last executing test programs: 49.031439109s ago: executing program 3 (id=3784): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x16, 0x2, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801, 0x0, @perf_bp={0x0, 0x6}, 0x100000, 0xca, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffe}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0f000000040000"], 0x48) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRES64, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700368df3757f0086dd6317ce8000377ac9b0e0865a6596aff57b000000000000000000000000007f"], 0xffffffffffffffc7) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = perf_event_open(0x0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a00000000a3f500950004000000010045"], 0x0, 0x5}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) 48.366639043s ago: executing program 2 (id=3788): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100000, 0x4, 0x2, 0x0, 0x80, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="fbe6bd8dfcdda5a210b8cfefbd66f459c7261b927d25d3cf74d2f7c97735eba47f606a290d18492592230700000000000000081fdbd921ed4db0e67c9d5ab1452445a1e0da5ac68b13f4afe2712eeaad350d07", 0x53}], 0x1}, 0x4000000) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0xe, 0x0, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x12100, 0xc8, 0x2, 0x8, 0x0, 0x10001, 0xa, 0x0, 0x800}, 0x0, 0x5, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00ff0200000000000000000001ffaaaaaa"], 0xfdef) 48.352444304s ago: executing program 1 (id=3789): r0 = socket$kcm(0xa, 0x1, 0x106) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x24000059) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x40009, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0xffffffffffffffff, 0x3fff8000}, 0x0, 0xff, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext={0x0, 0x1000000}, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="10000000040000000800000008"], 0x50) close(0x3) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000001000)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000bc00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000400850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0x3100, 0x3100, &(0x7f0000000000), 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x3, 0x13, &(0x7f00000001c0)=ANY=[@ANYBLOB="18020000057700000000000000000000182ec0002020702500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb70200000800c309b70300002400"], 0x0, 0x5, 0x0, 0x0, 0x41000, 0xc}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000000540)={0x7, 0x80, 0xb, 0xc0, 0x7, 0x6, 0x0, 0x5, 0x100, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8, 0x1}, 0x8, 0x5, 0x6, 0x9, 0x7, 0x35b, 0x7, 0x0, 0x2, 0x0, 0x8}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) ioctl$SIOCSIFHWADDR(r4, 0x8b06, &(0x7f0000000080)={'wlan1\x00', @random="02000000000a"}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r7 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x10, 0x2, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) socket$kcm(0x28, 0x1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x0, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x34, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0x0, 0xffffffffffffffff, 0xa) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x20000001) r8 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000016000b63d25a80648c2594f90124fc60", 0x14}], 0x1}, 0x0) recvmsg$kcm(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000500)=""/114, 0x72}, {0x0, 0xffa1}], 0x3}, 0x120) perf_event_open$cgroup(0x0, r7, 0xc, r5, 0x0) socket$kcm(0xa, 0x2, 0x3a) recvmsg$unix(r6, 0x0, 0x3) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) 48.271000158s ago: executing program 3 (id=3790): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x16, 0x2, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801, 0x0, @perf_bp={0x0, 0x6}, 0x100000, 0xca, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000001}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d32, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x140) socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) syz_open_procfs$namespace(0x0, &(0x7f0000000380)='ns/uts\x00') recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[@ANYRES8=r1, @ANYRES8=r5], 0x12) 48.192208372s ago: executing program 0 (id=3791): bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x38) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x1c, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7902009875f37538e486dd6317ce62667f2c"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200"], 0xcfa4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x300, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 47.990381903s ago: executing program 2 (id=3792): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x16, 0x2, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801, 0x0, @perf_bp={0x0, 0x6}, 0x100000, 0xca, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000001}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d32, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x140) socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) syz_open_procfs$namespace(0x0, &(0x7f0000000380)='ns/uts\x00') recvmsg$unix(r0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="85feff0fc9"], 0x0, 0x80, 0x0, 0x0, 0x0, 0x1}, 0x94) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYRES8=r1, @ANYRES8=r4], 0x12) 47.681160678s ago: executing program 3 (id=3793): r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000300)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x10000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000080900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1c, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000080)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x3, &(0x7f0000000480)=@framed, &(0x7f0000000500)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000600)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0xfffffffc}, 0x50) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000ac0)={r2, r3}, 0xc) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000)={r2, r1}, 0xc) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xac0, 0x2006c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x1, 0x0, 0x0, 0xba12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0xb, &(0x7f00000002c0), 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x5, 0x2, 0x7, 0x140, 0x1, 0x10000}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x54b2ac04}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r6, r5}, 0xc) socket$kcm(0xa, 0x2, 0x3a) r7 = bpf$ITER_CREATE(0xb, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b00)=@bpf_ext={0x1c, 0x6, 0x0, 0x0, 0x8, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000880)={0x3, 0x2}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x4, 0x2a, 0x37b}, 0x10, 0x11a81, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a00)}, 0x94) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x1ff, 0x200}, 0x8000, 0xcdd, 0x43a1bd76, 0x4, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000480)="5c00000012006bab9a3fe3d86e17aa0b046b876c1d0048380019001931a0e69ee517d34460bc06000000a701251e6182949a3651f60a84c9f4d4938037e70e4509c51c268811000000000000000000002571cd53b9851b30599980bc", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 47.666907899s ago: executing program 0 (id=3794): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r0, &(0x7f0000000b40)={&(0x7f0000000080)={0x2, 0x4e25, @remote}, 0x10, 0x0}, 0xfffe) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000280)=""/59, 0x3b}], 0x1, &(0x7f0000000680)=""/10, 0xa}, 0x40002000) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x900b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x0, 0x2800, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0xc023, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50f, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0x100c, 0x7, 0x3ff, 0x5, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0x1, 0x2b4}, 0x0, 0x10000, 0x0, 0x0, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$kcm(0x10, 0x2, 0x4) socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000b40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000ac0)={&(0x7f0000000700)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000880)=[{&(0x7f0000000800)="36fda40a8ff475d3779f35bcc458f1f3656e29f89ded88d4196766955f9ef168181eaec640714ebac5c3b0a5609282e0e2b810a4b5679442e1085b2256feb3950e3a11b728a67c6af0834448d7cbf4a6182665b080a3df56f674acd5e9fad6ab980d1a0013185fb43e98d424", 0x6c}], 0x1, &(0x7f0000000a80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}], 0x20}, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8b07, &(0x7f0000000040)={'wlan1\x00', @random="8dffffff0600"}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4000000) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r4, &(0x7f0000000b40)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000000540)=[{&(0x7f0000002880)="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", 0x712}], 0x1, &(0x7f0000000100)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0xd}, @loopback}}}], 0x20}, 0xe900) sendmsg$inet(r4, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x44000) socket$kcm(0x10, 0x2, 0x0) r5 = socket$kcm(0x2, 0x922000000001, 0x106) setsockopt$sock_attach_bpf(r5, 0x1, 0x19, 0x0, 0x3b) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1e, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg=0x7}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b000000000000000000000000800000000000", @ANYRESDEC=r1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000011008108090f9becdb4cb92e0a4831371400000069bd6efb2502eaf60d000300020400bf050005001201", 0x2e}], 0x1}, 0x0) 47.624756081s ago: executing program 1 (id=3795): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x16, 0x2, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801, 0x0, @perf_bp={0x0, 0x6}, 0x100000, 0xca, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000001}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d32, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x140) socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[@ANYRES8=r1, @ANYRES8=r5], 0x12) 47.44712776s ago: executing program 2 (id=3796): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x16, 0x2, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801, 0x0, @perf_bp={0x0, 0x6}, 0x100000, 0xca, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000001}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d32, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') syz_open_procfs$namespace(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x140) socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) syz_open_procfs$namespace(0x0, &(0x7f0000000380)='ns/uts\x00') recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[@ANYRES8=r1, @ANYRES8=r3], 0x12) 47.205732413s ago: executing program 0 (id=3797): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x16, 0x2, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801, 0x0, @perf_bp={0x0, 0x6}, 0x100000, 0xca, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000001}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d32, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x140) socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="85feff0fc9"], 0x0, 0x80, 0x0, 0x0, 0x0, 0x1}, 0x94) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[@ANYRES8=r1, @ANYRES8=r5], 0x12) 47.178593864s ago: executing program 3 (id=3798): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x1ff, 0x200}, 0x8000, 0xcdd, 0x43a1bd76, 0x4, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, 0x0, &(0x7f0000000c00)='GPL\x00'}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8fff0ff79a4f0ff00000000b7060000ffffffff6d64050000000000650404000100000004"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001f80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa6, 0x0, 0x0, 0x10, 0x3}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x20e, 0xe40, 0xfd000004, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 47.164617575s ago: executing program 1 (id=3799): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000480)="5c00000012006bab9a3fe3d86e17aa0b046b876c1d0048380019001931a0e69ee517d34460bc06000000a701251e6182949a3651f60a84c9f4d4938037e70e4509c51c268811000000000000000000002571cd53b9851b30599980bc", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000002a00)=""/238, 0xee}, {0x0}, {&(0x7f0000003b00)=""/4130, 0x1022}, {&(0x7f0000003a40)=""/166, 0xa6}, {&(0x7f00000000c0)=""/117, 0x75}, {&(0x7f00000018c0)=""/99, 0x63}, {&(0x7f0000002b00)=""/234, 0xea}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/66, 0x42}, {&(0x7f0000000240)=""/182, 0xb6}], 0xa}, 0x0) 47.081280029s ago: executing program 2 (id=3800): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100000, 0x4, 0x2, 0x0, 0x80, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="fbe6bd8dfcdda5a210b8cfefbd66f459c7261b927d25d3cf74d2f7c97735eba47f606a290d18492592230700000000000000081fdbd921ed4db0e67c9d5ab1452445a1e0da5ac68b13f4afe2712eeaad350d07", 0x53}], 0x1}, 0x4000000) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0xe, 0x0, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x12100, 0xc8, 0x2, 0x8, 0x0, 0x10001, 0xa, 0x0, 0x800}, 0x0, 0x5, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00ff0200000000000000000001ffaaaaaa"], 0xfdef) 46.837520922s ago: executing program 2 (id=3801): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x16, 0x2, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801, 0x0, @perf_bp={0x0, 0x6}, 0x100000, 0xca, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000001}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d32, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x140) socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) syz_open_procfs$namespace(0x0, &(0x7f0000000380)='ns/uts\x00') recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[@ANYRES8=r1, @ANYRES8=r5], 0x12) 46.795009524s ago: executing program 0 (id=3802): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x44) ioctl$SIOCSIFHWADDR(r2, 0x541b, &(0x7f0000000340)={'veth0_virt_wifi\x00', @remote}) 46.752391166s ago: executing program 3 (id=3803): r0 = socket$kcm(0xa, 0x1, 0x106) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x24000059) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x40009, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0xffffffffffffffff, 0x3fff8000}, 0x0, 0xff, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_config_ext={0x0, 0x1000000}, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="10000000040000000800000008"], 0x50) close(0x3) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000001000)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000bc00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000400850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0x3100, 0x3100, &(0x7f0000000000), 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x3, 0x13, &(0x7f00000001c0)=ANY=[@ANYBLOB="18020000057700000000000000000000182ec0002020702500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb70200000800c309b70300002400"], 0x0, 0x5, 0x0, 0x0, 0x41000, 0xc}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000000540)={0x7, 0x80, 0xb, 0xc0, 0x7, 0x6, 0x0, 0x5, 0x100, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8, 0x1}, 0x8, 0x5, 0x6, 0x9, 0x7, 0x35b, 0x7, 0x0, 0x2, 0x0, 0x8}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) ioctl$SIOCSIFHWADDR(r4, 0x8b06, &(0x7f0000000080)={'wlan1\x00', @random="02000000000a"}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r7 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$kcm(0x10, 0x2, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) socket$kcm(0x28, 0x1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x0, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x34, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0x0, 0xffffffffffffffff, 0xa) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x20000001) r8 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000016000b63d25a80648c2594f90124fc60", 0x14}], 0x1}, 0x0) recvmsg$kcm(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000500)=""/114, 0x72}, {0x0, 0xffa1}], 0x3}, 0x120) perf_event_open$cgroup(0x0, r7, 0xc, r5, 0x0) socket$kcm(0xa, 0x2, 0x3a) recvmsg$unix(r6, 0x0, 0x3) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, 0x0, 0x0) 46.725211317s ago: executing program 1 (id=3804): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x16, 0x2, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801, 0x0, @perf_bp={0x0, 0x6}, 0x100000, 0xca, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000001}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d32, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x140) socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) syz_open_procfs$namespace(0x0, &(0x7f0000000380)='ns/uts\x00') recvmsg$unix(r0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="85feff0fc9"], 0x0, 0x80, 0x0, 0x0, 0x0, 0x1}, 0x94) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYRES8=r1, @ANYRES8=r4], 0x12) 46.452070891s ago: executing program 0 (id=3805): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r0, &(0x7f0000000b40)={&(0x7f0000000080)={0x2, 0x4e25, @remote}, 0x10, 0x0}, 0xfffe) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000280)=""/59, 0x3b}], 0x1, &(0x7f0000000680)=""/10, 0xa}, 0x40002000) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x900b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x2, 0x0, 0x2800, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0xc023, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50f, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0x100c, 0x7, 0x3ff, 0x5, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0x1, 0x2b4}, 0x0, 0x10000, 0x0, 0x0, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$kcm(0x10, 0x2, 0x4) socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000b40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000ac0)={&(0x7f0000000700)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000880)=[{&(0x7f0000000800)="36fda40a8ff475d3779f35bcc458f1f3656e29f89ded88d4196766955f9ef168181eaec640714ebac5c3b0a5609282e0e2b810a4b5679442e1085b2256feb3950e3a11b728a67c6af0834448d7cbf4a6182665b080a3df56f674acd5e9fad6ab980d1a0013185fb43e98d424", 0x6c}], 0x1, &(0x7f0000000a80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}], 0x20}, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8b07, &(0x7f0000000040)={'wlan1\x00', @random="8dffffff0600"}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4000000) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r4, &(0x7f0000000b40)={&(0x7f0000000400)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000000540)=[{&(0x7f0000002880)="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", 0x712}], 0x1, &(0x7f0000000100)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0xd}, @loopback}}}], 0x20}, 0xe900) sendmsg$inet(r4, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x44000) socket$kcm(0x10, 0x2, 0x0) r5 = socket$kcm(0x2, 0x922000000001, 0x106) setsockopt$sock_attach_bpf(r5, 0x1, 0x19, 0x0, 0x3b) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1e, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg=0x7}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b000000000000000000000000800000000000", @ANYRESDEC=r1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000011008108090f9becdb4cb92e0a4831371400000069bd6efb2502eaf60d000300020400bf050005001201", 0x2e}], 0x1}, 0x0) 46.382796045s ago: executing program 2 (id=3806): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x5, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x0, 0x4}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1e, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000c40)=[{0x0, 0x0, 0x0, 0xa}, {0x1, 0x0, 0x2}, {0x0, 0x80004, 0x10100, 0x3}], 0x10, 0x1}, 0x94) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000b05d25a806c8c6f94f90224fc60100002000a000200053582c137153e37000c0980fc0b10000300", 0x33fe0}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a, 0x10, &(0x7f0000000340), 0xd58495bc, 0x0, 0xffffffffffffffff, 0xffffffffffffff5b}, 0x42) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000100)=r4, 0x129) 46.311146429s ago: executing program 1 (id=3807): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000002000000b705000007f70000850000006900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001100)=ANY=[@ANYBLOB="b70200001a000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946e0ebc622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deda8e0400000000000000c61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7b148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1b2ef4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b74cd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f53d709959d7bd2f5cc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b36fb0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece010000000100000010223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f50714600fb6241c6e955031795b2c2f56411e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffff854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeedd005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4a7bce853249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8012392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccaca8154b8601213ee2296d2a27798c8ce2a305c0c8d1acf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e92604e1026e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c04701563816514f868a2b95319abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdff7f0000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977e37df17a321d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd52364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2c6aea1d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb89243a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a01040000a35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92de6b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000a5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f250054f84b0fccd4f810bce02322b489b79aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58f0225f3390343c12aa51810134d4b8123de6516737be55c06d9cdcfb1e20280e14700eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b19128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734137ff17320adda5867947257f164391c673b6079e65d7295eed164ca63e4ea26dceedb2ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a927de6f4c09f4b742e037381c85d2ec7bb2a8152f0d6a99a0370e0cbd65744eb2efd7b65f04aa7e72588757b9612bb4253a63bb303c0c68a07f115d104f2007237a4f771416741bfd63fdfe3ae6f8bea755d8b7202c2bbae137dc1c3cf40db74a4c1c219d8ddec8f91dae2cdea1353fe062830fa1d233296ec9d8317872257e154665485e7f31cdbfbf435517faf93015b57417d84b8bc8662e097d5ba55d02d48e1000000b81b6790062e61cd000000acb1b33c38ddd302e28e8e30b5c180d38bb1cd770195799c541a7481f5d34ca75d74b3833d399371c8f09f6745d0e43d46f7c82ff1b7d6c04467d083fc708348f35ae9bb9b78f2984a0ee55647d4c4a63c4f438fdec726e7d8228eaff2374b2300b9c35f4259e3452b2f53ee114bb8a6c0ea6fc89a55fef6673013d7dd4597660865423e978dd6e41e201bb3a584d6fe6f24e290613b677271603c558ee2021be29c4a06a057b2acc5bfd34898afac0d839079bbcb3acd43532563367ac8ae6c4379fb5fdcdab5fe55e1a3a521284209871216817338073cbc4ec9903725b788a25b5a6003b579b8f0e20d78be3d885557292971e65f4f1daefad2c5ccbca608b46406ffff25610c3cbae9f56cd47678f482e2c1f7cdfc5ce2a67c1545c1192f2ac3990f9c850788401469fbca801e73cd9efbcc6e44b2f414cdff5c49e706d699b5bfa75526f700c4e32611b826b2787f99532c02262a9c60e4b07a09377c38747c7f05e38b6db5d8cc625873af8fc5a7d362334c509f6bb4e36e1c9e08949679e0ed9f84e668588b9f1b21069bd5ffe263b1e6860c305d1faca4d6e4680ab6a6d491ecc97a904cc9c643e489d1a5f7d8a359bea93ba2d95bd3341d98d4918118e5f7b6fa6f603274c561f63ee337ad8d0017bbd1e17b5ce71a18c8572810029fe5d0ac2a661d8b346240c46f0223981cd53c067b65b579c144a4c918504888132a19a6a1702afb8646cf8fbcc5a4f5fbc072388f7bd7955138fc4919d78cfc5f2fd7dccf3a20896045698d2b6770773412029db69c099fda38be5f37adc5bd48f7f11b5632bb63fa18718c1a24e0bad8d21f51f6bf3fbd3786a00c4e8f8536f6af28c9b8cd210bc0e82112f9943fc0fa81c08e456983cbdd8d08053c128e122da8b7583cb1"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe2f, 0xffffff99, &(0x7f0000000100)="b9ff03316844268cb89e14f086dd65e0ffff00122c00631177fbac14030a44079f03fe8000ff80000000000000000008ffff3a050b038da1880b251810a59d943be3f4aed50ea5a6b8686731cb89ef77523c899b699eeaa0eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f7ff4000000000000000000", 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000380)="b101000000353b", &(0x7f0000000000), 0x0, 0x700}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b70800000c300000638af8ff00000000b5080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018240000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1f, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r5 = gettid() r6 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r6, 0x84, 0x6, &(0x7f0000000000), 0x84) sendmsg$unix(r4, &(0x7f0000000180)={&(0x7f0000000280)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {r5, 0xee01, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [r4]}}], 0x38, 0x800}, 0x40800) socketpair(0x1, 0x4, 0xe, &(0x7f00000003c0)) gettid() sendmsg$unix(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)="f50f26933e6bae5155406cbed6e98cc2f483dc217d4829ce7f575e9b8993b232766b138dc93dda55943a0aacc8f3d85fa989cd3250690c69e0335193609fd99ab1ed52499a354c49034ddf10e61e577f202f46936b563ddbdf675e2f8a923b3b4f8ad1ef9502496dc5bd68fb6a52edaa5892f1a3324cb1aec1c49aa8f60360d2b45ff48fffefcc67f1e8858b5a2592d1365d6269efa2a72f522ddc65757a64b47842f2cfe577b7770848b35e0dcc697c5a5b70a2a08e0cf8b2c98fe2f53b366e68d0a6bc52d98251d37c", 0xca}, {&(0x7f0000000200)="74410ba152e1a7b526a2ea30ccb2e2a2694eddd2c3d2e5440b6ad02ed3fc0c37b41dc66d8d01a7d1d3ec510898c10dfb762ab6660203fe17832e49505b17c526041e", 0x42}], 0x2, &(0x7f0000000600), 0x0, 0x2004c011}, 0x8000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002e00)={r0, &(0x7f0000001d00)="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", &(0x7f0000002d00)=""/196}, 0x20) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000400)={r2, 0x0, 0x0}, 0x10) 46.197423174s ago: executing program 3 (id=3808): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x16, 0x2, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801, 0x0, @perf_bp={0x0, 0x6}, 0x100000, 0xca, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000001}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d32, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x140) socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[@ANYRES8=r1, @ANYRES8=r5], 0x12) 38.394664174s ago: executing program 1 (id=3809): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x16, 0x2, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801, 0x0, @perf_bp={0x0, 0x6}, 0x100000, 0xca, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000001}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d32, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x140) socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) syz_open_procfs$namespace(0x0, &(0x7f0000000380)='ns/uts\x00') recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[@ANYRES8=r1, @ANYRES8=r3], 0x12) 36.597547176s ago: executing program 0 (id=3810): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x16, 0x2, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801, 0x0, @perf_bp={0x0, 0x6}, 0x100000, 0xca, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000001}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d32, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x140) socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="85feff0fc9"], 0x0, 0x80, 0x0, 0x0, 0x0, 0x1}, 0x94) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[@ANYRES8=r1, @ANYRES8=r5], 0x12) 28.295529551s ago: executing program 32 (id=3806): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x5, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x0, 0x4}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1e, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000c40)=[{0x0, 0x0, 0x0, 0xa}, {0x1, 0x0, 0x2}, {0x0, 0x80004, 0x10100, 0x3}], 0x10, 0x1}, 0x94) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000b05d25a806c8c6f94f90224fc60100002000a000200053582c137153e37000c0980fc0b10000300", 0x33fe0}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a, 0x10, &(0x7f0000000340), 0xd58495bc, 0x0, 0xffffffffffffffff, 0xffffffffffffff5b}, 0x42) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000100)=r4, 0x129) 17.77089167s ago: executing program 33 (id=3808): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x16, 0x2, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801, 0x0, @perf_bp={0x0, 0x6}, 0x100000, 0xca, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000001}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d32, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x140) socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[@ANYRES8=r1, @ANYRES8=r5], 0x12) 12.457460153s ago: executing program 34 (id=3810): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x16, 0x2, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801, 0x0, @perf_bp={0x0, 0x6}, 0x100000, 0xca, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000001}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d32, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x140) socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="85feff0fc9"], 0x0, 0x80, 0x0, 0x0, 0x0, 0x1}, 0x94) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[@ANYRES8=r1, @ANYRES8=r5], 0x12) 0s ago: executing program 35 (id=3809): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x16, 0x2, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801, 0x0, @perf_bp={0x0, 0x6}, 0x100000, 0xca, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000001}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d32, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x140) socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) syz_open_procfs$namespace(0x0, &(0x7f0000000380)='ns/uts\x00') recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[@ANYRES8=r1, @ANYRES8=r3], 0x12) kernel console output (not intermixed with test programs): wn node [ 409.259920][T14835] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 410.164968][T14856] netlink: 128 bytes leftover after parsing attributes in process `syz.2.3017'. [ 410.227189][T14856] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 410.667780][ T5082] Bluetooth: hci4: Opcode 0x0c03 failed: -110 [ 411.978323][T14894] validate_nla: 9 callbacks suppressed [ 411.978339][T14894] netlink: 'syz.3.3030': attribute type 29 has an invalid length. [ 411.992769][T14894] netlink: 'syz.3.3030': attribute type 29 has an invalid length. [ 412.003427][T14894] netlink: 'syz.3.3030': attribute type 29 has an invalid length. [ 412.055684][T14894] netlink: 'syz.3.3030': attribute type 29 has an invalid length. [ 412.244443][T14903] netlink: 128 bytes leftover after parsing attributes in process `syz.3.3035'. [ 412.264887][T14903] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 412.661042][T14921] netlink: 'syz.0.3042': attribute type 29 has an invalid length. [ 412.703675][T14921] netlink: 'syz.0.3042': attribute type 29 has an invalid length. [ 412.738426][T14921] netlink: 'syz.0.3042': attribute type 29 has an invalid length. [ 412.756985][T14921] netlink: 'syz.0.3042': attribute type 29 has an invalid length. [ 412.974914][T14933] syzkaller0: entered promiscuous mode [ 412.985795][T14933] syzkaller0: entered allmulticast mode [ 413.014340][T14933] syzkaller0: create flow: hash 402684513 index 0 [ 413.666409][T14954] netlink: 'syz.3.3055': attribute type 29 has an invalid length. [ 415.318014][T14954] netlink: 'syz.3.3055': attribute type 29 has an invalid length. [ 415.347566][T14932] syzkaller0 (unregistered): delete flow: hash 402684513 index 0 [ 415.613967][T14984] FAULT_INJECTION: forcing a failure. [ 415.613967][T14984] name failslab, interval 1, probability 0, space 0, times 0 [ 415.639313][T14984] CPU: 0 PID: 14984 Comm: syz.1.3065 Not tainted syzkaller #0 [ 415.646837][T14984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 415.657355][T14984] Call Trace: [ 415.660836][T14984] [ 415.663996][T14984] dump_stack_lvl+0x18c/0x250 [ 415.668725][T14984] ? show_regs_print_info+0x20/0x20 [ 415.673925][T14984] ? load_image+0x420/0x420 [ 415.678616][T14984] ? __might_sleep+0xe0/0xe0 [ 415.683377][T14984] ? __lock_acquire+0x7d40/0x7d40 [ 415.688856][T14984] should_fail_ex+0x39d/0x4d0 [ 415.693777][T14984] should_failslab+0x9/0x20 [ 415.698489][T14984] slab_pre_alloc_hook+0x59/0x310 [ 415.703530][T14984] kmem_cache_alloc+0x5a/0x2d0 [ 415.708295][T14984] ? sk_prot_alloc+0x57/0x210 [ 415.713175][T14984] sk_prot_alloc+0x57/0x210 [ 415.718003][T14984] ? sk_alloc+0x24/0x360 [ 415.722577][T14984] sk_alloc+0x3a/0x360 [ 415.727469][T14984] inet6_create+0x7f0/0x11d0 [ 415.732357][T14984] ? inet6_create+0x83/0x11d0 [ 415.737235][T14984] __sock_create+0x4a6/0x940 [ 415.742032][T14984] mptcp_subflow_create_socket+0x10b/0xac0 [ 415.747848][T14984] ? mark_lock+0x94/0x320 [ 415.752252][T14984] ? __mptcp_subflow_connect+0x1450/0x1450 [ 415.758318][T14984] ? lock_chain_count+0x20/0x20 [ 415.763378][T14984] __mptcp_nmpc_sk+0x157/0x740 [ 415.768693][T14984] ? __local_bh_enable_ip+0x13a/0x1c0 [ 415.774356][T14984] ? __bpf_trace_subflow_check_data_avail+0x160/0x160 [ 415.781600][T14984] mptcp_setsockopt+0xe7a/0x3390 [ 415.786784][T14984] ? __fget_files+0x28/0x4b0 [ 415.791772][T14984] ? pm_nl_exit_net+0x230/0x230 [ 415.796806][T14984] ? aa_af_perm+0x330/0x330 [ 415.801323][T14984] ? __fget_files+0x28/0x4b0 [ 415.806037][T14984] ? __fget_files+0x28/0x4b0 [ 415.810718][T14984] ? aa_sock_opt_perm+0x74/0x100 [ 415.815936][T14984] ? sock_common_setsockopt+0x36/0xc0 [ 415.821319][T14984] ? sock_common_recvmsg+0x190/0x190 [ 415.826784][T14984] do_sock_setsockopt+0x175/0x1a0 [ 415.831906][T14984] ? __fdget+0x180/0x210 [ 415.836238][T14984] __x64_sys_setsockopt+0x182/0x200 [ 415.841707][T14984] do_syscall_64+0x55/0xa0 [ 415.846212][T14984] ? clear_bhb_loop+0x40/0x90 [ 415.851245][T14984] ? clear_bhb_loop+0x40/0x90 [ 415.856107][T14984] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 415.862274][T14984] RIP: 0033:0x7f7f2919c819 [ 415.866947][T14984] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 415.887751][T14984] RSP: 002b:00007f7f2a02d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 415.896375][T14984] RAX: ffffffffffffffda RBX: 00007f7f29415fa0 RCX: 00007f7f2919c819 [ 415.905485][T14984] RDX: 000000000000004e RSI: 0000000000000029 RDI: 0000000000000003 [ 415.914350][T14984] RBP: 00007f7f2a02d090 R08: 0000000000004000 R09: 0000000000000000 [ 415.922957][T14984] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 415.931302][T14984] R13: 00007f7f29416038 R14: 00007f7f29415fa0 R15: 00007ffd46859b28 [ 415.939464][T14984] [ 415.986316][T14986] netlink: 209852 bytes leftover after parsing attributes in process `syz.3.3068'. [ 416.369635][T15003] netlink: 17255 bytes leftover after parsing attributes in process `syz.0.3076'. [ 417.067243][T15013] validate_nla: 5 callbacks suppressed [ 417.067262][T15013] netlink: 'syz.3.3080': attribute type 29 has an invalid length. [ 417.104449][T15013] netlink: 'syz.3.3080': attribute type 29 has an invalid length. [ 417.114536][T15013] netlink: 'syz.3.3080': attribute type 29 has an invalid length. [ 417.123250][T15013] netlink: 'syz.3.3080': attribute type 29 has an invalid length. [ 417.169270][T15017] netlink: 209852 bytes leftover after parsing attributes in process `syz.1.3082'. [ 417.832171][T15048] netlink: 'syz.3.3097': attribute type 4 has an invalid length. [ 417.840707][T15048] netlink: 152 bytes leftover after parsing attributes in process `syz.3.3097'. [ 417.857708][T15048] A link change request failed with some changes committed already. Interface hsr_slave_1 may have been left with an inconsistent configuration, please check. [ 417.903663][T15049] netlink: 209852 bytes leftover after parsing attributes in process `syz.0.3094'. [ 418.038096][T15056] netlink: 14 bytes leftover after parsing attributes in process `syz.3.3097'. [ 418.057012][T15056] netlink: del zone limit has 4 unknown bytes [ 418.423561][T15068] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 418.455728][T15068] netlink: 'syz.1.3105': attribute type 10 has an invalid length. [ 418.498052][T15075] FAULT_INJECTION: forcing a failure. [ 418.498052][T15075] name failslab, interval 1, probability 0, space 0, times 0 [ 418.521168][T15075] CPU: 0 PID: 15075 Comm: syz.2.3107 Not tainted syzkaller #0 [ 418.528959][T15075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 418.539043][T15075] Call Trace: [ 418.542526][T15075] [ 418.545576][T15075] dump_stack_lvl+0x18c/0x250 [ 418.550640][T15075] ? show_regs_print_info+0x20/0x20 [ 418.556057][T15075] ? load_image+0x420/0x420 [ 418.560684][T15075] ? __might_sleep+0xe0/0xe0 [ 418.565497][T15075] ? __lock_acquire+0x7d40/0x7d40 [ 418.570726][T15075] ? __asan_memset+0x22/0x40 [ 418.575693][T15075] should_fail_ex+0x39d/0x4d0 [ 418.580856][T15075] should_failslab+0x9/0x20 [ 418.585394][T15075] slab_pre_alloc_hook+0x59/0x310 [ 418.590556][T15075] kmem_cache_alloc+0x5a/0x2d0 [ 418.595428][T15075] ? security_inode_alloc+0x34/0x110 [ 418.600734][T15075] security_inode_alloc+0x34/0x110 [ 418.605864][T15075] inode_init_always+0x8fc/0xc90 [ 418.610822][T15075] new_inode_pseudo+0x95/0x1d0 [ 418.615772][T15075] __sock_create+0x12d/0x940 [ 418.620464][T15075] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 418.626738][T15075] __sys_socket+0xd7/0x1a0 [ 418.631344][T15075] __x64_sys_socket+0x7a/0x90 [ 418.636039][T15075] do_syscall_64+0x55/0xa0 [ 418.640466][T15075] ? clear_bhb_loop+0x40/0x90 [ 418.645149][T15075] ? clear_bhb_loop+0x40/0x90 [ 418.649924][T15075] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 418.656003][T15075] RIP: 0033:0x7f704499c819 [ 418.660533][T15075] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 418.680514][T15075] RSP: 002b:00007f704581e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 418.689130][T15075] RAX: ffffffffffffffda RBX: 00007f7044c15fa0 RCX: 00007f704499c819 [ 418.697394][T15075] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000025 [ 418.706083][T15075] RBP: 00007f704581e090 R08: 0000000000000000 R09: 0000000000000000 [ 418.714338][T15075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 418.722684][T15075] R13: 00007f7044c16038 R14: 00007f7044c15fa0 R15: 00007ffc483c8808 [ 418.730682][T15075] [ 418.781321][T15075] socket: no more sockets [ 418.793021][T15077] netlink: 'syz.0.3108': attribute type 29 has an invalid length. [ 418.801802][T15077] netlink: 'syz.0.3108': attribute type 29 has an invalid length. [ 418.812131][T15077] netlink: 'syz.0.3108': attribute type 29 has an invalid length. [ 418.821071][T15077] netlink: 'syz.0.3108': attribute type 29 has an invalid length. [ 419.184311][T15091] netlink: 209852 bytes leftover after parsing attributes in process `syz.2.3114'. [ 419.287796][T15097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 419.351560][T15097] team0: Port device bond0 added [ 419.598061][T15108] FAULT_INJECTION: forcing a failure. [ 419.598061][T15108] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 419.648917][T15108] CPU: 0 PID: 15108 Comm: syz.2.3120 Not tainted syzkaller #0 [ 419.656701][T15108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 419.667741][T15108] Call Trace: [ 419.671657][T15108] [ 419.674621][T15108] dump_stack_lvl+0x18c/0x250 [ 419.679347][T15108] ? show_regs_print_info+0x20/0x20 [ 419.684732][T15108] ? load_image+0x420/0x420 [ 419.689895][T15108] ? __might_fault+0xaa/0x120 [ 419.694875][T15108] ? __lock_acquire+0x7d40/0x7d40 [ 419.700040][T15108] should_fail_ex+0x39d/0x4d0 [ 419.704911][T15108] _copy_from_user+0x2f/0xe0 [ 419.709983][T15108] ___sys_sendmsg+0x1c7/0x360 [ 419.714694][T15108] ? get_pid_task+0x20/0x1e0 [ 419.719559][T15108] ? __sys_sendmsg+0x2a0/0x2a0 [ 419.724749][T15108] ? __lock_acquire+0x7d40/0x7d40 [ 419.730029][T15108] __se_sys_sendmsg+0x1c2/0x2b0 [ 419.735192][T15108] ? __x64_sys_sendmsg+0x80/0x80 [ 419.740250][T15108] ? lockdep_hardirqs_on+0x98/0x150 [ 419.745572][T15108] do_syscall_64+0x55/0xa0 [ 419.750109][T15108] ? clear_bhb_loop+0x40/0x90 [ 419.754899][T15108] ? clear_bhb_loop+0x40/0x90 [ 419.760032][T15108] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 419.766454][T15108] RIP: 0033:0x7f704499c819 [ 419.771155][T15108] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 419.792132][T15108] RSP: 002b:00007f704581e028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 419.801015][T15108] RAX: ffffffffffffffda RBX: 00007f7044c15fa0 RCX: 00007f704499c819 [ 419.809711][T15108] RDX: 0000000000000084 RSI: 0000200000000600 RDI: 0000000000000003 [ 419.817875][T15108] RBP: 00007f704581e090 R08: 0000000000000000 R09: 0000000000000000 [ 419.826052][T15108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 419.834315][T15108] R13: 00007f7044c16038 R14: 00007f7044c15fa0 R15: 00007ffc483c8808 [ 419.842767][T15108] [ 421.010187][T15168] FAULT_INJECTION: forcing a failure. [ 421.010187][T15168] name failslab, interval 1, probability 0, space 0, times 0 [ 421.024682][T15168] CPU: 0 PID: 15168 Comm: syz.3.3143 Not tainted syzkaller #0 [ 421.032705][T15168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 421.043700][T15168] Call Trace: [ 421.047352][T15168] [ 421.050655][T15168] dump_stack_lvl+0x18c/0x250 [ 421.055474][T15168] ? show_regs_print_info+0x20/0x20 [ 421.060805][T15168] ? load_image+0x420/0x420 [ 421.065784][T15168] ? __might_sleep+0xe0/0xe0 [ 421.070587][T15168] ? __lock_acquire+0x7d40/0x7d40 [ 421.075907][T15168] should_fail_ex+0x39d/0x4d0 [ 421.080802][T15168] should_failslab+0x9/0x20 [ 421.085526][T15168] slab_pre_alloc_hook+0x59/0x310 [ 421.090685][T15168] ? __lock_acquire+0x7d40/0x7d40 [ 421.095828][T15168] ? trace_contention_end+0x39/0xe0 [ 421.101154][T15168] ? nf_nat_masq_schedule+0x246/0x560 [ 421.107356][T15168] __kmem_cache_alloc_node+0x53/0x250 [ 421.113877][T15168] ? nf_nat_masq_schedule+0x246/0x560 [ 421.119937][T15168] kmalloc_trace+0x2a/0xe0 [ 421.124654][T15168] nf_nat_masq_schedule+0x246/0x560 [ 421.130157][T15168] ? mutex_unlock+0x10/0x10 [ 421.135778][T15168] ? nf_nat_masq_schedule+0x560/0x560 [ 421.141759][T15168] ? masq_device_event+0xd0/0xd0 [ 421.147360][T15168] ? nfqnl_rcv_dev_event+0xb1/0x770 [ 421.153009][T15168] masq_device_event+0xa2/0xd0 [ 421.158164][T15168] notifier_call_chain+0x197/0x380 [ 421.164000][T15168] __dev_notify_flags+0x16e/0x310 [ 421.169409][T15168] ? __dev_change_flags+0x6a0/0x6a0 [ 421.175347][T15168] ? __dev_change_flags+0x4d4/0x6a0 [ 421.180897][T15168] ? dev_get_flags+0x1c0/0x1c0 [ 421.185891][T15168] ? _raw_spin_unlock_irqrestore+0x86/0x120 [ 421.192227][T15168] ? lockdep_hardirqs_on+0x98/0x150 [ 421.197745][T15168] ? _raw_spin_unlock_irqrestore+0xc5/0x120 [ 421.203870][T15168] ? _raw_spin_unlock+0x40/0x40 [ 421.209294][T15168] dev_change_flags+0xe8/0x1a0 [ 