090 R08: 0000000000000000 R09: 0000000000000000 [ 696.896250][T11414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 696.904493][T11414] R13: 00007fc07e1e6128 R14: 00007fc07e1e6090 R15: 00007ffd62c2c038 [ 696.913116][T11414] [ 697.667478][T11425] syz.4.2174[11425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 698.031629][T11445] netlink: 144316 bytes leftover after parsing attributes in process `syz.4.2182'. [ 698.201308][T11452] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2184'. [ 698.462195][T11467] netlink: 'syz.5.2189': attribute type 153 has an invalid length. [ 698.470981][T11467] netlink: 128124 bytes leftover after parsing attributes in process `syz.5.2189'. [ 698.751620][T11461] netlink: 209844 bytes leftover after parsing attributes in process `syz.4.2187'. [ 698.983943][T11473] syz.6.2192[11473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 699.759955][T11480] netlink: 129384 bytes leftover after parsing attributes in process `syz.4.2194'. [ 699.766605][T11481] netlink: 129384 bytes leftover after parsing attributes in process `syz.4.2194'. [ 699.885203][T11487] netlink: 132 bytes leftover after parsing attributes in process `syz.6.2196'. [ 700.864336][T11516] netlink: 'syz.4.2205': attribute type 7 has an invalid length. [ 701.071195][ T5847] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 701.080987][ T5847] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 701.089810][ T5847] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 701.130635][ T5847] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 701.140263][ T5847] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 701.151191][ T5847] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 701.239494][T10245] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 701.399828][T11524] __nla_validate_parse: 2 callbacks suppressed [ 701.399846][T11524] netlink: 132 bytes leftover after parsing attributes in process `syz.6.2208'. [ 701.446786][T11525] netlink: 152 bytes leftover after parsing attributes in process `syz.4.2207'. [ 701.568458][T10245] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 701.714453][T11522] netlink: 'syz.4.2207': attribute type 10 has an invalid length. [ 701.860124][T11522] macvlan0: entered promiscuous mode [ 701.886147][T11522] macvlan0: entered allmulticast mode [ 702.033978][T11522] veth1_vlan: entered allmulticast mode [ 702.126192][T11522] bond0: (slave macvlan0): Enslaving as an active interface with an up link [ 702.250217][T10245] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 702.411978][T10245] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 703.204033][ T5847] Bluetooth: hci2: command tx timeout [ 703.253938][T11518] chnl_net:caif_netlink_parms(): no params data found [ 703.304154][T11558] netlink: 209844 bytes leftover after parsing attributes in process `syz.6.2216'. [ 703.595840][T11518] bridge0: port 1(bridge_slave_0) entered blocking state [ 703.615267][T11518] bridge0: port 1(bridge_slave_0) entered disabled state [ 703.638790][T11518] bridge_slave_0: entered allmulticast mode [ 703.665546][T11518] bridge_slave_0: entered promiscuous mode [ 703.703492][T11518] bridge0: port 2(bridge_slave_1) entered blocking state [ 703.725233][T11518] bridge0: port 2(bridge_slave_1) entered disabled state [ 703.747611][T11518] bridge_slave_1: entered allmulticast mode [ 703.775926][T11518] bridge_slave_1: entered promiscuous mode [ 703.798051][T11568] netlink: 132 bytes leftover after parsing attributes in process `syz.5.2217'. [ 704.209249][T11518] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 704.463925][T11518] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 704.635354][T11577] netlink: 'syz.6.2220': attribute type 29 has an invalid length. [ 704.794148][T11577] netlink: 'syz.6.2220': attribute type 29 has an invalid length. [ 705.336157][ T5847] Bluetooth: hci2: command tx timeout [ 706.021301][T11518] team0: Port device team_slave_0 added [ 706.058046][T11518] team0: Port device team_slave_1 added [ 706.065153][T11578] netlink: 'syz.6.2220': attribute type 29 has an invalid length. [ 706.448407][T11518] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 706.459992][T11518] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 706.527322][T11518] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 706.561730][T11518] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 706.590616][T11518] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 706.654737][T11518] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 706.910042][T11518] hsr_slave_0: entered promiscuous mode [ 706.942257][T11518] hsr_slave_1: entered promiscuous mode [ 707.200837][T10245] hsr_slave_0: left promiscuous mode [ 707.212229][T10245] hsr_slave_1: left promiscuous mode [ 707.238905][T10245] bridge_slave_1: left allmulticast mode [ 707.248540][T10245] bridge_slave_1: left promiscuous mode [ 707.264965][T10245] bridge0: port 2(bridge_slave_1) entered disabled state [ 707.307157][T10245] bridge_slave_0: left allmulticast mode [ 707.324826][T10245] bridge_slave_0: left promiscuous mode [ 707.334979][T10245] bridge0: port 