last executing test programs: 2m36.337329448s ago: executing program 2 (id=2168): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0xcc, 0xc, 0x1010}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000808500000082000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f00000021c0)={r2, 0x0, 0x0}, 0x10) 2m36.09950897s ago: executing program 2 (id=2171): r0 = socket$kcm(0x10, 0x3, 0x0) close(0x3) r1 = socket$kcm(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x64, &(0x7f0000000000)=r4, 0x10) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000140)=[{&(0x7f00000005c0)="df", 0x1}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x102) 2m35.68551783s ago: executing program 2 (id=2173): perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000500)={0x7, 0x80, 0xe8, 0xbb, 0x1, 0x0, 0x0, 0x7fffffff, 0x4000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000004c0), 0x6}, 0xb000, 0x8, 0x3, 0x8, 0x5, 0xffff, 0x3, 0x0, 0x7f, 0x0, 0x6e0a}, r2, 0x7, r0, 0x7) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x74, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509c5bb", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r1, 0x0, 0x40002002) recvmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/47, 0x2f}, {&(0x7f0000000880)=""/4096, 0x1000}], 0x2, &(0x7f0000000080)=""/162, 0xa2}, 0x40000040) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x89, 0x1, 0x0, 0x0, 0x0, 0x34, 0x2, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x2}, 0x8002, 0x2, 0xfffffffe, 0x0, 0x200, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x0, 0x9a, 0x0, 0xfd, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x408, 0xca, 0xfffffffc, 0x2, 0xfffffffffffffffc, 0x8}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000580), 0x4) bpf$ITER_CREATE(0x21, &(0x7f00000005c0)={r5}, 0x8) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r6, &(0x7f0000000200)=ANY=[], 0x12) 2m35.427922123s ago: executing program 2 (id=2177): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0xcc, 0xc, 0x1010}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0xe, 0x4, 0x8, 0x8001, 0x4}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000080850000008200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f00000021c0)={r2, 0x0, 0x0}, 0x10) (fail_nth: 1) 2m35.131211957s ago: executing program 2 (id=2178): bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0xffffffff, 0x0, 0xb, 0x3}, {0x10000002, 0x20, 0x400084, 0x3}]}, 0x94) close(0x3) r0 = socket$kcm(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000)=r3, 0x10) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000140)=[{&(0x7f00000005c0)="df", 0x1}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x102) 2m34.686882499s ago: executing program 2 (id=2181): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x640b9, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b07, 0x2, @perf_bp={0x0, 0xc}, 0x8500, 0x5, 0x43a1bd76, 0x7, 0x2, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() (async) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x6, 0x5, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000700), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, 0xfffd}, 0x0, 0xd, r1, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x400, 0x10506, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x1000000000000801, 0x1}, 0x7402, 0x0, 0x0, 0x9, 0x0, 0xffffffff, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = socket$kcm(0x2b, 0x1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x10, 0x4, &(0x7f0000000000)=ANY=[@ANYRESHEX=r2], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x94) (async, rerun: 32) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) (async, rerun: 32) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYRES8=r0, @ANYRESDEC=r2], 0xfdef) (async) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x100008}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b1a, &(0x7f0000000000)={'wlan1\x00', @random="000000000402"}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd63"], 0xcfa4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xff00}, 0x48) (async) setsockopt$sock_attach_bpf(r3, 0x6, 0x10, &(0x7f0000000200), 0x4) (async) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r7, 0x80082407, &(0x7f0000000240)) (async, rerun: 64) close(r2) (async, rerun: 64) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={@cgroup, 0x37, 0x1, 0x800, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)=[0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0]}, 0x40) (async) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r8) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd8e, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, 0x8, 0x0, 0x0}}, 0x10) (async, rerun: 32) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYRES64=r4, @ANYRES32=r4, @ANYRES16=r3, @ANYRESOCT=0x0, @ANYRES64=r5, @ANYBLOB="0400000002000000050000000000000000000000000000000000fe0952634f5e0699ca48fc3482ca510ac73e468dc91f048d998a94a86dcd4a0abcf391a317123d177f33b73fcef02a5b9887d5bc30978a2d89138658f09caa3d2c4cdac0144828f767c97392b1c3e327068e5d5eb775f230b22b573fd98fe6915dc3683a9fc15977dc50ddd5ea307e6ca38a7352da11f1aef468a4c2fb08778f407206690ae49ce807cf80c3c3a095c6ac2eaf98f2bbda514550c84270f0004f985ea10d1485f9"], 0x50) (async) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)=@generic={&(0x7f0000000580)='./file0\x00'}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x6, &(0x7f0000000280)=ANY=[@ANYBLOB="18fc6700", @ANYRES32=r8, @ANYBLOB="000000000000000085200000020000004f55020001000000184900000400"/40], &(0x7f00000002c0)='syzkaller\x00', 