421.214289][T15168] do_setlink+0xc58/0x4130 [ 421.218758][T15168] ? arch_stack_walk+0x160/0x190 [ 421.223822][T15168] ? radix_tree_cpu_dead+0x160/0x160 [ 421.229500][T15168] ? nlmsg_parse_deprecated_strict+0x110/0x110 [ 421.236907][T15168] ? stack_trace_save+0xaa/0x100 [ 421.241896][T15168] ? __nla_validate_parse+0x2522/0x2ea0 [ 421.247770][T15168] ? __nla_validate+0x50/0x50 [ 421.252780][T15168] ? validate_linkmsg+0x719/0x910 [ 421.257938][T15168] rtnl_newlink+0x17da/0x20a0 [ 421.263135][T15168] ? rtnl_newlink+0x481/0x20a0 [ 421.267985][T15168] ? rtnl_setlink+0x4e0/0x4e0 [ 421.272963][T15168] ? trace_raw_output_contention_end+0xd0/0xd0 [ 421.279538][T15168] ? rcu_is_watching+0x15/0xb0 [ 421.284482][T15168] ? trace_contention_end+0x39/0xe0 [ 421.289973][T15168] ? __mutex_lock+0x315/0xcc0 [ 421.294793][T15168] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 421.299941][T15168] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 421.305436][T15168] ? rtnl_setlink+0x4e0/0x4e0 [ 421.310238][T15168] rtnetlink_rcv_msg+0x869/0xfa0 [ 421.315480][T15168] ? lockdep_hardirqs_on+0x98/0x150 [ 421.320714][T15168] ? rtnetlink_bind+0x80/0x80 [ 421.325764][T15168] ? perf_trace_preemptirq_template+0xac/0x330 [ 421.332772][T15168] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 421.338856][T15168] ? lock_chain_count+0x20/0x20 [ 421.343753][T15168] ? __local_bh_enable_ip+0x13a/0x1c0 [ 421.349444][T15168] ? lockdep_hardirqs_on+0x98/0x150 [ 421.354747][T15168] ? __local_bh_enable_ip+0x13a/0x1c0 [ 421.360296][T15168] ? _local_bh_enable+0xa0/0xa0 [ 421.365153][T15168] ? __dev_queue_xmit+0x265/0x3660 [ 421.370578][T15168] ? __dev_queue_xmit+0x265/0x3660 [ 421.375737][T15168] ? __dev_queue_xmit+0x1b2c/0x3660 [ 421.380962][T15168] ? __dev_queue_xmit+0x265/0x3660 [ 421.386120][T15168] ? ref_tracker_free+0x690/0x840 [ 421.391153][T15168] netlink_rcv_skb+0x241/0x4d0 [ 421.396024][T15168] ? rtnetlink_bind+0x80/0x80 [ 421.401093][T15168] ? netlink_ack+0x1180/0x1180 [ 421.406144][T15168] ? __lock_acquire+0x7d40/0x7d40 [ 421.411301][T15168] ? netlink_deliver_tap+0x2e/0x1b0 [ 421.416792][T15168] netlink_unicast+0x751/0x8d0 [ 421.421826][T15168] netlink_sendmsg+0x8d0/0xbf0 [ 421.427046][T15168] ? netlink_getsockopt+0x590/0x590 [ 421.432508][T15168] ? aa_sock_msg_perm+0x94/0x150 [ 421.437634][T15168] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 421.443110][T15168] ? security_socket_sendmsg+0x80/0xa0 [ 421.448671][T15168] ? netlink_getsockopt+0x590/0x590 [ 421.454242][T15168] ____sys_sendmsg+0x5ba/0x960 [ 421.459190][T15168] ? __asan_memset+0x22/0x40 [ 421.463798][T15168] ? __sys_sendmsg_sock+0x30/0x30 [ 421.468910][T15168] ? __import_iovec+0x3fa/0x850 [ 421.473968][T15168] ? import_iovec+0x73/0xa0 [ 421.478667][T15168] ___sys_sendmsg+0x2a6/0x360 [ 421.483616][T15168] ? get_pid_task+0x20/0x1e0 [ 421.488584][T15168] ? __sys_sendmsg+0x2a0/0x2a0 [ 421.493472][T15168] ? __lock_acquire+0x7d40/0x7d40 [ 421.498781][T15168] __se_sys_sendmsg+0x1c2/0x2b0 [ 421.503669][T15168] ? __x64_sys_sendmsg+0x80/0x80 [ 421.508812][T15168] ? lockdep_hardirqs_on+0x98/0x150 [ 421.514491][T15168] do_syscall_64+0x55/0xa0 [ 421.519456][T15168] ? clear_bhb_loop+0x40/0x90 [ 421.524242][T15168] ? clear_bhb_loop+0x40/0x90 [ 421.529037][T15168] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 421.535038][T15168] RIP: 0033:0x7f8ef299c819 [ 421.539481][T15168] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 421.560440][T15168] RSP: 002b:00007f8ef3931028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 421.568994][T15168] RAX: ffffffffffffffda RBX: 00007f8ef2c15fa0 RCX: 00007f8ef299c819 [ 421.577157][T15168] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000003 [ 421.585508][T15168] RBP: 00007f8ef3931090 R08: 0000000000000000 R09: 0000000000000000 [ 421.593958][T15168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 421.602028][T15168] R13: 00007f8ef2c16038 R14: 00007f8ef2c15fa0 R15: 00007ffee0f513f8 [ 421.610105][T15168] [ 421.676703][T15168] team0: Port device netdevsim0 added [ 422.214881][T15201] validate_nla: 19 callbacks suppressed [ 422.214900][T15201] netlink: 'syz.1.3154': attribute type 10 has an invalid length. [ 422.284881][T15201] team0: Port device netdevsim0 added [ 422.348671][T15207] netlink: 'syz.0.3158': attribute type 10 has an invalid length. [ 422.388409][T15207] syz_tun: entered promiscuous mode [ 422.423719][T15207] bond0: (slave syz_tun): Enslaving as an active interface with an up link [ 422.514530][T15213] netlink: 'syz.1.3160': attribute type 29 has an invalid length. [ 422.528060][T15213] netlink: 'syz.1.3160': attribute type 29 has an invalid length. [ 422.538586][T15213] netlink: 'syz.1.3160': attribute type 29 has an invalid length. [ 422.547432][T15213] netlink: 'syz.1.3160': attribute type 29 has an invalid length. [ 422.618309][T15215] netlink: 'syz.1.3161': attribute type 10 has an invalid length. [ 423.120484][T15234] netlink: 'syz.1.3169': attribute type 29 has an invalid length. [ 423.129401][T15234] netlink: 'syz.1.3169': attribute type 29 has an invalid length. [ 423.139680][T15234] netlink: 'syz.1.3169': attribute type 29 has an invalid length. [ 423.183429][T15236] netlink: 161700 bytes leftover after parsing attributes in process `syz.2.3170'. [ 423.231650][T15239] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3171'. [ 423.241250][T15239] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3171'. [ 424.318261][T15283] pim6reg0: tun_chr_ioctl cmd 1074025676 [ 424.324252][T15283] pim6reg0: owner set to 0 [ 424.441100][T15292] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3191'. [ 424.525612][T15292] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3191'. [ 424.887924][T15309] team0: Port device netdevsim0 added [ 425.286764][T15326] FAULT_INJECTION: forcing a failure. [ 425.286764][T15326] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 425.301576][T15326] CPU: 0 PID: 15326 Comm: syz.1.3206 Not tainted syzkaller #0 [ 425.309344][T15326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 425.319861][T15326] Call Trace: [ 425.323249][T15326] [ 425.326300][T15326] dump_stack_lvl+0x18c/0x250 [ 425.331196][T15326] ? show_regs_print_info+0x20/0x20 [ 425.336606][T15326] ? load_image+0x420/0x420 [ 425.341589][T15326] ? __lock_acquire+0x7d40/0x7d40 [ 425.346831][T15326] should_fail_ex+0x39d/0x4d0 [ 425.351563][T15326] _copy_from_user+0x2f/0xe0 [ 425.356198][T15326] __copy_msghdr+0x3bb/0x580 [ 425.361088][T15326] ___sys_sendmsg+0x214/0x360 [ 425.365941][T15326] ? get_pid_task+0x20/0x1e0 [ 425.370651][T15326] ? __sys_sendmsg+0x2a0/0x2a0 [ 425.375463][T15326] ? __lock_acquire+0x7d40/0x7d40 [ 425.380726][T15326] __se_sys_sendmsg+0x1c2/0x2b0 [ 425.385785][T15326] ? __x64_sys_sendmsg+0x80/0x80 [ 425.391213][T15326] ? lockdep_hardirqs_on+0x98/0x150 [ 425.396751][T15326] do_syscall_64+0x55/0xa0 [ 425.401286][T15326] ? clear_bhb_loop+0x40/0x90 [ 425.406473][T15326] ? clear_bhb_loop+0x40/0x90 [ 425.411191][T15326] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 425.417337][T15326] RIP: 0033:0x7f7f2919c819 [ 425.421871][T15326] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 425.441940][T15326] RSP: 002b:00007f7f2a02d028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 425.450500][T15326] RAX: ffffffffffffffda RBX: 00007f7f29415fa0 RCX: 00007f7f2919c819 [ 425.458586][T15326] RDX: 000000000000ff00 RSI: 0000200000000000 RDI: 0000000000000003 [ 425.466777][T15326] RBP: 00007f7f2a02d090 R08: 0000000000000000 R09: 0000000000000000 [ 425.474854][T15326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 425.483032][T15326] R13: 00007f7f29416038 R14: 00007f7f29415fa0 R15: 00007ffd46859b28 [ 425.491303][T15326] [ 425.516025][T15331] IPv6: NLM_F_CREATE should be specified when creating new route [ 425.536302][T15331] netlink: 1 bytes leftover after parsing attributes in process `syz.0.3207'. [ 426.305374][T15359] syz_tun: entered promiscuous mode [ 426.343850][T15359] bond0: (slave syz_tun): Enslaving as an active interface with an up link [ 426.759897][T15375] netlink: 209852 bytes leftover after parsing attributes in process `syz.0.3218'. [ 427.451945][T15406] raw_sendmsg: syz.3.3232 forgot to set AF_INET. Fix it! [ 427.732950][T15415] netlink: 123072 bytes leftover after parsing attributes in process `syz.1.3236'. [ 428.181408][T15427] FAULT_INJECTION: forcing a failure. [ 428.181408][T15427] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 428.215847][T15427] CPU: 1 PID: 15427 Comm: syz.3.3242 Not tainted syzkaller #0 [ 428.223376][T15427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 428.233730][T15427] Call Trace: [ 428.237031][T15427] [ 428.239990][T15427] dump_stack_lvl+0x18c/0x250 [ 428.244976][T15427] ? show_regs_print_info+0x20/0x20 [ 428.250462][T15427] ? load_image+0x420/0x420 [ 428.255096][T15427] ? __might_fault+0xaa/0x120 [ 428.260121][T15427] ? __lock_acquire+0x7d40/0x7d40 [ 428.265448][T15427] should_fail_ex+0x39d/0x4d0 [ 428.270377][T15427] _copy_to_user+0x2f/0xa0 [ 428.275440][T15427] bpf_task_fd_query_copy+0x2a7/0x410 [ 428.281222][T15427] bpf_task_fd_query+0x607/0x6d0 [ 428.286318][T15427] ? bpf_task_fd_query+0x18f/0x6d0 [ 428.291467][T15427] ? bpf_btf_get_fd_by_id+0x80/0x80 [ 428.296888][T15427] ? __lock_acquire+0x7d40/0x7d40 [ 428.302116][T15427] ? __might_fault+0xaa/0x120 [ 428.307019][T15427] ? __might_fault+0xc6/0x120 [ 428.311838][T15427] ? __might_fault+0xaa/0x120 [ 428.317133][T15427] ? bpf_lsm_bpf+0x9/0x10 [ 428.322190][T15427] ? security_bpf+0x7e/0xa0 [ 428.326995][T15427] __sys_bpf+0x6cc/0x890 [ 428.331366][T15427] ? bpf_link_show_fdinfo+0x390/0x390 [ 428.336794][T15427] ? lock_chain_count+0x20/0x20 [ 428.342073][T15427] __x64_sys_bpf+0x7c/0x90 [ 428.346692][T15427] do_syscall_64+0x55/0xa0 [ 428.351143][T15427] ? clear_bhb_loop+0x40/0x90 [ 428.356384][T15427] ? clear_bhb_loop+0x40/0x90 [ 428.361663][T15427] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 428.367844][T15427] RIP: 0033:0x7f8ef299c819 [ 428.372285][T15427] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 428.392007][T15427] RSP: 002b:00007f8ef3931028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 428.400442][T15427] RAX: ffffffffffffffda RBX: 00007f8ef2c15fa0 RCX: 00007f8ef299c819 [ 428.408530][T15427] RDX: 0000000000000012 RSI: 0000200000000340 RDI: 0000000000000014 [ 428.416518][T15427] RBP: 00007f8ef3931090 R08: 0000000000000000 R09: 0000000000000000 [ 428.425077][T15427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 428.433299][T15427] R13: 00007f8ef2c16038 R14: 00007f8ef2c15fa0 R15: 00007ffee0f513f8 [ 428.441659][T15427] [ 428.651612][T15441] netlink: 16410 bytes leftover after parsing attributes in process `syz.3.3246'. [ 429.090323][T15455] validate_nla: 15 callbacks suppressed [ 429.090362][T15455] netlink: 'syz.2.3252': attribute type 3 has an invalid length. [ 429.106494][T15450] FAULT_INJECTION: forcing a failure. [ 429.106494][T15450] name failslab, interval 1, probability 0, space 0, times 0 [ 429.125335][T15455] netlink: 130984 bytes leftover after parsing attributes in process `syz.2.3252'. [ 429.135241][T15450] CPU: 0 PID: 15450 Comm: syz.3.3250 Not tainted syzkaller #0 [ 429.135293][T15450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 429.135304][T15450] Call Trace: [ 429.135311][T15450] [ 429.135318][T15450] dump_stack_lvl+0x18c/0x250 [ 429.135353][T15450] ? show_regs_print_info+0x20/0x20 [ 429.135377][T15450] ? load_image+0x420/0x420 [ 429.135402][T15450] ? __might_sleep+0xe0/0xe0 [ 429.135423][T15450] ? __lock_acquire+0x7d40/0x7d40 [ 429.135447][T15450] should_fail_ex+0x39d/0x4d0 [ 429.135478][T15450] should_failslab+0x9/0x20 [ 429.135501][T15450] slab_pre_alloc_hook+0x59/0x310 [ 429.135527][T15450] ? tomoyo_encode+0x28b/0x540 [ 429.135545][T15450] ? tomoyo_encode+0x28b/0x540 [ 429.135561][T15450] __kmem_cache_alloc_node+0x53/0x250 [ 429.135588][T15450] ? tomoyo_encode+0x28b/0x540 [ 429.135604][T15450] __kmalloc+0xa4/0x230 [ 429.135629][T15450] tomoyo_encode+0x28b/0x540 [ 429.135651][T15450] tomoyo_realpath_from_path+0x592/0x5d0 [ 429.135682][T15450] tomoyo_path_number_perm+0x248/0x620 [ 429.135707][T15450] ? tomoyo_path_number_perm+0x217/0x620 [ 429.135731][T15450] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 429.135754][T15450] ? trace_call_bpf+0xc3/0x6c0 [ 429.135777][T15450] ? trace_call_bpf+0xc3/0x6c0 [ 429.135800][T15450] ? trace_call_bpf+0x5e9/0x6c0 [ 429.135860][T15450] ? __fget_files+0x28/0x4b0 [ 429.135881][T15450] ? __fget_files+0x28/0x4b0 [ 429.135914][T15450] security_file_ioctl+0x70/0xa0 [ 429.135933][T15450] __se_sys_ioctl+0x48/0x170 [ 429.135957][T15450] do_syscall_64+0x55/0xa0 [ 429.135971][T15450] ? clear_bhb_loop+0x40/0x90 [ 429.135991][T15450] ? clear_bhb_loop+0x40/0x90 [ 429.136012][T15450] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 429.136031][T15450] RIP: 0033:0x7f8ef299c819 [ 429.136048][T15450] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 429.136062][T15450] RSP: 002b:00007f8ef3931028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 429.136083][T15450] RAX: ffffffffffffffda RBX: 00007f8ef2c15fa0 RCX: 00007f8ef299c819 [ 429.136097][T15450] RDX: 0000200000000080 RSI: 0000000000008941 RDI: 0000000000000007 [ 429.136108][T15450] RBP: 00007f8ef3931090 R08: 0000000000000000 R09: 0000000000000000 [ 429.136119][T15450] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 429.136129][T15450] R13: 00007f8ef2c16038 R14: 00007f8ef2c15fa0 R15: 00007ffee0f513f8 [ 429.136157][T15450] [ 429.137361][T15450] ERROR: Out of memory at tomoyo_realpath_from_path. [ 429.170159][T15456] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3252'. [ 429.424546][T15467] netlink: 48 bytes leftover after parsing attributes in process `syz.1.3254'. [ 429.463286][T15467] FAULT_INJECTION: forcing a failure. [ 429.463286][T15467] name failslab, interval 1, probability 0, space 0, times 0 [ 429.487674][T15467] CPU: 1 PID: 15467 Comm: syz.1.3254 Not tainted syzkaller #0 [ 429.495368][T15467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 429.505567][T15467] Call Trace: [ 429.508872][T15467] [ 429.511919][T15467] dump_stack_lvl+0x18c/0x250 [ 429.516725][T15467] ? show_regs_print_info+0x20/0x20 [ 429.522051][T15467] ? load_image+0x420/0x420 [ 429.526695][T15467] ? __might_sleep+0xe0/0xe0 [ 429.531327][T15467] ? __lock_acquire+0x7d40/0x7d40 [ 429.536395][T15467] should_fail_ex+0x39d/0x4d0 [ 429.541292][T15467] should_failslab+0x9/0x20 [ 429.545911][T15467] slab_pre_alloc_hook+0x59/0x310 [ 429.550960][T15467] kmem_cache_alloc_node+0x60/0x320 [ 429.556343][T15467] ? __alloc_skb+0x103/0x2c0 [ 429.560946][T15467] __alloc_skb+0x103/0x2c0 [ 429.565799][T15467] rtmsg_ifinfo_build_skb+0x8c/0x260 [ 429.571194][T15467] rtmsg_ifinfo+0x8c/0x1a0 [ 429.575646][T15467] netdev_state_change+0xfe/0x170 [ 429.580928][T15467] ? netdev_features_change+0xd0/0xd0 [ 429.586497][T15467] do_setlink+0x84a/0x4130 [ 429.591379][T15467] ? trace_call_bpf+0xc3/0x6c0 [ 429.596332][T15467] ? trace_call_bpf+0x5e9/0x6c0 [ 429.601357][T15467] ? trace_call_bpf+0xc3/0x6c0 [ 429.606118][T15467] ? nlmsg_parse_deprecated_strict+0x110/0x110 [ 429.612736][T15467] ? mark_lock+0x94/0x320 [ 429.617259][T15467] ? __bpf_trace_bpf_trace_printk+0x100/0x100 [ 429.623332][T15467] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 429.629432][T15467] ? perf_trace_run_bpf_submit+0x125/0x1c0 [ 429.635349][T15467] ? mark_lock+0x94/0x320 [ 429.639764][T15467] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 429.645839][T15467] ? lock_chain_count+0x20/0x20 [ 429.650831][T15467] ? __local_bh_enable_ip+0x13a/0x1c0 [ 429.656200][T15467] ? lockdep_hardirqs_on+0x98/0x150 [ 429.661837][T15467] ? __local_bh_enable_ip+0x13a/0x1c0 [ 429.667491][T15467] ? _local_bh_enable+0xa0/0xa0 [ 429.672720][T15467] ? do_raw_spin_unlock+0x121/0x230 [ 429.678351][T15467] ? br_port_slave_changelink+0x143/0x150 [ 429.684977][T15467] ? br_port_slave_changelink+0x143/0x150 [ 429.691151][T15467] rtnl_newlink+0x17da/0x20a0 [ 429.695881][T15467] ? rtnl_setlink+0x4e0/0x4e0 [ 429.701186][T15467] ? trace_raw_output_contention_end+0xd0/0xd0 [ 429.707733][T15467] ? rcu_is_watching+0x15/0xb0 [ 429.712683][T15467] ? trace_contention_end+0x39/0xe0 [ 429.718187][T15467] ? __mutex_lock+0x315/0xcc0 [ 429.723376][T15467] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 429.728509][T15467] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 429.733788][T15467] ? rtnl_setlink+0x4e0/0x4e0 [ 429.738721][T15467] rtnetlink_rcv_msg+0x869/0xfa0 [ 429.743662][T15467] ? rtnetlink_bind+0x80/0x80 [ 429.748445][T15467] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 429.754901][T15467] ? lockdep_hardirqs_on+0x98/0x150 [ 429.760133][T15467] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 429.766691][T15467] ? __dev_queue_xmit+0x265/0x3660 [ 429.771994][T15467] ? __local_bh_enable_ip+0x142/0x1c0 [ 429.778461][T15467] ? _local_bh_enable+0xa0/0xa0 [ 429.784706][T15467] ? __dev_queue_xmit+0x265/0x3660 [ 429.790309][T15467] ? __dev_queue_xmit+0x265/0x3660 [ 429.796579][T15467] ? __dev_queue_xmit+0x1b2c/0x3660 [ 429.802317][T15467] ? __dev_queue_xmit+0x265/0x3660 [ 429.807997][T15467] ? ref_tracker_free+0x690/0x840 [ 429.814192][T15467] netlink_rcv_skb+0x241/0x4d0 [ 429.819120][T15467] ? rtnetlink_bind+0x80/0x80 [ 429.824412][T15467] ? netlink_ack+0x1180/0x1180 [ 429.829474][T15467] ? __lock_acquire+0x7d40/0x7d40 [ 429.834915][T15467] ? netlink_deliver_tap+0x2e/0x1b0 [ 429.840384][T15467] netlink_unicast+0x751/0x8d0 [ 429.845785][T15467] netlink_sendmsg+0x8d0/0xbf0 [ 429.851089][T15467] ? netlink_getsockopt+0x590/0x590 [ 429.857448][T15467] ? aa_sock_msg_perm+0x94/0x150 [ 429.863324][T15467] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 429.869461][T15467] ? security_socket_sendmsg+0x80/0xa0 [ 429.875198][T15467] ? netlink_getsockopt+0x590/0x590 [ 429.881035][T15467] ____sys_sendmsg+0x5ba/0x960 [ 429.886712][T15467] ? __asan_memset+0x22/0x40 [ 429.893005][T15467] ? __sys_sendmsg_sock+0x30/0x30 [ 429.898481][T15467] ? __import_iovec+0x5f2/0x850 [ 429.903808][T15467] ? import_iovec+0x73/0xa0 [ 429.908558][T15467] ___sys_sendmsg+0x2a6/0x360 [ 429.913885][T15467] ? __sys_sendmsg+0x2a0/0x2a0 [ 429.919057][T15467] ? trace_call_bpf+0xc3/0x6c0 [ 429.924214][T15467] ? seqcount_lockdep_reader_access+0x17b/0x1d0 [ 429.931561][T15467] __se_sys_sendmsg+0x1c2/0x2b0 [ 429.937590][T15467] ? __x64_sys_sendmsg+0x80/0x80 [ 429.942908][T15467] ? lockdep_hardirqs_on+0x98/0x150 [ 429.948289][T15467] do_syscall_64+0x55/0xa0 [ 429.953063][T15467] ? clear_bhb_loop+0x40/0x90 [ 429.958270][T15467] ? clear_bhb_loop+0x40/0x90 [ 429.965509][T15467] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 429.971791][T15467] RIP: 0033:0x7f7f2919c819 [ 429.976391][T15467] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 429.997458][T15467] RSP: 002b:00007f7f2a02d028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 430.007614][T15467] RAX: ffffffffffffffda RBX: 00007f7f29415fa0 RCX: 00007f7f2919c819 [ 430.016326][T15467] RDX: 0000000004040040 RSI: 0000200000000080 RDI: 0000000000000007 [ 430.025592][T15467] RBP: 00007f7f2a02d090 R08: 0000000000000000 R09: 0000000000000000 [ 430.034006][T15467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 430.042373][T15467] R13: 00007f7f29416038 R14: 00007f7f29415fa0 R15: 00007ffd46859b28 [ 430.050635][T15467] [ 432.497584][T15553] macvlan1: entered promiscuous mode [ 432.554549][T15555] FAULT_INJECTION: forcing a failure. [ 432.554549][T15555] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 432.599776][T15555] CPU: 0 PID: 15555 Comm: syz.3.3286 Not tainted syzkaller #0 [ 432.607476][T15555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 432.617997][T15555] Call Trace: [ 432.621382][T15555] [ 432.624595][T15555] dump_stack_lvl+0x18c/0x250 [ 432.629313][T15555] ? show_regs_print_info+0x20/0x20 [ 432.634636][T15555] ? load_image+0x420/0x420 [ 432.639248][T15555] ? __might_fault+0xaa/0x120 [ 432.643944][T15555] ? __lock_acquire+0x7d40/0x7d40 [ 432.649170][T15555] ? __kasan_slab_alloc+0x6c/0x80 [ 432.654371][T15555] should_fail_ex+0x39d/0x4d0 [ 432.659305][T15555] strncpy_from_user+0x36/0x2d0 [ 432.664583][T15555] getname_flags+0xf6/0x500 [ 432.669568][T15555] __x64_sys_mkdirat+0x7c/0xa0 [ 432.674445][T15555] do_syscall_64+0x55/0xa0 [ 432.679305][T15555] ? clear_bhb_loop+0x40/0x90 [ 432.684223][T15555] ? clear_bhb_loop+0x40/0x90 [ 432.689124][T15555] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 432.695398][T15555] RIP: 0033:0x7f8ef299c819 [ 432.699965][T15555] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 432.720804][T15555] RSP: 002b:00007f8ef3910028 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 432.729332][T15555] RAX: ffffffffffffffda RBX: 00007f8ef2c16090 RCX: 00007f8ef299c819 [ 432.737391][T15555] RDX: 00000000000001ff RSI: 00002000000000c0 RDI: ffffffffffffff9c [ 432.745542][T15555] RBP: 00007f8ef3910090 R08: 0000000000000000 R09: 0000000000000000 [ 432.753672][T15555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 432.761767][T15555] R13: 00007f8ef2c16128 R14: 00007f8ef2c16090 R15: 00007ffee0f513f8 [ 432.770101][T15555] [ 433.897139][T15593] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3300'. [ 433.971872][T15593] netlink: 'syz.1.3300': attribute type 3 has an invalid length. [ 433.994102][T15593] netlink: 130984 bytes leftover after parsing attributes in process `syz.1.3300'. [ 434.495346][T15610] pim6reg1: entered promiscuous mode [ 434.500736][T15610] pim6reg1: entered allmulticast mode [ 434.505173][T15612] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3310'. [ 434.545246][T15612] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3310'. [ 