1(bridge_slave_0) entered disabled state [ 707.355600][ T5847] Bluetooth: hci2: command tx timeout [ 707.408899][T10245] veth0_macvtap: left promiscuous mode [ 707.418703][T10245] veth1_vlan: left promiscuous mode [ 707.424179][T10245] veth0_vlan: left promiscuous mode [ 708.293005][T10245] team0 (unregistering): Port device team_slave_1 removed [ 708.347449][T10245] team0 (unregistering): Port device C removed [ 708.401495][T10245] bond0 (unregistering): (slave 4@0Ù): Releasing backup interface [ 708.454302][T10245] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 708.945453][T10245] bond0 (unregistering): Released all slaves [ 709.061333][T11613] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2231'. [ 709.071908][T11619] netlink: 'syz.6.2233': attribute type 10 has an invalid length. [ 709.094738][T11619] netlink: 40 bytes leftover after parsing attributes in process `syz.6.2233'. [ 709.104576][T11619] team0: Device lo is loopback device. Loopback devices can't be added as a team port [ 709.132742][T11619] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 709.149455][T11618] netlink: 'syz.6.2233': attribute type 10 has an invalid length. [ 709.162686][T11618] netlink: 40 bytes leftover after parsing attributes in process `syz.6.2233'. [ 709.173728][T11618] team0: Device lo is loopback device. Loopback devices can't be added as a team port [ 709.190659][T11618] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 709.444794][ T5847] Bluetooth: hci2: command tx timeout [ 710.159381][T11518] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 710.172673][T11518] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 710.200006][T11518] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 710.212840][T11518] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 710.381873][T11655] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2242'. [ 710.440347][T11518] 8021q: adding VLAN 0 to HW filter on device bond0 [ 710.498256][T11518] 8021q: adding VLAN 0 to HW filter on device team0 [ 710.515443][T10245] bridge0: port 1(bridge_slave_0) entered blocking state [ 710.523324][T10245] bridge0: port 1(bridge_slave_0) entered forwarding state [ 710.563906][T10245] bridge0: port 2(bridge_slave_1) entered blocking state [ 710.571180][T10245] bridge0: port 2(bridge_slave_1) entered forwarding state [ 710.650128][T11518] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 710.895027][T11671] netlink: 'syz.6.2248': attribute type 39 has an invalid length. [ 711.083961][T11518] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 711.180043][T11518] veth0_vlan: entered promiscuous mode [ 711.215400][T11518] veth1_vlan: entered promiscuous mode [ 711.278643][T11518] veth0_macvtap: entered promiscuous mode [ 711.299963][T11518] veth1_macvtap: entered promiscuous mode [ 711.335389][T11518] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 711.346271][T11518] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 711.358295][T11518] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 711.369275][T11518] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 711.379513][T11518] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 711.390453][T11518] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 711.426138][T11518] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 711.505357][T11518] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 711.538704][T11518] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 711.564949][T11518] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 711.584712][T11518] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 711.600462][T11518] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 711.625703][T11518] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 711.640853][T11518] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 711.654179][T11518] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 711.669978][T11518] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 711.681776][T11518] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 711.698873][T11518] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 711.721479][T11686] netlink: 132 bytes leftover after parsing attributes in process `syz.5.2253'. [ 711.940358][ T7061] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 711.963644][ T7061] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 712.011712][T10245] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 712.023854][T10245] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 712.163978][T11699] netlink: 'syz.3.2202': attribute type 10 has an invalid length. [ 712.172123][T11699] netlink: 55 bytes leftover after parsing attributes in process `syz.3.2202'. [ 712.691966][T11717] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2261'. [ 712.726788][T11705] delete_channel: no stack [ 712.842976][T11723] netlink: 'syz.5.2263': attribute type 2 has an invalid length. [ 712.887138][T11723] netlink: 'syz.5.2263': attribute type 1 has an invalid length. [ 712.915122][T11723] netlink: 132 bytes leftover after parsing attributes in process `syz.5.2263'. [ 713.061179][T11732] netlink: 