0x5, 0x1b, &(0x7f00000003c0)=""/27, 0x41100, 0x28, '\x00', r9, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x10, 0x11, 0x9}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000005c0)=[r8, r10, r11, r7, r7, 0x1, 0x1, r7], &(0x7f0000000600)=[{0x0, 0x4, 0x10, 0x8}], 0x10, 0x7ff}, 0x94) (async) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x2400, 0x3ff) (async) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24040080) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000140), 0x55) 2m19.39812503s ago: executing program 32 (id=2181): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x640b9, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b07, 0x2, @perf_bp={0x0, 0xc}, 0x8500, 0x5, 0x43a1bd76, 0x7, 0x2, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() (async) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x6, 0x5, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000700), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, 0xfffd}, 0x0, 0xd, r1, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x400, 0x10506, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x1000000000000801, 0x1}, 0x7402, 0x0, 0x0, 0x9, 0x0, 0xffffffff, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = socket$kcm(0x2b, 0x1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x10, 0x4, &(0x7f0000000000)=ANY=[@ANYRESHEX=r2], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x94) (async, rerun: 32) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) (async, rerun: 32) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYRES8=r0, @ANYRESDEC=r2], 0xfdef) (async) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x100008}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b1a, &(0x7f0000000000)={'wlan1\x00', @random="000000000402"}) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd63"], 0xcfa4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xff00}, 0x48) (async) setsockopt$sock_attach_bpf(r3, 0x6, 0x10, &(0x7f0000000200), 0x4) (async) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r7, 0x80082407, &(0x7f0000000240)) (async, rerun: 64) close(r2) (async, rerun: 64) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={@cgroup, 0x37, 0x1, 0x800, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)=[0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0]}, 0x40) (async) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r8) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd8e, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, 0x8, 0x0, 0x0}}, 0x10) (async, rerun: 32) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYRES64=r4, @ANYRES32=r4, @ANYRES16=r3, @ANYRESOCT=0x0, @ANYRES64=r5, @ANYBLOB="0400000002000000050000000000000000000000000000000000fe0952634f5e0699ca48fc3482ca510ac73e468dc91f048d998a94a86dcd4a0abcf391a317123d177f33b73fcef02a5b9887d5bc30978a2d89138658f09caa3d2c4cdac0144828f767c97392b1c3e327068e5d5eb775f230b22b573fd98fe6915dc3683a9fc15977dc50ddd5ea307e6ca38a7352da11f1aef468a4c2fb08778f407206690ae49ce807cf80c3c3a095c6ac2eaf98f2bbda514550c84270f0004f985ea10d1485f9"], 0x50) (async) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)=@generic={&(0x7f0000000580)='./file0\x00'}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x6, &(0x7f0000000280)=ANY=[@ANYBLOB="18fc6700", @ANYRES32=r8, @ANYBLOB="000000000000000085200000020000004f55020001000000184900000400"/40], &(0x7f00000002c0)='syzkaller\x00', 0x5, 0x1b, &(0x7f00000003c0)=""/27, 0x41100, 0x28, '\x00', r9, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0x10, 0x11, 0x9}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000005c0)=[r8, r10, r11, r7, r7, 0x1, 0x1, r7], &(0x7f0000000600)=[{0x0, 0x4, 0x10, 0x8}], 0x10, 0x7ff}, 0x94) (async) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x2400, 0x3ff) (async) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24040080) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000140), 0x55) 15.969714815s ago: executing program 0 (id=2706): mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r0 = socket$kcm(0x22, 0x2, 0x21) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x80044944, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000480)="5c00000012006bab9a3fe3d86e17aa0b046b876c1d0048380019001931a0e69ee517d34460bc06000000a701251e6182949a3651f60a84c9f4d4938037e70e4509c51c268811000000000000000000002571cd53b9851b30599980bc", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000780)=""/174, 0xae}, {&(0x7f0000000140)=""/219, 0xdb}, {&(0x7f0000001b40)=""/4050, 0xfd2}, {&(0x7f0000002b40)=""/4090, 0xffa}, {&(0x7f00000002c0)=""/113, 0x71}, {&(0x7f0000000500)=""/151, 0x97}], 0x6}, 0x2020) recvmsg$kcm(r1, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x80) 15.745440816s ago: executing program 0 (id=2710): r0 = socket$kcm(0x11, 0x3, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x8, &(0x7f0000000080)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5}, @ringbuf_query, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000000c0)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x31, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000180)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0x7, 0x1, 0x80000001}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000240)=[0xffffffffffffffff, 0x1, r0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000280)=[{0x2, 0x1, 0x5, 0x6}, {0x3, 0x4, 0x9, 0x9}, {0x1, 0x1, 0xe, 0x5}, {0x1, 0x4, 0x10, 0x7}, {0x1, 0x4, 