434.564023][T15612] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3310'. [ 435.267827][T15641] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3321'. [ 435.287982][T15641] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3321'. [ 435.326238][T15641] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3321'. [ 435.508957][T15647] netlink: 132 bytes leftover after parsing attributes in process `syz.2.3324'. [ 435.529126][T15648] netlink: 132 bytes leftover after parsing attributes in process `syz.2.3324'. [ 436.512752][T15682] FAULT_INJECTION: forcing a failure. [ 436.512752][T15682] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 436.527032][T15682] CPU: 1 PID: 15682 Comm: syz.3.3337 Not tainted syzkaller #0 [ 436.534622][T15682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 436.545144][T15682] Call Trace: [ 436.548547][T15682] [ 436.551494][T15682] dump_stack_lvl+0x18c/0x250 [ 436.556305][T15682] ? show_regs_print_info+0x20/0x20 [ 436.561726][T15682] ? load_image+0x420/0x420 [ 436.566277][T15682] ? __might_fault+0xaa/0x120 [ 436.571129][T15682] ? __lock_acquire+0x7d40/0x7d40 [ 436.576268][T15682] should_fail_ex+0x39d/0x4d0 [ 436.581156][T15682] _copy_from_user+0x2f/0xe0 [ 436.585852][T15682] __sys_bpf+0x23e/0x890 [ 436.590468][T15682] ? bpf_link_show_fdinfo+0x390/0x390 [ 436.596132][T15682] ? lock_chain_count+0x20/0x20 [ 436.601115][T15682] __x64_sys_bpf+0x7c/0x90 [ 436.605535][T15682] do_syscall_64+0x55/0xa0 [ 436.610209][T15682] ? clear_bhb_loop+0x40/0x90 [ 436.615492][T15682] ? clear_bhb_loop+0x40/0x90 [ 436.620168][T15682] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 436.626414][T15682] RIP: 0033:0x7f8ef299c819 [ 436.631262][T15682] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 436.651138][T15682] RSP: 002b:00007f8ef3931028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 436.659561][T15682] RAX: ffffffffffffffda RBX: 00007f8ef2c15fa0 RCX: 00007f8ef299c819 [ 436.667881][T15682] RDX: 000000000000004c RSI: 0000200000000080 RDI: 000000000000000a [ 436.676026][T15682] RBP: 00007f8ef3931090 R08: 0000000000000000 R09: 0000000000000000 [ 436.684166][T15682] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 436.692329][T15682] R13: 00007f8ef2c16038 R14: 00007f8ef2c15fa0 R15: 00007ffee0f513f8 [ 436.700414][T15682] [ 438.899679][ T6294] tipc: Subscription rejected, illegal request [ 438.965593][T15740] netlink: 'syz.3.3359': attribute type 10 has an invalid length. [ 439.140737][T15740] team0: Port device geneve1 added [ 439.394881][T15758] __nla_validate_parse: 9 callbacks suppressed [ 439.394893][T15758] netlink: 60 bytes leftover after parsing attributes in process `syz.3.3366'. [ 439.411295][T15758] netlink: 60 bytes leftover after parsing attributes in process `syz.3.3366'. [ 439.446380][T15758] netlink: 60 bytes leftover after parsing attributes in process `syz.3.3366'. [ 440.431551][ T1292] ieee802154 phy0 wpan0: encryption failed: -22 [ 440.438887][ T1292] ieee802154 phy1 wpan1: encryption failed: -22 [ 440.554765][T15796] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3382'. [ 440.564522][T15796] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3382'. [ 440.581476][T15796] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3382'. [ 441.116276][ T6294] tipc: Subscription rejected, illegal request [ 441.390265][T15815] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 441.427917][T15815] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 441.474567][T15815] bond0 (unregistering): Released all slaves [ 441.770971][T15831] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3395'. [ 441.801896][T15831] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3395'. [ 441.830021][T15831] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3395'. [ 442.476308][T15862] netlink: 60 bytes leftover after parsing attributes in process `syz.3.3407'. [ 442.666468][T15869] ref_tracker: memory allocation failure, unreliable refcount tracker. [ 446.681203][T15986] netlink: 'syz.3.3452': attribute type 3 has an invalid length. [ 446.689831][T15986] netlink: 'syz.3.3452': attribute type 1 has an invalid length. [ 446.698582][T15986] __nla_validate_parse: 2 callbacks suppressed [ 446.698597][T15986] netlink: 130160 bytes leftover after parsing attributes in process `syz.3.3452'. [ 446.732761][T15987] netlink: 199836 bytes leftover after parsing attributes in process `syz.3.3452'. [ 447.238091][T16003] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3457'. [ 447.265171][T16003] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3457'. [ 447.286240][T16003] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3457'. [ 447.457946][T16008] netlink: 'syz.2.3459': attribute type 30 has an invalid length. [ 447.488636][T16008] netlink: 'syz.2.3459': attribute type 10 has an invalid length. [ 447.550002][T16008] bond0: (slave wlan1): Enslaving as an active interface with an up link [ 447.633090][T16016] bridge0: port 3(veth0_to_bridge) entered blocking state [ 447.640885][T16016] bridge0: port 3(veth0_to_bridge) entered disabled state [ 447.665337][T16016] veth0_to_bridge: entered allmulticast mode [ 447.694658][T16016] veth0_to_bridge: entered promiscuous mode [ 447.708910][T16016] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 447.722671][T16016] bridge0: port 3(veth0_to_bridge) entered blocking state [ 447.730229][T16016] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 447.870304][T16020] netlink: 'syz.2.3466': attribute type 1 has an invalid length. [ 447.879680][T16020] netlink: 168864 bytes leftover after parsing attributes in process `syz.2.3466'. [ 447.998581][T16027] netlink: 60 bytes leftover after parsing attributes in process `syz.3.3468'. [ 448.008628][T16027] netlink: 60 bytes leftover after parsing attributes in process `syz.3.3468'. [ 448.019819][T16027] netlink: 60 bytes leftover after parsing attributes in process `syz.3.3468'. [ 448.106218][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 448.119980][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 448.133847][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 448.147578][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 448.161547][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 448.175338][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 448.189862][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 448.204000][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 448.218264][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 448.231930][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 449.723227][T16059] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3480'. [ 453.115361][ C1] net_ratelimit: 4095 callbacks suppressed [ 453.115380][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 453.135458][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 453.149080][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 453.163139][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 453.176923][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 453.190804][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 453.204643][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 453.218436][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 453.231532][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 453.246098][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 453.535093][T16059] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3480'. [ 453.730355][T16075] FAULT_INJECTION: forcing a failure. [ 453.730355][T16075] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 453.814243][T16075] CPU: 1 PID: 16075 Comm: syz.2.3487 Not tainted syzkaller #0 [ 453.821899][T16075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 453.832135][T16075] Call Trace: [ 453.835650][T16075] [ 453.838723][T16075] dump_stack_lvl+0x18c/0x250 [ 453.843610][T16075] ? show_regs_print_info+0x20/0x20 [ 453.849431][T16075] ? load_image+0x420/0x420 [ 453.854442][T16075] ? __might_fault+0xaa/0x120 [ 453.859384][T16075] ? __lock_acquire+0x7d40/0x7d40 [ 453.864914][T16075] ? unix_ioctl+0x261/0x670 [ 453.869509][T16075] should_fail_ex+0x39d/0x4d0 [ 453.874590][T16075] _copy_from_user+0x2f/0xe0 [ 453.879253][T16075] sock_do_ioctl+0x190/0x310 [ 453.883926][T16075] ? sock_show_fdinfo+0xb0/0xb0 [ 453.888914][T16075] sock_ioctl+0x5ba/0x7e0 [ 453.893331][T16075] ? sock_poll+0x3e0/0x3e0 [ 453.898116][T16075] ? bpf_lsm_file_ioctl+0x9/0x10 [ 453.903201][T16075] ? security_file_ioctl+0x80/0xa0 [ 453.908474][T16075] ? sock_poll+0x3e0/0x3e0 [ 453.913576][T16075] __se_sys_ioctl+0xfd/0x170 [ 453.918365][T16075] do_syscall_64+0x55/0xa0 [ 453.922961][T16075] ? clear_bhb_loop+0x40/0x90 [ 453.927783][T16075] ? clear_bhb_loop+0x40/0x90 [ 453.932603][T16075] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 453.938560][T16075] RIP: 0033:0x7f704499c819 [ 453.943124][T16075] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 453.963406][T16075] RSP: 002b:00007f704581e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 453.971995][T16075] RAX: ffffffffffffffda RBX: 00007f7044c15fa0 RCX: 00007f704499c819 [ 453.980030][T16075] RDX: 0000200000000080 RSI: 0000000000008922 RDI: 0000000000000005 [ 453.988540][T16075] RBP: 00007f704581e090 R08: 0000000000000000 R09: 0000000000000000 [ 453.996696][T16075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 454.004994][T16075] R13: 00007f7044c16038 R14: 00007f7044c15fa0 R15: 00007ffc483c8808 [ 454.013096][T16075] [ 455.631584][T16107] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3496'. [ 455.677893][T16107] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3496'. [ 455.724116][T16107] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3496'. [ 456.950473][T16142] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3510'. [ 456.973828][T16142] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3510'. [ 457.050455][T16146] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3510'. [ 458.100649][T16170] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3522'. [ 458.125038][ C1] net_ratelimit: 3228 callbacks suppressed [ 458.125056][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 458.128602][T16170] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3522'. [ 458.132385][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 458.166670][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 458.180228][T16170] netlink: 60 bytes leftover after parsing attributes in process `syz.2.3522'. [ 458.180754][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 458.203929][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 458.217446][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 458.231180][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 458.244661][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 458.258154][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 458.272197][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 460.216128][T16214] netlink: 'syz.0.3542': attribute type 1 has an invalid length. [ 463.135702][ C1] net_ratelimit: 3594 callbacks suppressed [ 463.135724][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 463.157553][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 463.173106][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 463.191095][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 463.208834][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 463.224707][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 463.240010][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 463.254178][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 463.268846][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 463.283089][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 464.751892][T16259] netlink: 10 bytes leftover after parsing attributes in process `syz.3.3559'. [ 465.802735][T16285] FAULT_INJECTION: forcing a failure. [ 465.802735][T16285] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 466.625616][T16285] CPU: 0 PID: 16285 Comm: syz.0.3571 Not tainted syzkaller #0 [ 466.633406][T16285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 466.643500][T16285] Call Trace: [ 466.646832][T16285] [ 466.649782][T16285] dump_stack_lvl+0x18c/0x250 [ 466.654669][T16285] ? show_regs_print_info+0x20/0x20 [ 466.660081][T16285] ? load_image+0x420/0x420 [ 466.664702][T16285] ? __might_fault+0xaa/0x120 [ 466.669419][T16285] ? __lock_acquire+0x7d40/0x7d40 [ 466.674482][T16285] should_fail_ex+0x39d/0x4d0 [ 466.679299][T16285] _copy_from_user+0x2f/0xe0 [ 466.684009][T16285] generic_map_update_batch+0x54b/0x810 [ 466.689940][T16285] ? rcu_read_unlock+0xa0/0xa0 [ 466.695256][T16285] ? rcu_read_unlock+0xa0/0xa0 [ 466.700043][T16285] bpf_map_do_batch+0x3d7/0x610 [ 466.705016][T16285] __sys_bpf+0x381/0x890 [ 466.709379][T16285] ? bpf_link_show_fdinfo+0x390/0x390 [ 466.714794][T16285] ? lock_chain_count+0x20/0x20 [ 466.719688][T16285] __x64_sys_bpf+0x7c/0x90 [ 466.724230][T16285] do_syscall_64+0x55/0xa0 [ 466.728933][T16285] ? clear_bhb_loop+0x40/0x90 [ 466.733817][T16285] ? clear_bhb_loop+0x40/0x90 [ 466.738528][T16285] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 466.744537][T16285] RIP: 0033:0x7f9fc379c819 [ 466.748979][T16285] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 466.769454][T16285] RSP: 002b:00007f9fc45ca028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 466.778264][T16285] RAX: ffffffffffffffda RBX: 00007f9fc3a15fa0 RCX: 00007f9fc379c819 [ 466.786443][T16285] RDX: 0000000000000038 RSI: 0000200000000300 RDI: 000000000000001a [ 466.794528][T16285] RBP: 00007f9fc45ca090 R08: 0000000000000000 R09: 0000000000000000 [ 466.802627][T16285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 466.810987][T16285] R13: 00007f9fc3a16038 R14: 00007f9fc3a15fa0 R15: 00007ffc3f8e4c08 [ 466.819181][T16285] [ 467.080455][T16304] netlink: 'syz.2.3576': attribute type 21 has an invalid length. [ 467.113025][T16304] netlink: 128 bytes leftover after parsing attributes in process `syz.2.3576'. [ 467.130934][T16304] netlink: 'syz.2.3576': attribute type 4 has an invalid length. [ 467.532882][T16314] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3582'. [ 467.549725][T16314] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3582'. [ 467.560545][T16314] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3582'. [ 467.828258][T16323] FAULT_INJECTION: forcing a failure. [ 467.828258][T16323] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 467.935289][T16323] CPU: 0 PID: 16323 Comm: syz.2.3585 Not tainted syzkaller #0 [ 467.943134][T16323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 467.953404][T16323] Call Trace: [ 467.956881][T16323] [ 467.960026][T16323] dump_stack_lvl+0x18c/0x250 [ 467.964846][T16323] ? show_regs_print_info+0x20/0x20 [ 467.970163][T16323] ? load_image+0x420/0x420 [ 467.974700][T16323] ? __might_fault+0xaa/0x120 [ 467.979495][T16323] ? __lock_acquire+0x7d40/0x7d40 [ 467.984822][T16323] should_fail_ex+0x39d/0x4d0 [ 467.989719][T16323] _copy_from_user+0x2f/0xe0 [ 467.994437][T16323] smc_setsockopt+0x3d3/0xac0 [ 467.999361][T16323] ? smc_shutdown+0x9b0/0x9b0 [ 468.004262][T16323] ? __fget_files+0x28/0x4b0 [ 468.008916][T16323] ? bpf_lsm_socket_setsockopt+0x9/0x10 [ 468.014588][T16323] ? security_socket_setsockopt+0x7e/0xa0 [ 468.020601][T16323] ? smc_shutdown+0x9b0/0x9b0 [ 468.026100][T16323] do_sock_setsockopt+0x175/0x1a0 [ 468.031685][T16323] ? __fdget+0x180/0x210 [ 468.036080][T16323] __x64_sys_setsockopt+0x182/0x200 [ 468.041501][T16323] do_syscall_64+0x55/0xa0 [ 468.046048][T16323] ? clear_bhb_loop+0x40/0x90 [ 468.050757][T16323] ? clear_bhb_loop+0x40/0x90 [ 468.055909][T16323] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 468.062355][T16323] RIP: 0033:0x7f704499c819 [ 468.067154][T16323] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 468.087315][T16323] RSP: 002b:00007f704581e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 468.096288][T16323] RAX: ffffffffffffffda RBX: 00007f7044c15fa0 RCX: 00007f704499c819 [ 468.104775][T16323] RDX: 0000000000000025 RSI: 0000000000000006 RDI: 0000000000000003 [ 468.112944][T16323] RBP: 00007f704581e090 R08: 0000000000000004 R09: 0000000000000000 [ 468.121114][T16323] R10: 0000200000000200 R11: 0000000000000246 R12: 0000000000000001 [ 468.129291][T16323] R13: 00007f7044c16038 R14: 00007f7044c15fa0 R15: 00007ffc483c8808 [ 468.137396][T16323] [ 468.145453][ C1] net_ratelimit: 3273 callbacks suppressed [ 468.145475][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 468.165770][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 468.180092][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 468.194543][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 468.209166][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 468.224487][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 468.238182][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 468.251725][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 468.265963][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 468.279753][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 468.403546][T16327] netlink: 'syz.1.3588': attribute type 29 has an invalid length. [ 468.429820][T16327] netlink: 'syz.1.3588': attribute type 3 has an invalid length. [ 468.458880][T16327] netlink: 132 bytes leftover after parsing attributes in process `syz.1.3588'. [ 469.001839][T16340] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3592'. [ 469.040509][T16340] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3592'. [ 469.080942][T16340] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3592'. [ 469.578251][T16347] macvlan1: entered promiscuous mode [ 469.732429][T16347] netlink: 121460 bytes leftover after parsing attributes in process `syz.0.3593'. [ 469.771647][T16347] netlink: 21068 bytes leftover after parsing attributes in process `syz.0.3593'. [ 469.807991][T16347] tipc: Started in network mode [ 469.842527][T16347] tipc: Node identity d, cluster identity 56 [ 469.872940][T16347] tipc: Node number set to 13 [ 470.208363][T16357] netlink: 'syz.1.3596': attribute type 10 has an invalid length. [ 470.225593][T16357] netlink: 2 bytes leftover after parsing attributes in process `syz.1.3596'. [ 470.247147][T16357] batadv_slave_1: entered promiscuous mode [ 470.538338][T16363] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3601'. [ 470.666625][T16363] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3601'. [ 470.755445][T16367] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3601'. [ 471.811543][T16395] netlink: 60 bytes leftover after parsing attributes in process `syz.3.3613'. [ 471.878804][T16395] netlink: 60 bytes leftover after parsing attributes in process `syz.3.3613'. [ 471.899425][T16396] netlink: 60 bytes leftover after parsing attributes in process `syz.3.3613'. [ 472.820024][T16416] team0: entered promiscuous mode [ 472.837021][T16416] team_slave_0: entered promiscuous mode [ 472.842908][T16416] team_slave_1: entered promiscuous mode [ 472.852798][T16416] bond0: entered promiscuous mode [ 472.859123][T16416] bond_slave_0: entered promiscuous mode [ 472.865872][T16416] bond_slave_1: entered promiscuous mode [ 472.872228][T16416] netdevsim netdevsim3 netdevsim0: entered promiscuous mode [ 472.882409][T16416] geneve1: entered promiscuous mode [ 472.922468][T16418] netlink: 'syz.3.3621': attribute type 10 has an invalid length. [ 472.974903][T16418] FAULT_INJECTION: forcing a failure. [ 472.974903][T16418] name failslab, interval 1, probability 0, space 0, times 0 [ 473.007141][T16418] CPU: 0 PID: 16418 Comm: syz.3.3621 Not tainted syzkaller #0 [ 473.015100][T16418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 473.025182][T16418] Call Trace: [ 473.028600][T16418] [ 473.031578][T16418] dump_stack_lvl+0x18c/0x250 [ 473.036764][T16418] ? show_regs_print_info+0x20/0x20 [ 473.042265][T16418] ? load_image+0x420/0x420 [ 473.047150][T16418] ? __might_sleep+0xe0/0xe0 [ 473.052061][T16418] ? __lock_acquire+0x7d40/0x7d40 [ 473.057917][T16418] should_fail_ex+0x39d/0x4d0 [ 473.063077][T16418] should_failslab+0x9/0x20 [ 473.067801][T16418] slab_pre_alloc_hook+0x59/0x310 [ 473.072955][T16418] ? __lock_acquire+0x7d40/0x7d40 [ 473.078096][T16418] ? trace_contention_end+0x39/0xe0 [ 473.083679][T16418] ? nf_nat_masq_schedule+0x246/0x560 [ 473.089534][T16418] __kmem_cache_alloc_node+0x53/0x250 [ 473.095317][T16418] ? nf_nat_masq_schedule+0x246/0x560 [ 473.101261][T16418] kmalloc_trace+0x2a/0xe0 [ 473.105999][T16418] nf_nat_masq_schedule+0x246/0x560 [ 473.111340][T16418] ? mutex_unlock+0x10/0x10 [ 473.116058][T16418] ? nf_nat_masq_schedule+0x560/0x560 [ 473.121589][T16418] ? masq_device_event+0xd0/0xd0 [ 473.126590][T16418] ? nfqnl_rcv_dev_event+0xb1/0x770 [ 473.131845][T16418] masq_device_event+0xa2/0xd0 [ 473.136942][T16418] notifier_call_chain+0x197/0x380 [ 473.142103][T16418] __dev_notify_flags+0x16e/0x310 [ 473.147362][T16418] ? __dev_change_flags+0x6a0/0x6a0 [ 473.152769][T16418] ? __dev_change_flags+0x4d4/0x6a0 [ 473.156198][ C1] net_ratelimit: 3034 callbacks suppressed [ 473.156214][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 473.158153][T16418] ? vprintk_emit+0x53d/0x610 [ 473.166352][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 473.177572][T16418] ? dev_get_flags+0x1c0/0x1c0 [ 473.177611][T16418] ? printk_sprint+0x460/0x460 [ 473.177629][T16418] ? _raw_spin_unlock_irqrestore+0xc5/0x120 [ 473.177649][T16418] ? _raw_spin_unlock+0x40/0x40 [ 473.184365][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 473.194733][T16418] dev_change_flags+0xe8/0x1a0 [ 473.194782][T16418] do_setlink+0xc58/0x4130 [ 473.194800][T16418] ? arch_stack_walk+0x160/0x190 [ 