'syz.4.2268': attribute type 27 has an invalid length. [ 713.099732][T11732] netlink: 'syz.4.2268': attribute type 10 has an invalid length. [ 713.194042][T11732] team0: Port device wlan1 added [ 713.836939][T11746] netlink: 'syz.4.2272': attribute type 10 has an invalid length. [ 713.874155][T11746] netlink: 40 bytes leftover after parsing attributes in process `syz.4.2272'. [ 713.893797][T11746] team0: entered promiscuous mode [ 713.900981][T11746] team_slave_0: entered promiscuous mode [ 713.953880][T11746] team_slave_1: entered promiscuous mode [ 713.990372][T11746] mac80211_hwsim hwsim11 wlan1: entered promiscuous mode [ 714.007636][T11746] team0: entered allmulticast mode [ 714.013595][T11746] team_slave_0: entered allmulticast mode [ 714.025224][T11746] team_slave_1: entered allmulticast mode [ 714.033690][T11746] mac80211_hwsim hwsim11 wlan1: entered allmulticast mode [ 714.047905][T11746] bridge0: port 3(team0) entered blocking state [ 714.055665][T11746] bridge0: port 3(team0) entered disabled state [ 714.084147][T11746] bridge0: port 3(team0) entered blocking state [ 714.091107][T11746] bridge0: port 3(team0) entered forwarding state [ 714.110185][T11753] netlink: 132 bytes leftover after parsing attributes in process `syz.5.2275'. [ 714.123959][T11754] netlink: 132 bytes leftover after parsing attributes in process `syz.6.2274'. [ 715.125932][T11789] netlink: 132 bytes leftover after parsing attributes in process `syz.6.2285'. [ 715.216022][T11793] netlink: 'syz.6.2287': attribute type 4 has an invalid length. [ 715.224064][T11793] netlink: 152 bytes leftover after parsing attributes in process `syz.6.2287'. [ 715.240674][T11793] .`: renamed from bond0 [ 716.517795][T11820] netlink: 132 bytes leftover after parsing attributes in process `syz.6.2295'. [ 717.209379][T11827] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 718.273467][T11847] netlink: 132 bytes leftover after parsing attributes in process `syz.6.2305'. [ 718.391923][T11849] netlink: 'syz.6.2306': attribute type 33 has an invalid length. [ 718.407556][T11849] netlink: 152 bytes leftover after parsing attributes in process `syz.6.2306'. [ 718.703907][T11852] delete_channel: no stack [ 718.748533][T11852] delete_channel: no stack [ 719.083877][T11852] veth1_to_bond: entered allmulticast mode [ 720.424590][T11869] netlink: 209844 bytes leftover after parsing attributes in process `syz.4.2311'. [ 720.675610][T11870] netlink: 132 bytes leftover after parsing attributes in process `syz.6.2312'. [ 722.038191][T11892] netlink: 132 bytes leftover after parsing attributes in process `syz.5.2317'. [ 723.192101][T11928] syz.5.2328[11928] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 723.192255][T11928] syz.5.2328[11928] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 723.354222][T11930] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2329'. [ 723.582538][T11943] netlink: 'syz.5.2334': attribute type 10 has an invalid length. [ 723.829213][T11952] netlink: 'syz.6.2335': attribute type 1 has an invalid length. [ 723.858835][T11952] netlink: 157116 bytes leftover after parsing attributes in process `syz.6.2335'. [ 723.917397][T11961] netlink: 'syz.5.2338': attribute type 9 has an invalid length. [ 723.934901][T11961] netlink: 209836 bytes leftover after parsing attributes in process `syz.5.2338'. [ 723.954864][T11957] netlink: 'syz.6.2335': attribute type 1 has an invalid length. [ 723.992496][T11957] netlink: 157116 bytes leftover after parsing attributes in process `syz.6.2335'. [ 724.124860][T11956] netlink: 'syz.5.2338': attribute type 9 has an invalid length. [ 724.132978][T11956] netlink: 209836 bytes leftover after parsing attributes in process `syz.5.2338'. [ 724.702017][T11981] netlink: 132 bytes leftover after parsing attributes in process `syz.4.2344'. [ 724.822066][T11984] netlink: 'syz.6.2346': attribute type 21 has an invalid length. [ 724.864841][T11984] netlink: 'syz.6.2346': attribute type 1 has an invalid length. [ 724.896234][T11984] netlink: 16050 bytes leftover after parsing attributes in process `syz.6.2346'. [ 725.442728][T12000] __nla_validate_parse: 1 callbacks suppressed [ 725.442753][T12000] netlink: 60 bytes leftover after parsing attributes in process `syz.5.2352'. [ 725.519055][T12000] netlink: 60 bytes leftover after parsing attributes in process `syz.5.2352'. [ 725.565472][T12001] netlink: 60 bytes leftover after parsing attributes in process `syz.5.2352'. [ 725.615222][T12000] netlink: 60 bytes leftover after parsing attributes in process `syz.5.2352'. [ 725.698876][T12001] netlink: 'syz.5.2352': attribute type 10 has an invalid length. [ 725.811822][T12001] team0: Port device wlan1 added [ 725.845129][T12006] netlink: 132 bytes leftover after parsing attributes in process `syz.6.2353'. [ 725.849729][T11999] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 726.440795][T12020] netlink: 132 bytes leftover after parsing attributes in process `syz.5.2358'. [ 726.801556][T12027] wg2: entered promiscuous mode [ 726.813071][T12027] wg2: entered allmulticast mode [ 727.550494][T12046] netlink: 14548 bytes leftover after parsing attributes in