473.201932][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 473.204828][T16418] ? load_image+0x420/0x420 [ 473.213192][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 473.216465][T16418] ? nlmsg_parse_deprecated_strict+0x110/0x110 [ 473.216491][T16418] ? stack_trace_save+0xaa/0x100 [ 473.216515][T16418] ? __nla_validate_parse+0x2522/0x2ea0 [ 473.216548][T16418] ? __nla_validate+0x50/0x50 [ 473.233444][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 473.235203][T16418] ? validate_linkmsg+0x719/0x910 [ 473.235233][T16418] rtnl_newlink+0x17da/0x20a0 [ 473.235260][T16418] ? rtnl_newlink+0x481/0x20a0 [ 473.242310][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 473.246175][T16418] ? rtnl_setlink+0x4e0/0x4e0 [ 473.246198][T16418] ? __rwlock_init+0x150/0x150 [ 473.246221][T16418] ? do_raw_spin_unlock+0x121/0x230 [ 473.260465][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 473.263199][T16418] ? __mutex_lock+0x956/0xcc0 [ 473.276934][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 473.281602][T16418] ? __mutex_lock+0x4f9/0xcc0 [ 473.288346][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 473.292472][T16418] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 473.402574][T16418] ? rtnetlink_rcv_msg+0x221/0xfa0 [ 473.407735][T16418] ? rtnl_setlink+0x4e0/0x4e0 [ 473.412527][T16418] rtnetlink_rcv_msg+0x869/0xfa0 [ 473.417674][T16418] ? lockdep_hardirqs_on+0x98/0x150 [ 473.423008][T16418] ? rtnetlink_bind+0x80/0x80 [ 473.427986][T16418] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 473.434011][T16418] ? lock_chain_count+0x20/0x20 [ 473.438985][T16418] ? __local_bh_enable_ip+0x13a/0x1c0 [ 473.444563][T16418] ? lockdep_hardirqs_on+0x98/0x150 [ 473.449824][T16418] ? __local_bh_enable_ip+0x13a/0x1c0 [ 473.455225][T16418] ? _local_bh_enable+0xa0/0xa0 [ 473.460115][T16418] ? __dev_queue_xmit+0x265/0x3660 [ 473.465255][T16418] ? __dev_queue_xmit+0x265/0x3660 [ 473.470398][T16418] ? __dev_queue_xmit+0x1b2c/0x3660 [ 473.475661][T16418] ? __dev_queue_xmit+0x265/0x3660 [ 473.480818][T16418] ? ref_tracker_free+0x690/0x840 [ 473.485882][T16418] netlink_rcv_skb+0x241/0x4d0 [ 473.490854][T16418] ? rtnetlink_bind+0x80/0x80 [ 473.495654][T16418] ? netlink_ack+0x1180/0x1180 [ 473.500537][T16418] ? __lock_acquire+0x7d40/0x7d40 [ 473.505598][T16418] ? netlink_deliver_tap+0x2e/0x1b0 [ 473.510837][T16418] netlink_unicast+0x751/0x8d0 [ 473.515660][T16418] netlink_sendmsg+0x8d0/0xbf0 [ 473.520726][T16418] ? netlink_getsockopt+0x590/0x590 [ 473.526132][T16418] ? aa_sock_msg_perm+0x94/0x150 [ 473.531277][T16418] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 473.536688][T16418] ? security_socket_sendmsg+0x80/0xa0 [ 473.542625][T16418] ? netlink_getsockopt+0x590/0x590 [ 473.547917][T16418] ____sys_sendmsg+0x5ba/0x960 [ 473.552800][T16418] ? __asan_memset+0x22/0x40 [ 473.557547][T16418] ? __sys_sendmsg_sock+0x30/0x30 [ 473.563080][T16418] ? __import_iovec+0x5f2/0x850 [ 473.568061][T16418] ? import_iovec+0x73/0xa0 [ 473.572778][T16418] ___sys_sendmsg+0x2a6/0x360 [ 473.577775][T16418] ? get_pid_task+0x20/0x1e0 [ 473.582592][T16418] ? __sys_sendmsg+0x2a0/0x2a0 [ 473.587541][T16418] ? __lock_acquire+0x7d40/0x7d40 [ 473.592794][T16418] __se_sys_sendmsg+0x1c2/0x2b0 [ 473.597686][T16418] ? __x64_sys_sendmsg+0x80/0x80 [ 473.602678][T16418] ? lockdep_hardirqs_on+0x98/0x150 [ 473.607996][T16418] do_syscall_64+0x55/0xa0 [ 473.612543][T16418] ? clear_bhb_loop+0x40/0x90 [ 473.617340][T16418] ? clear_bhb_loop+0x40/0x90 [ 473.622487][T16418] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 473.628523][T16418] RIP: 0033:0x7f8ef299c819 [ 473.632966][T16418] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 473.653232][T16418] RSP: 002b:00007f8ef3910028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 473.662036][T16418] RAX: ffffffffffffffda RBX: 00007f8ef2c16090 RCX: 00007f8ef299c819 [ 473.670218][T16418] RDX: 0000000000008044 RSI: 0000200000000600 RDI: 0000000000000005 [ 473.678545][T16418] RBP: 00007f8ef3910090 R08: 0000000000000000 R09: 0000000000000000 [ 473.686974][T16418] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 473.695561][T16418] R13: 00007f8ef2c16128 R14: 00007f8ef2c16090 R15: 00007ffee0f513f8 [ 473.704099][T16418] [ 473.745492][T16418] dummy0: entered promiscuous mode [ 473.751805][T16418] team0: Port device dummy0 added [ 474.216671][T16427] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3624'. [ 474.491848][T16427] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3624'. [ 476.468756][T16455] FAULT_INJECTION: forcing a failure. [ 476.468756][T16455] name failslab, interval 1, probability 0, space 0, times 0 [ 476.501122][T16455] CPU: 0 PID: 16455 Comm: syz.1.3633 Not tainted syzkaller #0 [ 476.508651][T16455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 476.518909][T16455] Call Trace: [ 476.522294][T16455] [ 476.525330][T16455] dump_stack_lvl+0x18c/0x250 [ 476.530420][T16455] ? show_regs_print_info+0x20/0x20 [ 476.535832][T16455] ? load_image+0x420/0x420 [ 476.540376][T16455] ? __might_sleep+0xe0/0xe0 [ 476.545082][T16455] ? __lock_acquire+0x7d40/0x7d40 [ 476.550369][T16455] should_fail_ex+0x39d/0x4d0 [ 476.555175][T16455] should_failslab+0x9/0x20 [ 476.559704][T16455] slab_pre_alloc_hook+0x59/0x310 [ 476.564850][T16455] ? page_pool_create+0x71/0x5c0 [ 476.569994][T16455] __kmem_cache_alloc_node+0x53/0x250 [ 476.575415][T16455] ? page_pool_create+0x71/0x5c0 [ 476.580620][T16455] kmalloc_node_trace+0x26/0xe0 [ 476.586120][T16455] page_pool_create+0x71/0x5c0 [ 476.590920][T16455] bpf_test_run_xdp_live+0x203/0x1b20 [ 476.596763][T16455] ? bpf_dispatcher_xdp+0x800/0x1000 [ 476.602340][T16455] ? bpf_dispatcher_xdp+0x800/0x1000 [ 476.607757][T16455] ? bpf_dispatcher_change_prog+0xcbf/0xf10 [ 476.613684][T16455] ? bpf_dispatcher_xdp+0x800/0x1000 [ 476.619007][T16455] ? xdp_convert_md_to_buff+0x330/0x330 [ 476.624883][T16455] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 476.631344][T16455] ? _copy_from_user+0xa5/0xe0 [ 476.636407][T16455] ? bpf_test_init+0x119/0x140 [ 476.641197][T16455] ? xdp_convert_md_to_buff+0x5b/0x330 [ 476.646772][T16455] bpf_prog_test_run_xdp+0x7ca/0x10e0 [ 476.652470][T16455] ? dev_put+0x80/0x80 [ 476.656578][T16455] ? dev_put+0x80/0x80 [ 476.660898][T16455] bpf_prog_test_run+0x321/0x390 [ 476.666131][T16455] __sys_bpf+0x49d/0x890 [ 476.670489][T16455] ? bpf_link_show_fdinfo+0x390/0x390 [ 476.675897][T16455] ? lock_chain_count+0x20/0x20 [ 476.681045][T16455] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 476.687235][T16455] __x64_sys_bpf+0x7c/0x90 [ 476.691873][T16455] do_syscall_64+0x55/0xa0 [ 476.696574][T16455] ? clear_bhb_loop+0x40/0x90 [ 476.701282][T16455] ? clear_bhb_loop+0x40/0x90 [ 476.706165][T16455] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 476.712261][T16455] RIP: 0033:0x7f7f2919c819 [ 476.716795][T16455] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 476.736951][T16455] RSP: 002b:00007f7f2a02d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 476.745842][T16455] RAX: ffffffffffffffda RBX: 00007f7f29415fa0 RCX: 00007f7f2919c819 [ 476.754009][T16455] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 476.762267][T16455] RBP: 00007f7f2a02d090 R08: 0000000000000000 R09: 0000000000000000 [ 476.770359][T16455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 476.778530][T16455] R13: 00007f7f29416038 R14: 00007f7f29415fa0 R15: 00007ffd46859b28 [ 476.786638][T16455] [ 476.838604][T16449] netlink: 'syz.2.3630': attribute type 10 has an invalid length. [ 477.059037][T16458] netlink: 'syz.3.3635': attribute type 1 has an invalid length. [ 477.078070][T16458] __nla_validate_parse: 1 callbacks suppressed [ 477.078107][T16458] netlink: 209592 bytes leftover after parsing attributes in process `syz.3.3635'. [ 477.123026][T16459] syzkaller0: entered promiscuous mode [ 477.141287][T16459] syzkaller0: entered allmulticast mode [ 478.165384][ C1] net_ratelimit: 3021 callbacks suppressed [ 478.165407][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 478.185362][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 478.199753][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 478.213724][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 478.227086][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 478.240958][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 478.254787][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 478.268208][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 478.281249][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 478.294747][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 479.400067][T16494] team0: entered promiscuous mode [ 479.439527][T16494] team_slave_0: entered promiscuous mode [ 479.479255][T16494] team_slave_1: entered promiscuous mode [ 479.506516][T16494] dummy0: entered promiscuous mode [ 479.529810][T16494] netdevsim netdevsim0 netdevsim0: entered promiscuous mode [ 479.632564][T16498] netlink: 'syz.0.3645': attribute type 10 has an invalid length. [ 479.925764][T16502] mac80211_hwsim hwsim22 wlan1: entered allmulticast mode [ 480.436015][T16515] syzkaller0: entered promiscuous mode [ 480.442070][T16515] syzkaller0: entered allmulticast mode [ 481.630446][T16532] netlink: 16186 bytes leftover after parsing attributes in process `syz.2.3660'. [ 481.689837][T16534] team0: entered promiscuous mode [ 481.706382][T16534] team_slave_0: entered promiscuous mode [ 481.747809][T16534] team_slave_1: entered promiscuous mode [ 481.803963][T16534] netdevsim netdevsim1 netdevsim0: entered promiscuous mode [ 481.874416][T16537] netlink: 'syz.1.3661': attribute type 10 has an invalid length. [ 482.017614][T16537] dummy0: entered promiscuous mode [ 482.071360][T16537] team0: Port device dummy0 added [ 482.134860][T16538] mac80211_hwsim hwsim18 wlan1: entered allmulticast mode [ 483.175085][ C1] net_ratelimit: 3302 callbacks suppressed [ 483.175105][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 483.175789][T16563] netlink: 'syz.3.3673': attribute type 10 has an invalid length. [ 483.183382][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 483.218296][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 483.231757][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 483.244871][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 483.258258][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 483.271713][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 483.285020][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 483.297950][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 483.312502][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 483.721093][T16569] mac80211_hwsim hwsim20 wlan1: entered allmulticast mode [ 488.069521][T16658] FAULT_INJECTION: forcing a failure. [ 488.069521][T16658] name failslab, interval 1, probability 0, space 0, times 0 [ 488.082923][T16658] CPU: 0 PID: 16658 Comm: syz.1.3705 Not tainted syzkaller #0 [ 488.090526][T16658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 488.100791][T16658] Call Trace: [ 488.104558][T16658] [ 488.107597][T16658] dump_stack_lvl+0x18c/0x250 [ 488.112483][T16658] ? show_regs_print_info+0x20/0x20 [ 488.117903][T16658] ? load_image+0x420/0x420 [ 488.122448][T16658] ? netdev_core_pick_tx+0x340/0x340 [ 488.127860][T16658] should_fail_ex+0x39d/0x4d0 [ 488.132872][T16658] should_failslab+0x9/0x20 [ 488.137506][T16658] slab_pre_alloc_hook+0x59/0x310 [ 488.142747][T16658] kmem_cache_alloc+0x5a/0x2d0 [ 488.147725][T16658] ? skb_clone+0x1eb/0x370 [ 488.152616][T16658] skb_clone+0x1eb/0x370 [ 488.156978][T16658] bpf_clone_redirect+0x167/0x4a0 [ 488.162174][T16658] bpf_prog_973cd02a7a0e8181+0x5e/0x63 [ 488.168185][T16658] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 488.174809][T16658] ? lock_chain_count+0x20/0x20 [ 488.180053][T16658] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 488.186586][T16658] ? lockdep_softirqs_on+0x580/0x580 [ 488.187574][ C1] net_ratelimit: 2834 callbacks suppressed [ 488.187619][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 488.192231][T16658] ? lock_chain_count+0x20/0x20 [ 488.192254][T16658] ? seqcount_lockdep_reader_access+0x191/0x1d0 [ 488.192282][T16658] ? __local_bh_disable_ip+0x108/0x1a0 [ 488.203438][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 488.210364][T16658] ? __cant_sleep+0x220/0x220 [ 488.210391][T16658] ? __local_bh_enable_ip+0x13a/0x1c0 [ 488.210406][T16658] ? _local_bh_enable+0xa0/0xa0 [ 488.210426][T16658] ? bpf_test_timer_continue+0x135/0x380 [ 488.210449][T16658] ? bpf_test_run+0x174/0x870 [ 488.210469][T16658] bpf_test_run+0x2df/0x870 [ 488.210500][T16658] ? bpf_test_run+0x174/0x870 [ 488.220741][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 488.221998][T16658] ? convert___skb_to_skb+0x590/0x590 [ 488.222029][T16658] ? convert___skb_to_skb+0x1f9/0x590 [ 488.222050][T16658] ? __asan_memcpy+0x40/0x70 [ 488.222074][T16658] ? convert___skb_to_skb+0x2f6/0x590 [ 488.232638][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 488.240172][T16658] bpf_prog_test_run_skb+0xad2/0x12b0 [ 488.240211][T16658] ? cpu_online+0x60/0x60 [ 488.240231][T16658] bpf_prog_test_run+0x321/0x390 [ 488.240253][T16658] __sys_bpf+0x49d/0x890 [ 488.250483][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 488.250735][T16658] ? bpf_link_show_fdinfo+0x390/0x390 [ 488.250775][T16658] ? lock_chain_count+0x20/0x20 [ 488.260719][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 488.261445][T16658] __x64_sys_bpf+0x7c/0x90 [ 488.261472][T16658] do_syscall_64+0x55/0xa0 [ 488.271338][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 488.275755][T16658] ? clear_bhb_loop+0x40/0x90 [ 488.275783][T16658] ? clear_bhb_loop+0x40/0x90 [ 488.275801][T16658] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 488.275821][T16658] RIP: 0033:0x7f7f2919c819 [ 488.275839][T16658] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 488.275853][T16658] RSP: 002b:00007f7f2a02d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 488.275873][T16658] RAX: ffffffffffffffda RBX: 00007f7f29415fa0 RCX: 00007f7f2919c819 [ 488.275886][T16658] RDX: 000000000000003b RSI: 0000200000000080 RDI: 000000000000000a [ 488.275898][T16658] RBP: 00007f7f2a02d090 R08: 0000000000000000 R09: 0000000000000000 [ 488.275909][T16658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 488.293691][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 488.293922][T16658] R13: 00007f7f29416038 R14: 00007f7f29415fa0 R15: 00007ffd46859b28 [ 488.293953][T16658] [ 488.508176][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 488.521949][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 488.878916][T16666] netlink: 'syz.1.3709': attribute type 1 has an invalid length. [ 488.945349][T16666] netlink: 209592 bytes leftover after parsing attributes in process `syz.1.3709'. [ 490.439708][T16707] netlink: 'syz.3.3724': attribute type 1 has an invalid length. [ 490.457515][T16707] netlink: 209592 bytes leftover after parsing attributes in process `syz.3.3724'. [ 490.783184][T16717] netlink: 'syz.0.3726': attribute type 21 has an invalid length. [ 490.804412][T16717] netlink: 'syz.0.3726': attribute type 6 has an invalid length. [ 490.827404][T16717] netlink: 132 bytes leftover after parsing attributes in process `syz.0.3726'. [ 492.325415][T16748] netlink: 'syz.2.3735': attribute type 1 has an invalid length. [ 492.358755][T16748] netlink: 209592 bytes leftover after parsing attributes in process `syz.2.3735'. [ 492.729517][T16756] netlink: 'syz.0.3737': attribute type 10 has an invalid length. [ 492.758129][T16756] nla_validate_range_unsigned: 25 callbacks suppressed [ 492.758175][T16756] netlink: 'syz.0.3737': attribute type 11 has an invalid length. [ 492.795479][T16756] netlink: 'syz.0.3737': attribute type 11 has an invalid length. [ 492.838189][T16756] netlink: 'syz.0.3737': attribute type 11 has an invalid length. [ 492.876210][T16756] netlink: 'syz.0.3737': attribute type 11 has an invalid length. [ 492.894374][T16761] netlink: 'syz.0.3737': attribute type 27 has an invalid length. [ 492.911024][T16756] netlink: 'syz.0.3737': attribute type 11 has an invalid length. [ 492.923469][T16756] netlink: 'syz.0.3737': attribute type 11 has an invalid length. [ 492.939020][T16756] netlink: 'syz.0.3737': attribute type 11 has an invalid length. [ 492.986944][T16756] netlink: 'syz.0.3737': attribute type 11 has an invalid length. [ 493.014806][T16756] netlink: 'syz.0.3737': attribute type 11 has an invalid length. [ 493.043485][T16756] netlink: 'syz.0.3737': attribute type 11 has an invalid length. [ 493.071961][T16756] netlink: 'syz.0.3737': attribute type 4 has an invalid length. [ 493.103301][T16756] netlink: 'syz.0.3737': attribute type 5 has an invalid length. [ 493.127631][T16763] netlink: 128 bytes leftover after parsing attributes in process `syz.1.3739'. [ 493.150883][T16756] netlink: 208556 bytes leftover after parsing attributes in process `syz.0.3737'. [ 493.195433][ C1] net_ratelimit: 3367 callbacks suppressed [ 493.195455][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 493.215270][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 493.229657][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 493.243756][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 493.257141][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 493.270440][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 493.283855][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 493.297522][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 493.310527][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 493.323602][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 493.474469][T16771] netlink: 128 bytes leftover after parsing attributes in process `syz.1.3743'. [ 494.159998][T16781] netlink: 830 bytes leftover after parsing attributes in process `syz.3.3746'. [ 494.692440][T16789] tap0: tun_chr_ioctl cmd 1074025677 [ 494.704864][T16789] tap0: linktype set to 778 [ 494.710809][T16791] netlink: 132 bytes leftover after parsing attributes in process `syz.2.3748'. [ 494.733845][T16792] netlink: 830 bytes leftover after parsing attributes in process `syz.0.3750'. [ 494.751226][T16792] bond_slave_0: entered promiscuous mode [ 494.757580][T16792] bond_slave_1: entered promiscuous mode [ 494.802665][T16794] netlink: 4083 bytes leftover after parsing attributes in process `syz.1.3751'. [ 494.942693][T16794] netlink: 4083 bytes leftover after parsing attributes in process `syz.1.3751'. [ 495.096089][T16795] netlink: 4083 bytes leftover after parsing attributes in process `syz.1.3751'. [ 495.137118][T16796] netlink: 4083 bytes leftover after parsing attributes in process `syz.1.3751'. [ 495.343481][T16806] FAULT_INJECTION: forcing a failure. [ 495.343481][T16806] name failslab, interval 1, probability 0, space 0, times 0 [ 495.395210][T16806] CPU: 0 PID: 16806 Comm: syz.0.3755 Not tainted syzkaller #0 [ 495.403603][T16806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 495.414244][T16806] Call Trace: [ 495.417639][T16806] [ 495.420708][T16806] dump_stack_lvl+0x18c/0x250 [ 495.425706][T16806] ? show_regs_print_info+0x20/0x20 [ 495.431167][T16806] ? load_image+0x420/0x420 [ 495.435719][T16806] ? __might_sleep+0xe0/0xe0 [ 495.440524][T16806] ? __lock_acquire+0x7d40/0x7d40 [ 495.446063][T16806] should_fail_ex+0x39d/0x4d0 [ 495.451224][T16806] should_failslab+0x9/0x20 [ 495.455842][T16806] slab_pre_alloc_hook+0x59/0x310 [ 495.461001][T16806] ? lockdep_hardirqs_on+0x98/0x150 [ 495.466254][T16806] kmem_cache_alloc_node+0x60/0x320 [ 495.471671][T16806] ? __alloc_skb+0x103/0x2c0 [ 495.476362][T16806] __alloc_skb+0x103/0x2c0 [ 495.480805][T16806] netlink_ack+0x376/0x1180 [ 495.485520][T16806] ? __dev_queue_xmit+0x265/0x3660 [ 495.490775][T16806] ? netlink_dump+0xe50/0xe50 [ 495.495552][T16806] ? perf_trace_lock+0xfc/0x3b0 [ 495.500714][T16806] netlink_rcv_skb+0x2c5/0x4d0 [ 495.505526][T16806] ? rtnetlink_bind+0x80/0x80 [ 495.510244][T16806] ? netlink_ack+0x1180/0x1180 [ 495.515048][T16806] ? __lock_acquire+0x7d40/0x7d40 [ 495.520186][T16806] ? netlink_deliver_tap+0x2e/0x1b0 [ 495.525685][T16806] netlink_unicast+0x751/0x8d0 [ 495.530670][T16806] netlink_sendmsg+0x8d0/0xbf0 [ 495.535486][T16806] ? netlink_getsockopt+0x590/0x590 [ 495.540981][T16806] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 495.547772][T16806] ? aa_sock_msg_perm+0x94/0x150 [ 495.552744][T16806] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 495.558123][T16806] ? security_socket_sendmsg+0x80/0xa0 [ 495.563691][T16806] ? netlink_getsockopt+0x590/0x590 [ 495.568934][T16806] ____sys_sendmsg+0x5ba/0x960 [ 495.573827][T16806] ? __sys_sendmsg_sock+0x30/0x30 [ 495.579303][T16806] ? __import_iovec+0x5f2/0x850 [ 495.584195][T16806] ? import_iovec+0x73/0xa0 [ 495.588730][T16806] ___sys_sendmsg+0x2a6/0x360 [ 495.593613][T16806] ? __sys_sendmsg+0x2a0/0x2a0 [ 495.598452][T16806] __se_sys_sendmsg+0x1c2/0x2b0 [ 495.603421][T16806] ? __x64_sys_sendmsg+0x80/0x80 [ 495.608490][T16806] do_syscall_64+0x55/0xa0 [ 495.612929][T16806] ? clear_bhb_loop+0x40/0x90 [ 495.617723][T16806] ? clear_bhb_loop+0x40/0x90 [ 495.622610][T16806] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 495.628628][T16806] RIP: 0033:0x7f9fc379c819 [ 495.633261][T16806] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 495.653158][T16806] RSP: 002b:00007f9fc45ca028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 495.661607][T16806] RAX: ffffffffffffffda RBX: 00007f9fc3a15fa0 RCX: 00007f9fc379c819 [ 495.669796][T16806] RDX: 0000000020004080 RSI: 0000200000000040 RDI: 0000000000000005 [ 495.677981][T16806] RBP: 00007f9fc45ca090 R08: 0000000000000000 R09: 0000000000000000 [ 495.686353][T16806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 495.694612][T16806] R13: 00007f9fc3a16038 R14: 00007f9fc3a15fa0 R15: 00007ffc3f8e4c08 [ 495.702638][T16806] [ 496.902861][T16843] netlink: 135856 bytes leftover after parsing attributes in process `syz.3.3766'. [ 496.984942][T16843] netlink: 8442 bytes leftover after parsing attributes in process `syz.3.3766'. [ 497.276981][T16855] FAULT_INJECTION: forcing a failure. [ 497.276981][T16855] name failslab, interval 1, probability 0, space 0, times 0 [ 497.350790][T16855] CPU: 0 PID: 16855 Comm: syz.3.3771 Not tainted syzkaller #0 [ 497.358667][T16855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 497.369629][T16855] Call Trace: [ 497.373123][T16855] [ 497.376081][T16855] dump_stack_lvl+0x18c/0x250 [ 497.380818][T16855] ? show_regs_print_info+0x20/0x20 [ 497.386414][T16855] ? load_image+0x420/0x420 [ 497.390951][T16855] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 497.397227][T16855] ? lock_chain_count+0x20/0x20 [ 497.402220][T16855] should_fail_ex+0x39d/0x4d0 [ 497.406983][T16855] should_failslab+0x9/0x20 [ 497.411728][T16855] slab_pre_alloc_hook+0x59/0x310 [ 497.416984][T16855] ? perf_event_fd_array_get_ptr+0x139/0x210 [ 497.423578][T16855] __kmem_cache_alloc_node+0x53/0x250 [ 497.429192][T16855] ? perf_event_fd_array_get_ptr+0x139/0x210 [ 497.435457][T16855] kmalloc_trace+0x2a/0xe0 [ 497.440004][T16855] perf_event_fd_array_get_ptr+0x139/0x210 [ 497.446037][T16855] ? perf_event_fd_array_map_free+0x200/0x200 [ 497.452408][T16855] ? read_lock_is_recursive+0x20/0x20 [ 497.458020][T16855] ? __might_fault+0xaa/0x120 [ 497.462732][T16855] ? __lock_acquire+0x7d40/0x7d40 [ 497.467876][T16855] bpf_fd_array_map_update_elem+0x102/0x330 [ 497.473854][T16855] bpf_map_update_value+0x591/0x720 [ 497.479088][T16855] map_update_elem+0x57b/0x700 [ 497.483978][T16855] __sys_bpf+0x6b5/0x890 [ 497.488434][T16855] ? bpf_link_show_fdinfo+0x390/0x390 [ 497.493874][T16855] ? lock_chain_count+0x20/0x20 [ 497.498936][T16855] __x64_sys_bpf+0x7c/0x90 [ 497.503555][T16855] do_syscall_64+0x55/0xa0 [ 497.507998][T16855] ? clear_bhb_loop+0x40/0x90 [ 497.512821][T16855] ? clear_bhb_loop+0x40/0x90 [ 497.517703][T16855] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 497.523883][T16855] RIP: 0033:0x7f8ef299c819 [ 497.528330][T16855] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 497.548753][T16855] RSP: 002b:00007f8ef3931028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 497.557558][T16855] RAX: ffffffffffffffda RBX: 00007f8ef2c15fa0 RCX: 00007f8ef299c819 [ 497.565906][T16855] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000002 [ 497.573901][T16855] RBP: 00007f8ef3931090 R08: 0000000000000000 R09: 0000000000000000 [ 497.582346][T16855] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 497.590435][T16855] R13: 00007f8ef2c16038 R14: 00007f8ef2c15fa0 R15: 00007ffee0f513f8 [ 497.598904][T16855] [ 498.205511][ C1] net_ratelimit: 3782 callbacks suppressed [ 498.205530][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 498.225334][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 498.238933][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 498.252905][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 498.266843][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 498.280643][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 498.294889][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 498.308413][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 498.321905][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 498.336917][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 498.889320][T16876] netlink: 'syz.3.3779': attribute type 10 has an invalid length. [ 498.932266][T16876] netlink: 40 bytes leftover after parsing attributes in process `syz.3.3779'. [ 499.393876][T16893] netlink: 'syz.2.3785': attribute type 1 has an invalid length. [ 499.447413][T16893] __nla_validate_parse: 2 callbacks suppressed [ 499.447453][T16893] netlink: 209592 bytes leftover after parsing attributes in process `syz.2.3785'. [ 499.508366][T16900] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3787'. [ 499.613650][T16900] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3787'. [ 499.717318][T16901] netlink: 60 bytes leftover after parsing attributes in process `syz.0.3787'. [ 500.624147][T16919] netlink: 60 bytes leftover after parsing attributes in process `syz.3.3793'. [ 500.661798][T16919] netlink: 60 bytes leftover after parsing attributes in process `syz.3.3793'. [ 501.070688][T16930] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3799'. [ 501.126706][T16930] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3799'. [ 501.176566][T16930] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3799'. [ 501.831997][T16945] netlink: 'syz.2.3806': attribute type 1 has an invalid length. [ 503.050671][ T1292] ieee802154 phy0 wpan0: encryption failed: -22 [ 503.073283][ T1292] ieee802154 phy1 wpan1: encryption failed: -22 [ 503.215045][ C0] net_ratelimit: 6677 callbacks suppressed [ 503.215067][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.215239][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 503.221774][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.235188][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 503.246355][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.260169][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 503.271298][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.284766][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 503.295699][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.309314][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 508.225485][ C0] net_ratelimit: 13370 callbacks suppressed [ 508.225505][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 508.230316][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 508.233362][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.253768][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 508.259429][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.278381][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 508.285168][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 508.303218][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 508.309786][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.328840][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 513.235036][ C0] net_ratelimit: 11763 callbacks suppressed [ 513.235058][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.238415][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 513.241797][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.261866][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 513.268562][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 513.286845][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 513.293057][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.311232][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 513.317849][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.337965][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 517.080178][T16945] netlink: 209592 bytes leftover after parsing attributes in process `syz.2.3806'. [ 518.244989][ C0] net_ratelimit: 11615 callbacks suppressed [ 518.245011][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 518.245486][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.245848][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.246047][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 518.246326][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 518.246828][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.247187][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.248203][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 518.248640][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.249045][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.255156][ C0] net_ratelimit: 11834 callbacks suppressed [ 523.255178][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.255727][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 523.255818][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 523.256328][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.256745][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.257336][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 523.257836][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.258629][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.259140][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 523.259585][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.265045][ C0] net_ratelimit: 11843 callbacks suppressed [ 528.265067][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.265474][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.266014][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 528.266487][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.266910][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.267468][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 528.267933][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.268348][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.268875][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 528.269339][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.275199][ C0] net_ratelimit: 11821 callbacks suppressed [ 533.275220][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 533.275658][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.276027][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.276563][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 533.277020][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.277396][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.277884][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 533.278315][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.278725][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.279227][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 538.285150][ C0] net_ratelimit: 11914 callbacks suppressed [ 538.285170][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 538.285634][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.286022][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.286514][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 538.286932][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.287422][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.287941][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 538.288366][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.288731][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.289214][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 543.295259][ C0] net_ratelimit: 11785 callbacks suppressed [ 543.295281][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 543.295692][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.296053][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.296521][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 543.296979][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.297360][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.297845][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 543.298269][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.298621][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.299084][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 548.304987][ C0] net_ratelimit: 11845 callbacks suppressed [ 548.305010][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 548.305506][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 548.305956][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 548.306505][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 548.306996][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 548.307426][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 548.307761][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 548.308245][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 548.308709][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 548.309097][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 553.315439][ C0] net_ratelimit: 11663 callbacks suppressed [ 553.315461][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 553.315921][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 553.316297][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 553.316843][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 553.317289][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 553.317688][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 553.318184][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 553.318256][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 553.318646][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 553.319014][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.325323][ C0] net_ratelimit: 11811 callbacks suppressed [ 558.325345][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 558.325455][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 558.325787][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.326162][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.326646][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 558.327078][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.327469][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.328075][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 558.328495][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.328896][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 563.335607][ C0] net_ratelimit: 11860 callbacks suppressed [ 563.335629][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 563.336115][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 563.336499][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 563.336989][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 563.337424][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 563.337813][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 563.338302][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 563.338478][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 563.338755][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 563.339112][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 563.548985][ T1292] ieee802154 phy0 wpan0: encryption failed: -22 [ 563.562420][ T1292] ieee802154 phy1 wpan1: encryption failed: -22 [ 568.345125][ C0] net_ratelimit: 11951 callbacks suppressed [ 568.345148][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.345800][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 568.346216][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.346584][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.347050][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 568.347486][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.347875][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.348340][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 568.348755][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.349106][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 573.355251][ C0] net_ratelimit: 11745 callbacks suppressed [ 573.355273][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 573.355705][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 573.356308][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 573.356740][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 573.357108][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 573.357716][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 573.358500][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 573.358908][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 573.359437][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 573.359866][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 578.365131][ C0] net_ratelimit: 9969 callbacks suppressed [ 578.365152][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.365638][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 578.366066][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.366453][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.366941][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 578.367389][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.367745][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.368485][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 578.368952][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.369340][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.375259][ C0] net_ratelimit: 11925 callbacks suppressed [ 583.375280][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 583.375758][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.376130][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.376632][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 583.377086][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.377227][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 583.377462][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.377984][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 583.378464][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.378840][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.385139][ C0] net_ratelimit: 11532 callbacks suppressed [ 588.385161][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.385585][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.386079][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 588.386494][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.386861][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.387341][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 588.387941][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.388329][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.388819][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 588.389243][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.395227][ C0] net_ratelimit: 11682 callbacks suppressed [ 593.395250][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.395642][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.396122][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 593.396553][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.396908][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.397427][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 593.397852][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.398330][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.398876][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 593.399435][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 598.405132][ C0] net_ratelimit: 10547 callbacks suppressed [ 598.405153][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 598.405749][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 598.406226][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 598.406860][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 598.407426][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 598.407911][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 598.408509][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 598.409081][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 598.409575][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 598.410368][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 603.415295][ C0] net_ratelimit: 11270 callbacks suppressed [ 603.415316][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 603.415751][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 603.416145][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 603.416663][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 603.417083][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 603.417473][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 603.417998][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 603.418448][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 603.418814][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 603.419325][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 608.425223][ C0] net_ratelimit: 11514 callbacks suppressed [ 608.425252][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 608.425707][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 608.426081][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 608.426597][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 608.427025][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 608.427383][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 608.427880][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 608.428328][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 608.428686][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 608.428927][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 613.435135][ C0] net_ratelimit: 11760 callbacks suppressed [ 613.435157][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 613.435639][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 613.436012][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 613.436564][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 613.440136][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 613.445116][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 613.445588][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 613.446170][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 613.446272][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 613.446719][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 618.444991][ C0] net_ratelimit: 11943 callbacks suppressed [ 618.445016][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 