process `syz.3.2367'. [ 727.685823][T12053] netlink: 132 bytes leftover after parsing attributes in process `syz.6.2370'. [ 728.042249][T12063] netlink: 9286 bytes leftover after parsing attributes in process `syz.6.2373'. [ 728.160902][T12063] netlink: 156 bytes leftover after parsing attributes in process `syz.6.2373'. [ 728.455826][T12072] syzkaller1: tun_chr_ioctl cmd 1074025677 [ 728.483534][T12072] syzkaller1: linktype set to 823 [ 729.594368][T12115] openvswitch: netlink: ufid size 3064 bytes exceeds the range (1, 16) [ 747.635734][ T1287] ieee802154 phy0 wpan0: encryption failed: -22 [ 747.642192][ T1287] ieee802154 phy1 wpan1: encryption failed: -22 [ 758.242832][ T5105] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 758.256236][ T5105] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 758.274992][ T5105] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 758.297541][ T5842] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 758.307498][ T5842] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 758.324694][ T5842] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 758.351195][ T5851] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 758.360743][ T5851] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 758.371318][ T5851] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 758.385015][ T5851] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 758.392911][ T5851] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 758.401998][ T5851] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 758.410738][ T51] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 758.421160][ T51] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 758.428755][ T5851] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 758.447388][ T5851] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 758.455582][ T5851] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 758.479869][ T5851] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 758.528495][ T5847] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 758.551212][ T5847] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 758.565868][ T5847] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 758.574295][ T5847] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 758.582801][ T5847] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 758.590273][ T5847] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 758.775568][ T5911] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 758.901020][ T5911] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 759.027036][ T5911] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 759.100382][ T5911] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 759.317133][T12169] chnl_net:caif_netlink_parms(): no params data found [ 759.684582][T12169] bridge0: port 1(bridge_slave_0) entered blocking state [ 759.699373][T12169] bridge0: port 1(bridge_slave_0) entered disabled state [ 759.706840][T12169] bridge_slave_0: entered allmulticast mode [ 759.713683][T12169] bridge_slave_0: entered promiscuous mode [ 759.723061][T12169] bridge0: port 2(bridge_slave_1) entered blocking state [ 759.730327][T12169] bridge0: port 2(bridge_slave_1) entered disabled state [ 759.738423][T12169] bridge_slave_1: entered allmulticast mode [ 759.745857][T12169] bridge_slave_1: entered promiscuous mode [ 759.753438][T12175] chnl_net:caif_netlink_parms(): no params data found [ 759.776674][T12171] chnl_net:caif_netlink_parms(): no params data found [ 759.943376][T12169] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 759.956538][T12169] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 760.071883][T12169] team0: Port device team_slave_0 added [ 760.082959][T12169] team0: Port device team_slave_1 added [ 760.168239][T12175] bridge0: port 1(bridge_slave_0) entered blocking state [ 760.178404][T12175] bridge0: port 1(bridge_slave_0) entered disabled state [ 760.186120][T12175] bridge_slave_0: entered allmulticast mode [ 760.192944][T12175] bridge_slave_0: entered promiscuous mode [ 760.273099][T12175] bridge0: port 2(bridge_slave_1) entered blocking state [ 760.280640][T12175] bridge0: port 2(bridge_slave_1) entered disabled state [ 760.288796][T12175] bridge_slave_1: entered allmulticast mode [ 760.296640][T12175] bridge_slave_1: entered promiscuous mode [ 760.306990][T12171] bridge0: port 1(bridge_slave_0) entered blocking state [ 760.314160][T12171] bridge0: port 1(bridge_slave_0) entered disabled state [ 760.321794][T12171] bridge_slave_0: entered allmulticast mode [ 760.329017][T12171] bridge_slave_0: entered promiscuous mode [ 760.339274][T12171] bridge0: port 2(bridge_slave_1) entered blocking state [ 760.346571][T12171] bridge0: port 2(bridge_slave_1) entered disabled state [ 760.354276][T12171] bridge_slave_1: entered allmulticast mode [ 760.362137][T12171] bridge_slave_1: entered promiscuous mode [ 760.369747][T12169] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 760.377374][T12169] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 760.403572][T12169] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 760.414323][ T5851] Bluetooth: hci0: command tx timeout [ 760.417530][T12169] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 760.431617][T12169] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 760.459621][T12169] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 760.486795][T12177] chnl_net:caif_netlink_parms(): no params data found [ 760.554862][ T5851] Bluetooth: hci4: command tx timeout [ 760.555903][ T5847] Bluetooth: hci1: command tx timeout [ 760.579566][T12175] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 760.596258][T12175] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 760.635111][ T5847] Bluetooth: hci3: command tx timeout [ 760.698280][T12171] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 760.757368][T12171] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 760.787730][T12169] hsr_slave_0: entered promiscuous mode [ 760.796241][T12169] hsr_slave_1: entered promiscuous mode [ 760.802546][T12169] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 760.811933][T12169] Cannot create hsr debugfs directory [ 760.854797][T12175] team0: Port device team_slave_0 added [ 760.884032][T12171] team0: Port device team_slave_0 added [ 760.899323][T12175] team0: Port device team_slave_1 added [ 760.946823][T12171] team0: Port device team_slave_1 added [ 761.012113][T12177] bridge0: port 1(bridge_slave_0) entered blocking state [ 761.020045][T12177] bridge0: port 1(bridge_slave_0) entered disabled state [ 761.027544][T12177] bridge_slave_0: entered allmulticast mode [ 761.035383][T12177] bridge_slave_0: entered promiscuous mode [ 761.062517][T12175] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 761.070024][T12175] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 761.102018][T12175] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 761.130846][T12177] bridge0: port 2(bridge_slave_1) entered blocking state [ 761.139741][T12177] bridge0: port 2(bridge_slave_1) entered disabled state [ 761.147850][T12177] bridge_slave_1: entered allmulticast mode [ 761.154930][T12177] bridge_slave_1: entered promiscuous mode [ 761.173995][T12175] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 761.181144][T12175] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 761.208317][T12175] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 761.223764][T12171] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 761.230977][T12171] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 761.257386][T12171] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 761.284615][ T5911] [ 761.287000][ T5911] ====================================================== [ 761.294012][ T5911] WARNING: possible circular locking dependency detected [ 761.301057][ T5911] syzkaller #0 Not tainted [ 761.305509][ T5911] ------------------------------------------------------ [ 761.312610][ T5911] kworker/u4:2/5911 is trying to acquire lock: [ 761.318842][ T5911] ffff88807db90d00 (team->team_lock_key#5){+.+.}-{3:3}, at: team_del_slave+0x32/0x1c0 [ 761.328596][ T5911] [ 761.328596][ T5911] but task is already holding lock: [ 761.336126][ T5911] ffff88807a2e0768 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: ieee80211_remove_interfaces+0x292/0x680 [ 761.346650][ T5911] [ 761.346650][ T5911] which lock already depends on the new lock. [ 761.346650][ T5911] [ 761.357144][ T5911] [ 761.357144][ T5911] the existing dependency chain (in reverse order) is: [ 761.366153][ T5911] [ 761.366153][ T5911] -> #1 (&rdev->wiphy.mtx){+.+.}-{3:3}: [ 761.373878][ T5911] __mutex_lock+0x129/0xcc0 [ 761.378925][ T5911] ieee80211_open+0x144/0x200 [ 761.384152][ T5911] __dev_open+0x2bc/0x430 [ 761.389010][ T5911] dev_open+0xab/0x170 [ 761.393611][ T5911] team_add_slave+0xae7/0x2660 [ 761.398904][ T5911] do_setlink+0xe14/0x3fb0 [ 761.403907][ T5911] rtnl_newlink+0x175b/0x2020 [ 761.409107][ T5911] rtnetlink_rcv_msg+0x7c7/0xf10 [ 761.414959][ T5911] netlink_rcv_skb+0x216/0x480 [ 761.420241][ T5911] netlink_unicast+0x751/0x8d0 [ 761.425533][ T5911] netlink_sendmsg+0x8c1/0xbe0 [ 761.430939][ T5911] ____sys_sendmsg+0x5bf/0x950 [ 761.436227][ T5911] ___sys_sendmsg+0x220/0x290 [ 761.441422][ T5911] __se_sys_sendmsg+0x1a5/0x270 [ 761.446796][ T5911] do_syscall_64+0x55/0xb0 [ 761.451833][ T5911] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 761.458332][ T5911] [ 761.458332][ T5911] -> #0 (team->team_lock_key#5){+.+.}-{3:3}: [ 761.466846][ T5911] __lock_acquire+0x2ddb/0x7c80 [ 761.472217][ T5911] lock_acquire+0x197/0x410 [ 761.477245][ T5911] __mutex_lock+0x129/0xcc0 [ 761.482309][ T5911] team_del_slave+0x32/0x1c0 [ 761.487446][ T5911] team_device_event+0x28d/0xa20 [ 761.492933][ T5911] notifier_call_chain+0x197/0x390 [ 761.498664][ T5911] unregister_netdevice_many_notify+0xf36/0x1810 [ 761.505515][ T5911] unregister_netdevice_queue+0x324/0x360 [ 761.511752][ T5911] _cfg80211_unregister_wdev+0x16b/0x580 [ 761.518005][ T5911] ieee80211_remove_interfaces+0x496/0x680 [ 761.524416][ T5911] ieee80211_unregister_hw+0x5d/0x2a0 [ 761.530403][ T5911] mac80211_hwsim_del_radio+0x274/0x450 [ 761.536606][ T5911] hwsim_exit_net+0x585/0x640 [ 761.542027][ T5911] cleanup_net+0x6f4/0xb90 [ 761.546981][ T5911] process_scheduled_works+0xa45/0x15b0 [ 761.553060][ T5911] worker_thread+0xa55/0xfc0 [ 761.558270][ T5911] kthread+0x2fa/0x390 [ 761.562878][ T5911] ret_from_fork+0x48/0x80 [ 761.567812][ T5911] ret_from_fork_asm+0x11/0x20 [ 761.573097][ T5911] [ 761.573097][ T5911] other info that might help us debug this: [ 761.573097][ T5911] [ 761.583354][ T5911] Possible unsafe locking scenario: [ 761.583354][ T5911] [ 761.590880][ T5911] CPU0 CPU1 [ 761.596244][ T5911] ---- ---- [ 761.601598][ T5911] lock(&rdev->wiphy.mtx); [ 761.606096][ T5911] lock(team->team_lock_key#5); [ 761.613548][ T5911] lock(&rdev->wiphy.mtx); [ 761.620734][ T5911] lock(team->team_lock_key#5); [ 761.625683][ T5911] [ 761.625683][ T5911] *** DEADLOCK *** [ 761.625683][ T5911] [ 761.633828][ T5911] 5 locks held by kworker/u4:2/5911: [ 761.639104][ T5911] #0: ffff888017873938 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x957/0x15b0 [ 761.650145][ T5911] #1: ffffc90004e6fd00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x957/0x15b0 [ 761.660712][ T5911] #2: ffffffff8dfaf790 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x136/0xb90 [ 761.670273][ T5911] #3: ffffffff8dfbc5c8 (rtnl_mutex){+.+.}-{3:3}, at: ieee80211_unregister_hw+0x55/0x2a0 [ 761.680157][ T5911] #4: ffff88807a2e0768 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: ieee80211_remove_interfaces+0x292/0x680 [ 761.690975][ T5911] [ 761.690975][ T5911] stack backtrace: [ 761.696851][ T5911] CPU: 1 PID: 5911 Comm: kworker/u4:2 Not tainted syzkaller #0 [ 761.704532][ T5911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 761.714791][ T5911] Workqueue: netns cleanup_net [ 761.719570][ T5911] Call Trace: [ 761.722865][ T5911] [ 761.725817][ T5911] dump_stack_lvl+0x16c/0x230 [ 761.730537][ T5911] ? load_image+0x3b0/0x3b0 [ 761.735487][ T5911] ? show_regs_print_info+0x20/0x20 [ 761.740708][ T5911] ? print_circular_bug+0x12b/0x1a0 [ 761.745991][ T5911] check_noncircular+0x2bd/0x3c0 [ 761.751012][ T5911] ? print_deadlock_bug+0x5d0/0x5d0 [ 761.756290][ T5911] ? lockdep_lock+0xe0/0x220 [ 761.760963][ T5911] ? __lock_acquire+0x1334/0x7c80 [ 761.765984][ T5911] ? _find_first_zero_bit+0xd3/0x100 [ 761.771269][ T5911] __lock_acquire+0x2ddb/0x7c80 [ 761.776271][ T5911] ? verify_lock_unused+0x140/0x140 [ 761.781489][ T5911] ? verify_lock_unused+0x140/0x140 [ 761.786737][ T5911] lock_acquire+0x197/0x410 [ 761.791329][ T5911] ? team_del_slave+0x32/0x1c0 [ 761.796093][ T5911] ? __might_sleep+0xe0/0xe0 [ 761.800677][ T5911] ? read_lock_is_recursive+0x20/0x20 [ 761.806051][ T5911] __mutex_lock+0x129/0xcc0 [ 761.810727][ T5911] ? team_del_slave+0x32/0x1c0 [ 761.815507][ T5911] ? __lock_acquire+0x7c80/0x7c80 [ 761.820524][ T5911] ? rcu_is_watching+0x15/0xb0 [ 761.825295][ T5911] ? trace_contention_end+0x39/0xe0 [ 761.830521][ T5911] ? __mutex_lock+0x304/0xcc0 [ 761.835200][ T5911] ? team_del_slave+0x32/0x1c0 [ 761.839957][ T5911] ? mutex_lock_nested+0x20/0x20 [ 761.844893][ T5911] ? bond_netdev_event+0xe1/0xef0 [ 761.849908][ T5911] ? __mutex_unlock_slowpath+0x1a2/0x6a0 [ 761.855540][ T5911] ? bond_ipsec_offload_ok+0x410/0x410 [ 761.861015][ T5911] team_del_slave+0x32/0x1c0 [ 761.865602][ T5911] team_device_event+0x28d/0xa20 [ 761.870535][ T5911] notifier_call_chain+0x197/0x390 [ 761.875750][ T5911] unregister_netdevice_many_notify+0xf36/0x1810 [ 761.882104][ T5911] ? lock_chain_count+0x20/0x20 [ 761.886972][ T5911] ? unregister_netdevice_many+0x20/0x20 [ 761.892614][ T5911] ? kernfs_remove_by_name_ns+0x117/0x150 [ 761.898409][ T5911] ? __lock_acquire+0x7c80/0x7c80 [ 761.903450][ T5911] unregister_netdevice_queue+0x324/0x360 [ 761.909254][ T5911] ? list_netdevice+0x730/0x730 [ 761.914107][ T5911] ? kernfs_remove_by_name_ns+0x117/0x150 [ 761.919940][ T5911] _cfg80211_unregister_wdev+0x16b/0x580 [ 761.925585][ T5911] ieee80211_remove_interfaces+0x496/0x680 [ 761.931432][ T5911] ? ieee80211_do_stop+0x1db0/0x1db0 [ 761.936755][ T5911] ? rcu_is_watching+0x15/0xb0 [ 761.941547][ T5911] ieee80211_unregister_hw+0x5d/0x2a0 [ 761.947025][ T5911] mac80211_hwsim_del_radio+0x274/0x450 [ 761.952571][ T5911] ? rhashtable_remove_fast+0xbf0/0xbf0 [ 761.958203][ T5911] hwsim_exit_net+0x585/0x640 [ 761.962968][ T5911] ? hwsim_init_net+0x90/0x90 [ 761.967670][ T5911] ? __ip_vs_dev_cleanup_batch+0x238/0x250 [ 761.973486][ T5911] cleanup_net+0x6f4/0xb90 [ 761.977923][ T5911] ? ops_free_list+0x3b0/0x3b0 [ 761.982710][ T5911] ? _raw_spin_unlock_irq+0x23/0x50 [ 761.988009][ T5911] ? process_scheduled_works+0x957/0x15b0 [ 761.993909][ T5911] ? process_scheduled_works+0x957/0x15b0 [ 761.999646][ T5911] process_scheduled_works+0xa45/0x15b0 [ 762.005205][ T5911] ? assign_work+0x400/0x400 [ 762.009792][ T5911] ? assign_work+0x39e/0x400 [ 762.014654][ T5911] worker_thread+0xa55/0xfc0 [ 762.019274][ T5911] kthread+0x2fa/0x390 [ 762.023335][ T5911] ? pr_cont_work+0x560/0x560 [ 762.028100][ T5911] ? kthread_blkcg+0xd0/0xd0 [ 762.032860][ T5911] ret_from_fork+0x48/0x80 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 762.037365][ T5911] ? kthread_blkcg+0xd0/0xd0 [ 762.041948][ T5911] ret_from_fork_asm+0x11/0x20 [ 762.046712][ T5911] [ 762.055346][ T5911] mac80211_hwsim hwsim11 wlan1 (unregistering): left promiscuous mode [ 762.063822][ T5911] mac80211_hwsim hwsim11 wlan1 (unregistering): left allmulticast mode [ 762.075254][ T5911] team0: Port device wlan1 removed [ 762.150580][T12171] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 762.165144][T12171] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 762.191803][T12171] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 762.218771][T12177] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 762.233938][T12177] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 762.359894][T12175] hsr_slave_0: entered promiscuous mode [ 762.370958][T12175] hsr_slave_1: entered promiscuous mode [ 762.378128][T12175] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 762.389142][T12175] Cannot create hsr debugfs directory [ 762.484831][ T5847] Bluetooth: hci0: command tx timeout [ 762.639838][ T5847] Bluetooth: hci4: command tx timeout [ 762.645602][ T5847] Bluetooth: hci1: command tx timeout [ 763.671795][ T5911] hsr_slave_0: left promiscuous mode [ 763.678059][ T5911] hsr_slave_1: left promiscuous mode [ 763.683835][ T5911] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 763.691294][ T5911] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 763.698959][ T5911] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 763.706581][ T5911] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 763.714485][ T5911] bridge0: port 3(team0) entered disabled state [ 763.722462][ T5911] bridge_slave_1: left allmulticast mode [ 763.728603][ T5911] bridge_slave_1: left promiscuous mode [ 763.734684][ T5911] bridge0: port 2(bridge_slave_1) entered disabled state [ 763.742960][ T5911] bridge_slave_0: left allmulticast mode [ 763.748843][ T5911] bridge_slave_0: left promiscuous mode [ 763.754573][ T5911] bridge0: port 1(bridge_slave_0) entered disabled state [ 763.765208][ T5911] veth1_macvtap: left promiscuous mode [ 763.770759][ T5911] veth0_macvtap: left promiscuous mode [ 763.777303][ T5911] veth1_vlan: left allmulticast mode [ 763.782873][ T5911] veth1_vlan: left promiscuous mode [ 763.788154][ T5911] veth0_vlan: left promiscuous mode [ 763.885651][ T5911] bond0 (unregistering): (slave macvlan0): Releasing backup interface [ 763.988145][ T5911] team_slave_1 (unregistering): left promiscuous mode [ 763.998560][ T5911] team_slave_1 (unregistering): left allmulticast mode [ 764.011962][ T5911] team0 (unregistering): Port device team_slave_1 removed [ 764.051006][ T5911] team_slave_0 (unregistering): left promiscuous mode [ 764.062570][ T5911] team_slave_0 (unregistering): left allmulticast mode [ 764.070964][ T5911] team0 (unregistering): Port device team_slave_0 removed [ 764.097692][ T5911] bond0 (unregistering): (slave 4@0Ù): Releasing backup interface [ 764.190875][ T5911] bond0 (unregistering): Released all slaves [ 766.014562][ T5911] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 766.068808][ T5911] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 766.130264][ T5911] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 766.197225][ T5911] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 766.266536][ T5911] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 766.329863][ T5911] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 766.370803][ T5911] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 766.439999][ T5911] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 767.007028][ T5911] gretap0 (unregistering): left allmulticast mode [ 767.013710][ T5911] gretap0 (unregistering): left promiscuous mode [ 767.020498][ T5911] Ÿë: port 1(gretap0) entered disabled state [ 767.507654][ T5911] hsr_slave_0: left promiscuous mode [ 767.513492][ T5911] hsr_slave_1: left promiscuous mode [ 767.519880][ T5911] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 767.530454][ T5911] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 767.539073][ T5911] bridge_slave_1: left allmulticast mode [ 767.545131][ T5911] bridge_slave_1: left promiscuous mode [ 767.550876][ T5911] bridge0: port 2(bridge_slave_1) entered disabled state [ 767.559062][ T5911] bridge_slave_0: left allmulticast mode [ 767.569530][ T5911] bridge_slave_0: left promiscuous mode [ 767.575662][ T5911] bridge0: port 1(bridge_slave_0) entered disabled state [ 767.584172][ T5911] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 767.591960][ T5911] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 767.600510][ T5911] bridge_slave_1: left allmulticast mode [ 767.606298][ T5911] bridge_slave_1: left promiscuous mode [ 767.611953][ T5911] bridge0: port 2(bridge_slave_1) entered disabled state [ 767.620212][ T5911] bridge_slave_0: left allmulticast mode [ 767.626291][ T5911] bridge_slave_0: left promiscuous mode [ 767.632016][ T5911] bridge0: port 1(bridge_slave_0) entered disabled state [ 767.641081][ T5911] hsr_slave_0: left promiscuous mode [ 767.647346][ T5911] hsr_slave_1: left promiscuous mode [ 767.653271][ T5911] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 767.661319][ T5911] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 767.669392][ T5911] bridge_slave_1: left allmulticast mode [ 767.675457][ T5911] bridge_slave_1: left promiscuous mode [ 767.681372][ T5911] bridge0: port 2(bridge_slave_1) entered disabled state [ 767.690543][ T5911] bridge_slave_0: left allmulticast mode [ 767.696481][ T5911] bridge_slave_0: left promiscuous mode [ 767.702234][ T5911] bridge0: port 1(bridge_slave_0) entered disabled state [ 767.711607][ T5911] bridge_slave_1: left allmulticast mode [ 767.717455][ T5911] bridge_slave_1: left promiscuous mode [ 767.723290][ T5911] bridge0: port 2(bridge_slave_1) entered disabled state [ 767.733490][ T5911] bridge_slave_0: left allmulticast mode [ 767.739289][ T5911] bridge_slave_0: left promiscuous mode [ 767.746364][ T5911] bridge0: port 1(bridge_slave_0) entered disabled state [ 767.757521][ T5911] hsr_slave_0: left promiscuous mode [ 767.763280][ T5911] hsr_slave_1: left promiscuous mode [ 767.769329][ T5911] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 767.776851][ T5911] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 767.784413][ T5911] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 767.792570][ T5911] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 767.800678][ T5911] bridge_slave_1: left allmulticast mode [ 767.806570][ T5911] bridge_slave_1: left promiscuous mode [ 767.812452][ T5911] bridge0: port 2(bridge_slave_1) entered disabled state [ 767.821467][ T5911] bridge_slave_0: left allmulticast mode [ 767.827544][ T5911] bridge_slave_0: left promiscuous mode [ 767.833357][ T5911] bridge0: port 1(bridge_slave_0) entered disabled state [ 767.842514][ T5911] veth0_to_team: left allmulticast mode [ 767.848448][ T5911] veth0_to_team: left promiscuous mode [ 767.854097][ T5911] Ÿë: port 2(veth0_to_team) entered disabled state [ 767.865745][ T5911] hsr_slave_1: left promiscuous mode [ 767.871676][ T5911] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 767.879133][ T5911] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 767.887152][ T5911] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 767.894546][ T5911] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 767.902437][ T5911] bridge_slave_1: left allmulticast mode [ 767.909296][ T5911] bridge_slave_1: left promiscuous mode [ 767.915606][ T5911] bridge0: port 2(bridge_slave_1) entered disabled state [ 767.923927][ T5911] bridge_slave_0: left allmulticast mode [ 767.930006][ T5911] bridge_slave_0: left promiscuous mode [ 767.935755][ T5911] bridge0: port 1(bridge_slave_0) entered disabled state [ 767.948321][ T5911] veth1_macvtap: left promiscuous mode [ 767.953843][ T5911] veth0_macvtap: left promiscuous mode [ 767.960692][ T5911] veth1_macvtap: left promiscuous mode [ 767.966297][ T5911] veth0_macvtap: left promiscuous mode [ 767.971834][ T5911] veth1_vlan: left promiscuous mode [ 767.978111][ T5911] veth0_vlan: left promiscuous mode [ 768.169038][ T5911] team0 (unregistering): Port device team_slave_1 removed [ 768.196208][ T5911] team0 (unregistering): Port device team_slave_0 removed [ 768.224833][ T5911] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 768.253734][ T5911] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 768.334151][ T5911] bond0 (unregistering): Released all slaves [ 768.421576][ T5911] team0 (unregistering): Port device team_slave_1 removed [ 768.433214][ T5911] team0 (unregistering): Port device team_slave_0 removed [ 768.444392][ T5911] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 768.468753][ T5911] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 768.524507][ T5911] bond0 (unregistering): Released all slaves [ 768.601684][ T5911] team0 (unregistering): Port device team_slave_1 removed [ 768.613353][ T5911] team0 (unregistering): Port device team_slave_0 removed [ 768.662941][ T5911] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 768.691333][ T5911] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 768.742508][ T5911] bond0 (unregistering): Released all slaves [ 768.824318][ T5911] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 768.839580][ T5911] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 768.900683][ T5911] bond0 (unregistering): Released all slaves [ 769.060753][ T5911] team0 (unregistering): Port device team_slave_1 removed [ 769.093684][ T5911] team0 (unregistering): Port device team_slave_0 removed [ 769.121780][ T5911] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 769.158041][ T5911] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 769.346201][ T5911] bond0 (unregistering): Released all slaves [ 769.584554][ T5911] team0 (unregistering): Port device team_slave_1 removed [ 769.596399][ T5911] team0 (unregistering): Port device team_slave_0 removed [ 769.632590][ T5911] .` (unregistering): (slave bond_slave_1): Releasing backup interface [ 769.641558][ T5911] bond_slave_1 (unregistering): left promiscuous mode [ 769.716564][ T5911] .` (unregistering): (slave batadv0): Releasing backup interface [ 769.725858][ T5911] batadv0 (unregistering): left promiscuous mode [ 769.862177][ T5911] .` (unregistering): Released all slaves [ 771.248190][ T5911] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0