618.445480][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 618.445909][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 618.446411][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 618.446856][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 618.446952][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 618.447257][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 618.447756][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 618.448243][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 618.448607][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 623.184930][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 623.184955][ C1] rcu: 1-....: (10485 ticks this GP) idle=6c84/1/0x4000000000000000 softirq=56869/56871 fqs=981 [ 623.185588][ C1] rcu: hardirqs softirqs csw/system [ 623.185600][ C1] rcu: number: 2148675 2056 0 [ 623.185613][ C1] rcu: cputime: 28956 23500 20 ==> 52470(ms) [ 623.185628][ C1] rcu: (t=10500 jiffies g=72157 q=459 ncpus=2) [ 623.185645][ C1] CPU: 1 PID: 16945 Comm: syz.2.3806 Not tainted syzkaller #0 [ 623.185664][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 623.185676][ C1] RIP: 0010:__kernel_text_address+0x29/0x30 [ 623.185709][ C1] Code: 90 66 0f 1f 00 53 48 89 fb e8 23 00 00 00 48 81 fb 00 60 dd 8f 0f 93 c1 48 81 fb 8b 2c f4 8f 0f 92 c2 20 ca 08 c2 0f b6 c2 5b 66 0f 1f 44 00 00 66 0f 1f 00 55 41 56 53 48 81 ff 00 00 00 81 [ 623.185725][ C1] RSP: 0018:ffffc900001efcd8 EFLAGS: 00000202 [ 623.185744][ C1] RAX: 0000000000000001 RBX: ffffc900001efd50 RCX: 0000000000000100 [ 623.185758][ C1] RDX: ffff8880240f1e01 RSI: 0000000000000002 RDI: ffffffff887c596b [ 623.185771][ C1] RBP: 0000000000000002 R08: ffff8880240f1e00 R09: 0000000000000003 [ 623.185784][ C1] R10: 0000000000000004 R11: 0000000000000100 R12: ffffffff895ff7c5 [ 623.185797][ C1] R13: 00000000000002c0 R14: dffffc0000000000 R15: 1ffff9200003dfaa [ 623.185811][ C1] FS: 00007f704581e6c0(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000 [ 623.185828][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 623.185841][ C1] CR2: 0000555f60952608 CR3: 0000000078df2000 CR4: 00000000003506e0 [ 623.185860][ C1] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 623.185873][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 623.185886][ C1] Call Trace: [ 623.185894][ C1] [ 623.185901][ C1] unwind_get_return_address+0x5d/0xc0 [ 623.185922][ C1] ? stack_trace_save+0x100/0x100 [ 623.185946][ C1] arch_stack_walk+0x11d/0x190 [ 623.185971][ C1] ? __netif_receive_skb_core+0xfab/0x3af0 [ 623.185996][ C1] stack_trace_save+0xaa/0x100 [ 623.186018][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 623.186042][ C1] ? stack_trace_save+0xaa/0x100 [ 623.186063][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 623.186091][ C1] kasan_set_track+0x4e/0x70 [ 623.186110][ C1] ? kasan_set_track+0x4e/0x70 [ 623.186129][ C1] ? __kasan_slab_alloc+0x6c/0x80 [ 623.186148][ C1] ? slab_post_alloc_hook+0x6e/0x4b0 [ 623.186172][ C1] ? kmem_cache_alloc_node+0x14c/0x320 [ 623.186196][ C1] ? kmalloc_reserve+0x95/0x240 [ 623.186213][ C1] ? __alloc_skb+0x138/0x2c0 [ 623.186228][ C1] ? fdb_notify+0xa6/0x160 [ 623.186249][ C1] ? br_fdb_update+0x476/0x630 [ 623.186269][ C1] ? br_handle_frame_finish+0x5e5/0x18f0 [ 623.186293][ C1] ? br_nf_hook_thresh+0x3cd/0x4a0 [ 623.186308][ C1] ? br_nf_pre_routing_finish_ipv6+0x9dc/0xd00 [ 623.186328][ C1] ? br_nf_pre_routing_ipv6+0x349/0x6b0 [ 623.186348][ C1] ? br_handle_frame+0x1245/0x14d0 [ 623.186412][ C1] __kasan_slab_alloc+0x6c/0x80 [ 623.186435][ C1] slab_post_alloc_hook+0x6e/0x4b0 [ 623.186466][ C1] kmem_cache_alloc_node+0x14c/0x320 [ 623.186490][ C1] ? kmalloc_reserve+0x95/0x240 [ 623.186513][ C1] kmalloc_reserve+0x95/0x240 [ 623.186535][ C1] __alloc_skb+0x138/0x2c0 [ 623.186564][ C1] fdb_notify+0xa6/0x160 [ 623.186588][ C1] br_fdb_update+0x476/0x630 [ 623.186616][ C1] ? br_fdb_add_local+0x50/0x50 [ 623.186648][ C1] br_handle_frame_finish+0x5e5/0x18f0 [ 623.186680][ C1] ? kvm_sched_clock_read+0x11/0x20 [ 623.186701][ C1] ? sched_clock+0x3f/0x60 [ 623.186722][ C1] ? sched_clock_cpu+0x75/0x430 [ 623.186740][ C1] ? brport_get_ownership+0x80/0x80 [ 623.186765][ C1] ? clockevents_program_event+0x230/0x310 [ 623.186789][ C1] ? local_clock+0x20/0x20 [ 623.186814][ C1] ? mark_lock+0x94/0x320 [ 623.186837][ C1] ? nf_hook_slow+0x16c/0x200 [ 623.186862][ C1] ? brport_get_ownership+0x80/0x80 [ 623.186885][ C1] br_nf_hook_thresh+0x3cd/0x4a0 [ 623.186914][ C1] ? brnf_get_logical_dev+0x270/0x270 [ 623.186936][ C1] ? brport_get_ownership+0x80/0x80 [ 623.186964][ C1] ? nf_bridge_update_protocol+0xfe/0x170 [ 623.186990][ C1] br_nf_pre_routing_finish_ipv6+0x9dc/0xd00 [ 623.187011][ C1] ? brport_get_ownership+0x80/0x80 [ 623.187045][ C1] br_nf_pre_routing_ipv6+0x349/0x6b0 [ 623.187067][ C1] ? br_nf_pre_routing_ipv6+0x3f2/0x6b0 [ 623.187088][ C1] ? br_validate_ipv6+0x730/0x730 [ 623.187111][ C1] ? br_nf_pre_routing_ipv6+0x6b0/0x6b0 [ 623.187130][ C1] ? br_nf_pre_routing+0x70f/0x1420 [ 623.187155][ C1] ? br_nf_hook_thresh+0x4a0/0x4a0 [ 623.187177][ C1] br_handle_frame+0x1245/0x14d0 [ 623.187210][ C1] ? br_handle_frame_dummy+0x10/0x10 [ 623.187237][ C1] ? brport_get_ownership+0x80/0x80 [ 623.187269][ C1] ? br_handle_frame_dummy+0x10/0x10 [ 623.187294][ C1] __netif_receive_skb_core+0xfab/0x3af0 [ 623.187324][ C1] ? perf_trace_preemptirq_template+0x269/0x330 [ 623.187358][ C1] ? qdisc_run+0x230/0x230 [ 623.187383][ C1] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 623.187407][ C1] ? read_lock_is_recursive+0x20/0x20 [ 623.187427][ C1] ? _raw_spin_lock_irq+0xbb/0xf0 [ 623.187452][ C1] ? process_backlog+0x2cf/0x6f0 [ 623.187471][ C1] __netif_receive_skb+0x74/0x290 [ 623.187497][ C1] ? process_backlog+0x2cf/0x6f0 [ 623.187516][ C1] process_backlog+0x391/0x6f0 [ 623.187557][ C1] ? trigger_rx_softirq+0x60/0x60 [ 623.187579][ C1] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 623.187609][ C1] __napi_poll+0xc0/0x460 [ 623.187632][ C1] net_rx_action+0x616/0xc40 [ 623.187665][ C1] ? net_tx_action+0x980/0x980 [ 623.187686][ C1] ? detach_timer+0x2b0/0x2b0 [ 623.187708][ C1] ? lock_chain_count+0x20/0x20 [ 623.187737][ C1] handle_softirqs+0x280/0x820 [ 623.187761][ C1] ? __irq_exit_rcu+0xd3/0x190 [ 623.187785][ C1] ? do_softirq+0x1a0/0x1a0 [ 623.187808][ C1] ? irqtime_account_irq+0xb6/0x1c0 [ 623.187836][ C1] __irq_exit_rcu+0xd3/0x190 [ 623.187855][ C1] ? irq_exit_rcu+0x20/0x20 [ 623.187882][ C1] irq_exit_rcu+0x9/0x20 [ 623.187900][ C1] sysvec_apic_timer_interrupt+0xa4/0xc0 [ 623.187921][ C1] [ 623.187928][ C1] [ 623.187937][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 623.187960][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x5c/0x60 [ 623.187983][ C1] Code: f8 15 00 00 83 fa 02 75 21 48 8b 91 00 16 00 00 48 8b 32 48 8d 7e 01 8b 89 fc 15 00 00 48 39 cf 73 08 48 89 3a 48 89 44 f2 08 0f 1f 00 f3 0f 1e fa 48 8b 04 24 65 48 8b 15 50 93 7c 7e 65 8b [ 623.188000][ C1] RSP: 0018:ffffc9000c56e7b0 EFLAGS: 00000287 [ 623.188017][ C1] RAX: ffffffff8a76cc80 RBX: ffff0a1000000600 RCX: 0000000000080000 [ 623.188032][ C1] RDX: ffffc90011f97000 RSI: 000000000001759f RDI: 00000000000175a0 [ 623.188046][ C1] RBP: ffffffff8acb8b4c R08: ffffc9000c56ea8d R09: 1ffff920018add51 [ 623.188060][ C1] R10: dffffc0000000000 R11: fffff520018add52 R12: ffffc9008c56ea7f [ 623.188074][ C1] R13: ffffc9000c56ea8e R14: 0000000000000001 R15: dffffc0000000000 [ 623.188096][ C1] ? vsnprintf+0x1a90/0x1ba0 [ 623.188125][ C1] vsnprintf+0x1a90/0x1ba0 [ 623.188157][ C1] sprintf+0xe8/0x140 [ 623.188180][ C1] ? verify_lock_unused+0x140/0x140 [ 623.188199][ C1] ? lockdep_hardirqs_on+0x98/0x150 [ 623.188223][ C1] ? vsprintf+0x30/0x30 [ 623.188249][ C1] ? desc_read+0x1b8/0x3f0 [ 623.188279][ C1] info_print_prefix+0x16c/0x360 [ 623.188305][ C1] ? msg_add_dict_text+0x3d0/0x3d0 [ 623.188338][ C1] record_print_text+0x177/0x450 [ 623.188371][ C1] ? kmsg_dump_get_line+0x3e0/0x3e0 [ 623.188397][ C1] ? verify_lock_unused+0x140/0x140 [ 623.188417][ C1] ? trace_call_bpf+0x5e9/0x6c0 [ 623.188452][ C1] printk_get_next_message+0x2ab/0x980 [ 623.188485][ C1] ? trace_raw_output_console+0xd0/0xd0 [ 623.188524][ C1] ? read_lock_is_recursive+0x20/0x20 [ 623.188558][ C1] ? console_flush_all+0x355/0xd20 [ 623.188585][ C1] console_flush_all+0x3a8/0xd20 [ 623.188609][ C1] ? console_flush_all+0x921/0xd20 [ 623.188630][ C1] ? console_flush_all+0x10a/0xd20 [ 623.188657][ C1] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 623.188686][ C1] ? is_console_locked+0x20/0x20 [ 623.188712][ C1] ? console_unlock+0x77/0x350 [ 623.188739][ C1] console_unlock+0xad/0x350 [ 623.188764][ C1] ? other_cpu_in_panic+0xf0/0xf0 [ 623.188789][ C1] ? vprintk_emit+0x29e/0x610 [ 623.188817][ C1] vprintk_emit+0x497/0x610 [ 623.188841][ C1] ? printk_sprint+0x460/0x460 [ 623.188863][ C1] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 623.188899][ C1] _printk+0xde/0x130 [ 623.188923][ C1] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 623.188949][ C1] ? load_image+0x420/0x420 [ 623.188979][ C1] ? __nla_validate_parse+0x2654/0x2ea0 [ 623.189004][ C1] __nla_validate_parse+0x2672/0x2ea0 [ 623.189021][ C1] ? genl_family_rcv_msg_doit+0xce/0x310 [ 623.189040][ C1] ? genl_rcv_msg+0x619/0x7a0 [ 623.189056][ C1] ? netlink_rcv_skb+0x241/0x4d0 [ 623.189100][ C1] ? __nla_validate+0x50/0x50 [ 623.189145][ C1] __nla_parse+0x40/0x50 [ 623.189167][ C1] genl_family_rcv_msg_attrs_parse+0x1c6/0x290 [ 623.189194][ C1] genl_family_rcv_msg_doit+0xce/0x310 [ 623.189214][ C1] ? end_current_label_crit_section+0x170/0x170 [ 623.189242][ C1] ? genl_family_rcv_msg_dumpit+0x310/0x310 [ 623.189265][ C1] ? apparmor_capable+0x137/0x1a0 [ 623.189288][ C1] ? bpf_lsm_capable+0x9/0x10 [ 623.189311][ C1] ? security_capable+0x89/0xb0 [ 623.189342][ C1] genl_rcv_msg+0x619/0x7a0 [ 623.189367][ C1] ? genl_bind+0x360/0x360 [ 623.189385][ C1] ? team_nl_cmd_options_set+0xe40/0xe40 [ 623.189425][ C1] netlink_rcv_skb+0x241/0x4d0 [ 623.189452][ C1] ? genl_bind+0x360/0x360 [ 623.189472][ C1] ? netlink_ack+0x1180/0x1180 [ 623.189517][ C1] ? genl_bind+0x360/0x360 [ 623.189540][ C1] genl_rcv+0x28/0x40 [ 623.189563][ C1] netlink_unicast+0x751/0x8d0 [ 623.189599][ C1] netlink_sendmsg+0x8d0/0xbf0 [ 623.189623][ C1] ? lockdep_hardirqs_on+0x98/0x150 [ 623.189652][ C1] ? netlink_getsockopt+0x590/0x590 [ 623.189681][ C1] ? aa_sock_msg_perm+0x94/0x150 [ 623.189706][ C1] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 623.189727][ C1] ? security_socket_sendmsg+0x80/0xa0 [ 623.189747][ C1] ? netlink_getsockopt+0x590/0x590 [ 623.189775][ C1] ____sys_sendmsg+0x5ba/0x960 [ 623.189801][ C1] ? __asan_memset+0x22/0x40 [ 623.189825][ C1] ? __sys_sendmsg_sock+0x30/0x30 [ 623.189842][ C1] ? __import_iovec+0x5f2/0x850 [ 623.189869][ C1] ? import_iovec+0x73/0xa0 [ 623.189890][ C1] ___sys_sendmsg+0x2a6/0x360 [ 623.189915][ C1] ? __sys_sendmsg+0x2a0/0x2a0 [ 623.189981][ C1] __se_sys_sendmsg+0x1c2/0x2b0 [ 623.190004][ C1] ? __x64_sys_sendmsg+0x80/0x80 [ 623.190038][ C1] ? syscall_enter_from_user_mode+0x2e/0x80 [ 623.190065][ C1] do_syscall_64+0x55/0xa0 [ 623.190081][ C1] ? clear_bhb_loop+0x40/0x90 [ 623.190101][ C1] ? clear_bhb_loop+0x40/0x90 [ 623.190126][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 623.190148][ C1] RIP: 0033:0x7f704499c819 [ 623.190166][ C1] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 623.190198][ C1] RSP: 002b:00007f704581e028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 623.190219][ C1] RAX: ffffffffffffffda RBX: 00007f7044c15fa0 RCX: 00007f704499c819 [ 623.190233][ C1] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000007 [ 623.190246][ C1] RBP: 00007f7044a32c91 R08: 0000000000000000 R09: 0000000000000000 [ 623.190259][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 623.190271][ C1] R13: 00007f7044c16038 R14: 00007f7044c15fa0 R15: 00007ffc483c8808 [ 623.190299][ C1] [ 623.455217][ C0] net_ratelimit: 11932 callbacks suppressed [ 623.455239][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 623.455603][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 623.456410][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 623.456850][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 623.457251][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 623.457778][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 623.458198][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 623.458556][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 623.459049][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 623.459474][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 625.041149][ T1292] ieee802154 phy0 wpan0: encryption failed: -22 [ 625.054960][ T1292] ieee802154 phy1 wpan1: encryption failed: -22 [ 628.465230][ C0] net_ratelimit: 12175 callbacks suppressed [ 628.465252][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 628.465718][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 628.466128][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 628.466669][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 628.467167][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 628.467590][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 628.468128][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 628.468589][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 628.468994][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 628.469558][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 633.475017][ C0] net_ratelimit: 11904 callbacks suppressed [ 633.475039][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 633.475410][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 633.475917][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 633.476362][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 633.476744][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 633.477236][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 633.477658][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 633.478018][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 633.478382][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 633.478535][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 638.485126][ C0] net_ratelimit: 11936 callbacks suppressed [ 638.485147][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.485600][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.486145][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 638.486567][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.487109][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.487594][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.488026][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.488584][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 638.489029][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.489585][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 643.494964][ C0] net_ratelimit: 11780 callbacks suppressed [ 643.494986][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 643.495362][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 643.495871][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 643.496431][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 643.496795][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 643.497270][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 643.497688][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 643.498051][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 643.498582][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 643.498590][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 648.504979][ C0] net_ratelimit: 11765 callbacks suppressed [ 648.505000][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 648.505397][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 648.505723][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 648.506195][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 648.506578][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 648.506906][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 648.507375][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 648.507759][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 648.508130][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 648.508574][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.515465][ C1] net_ratelimit: 11766 callbacks suppressed [ 653.515513][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 653.525233][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 653.525370][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 653.525759][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 653.526190][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.526753][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.527251][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.527706][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.528303][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 653.528798][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:8e:a8:88:a0:35:34, vlan:0) [ 656.119896][ T29] INFO: task kworker/R-wg-cr:12777 blocked for more than 143 seconds. [ 656.119924][ T29] Not tainted syzkaller #0 [ 656.119937][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 656.119954][ T29] task:kworker/R-wg-cr state:D stack:29480 pid:12777 ppid:2 flags:0x00004000 [ 656.120000][ T29] Call Trace: [ 656.120011][ T29] [ 656.120027][ T29] __schedule+0x1553/0x45a0 [ 656.120086][ T29] ? asan.module_dtor+0x20/0x20 [ 656.120119][ T29] ? __mutex_lock+0x6a4/0xcc0 [ 656.120143][ T29] ? __mutex_trylock_common+0x8a/0x260 [ 656.120168][ T29] ? kthread_data+0x4f/0xc0 [ 656.120191][ T29] ? wq_worker_sleeping+0x63/0x240 [ 656.120218][ T29] schedule+0xbd/0x170 [ 656.120247][ T29] schedule_preempt_disabled+0x13/0x20 [ 656.120275][ T29] __mutex_lock+0x6a9/0xcc0 [ 656.120299][ T29] ? __mutex_lock+0x4f9/0xcc0 [ 656.120332][ T29] ? worker_attach_to_pool+0x2e/0x380 [ 656.120361][ T29] ? mutex_lock_nested+0x20/0x20 [ 656.120386][ T29] ? rescuer_thread+0x335/0x10d0 [ 656.120413][ T29] ? lock_chain_count+0x20/0x20 [ 656.120438][ T29] ? _raw_spin_lock_irq+0xbb/0xf0 [ 656.120468][ T29] worker_attach_to_pool+0x2e/0x380 [ 656.120499][ T29] rescuer_thread+0x347/0x10d0 [ 656.120527][ T29] ? lockdep_hardirqs_on+0x98/0x150 [ 656.120557][ T29] ? rescuer_thread+0xbb/0x10d0 [ 656.120590][ T29] ? __kthread_parkme+0x7a/0x1c0 [ 656.120621][ T29] kthread+0x2fa/0x390 [ 656.120642][ T29] ? install_unbound_pwq+0x480/0x480 [ 656.120669][ T29] ? kthread_blkcg+0xd0/0xd0 [ 656.120691][ T29] ret_from_fork+0x48/0x80 [ 656.120715][ T29] ? kthread_blkcg+0xd0/0xd0 [ 656.120738][ T29] ret_from_fork_asm+0x11/0x20 [ 656.120779][ T29] [ 656.120796][ T29] INFO: task kworker/R-wg-cr:13233 blocked for more than 143 seconds. [ 656.120814][ T29] Not tainted syzkaller #0 [ 656.120827][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 656.120839][ T29] task:kworker/R-wg-cr state:D stack:29480 pid:13233 ppid:2 flags:0x00004000 [ 656.120882][ T29] Call Trace: [ 656.120893][ T29] [ 656.120909][ T29] __schedule+0x1553/0x45a0 [ 656.120961][ T29] ? asan.module_dtor+0x20/0x20 [ 656.120993][ T29] ? __mutex_lock+0x6a4/0xcc0 [ 656.121016][ T29] ? __mutex_trylock_common+0x8a/0x260 [ 656.121041][ T29] ? kthread_data+0x4f/0xc0 [ 656.121063][ T29] ? wq_worker_sleeping+0x63/0x240 [ 656.121089][ T29] schedule+0xbd/0x170 [ 656.121118][ T29] schedule_preempt_disabled+0x13/0x20 [ 656.121146][ T29] __mutex_lock+0x6a9/0xcc0 [ 656.121170][ T29] ? __mutex_lock+0x4f9/0xcc0 [ 656.121195][ T29] ? worker_attach_to_pool+0x2e/0x380 [ 656.121222][ T29] ? mutex_lock_nested+0x20/0x20 [ 656.121247][ T29] ? rescuer_thread+0x335/0x10d0 [ 656.121282][ T29] ? lock_chain_count+0x20/0x20 [ 656.121307][ T29] ? _raw_spin_lock_irq+0xbb/0xf0 [ 656.121342][ T29] worker_attach_to_pool+0x2e/0x380 [ 656.121371][ T29] rescuer_thread+0x347/0x10d0 [ 656.121399][ T29] ? lockdep_hardirqs_on+0x98/0x150 [ 656.121427][ T29] ? rescuer_thread+0xbb/0x10d0 [ 656.121461][ T29] ? __kthread_parkme+0x7a/0x1c0 [ 656.121492][ T29] kthread+0x2fa/0x390 [ 656.121512][ T29] ? install_unbound_pwq+0x480/0x480 [ 656.121539][ T29] ? kthread_blkcg+0xd0/0xd0 [ 656.121561][ T29] ret_from_fork+0x48/0x80 [ 656.121585][ T29] ? kthread_blkcg+0xd0/0xd0 [ 656.121608][ T29] ret_from_fork_asm+0x11/0x20 [ 656.121648][ T29] [ 656.121661][ T29] INFO: task kworker/R-wg-cr:13234 blocked for more than 143 seconds. [ 656.121678][ T29] Not tainted syzkaller #0 [ 656.121691][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 656.121704][ T29] task:kworker/R-wg-cr state:D stack:29480 pid:13234 ppid:2 flags:0x00004000 [ 656.121745][ T29] Call Trace: [ 656.121755][ T29] [ 656.121771][ T29] __schedule+0x1553/0x45a0 [ 656.121824][ T29] ? asan.module_dtor+0x20/0x20 [ 656.121855][ T29] ? __mutex_lock+0x6a4/0xcc0 [ 656.121879][ T29] ? __mutex_trylock_common+0x8a/0x260 [ 656.121904][ T29] ? kthread_data+0x4f/0xc0 [ 656.121926][ T29] ? wq_worker_sleeping+0x63/0x240 [ 656.121953][ T29] schedule+0xbd/0x170 [ 656.121981][ T29] schedule_preempt_disabled+0x13/0x20 [ 656.122010][ T29] __mutex_lock+0x6a9/0xcc0 [ 656.122033][ T29] ? __mutex_lock+0x4f9/0xcc0 [ 656.122059][ T29] ? worker_attach_to_pool+0x2e/0x380 [ 656.122087][ T29] ? mutex_lock_nested+0x20/0x20 [ 656.122112][ T29] ? rescuer_thread+0x335/0x10d0 [ 656.122138][ T29] ? lock_chain_count+0x20/0x20 [ 656.122163][ T29] ? _raw_spin_lock_irq+0xbb/0xf0 [ 656.122192][ T29] worker_attach_to_pool+0x2e/0x380 [ 656.122222][ T29] rescuer_thread+0x347/0x10d0 [ 656.122250][ T29] ? lockdep_hardirqs_on+0x98/0x150 [ 656.122276][ T29] ? rescuer_thread+0xbb/0x10d0 [ 656.122315][ T29] ? __kthread_parkme+0x7a/0x1c0 [ 656.122347][ T29] kthread+0x2fa/0x390 [ 656.122368][ T29] ? install_unbound_pwq+0x480/0x480 [ 656.122395][ T29] ? kthread_blkcg+0xd0/0xd0 [ 656.122418][ T29] ret_from_fork+0x48/0x80 [ 656.122442][ T29] ? kthread_blkcg+0xd0/0xd0 [ 656.122464][ T29] ret_from_fork_asm+0x11/0x20 [ 656.122504][ T29] [ 656.122518][ T29] INFO: task kworker/R-wg-cr:13648 blocked for more than 143 seconds. [ 656.122534][ T29] Not tainted syzkaller #0 [ 656.122548][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 656.122559][ T29] task:kworker/R-wg-cr state:D stack:29480 pid:13648 ppid:2 flags:0x00004000 [ 656.122601][ T29] Call Trace: [ 656.122611][ T29] [ 656.122627][ T29] __schedule+0x1553/0x45a0 [ 656.122679][ T29] ? asan.module_dtor+0x20/0x20 [ 656.122711][ T29] ? __mutex_lock+0x6a4/0xcc0 [ 656.122735][ T29] ? __mutex_trylock_common+0x8a/0x260 [ 656.122760][ T29] ? kthread_data+0x4f/0xc0 [ 656.122782][ T29] ? wq_worker_sleeping+0x63/0x240 [ 656.122808][ T29] schedule+0xbd/0x170 [ 656.122837][ T29] schedule_preempt_disabled+0x13/0x20 [ 656.122865][ T29] __mutex_lock+0x6a9/0xcc0 [ 656.122889][ T29] ? __mutex_lock+0x4f9/0xcc0 [ 656.122914][ T29] ? worker_attach_to_pool+0x2e/0x380 [ 656.122942][ T29] ? mutex_lock_nested+0x20/0x20 [ 656.122967][ T29] ? rescuer_thread+0x335/0x10d0 [ 656.122994][ T29] ? lock_chain_count+0x20/0x20 [ 656.123019][ T29] ? _raw_spin_lock_irq+0xbb/0xf0 [ 656.123048][ T29] worker_attach_to_pool+0x2e/0x380 [ 656.123079][ T29] rescuer_thread+0x347/0x10d0 [ 656.123107][ T29] ? lockdep_hardirqs_on+0x98/0x150 [ 656.123135][ T29] ? rescuer_thread+0xbb/0x10d0 [ 656.123169][ T29] ? __kthread_parkme+0x7a/0x1c0 [ 656.123200][ T29] kthread+0x2fa/0x390 [ 656.123221][ T29] ? install_unbound_pwq+0x480/0x480 [ 656.123247][ T29] ? kthread_blkcg+0xd0/0xd0 [ 656.123269][ T29] ret_from_fork+0x48/0x80 [ 656.123290][ T29] ? kthread_blkcg+0xd0/0xd0 [ 656.123320][ T29] ret_from_fork_asm+0x11/0x20 [ 656.123360][ T29] [ 656.123373][ T29] INFO: task kworker/R-wg-cr:13652 blocked for more than 143 seconds. [ 656.123389][ T29] Not tainted syzkaller #0 [ 656.123403][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 656.123415][ T29] task:kworker/R-wg-cr state:D stack:29480 pid:13652 ppid:2 flags:0x00004000 [ 656.123457][ T29] Call Trace: [ 656.123468][ T29] [ 656.123484][ T29] __schedule+0x1553/0x45a0 [ 656.123536][ T29] ? asan.module_dtor+0x20/0x20 [ 656.123566][ T29] ? __mutex_lock+0x6a4/0xcc0 [ 656.123590][ T29] ? __mutex_trylock_common+0x8a/0x260 [ 656.123613][ T29] ? kthread_data+0x4f/0xc0 [ 656.123635][ T29] ? wq_worker_sleeping+0x63/0x240 [ 656.123661][ T29] schedule+0xbd/0x170 [ 656.123690][ T29] schedule_preempt_disabled+0x13/0x20 [ 656.123718][ T29] __mutex_lock+0x6a9/0xcc0 [ 656.123742][ T29] ? __mutex_lock+0x4f9/0xcc0 [ 656.123766][ T29] ? worker_attach_to_pool+0x2e/0x380 [ 656.123794][ T29] ? mutex_lock_nested+0x20/0x20 [ 656.123819][ T29] ? rescuer_thread+0x335/0x10d0 [ 656.123845][ T29] ? lock_chain_count+0x20/0x20 [ 656.123870][ T29] ? _raw_spin_lock_irq+0xbb/0xf0 [ 656.123899][ T29] worker_attach_to_pool+0x2e/0x380 [ 656.123929][ T29] rescuer_thread+0x347/0x10d0 [ 656.123956][ T29] ? lockdep_hardirqs_on+0x98/0x150 [ 656.123986][ T29] ? rescuer_thread+0xbb/0x10d0 [ 656.124018][ T29] ? __kthread_parkme+0x7a/0x1c0 [ 656.124049][ T29] kthread+0x2fa/0x390 [ 656.124070][ T29] ? install_unbound_pwq+0x480/0x480 [ 656.124095][ T29] ? kthread_blkcg+0xd0/0xd0 [ 656.124118][ T29] ret_from_fork+0x48/0x80 [ 656.124141][ T29] ? kthread_blkcg+0xd0/0xd0 [ 656.124164][ T29] ret_from_fork_asm+0x11/0x20 [ 656.124203][ T29] [ 656.124234][ T29] [ 656.124234][ T29] Showing all locks held in the system: [ 656.124249][ T29] 2 locks held by kworker/0:1/9: [ 656.124263][ T29] 2 locks held by kworker/u4:1/12: [ 656.124278][ T29] 1 lock held by kworker/R-mm_pe/13: [ 656.124292][ T29] #0: ffffffff8cfddc48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_attach_to_pool+0x2e/0x380 [ 656.124378][ T29] 2 locks held by kworker/1:0/23: [ 656.124394][ T29] 2 locks held by kworker/1:1/27: [ 656.124408][ T29] 1 lock held by khungtaskd/29: [ 656.124422][ T29] #0: ffffffff8d1320e0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x55/0x290 [ 656.124506][ T29] 3 locks held by kworker/u4:5/141: [ 656.124520][ T29] 2 locks held by kworker/1:2/787: [ 656.124535][ T29] 2 locks held by kworker/0:2/788: [ 656.124554][ T29] 2 locks held by kworker/u4:7/1142: [ 656.124569][ T29] 2 locks held by kworker/0:3/1204: [ 656.124603][ T29] 1 lock held by kworker/R-ipv6_/3152: [ 656.124617][ T29] #0: ffffffff8cfddc48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_attach_to_pool+0x2e/0x380 [ 656.124693][ T29] 2 locks held by klogd/5126: [ 656.124709][ T29] 1 lock held by dhcpcd/5431: [ 656.124724][ T29] 5 locks held by dhcpcd/5432: [ 656.124739][ T29] 2 locks held by crond/5510: [ 656.124753][ T29] 2 locks held by getty/5529: [ 656.124768][ T29] #0: ffff88814c7ae0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 [ 656.124839][ T29] #1: ffffc9000326e2f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x433/0x1390 [ 656.138843][ T29] 2 locks held by syz-executor/5754: [ 656.138861][ T29] 4 locks held by kworker/0:4/5800: [ 656.138876][ T29] 2 locks held by kworker/0:5/5801: [ 656.138891][ T29] #0: ffff888017c72538 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_scheduled_works+0x96f/0x15d0 [ 656.138969][ T29] #1: ffffc9000475fd00 ((work_completion)(&rew->rew_work)){+.+.}-{0:0}, at: process_scheduled_works+0x96f/0x15d0 [ 656.139045][ T29] 3 locks held by kworker/0:6/5802: [ 656.139060][ T29] 2 locks held by kworker/1:3/5821: [ 656.139075][ T29] 3 locks held by kworker/u4:10/6294: [ 656.139091][ T29] 1 lock held by kworker/u4:16/6311: [ 656.139106][ T29] #0: ffffffff8cfddc48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_attach_to_pool+0x2e/0x380 [ 656.139181][ T29] 3 locks held by kworker/u4:19/6322: [ 656.139197][ T29] 3 locks held by kworker/u4:24/6482: [ 656.139211][ T29] #0: ffff888017c71538 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x96f/0x15d0 [ 656.139293][ T29] #1: ffffc90003827d00 ((work_completion)(&pool->idle_cull_work)){+.+.}-{0:0}, at: process_scheduled_works+0x96f/0x15d0 [ 656.139506][ T29] #2: ffffffff8cfddc48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: idle_cull_fn+0xd7/0x520 [ 656.139574][ T29] 3 locks held by kworker/u4:26/6486: [ 656.139587][ T29] 2 locks held by kworker/1:4/6541: [ 656.139600][ T29] 1 lock held by kworker/R-wg-cr/12777: [ 656.139615][ T29] #0: ffffffff8cfddc48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_attach_to_pool+0x2e/0x380 [ 656.139690][ T29] 1 lock held by kworker/R-wg-cr/12778: [ 656.139705][ T29] #0: ffffffff8cfddc48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_attach_to_pool+0x2e/0x380 [ 656.139780][ T29] 1 lock held by syz-executor/13052: [ 656.139802][ T29] #0: ffffffff8d137ab8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x3da/0x880 [ 656.139881][ T29] 1 lock held by kworker/R-wg-cr/13103: [ 656.139897][ T29] 1 lock held by kworker/R-wg-cr/13104: [ 656.139911][ T29] #0: ffffffff8cfddc48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_attach_to_pool+0x2e/0x380 [ 656.139986][ T29] 1 lock held by kworker/R-wg-cr/13105: [ 656.140000][ T29] #0: ffffffff8cfddc48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_attach_to_pool+0x2e/0x380 [ 656.140075][ T29] 1 lock held by kworker/R-wg-cr/13233: [ 656.140090][ T29] #0: ffffffff8cfddc48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_attach_to_pool+0x2e/0x380 [ 656.140164][ T29] 1 lock held by kworker/R-wg-cr/13234: [ 656.140178][ T29] #0: ffffffff8cfddc48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_attach_to_pool+0x2e/0x380 [ 656.140253][ T29] 2 locks held by kworker/1:5/13245: [ 656.140269][ T29] 1 lock held by kworker/R-wg-cr/13648: [ 656.140284][ T29] #0: ffffffff8cfddc48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_attach_to_pool+0x2e/0x380 [ 656.140367][ T29] 1 lock held by kworker/R-wg-cr/13651: [ 656.140382][ T29] #0: ffffffff8cfddc48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_attach_to_pool+0x2e/0x380 [ 656.140465][ T29] 1 lock held by kworker/R-wg-cr/13652: [ 656.140480][ T29] #0: ffffffff8cfddc48 (wq_pool_attach_mutex){+.+.}-{3:3}, at: worker_attach_to_pool+0x2e/0x380 [ 656.140553][ T29] 5 locks held by syz.2.3806/16945: [ 656.140567][ T29] 1 lock held by syz-executor/16949: [ 656.140582][ T29] #0: ffffffff8d137ab8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x306/0x880 [ 656.140659][ T29] 2 locks held by syz-executor/16952: [ 656.140673][ T29] 2 locks held by syz-executor/16954: [ 656.140689][ T29] 1 lock held by dhcpcd/16955: [ 656.140703][ T29] #0: ffff88807ec02130 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x32/0xcc0 [ 656.140774][ T29] 1 lock held by dhcpcd/16956: [ 656.140787][ T29] #0: ffff88805af58130 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x32/0xcc0 [ 656.140855][ T29] 2 locks held by syz-executor/16957: [ 656.140871][ T29] [ 656.140880][ T29] ============================================= [ 656.140880][ T29] [ 656.140903][ T29] NMI backtrace for cpu 0 [ 656.140913][ T29] CPU: 0 PID: 29 Comm: khungtaskd Not tainted syzkaller #0 [ 656.140929][ T29] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 656.140940][ T29] Call Trace: [ 656.140948][ T29] [ 656.140955][ T29] dump_stack_lvl+0x18c/0x250 [ 656.140982][ T29] ? nmi_cpu_backtrace+0x1b6/0x3e0 [ 656.141001][ T29] ? show_regs_print_info+0x20/0x20 [ 656.141026][ T29] ? load_image+0x420/0x420 [ 656.141058][ T29] nmi_cpu_backtrace+0x3a6/0x3e0 [ 656.141078][ T29] ? nmi_trigger_cpumask_backtrace+0x2f0/0x2f0 [ 656.141095][ T29] ? _printk+0xde/0x130 [ 656.141115][ T29] ? load_image+0x420/0x420 [ 656.141138][ T29] ? load_image+0x420/0x420 [ 656.141163][ T29] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 656.141189][ T29] nmi_trigger_cpumask_backtrace+0x17a/0x2f0 [ 656.141210][ T29] watchdog+0xf3d/0xf80 [ 656.141232][ T29] ? watchdog+0x1e1/0xf80 [ 656.141260][ T29] kthread+0x2fa/0x390 [ 656.141277][ T29] ? hungtask_pm_notify+0x90/0x90 [ 656.141299][ T29] ? kthread_blkcg+0xd0/0xd0 [ 656.141323][ T29] ret_from_fork+0x48/0x80 [ 656.141342][ T29] ? kthread_blkcg+0xd0/0xd0 [ 656.141360][ T29] ret_from_fork_asm+0x11/0x20 [ 656.141393][ T29] [ 656.141402][ T29] Sending NMI from CPU 0 to CPUs 1: [ 656.141432][ C1] NMI backtrace for cpu 1 [ 656.141442][ C1] CPU: 1 PID: 16945 Comm: syz.2.3806 Not tainted syzkaller #0 [ 656.141457][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 656.141466][ C1] RIP: 0010:native_apic_msr_write+0x39/0x50 [ 656.141486][ C1] Code: 74 2a 83 ff 30 74 25 eb 10 81 ff d0 00 00 00 74 1b 81 ff e0 00 00 00 74 13 c1 ef 04 81 c7 00 08 00 00 89 f9 89 f0 31 d2 0f 30 <66> 90 c3 89 f6 31 d2 e9 4b f8 23 03 66 2e 0f 1f 84 00 00 00 00 00 [ 656.141500][ C1] RSP: 0018:ffffc900001efdd0 EFLAGS: 00000046 [ 656.141513][ C1] RAX: 000000000000025b RBX: ffff8880b8f28280 RCX: 0000000000000838 [ 656.141533][ C1] RDX: 0000000000000000 RSI: 000000000000025b RDI: 0000000000000838 [ 656.141542][ C1] RBP: 0000000000000000 R08: ffffffff8e8b15ef R09: 1ffffffff1d162bd [ 656.141553][ C1] R10: dffffc0000000000 R11: fffffbfff1d162be R12: dffffc0000000000 [ 656.141570][ C1] R13: 00000000100062fc R14: 000000000000025b R15: 0000000000000020 [ 656.141581][ C1] FS: 00007f704581e6c0(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000 [ 656.141595][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 656.141606][ C1] CR2: 0000555f60952608 CR3: 0000000078df2000 CR4: 00000000003506e0 [ 656.141621][ C1] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 656.141630][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 656.141640][ C1] Call Trace: [ 656.141646][ C1] [ 656.141651][ C1] lapic_next_event+0x11/0x20 [ 656.141668][ C1] clockevents_program_event+0x1c0/0x310 [ 656.141691][ C1] hrtimer_interrupt+0x5a1/0x9c0 [ 656.141720][ C1] __sysvec_apic_timer_interrupt+0xfb/0x3b0 [ 656.141740][ C1] sysvec_apic_timer_interrupt+0x51/0xc0 [ 656.141758][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 656.141777][ C1] RIP: 0010:lock_is_held_type+0x13e/0x190 [ 656.141795][ C1] Code: 75 40 48 c7 04 24 00 00 00 00 9c 8f 04 24 f7 04 24 00 02 00 00 75 46 41 f7 c5 00 02 00 00 74 01 fb 65 48 8b 04 25 28 00 00 00 <48> 3b 44 24 08 75 3c 89 e8 48 83 c4 10 5b 41 5c 41 5d 41 5e 41 5f [ 656.141808][ C1] RSP: 0018:ffffc900001f0038 EFLAGS: 00000206 [ 656.141820][ C1] RAX: 46819f7f3d771e00 RBX: ffff8880240f1e00 RCX: 46819f7f3d771e00 [ 656.141832][ C1] RDX: 0000000000000100 RSI: ffffffff8acadb60 RDI: ffffffff8b1c8e60 [ 656.141843][ C1] RBP: 0000000000000000 R08: ffff8880240f1e00 R09: 0000000000000004 [ 656.141853][ C1] R10: 0000000000000003 R11: 0000000000000100 R12: 0000000000000005 [ 656.141863][ C1] R13: 0000000000000246 R14: ffff8880764e9520 R15: ffff8880240f29a8 [ 656.141885][ C1] rhashtable_lookup+0x548/0x7f0 [ 656.141913][ C1] ? br_mdb_ip_get+0x230/0x230 [ 656.141942][ C1] br_mdb_get+0x61d/0x850 [ 656.141964][ C1] ? rcu_read_unlock+0xa0/0xa0 [ 656.141986][ C1] ? br_fdb_add_local+0x50/0x50 [ 656.142008][ C1] br_handle_frame_finish+0xc22/0x18f0 [ 656.142034][ C1] ? brport_get_ownership+0x80/0x80 [ 656.142057][ C1] ? ip6t_do_table+0x1d9/0x1510 [ 656.142078][ C1] ? nf_hook_slow+0x16c/0x200 [ 656.142097][ C1] ? brport_get_ownership+0x80/0x80 [ 656.142115][ C1] br_nf_hook_thresh+0x3cd/0x4a0 [ 656.142135][ C1] ? brnf_get_logical_dev+0x270/0x270 [ 656.142152][ C1] ? brport_get_ownership+0x80/0x80 [ 656.142177][ C1] br_nf_pre_routing_finish_ipv6+0x9dc/0xd00 [ 656.142193][ C1] ? brport_get_ownership+0x80/0x80 [ 656.142218][ C1] br_nf_pre_routing_ipv6+0x349/0x6b0 [ 656.142234][ C1] ? br_nf_pre_routing_ipv6+0x3f2/0x6b0 [ 656.142251][ C1] ? br_validate_ipv6+0x730/0x730 [ 656.142267][ C1] ? br_nf_pre_routing_ipv6+0x6b0/0x6b0 [ 656.142283][ C1] ? br_nf_pre_routing+0x70f/0x1420 [ 656.142301][ C1] ? br_nf_hook_thresh+0x4a0/0x4a0 [ 656.142317][ C1] br_handle_frame+0x1245/0x14d0 [ 656.142341][ C1] ? br_handle_frame_dummy+0x10/0x10 [ 656.142362][ C1] ? brport_get_ownership+0x80/0x80 [ 656.142381][ C1] ? ip6_mc_input+0xaa0/0xcb0 [ 656.142403][ C1] ? br_handle_frame_dummy+0x10/0x10 [ 656.142422][ C1] __netif_receive_skb_core+0xfab/0x3af0 [ 656.142443][ C1] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 656.142466][ C1] ? qdisc_run+0x230/0x230 [ 656.142484][ C1] ? process_backlog+0x2cf/0x6f0 [ 656.142501][ C1] ? read_lock_is_recursive+0x20/0x20 [ 656.142519][ C1] ? process_backlog+0x2cf/0x6f0 [ 656.142535][ C1] __netif_receive_skb+0x74/0x290 [ 656.142553][ C1] ? process_backlog+0x2cf/0x6f0 [ 656.142575][ C1] process_backlog+0x391/0x6f0 [ 656.142598][ C1] ? trigger_rx_softirq+0x60/0x60 [ 656.142614][ C1] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 656.142632][ C1] ? lock_chain_count+0x20/0x20 [ 656.142650][ C1] __napi_poll+0xc0/0x460 [ 656.142664][ C1] ? net_rx_action+0x3a0/0xc40 [ 656.142681][ C1] net_rx_action+0x616/0xc40 [ 656.142703][ C1] ? net_tx_action+0x980/0x980 [ 656.142718][ C1] ? detach_timer+0x2b0/0x2b0 [ 656.142741][ C1] handle_softirqs+0x280/0x820 [ 656.142759][ C1] ? __irq_exit_rcu+0xd3/0x190 [ 656.142776][ C1] ? do_softirq+0x1a0/0x1a0 [ 656.142793][ C1] ? irqtime_account_irq+0xb6/0x1c0 [ 656.142813][ C1] __irq_exit_rcu+0xd3/0x190 [ 656.142828][ C1] ? irq_exit_rcu+0x20/0x20 [ 656.142847][ C1] irq_exit_rcu+0x9/0x20 [ 656.142860][ C1] sysvec_apic_timer_interrupt+0xa4/0xc0 [ 656.142878][ C1] [ 656.142882][ C1] [ 656.142887][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 656.142906][ C1] RIP: 0010:string+0x26f/0x2b0 [ 656.142924][ C1] Code: 24 eb 13 e8 23 3e 10 f7 4d 8d 74 1e 01 4c 8b 24 24 48 8b 74 24 10 4c 89 f7 48 8b 54 24 08 4c 89 e1 eb 2e e8 03 3e 10 f7 89 de <49> 89 ee 48 8b 1c 24 eb 13 e8 f3 3d 10 f7 4d 8d 74 1e 01 48 8b 1c [ 656.142936][ C1] RSP: 0018:ffffc9000c56e768 EFLAGS: 00000283 [ 656.142947][ C1] RAX: ffffffff8a76e3fd RBX: 0000000000000002 RCX: 0000000000080000 [ 656.142957][ C1] RDX: ffffc90011f97000 RSI: 0000000000000002 RDI: 000000000001c751 [ 656.142967][ C1] RBP: ffffc9000c56ea91 R08: ffff8880240f1e00 R09: 0000000000000012 [ 656.142978][ C1] R10: 0000000000000012 R11: 0000000000000002 R12: ffffc9000c56e980 [ 656.142988][ C1] R13: 0000000000000000 R14: ffffc9000c56ea8f R15: fffffffffffffffe [ 656.143002][ C1] ? string+0x26d/0x2b0 [ 656.143022][ C1] ? string+0x26d/0x2b0 [ 656.143042][ C1] vsnprintf+0xf72/0x1ba0 [ 656.143065][ C1] sprintf+0xe8/0x140 [ 656.143085][ C1] ? vsprintf+0x30/0x30 [ 656.143104][ C1] ? desc_read+0x1b8/0x3f0 [ 656.143127][ C1] info_print_prefix+0x210/0x360 [ 656.143148][ C1] ? msg_add_dict_text+0x3d0/0x3d0 [ 656.143171][ C1] record_print_text+0x177/0x450 [ 656.143192][ C1] ? __bpf_trace_bpf_trace_printk+0x100/0x100 [ 656.143215][ C1] ? kmsg_dump_get_line+0x3e0/0x3e0 [ 656.143241][ C1] printk_get_next_message+0x2ab/0x980 [ 656.143264][ C1] ? trace_raw_output_console+0xd0/0xd0 [ 656.143284][ C1] ? lock_chain_count+0x20/0x20 [ 656.143304][ C1] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 656.143327][ C1] ? console_flush_all+0x355/0xd20 [ 656.143346][ C1] console_flush_all+0x3a8/0xd20 [ 656.143365][ C1] ? console_flush_all+0x921/0xd20 [ 656.143382][ C1] ? console_flush_all+0x10a/0xd20 [ 656.143402][ C1] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 656.143423][ C1] ? is_console_locked+0x20/0x20 [ 656.143443][ C1] ? console_unlock+0x77/0x350 [ 656.143463][ C1] console_unlock+0xad/0x350 [ 656.143481][ C1] ? other_cpu_in_panic+0xf0/0xf0 [ 656.143500][ C1] ? vprintk_emit+0x29e/0x610 [ 656.143520][ C1] vprintk_emit+0x497/0x610 [ 656.143538][ C1] ? printk_sprint+0x460/0x460 [ 656.143555][ C1] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 656.143585][ C1] _printk+0xde/0x130 [ 656.143604][ C1] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 656.143624][ C1] ? load_image+0x420/0x420 [ 656.143645][ C1] ? __nla_validate_parse+0x2654/0x2ea0 [ 656.143663][ C1] __nla_validate_parse+0x2672/0x2ea0 [ 656.143677][ C1] ? genl_family_rcv_msg_doit+0xce/0x310 [ 656.143693][ C1] ? genl_rcv_msg+0x619/0x7a0 [ 656.143706][ C1] ? netlink_rcv_skb+0x241/0x4d0 [ 656.143736][ C1] ? __nla_validate+0x50/0x50 [ 656.143763][ C1] __nla_parse+0x40/0x50 [ 656.143779][ C1] genl_family_rcv_msg_attrs_parse+0x1c6/0x290 [ 656.143799][ C1] genl_family_rcv_msg_doit+0xce/0x310 [ 656.143815][ C1] ? end_current_label_crit_section+0x170/0x170 [ 656.143836][ C1] ? genl_family_rcv_msg_dumpit+0x310/0x310 [ 656.143854][ C1] ? apparmor_capable+0x137/0x1a0 [ 656.143871][ C1] ? bpf_lsm_capable+0x9/0x10 [ 656.143891][ C1] ? security_capable+0x89/0xb0 [ 656.143912][ C1] genl_rcv_msg+0x619/0x7a0 [ 656.143930][ C1] ? genl_bind+0x360/0x360 [ 656.143944][ C1] ? team_nl_cmd_options_set+0xe40/0xe40 [ 656.143973][ C1] netlink_rcv_skb+0x241/0x4d0 [ 656.143994][ C1] ? genl_bind+0x360/0x360 [ 656.144009][ C1] ? netlink_ack+0x1180/0x1180 [ 656.144039][ C1] ? genl_bind+0x360/0x360 [ 656.144055][ C1] genl_rcv+0x28/0x40 [ 656.144068][ C1] netlink_unicast+0x751/0x8d0 [ 656.144093][ C1] netlink_sendmsg+0x8d0/0xbf0 [ 656.144113][ C1] ? lockdep_hardirqs_on+0x98/0x150 [ 656.144134][ C1] ? netlink_getsockopt+0x590/0x590 [ 656.144156][ C1] ? aa_sock_msg_perm+0x94/0x150 [ 656.144175][ C1] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 656.144192][ C1] ? security_socket_sendmsg+0x80/0xa0 [ 656.144209][ C1] ? netlink_getsockopt+0x590/0x590 [ 656.144230][ C1] ____sys_sendmsg+0x5ba/0x960 [ 656.144248][ C1] ? __asan_memset+0x22/0x40 [ 656.144268][ C1] ? __sys_sendmsg_sock+0x30/0x30 [ 656.144282][ C1] ? __import_iovec+0x5f2/0x850 [ 656.144301][ C1] ? import_iovec+0x73/0xa0 [ 656.144317][ C1] ___sys_sendmsg+0x2a6/0x360 [ 656.144335][ C1] ? __sys_sendmsg+0x2a0/0x2a0 [ 656.144373][ C1] __se_sys_sendmsg+0x1c2/0x2b0 [ 656.144389][ C1] ? __x64_sys_sendmsg+0x80/0x80 [ 656.144412][ C1] ? syscall_enter_from_user_mode+0x2e/0x80 [ 656.144432][ C1] do_syscall_64+0x55/0xa0 [ 656.144445][ C1] ? clear_bhb_loop+0x40/0x90 [ 656.144463][ C1] ? clear_bhb_loop+0x40/0x90 [ 656.144481][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 656.144499][ C1] RIP: 0033:0x7f704499c819 [ 656.144512][ C1] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 656.144524][ C1] RSP: 002b:00007f704581e028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 656.144538][ C1] RAX: ffffffffffffffda RBX: 00007f7044c15fa0 RCX: 00007f704499c819 [ 656.144549][ C1] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000007 [ 656.144565][ C1] RBP: 00007f7044a32c91 R08: 0000000000000000 R09: 0000000000000000 [ 656.144575][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 656.144584][ C1] R13: 00007f7044c16038 R14: 00007f7044c15fa0 R15: 00007ffc483c8808 [ 656.144602][ C1] [ 656.158099][ T29] Kernel panic - not syncing: hung_task: blocked tasks [ 656.158114][ T29] CPU: 0 PID: 29 Comm: khungtaskd Not tainted syzkaller #0 [ 656.158133][ T29] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 656.158142][ T29] Call Trace: [ 656.158149][ T29] [ 656.158156][ T29] dump_stack_lvl+0x18c/0x250 [ 656.158188][ T29] ? show_regs_print_info+0x20/0x20 [ 656.158214][ T29] ? load_image+0x420/0x420 [ 656.158245][ T29] panic+0x2dc/0x730 [ 656.158265][ T29] ? schedule_preempt_disabled+0x20/0x20 [ 656.158293][ T29] ? bpf_jit_dump+0xd0/0xd0 [ 656.158318][ T29] ? __irq_work_queue_local+0x13a/0x3b0 [ 656.158343][ T29] ? nmi_trigger_cpumask_backtrace+0x2a4/0x2f0 [ 656.158367][ T29] watchdog+0xf7c/0xf80 [ 656.158390][ T29] ? watchdog+0x1e1/0xf80 [ 656.158417][ T29] kthread+0x2fa/0x390 [ 656.158432][ T29] ? hungtask_pm_notify+0x90/0x90 [ 656.158453][ T29] ? kthread_blkcg+0xd0/0xd0 [ 656.158470][ T29] ret_from_fork+0x48/0x80 [ 656.158488][ T29] ? kthread_blkcg+0xd0/0xd0 [ 656.158505][ T29] ret_from_fork_asm+0x11/0x20 [ 656.158537][ T29] [ 656.159058][ T29] Kernel Offset: disabled