0xe, 0x6}, {0x1, 0x3, 0xb, 0x8}], 0x10, 0x2}, 0x94) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000003c0)=r1, 0x4) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@phonet={0x23, 0xa, 0x3, 0x8f}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000040)="27050200420014000600002fb96d", 0xe}], 0x1}, 0x0) 15.561120975s ago: executing program 0 (id=2711): write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f39138e486dd6349080006"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0763707573740153646370750806"], 0x12) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000020000000000000000ee0000"], 0x0}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xec}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 15.218367922s ago: executing program 0 (id=2715): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x1000, 0x2, 0xffffff7e, 0x8, 0x0, 0xfffffffe, 0x1ff, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000080)=@framed={{0x18, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x66}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, @exit, @alu={0x4, 0x0, 0xc, 0x3}]}, &(0x7f0000001300)='GPL\x00'}, 0x94) (async) socket$kcm(0x2, 0x5, 0x84) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x280, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000040)={r3}, 0x8) r5 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r5, 0x6, 0x3, &(0x7f00000000c0)=r4, 0x4) (async) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x5, 0x0, 0x80}, {0x40, 0x0, 0x0, 0x3}, {0x6, 0xc, 0x0, 0x100b100}]}) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) (async) perf_event_open(&(0x7f0000000500)={0x3, 0x80, 0x28, 0x1, 0x7, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={&(0x7f0000000900), 0x8}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12008, 0x0, 0x100000, 0x0, 0x2, 0x0, 0x80}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x8) (async) bpf$ITER_CREATE(0xb, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r1, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0], 0x0, 0xe6, &(0x7f0000000240)=[{}, {}], 0x10, 0x10, &(0x7f00000002c0), &(0x7f0000000580), 0x8, 0xd5, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000800)=r8, 0x4) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x7}, 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0xd, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b5af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000d000000850000000700000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x64200600, &(0x7f0000000840)="395cfc6f8fbb7b21ce14dacda33cbcf0045c83d02e706db5f2dd5d1ec3a225ff5da83afe1e786def6a98067382efd5cd4c2d881158be949e5c5ec4c2ba", 0x3d, &(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000a40)="77b488c18bfc55638864832de4937a3f46800b3b0570f9384dbf2150573ab90a6da2a4d4c15af4fcf55dc7068f439c37f883f2ba70bc3e271d70a8d60bef5033a0e14673483b727e9cfed48170689c321dca524b2ce51fbd956240e9085147ef46343e4d2ba8ee223a5140be085e52259edf54ef615dfa705a9ed048adb14fb3daabba30846f988a51061eb47484dc56b9b0fc6e2ec70133d918e9d012cd782069449b5f9da46360fc33432f6ef611efa7b2ebd45571f71b9293c2684e68ac8ffca6fdda7ba10365bc877d77b5424fe61c0e581054a8ede7788b9519253d4769da90b4e2f7702bdecf93f4") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000005c0)={r10, 0x0, 0xe, 0x0, &(0x7f0000000640)="d9b9547ed3c0c80d47820400ab3d", 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) r11 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r11, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}, {0x0, 0x64}], 0x2, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x0) (async) r12 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r12, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000140)="d80000001a0081044e81f782db4cb904021d08007b490d4f1e81f8d8150019001105142603600e12080005007a010401a80016002000034004000000035c0461c9d67f6f940071342e875fab7cb6cec6cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b141993c034e653fe8efe7c9f8775730d16a4683f5aebfb0daa7b0cd39e4edbb57a5025ccca9e020000000000000040fad95667e006dcbd63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a", 0xd9}], 0x1}, 0x0) (async) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 11.929903254s ago: executing program 0 (id=2720): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x30300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x200, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) (async) socketpair(0x1, 0x1, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080), 0x8) r0 = socket$kcm(0xa, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x16, 0x0, 0x4, 0xffff, 0x0, 0x1}, 0x50) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) bpf$MAP_UPDATE_BATCH(0x1b, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x2, r3}, 0x38) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x541b, &(0x7f0000000240)) socket$kcm(0xa, 0x1, 0x106) (async) r4 = socket$kcm(0xa, 0x1, 0x106) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x4, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x73, 0x11, 0x3b}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0xb7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x31}, 0x94) sendmsg$kcm(r4, &(0x7f00000003c0)={&(0x7f0000000180)=@phonet={0x23, 0x6, 0x7, 0xfa}, 0x80, &(0x7f0000000340)=[{0x0}, {&(0x7f0000000240)="70182e485ce8a4218bd673aae3bdb9754aaadb49cb18a2134c94951895b5c3b0fe569b5206d06842ddc14fcbffb4492f9635d7d7854cd4e9b0667044de7ac5f71bf2b4bd59305b8aea9c6041cffb46ee13243da54680c508707cd19725daa8a192477992e48dd5fb04adb7499d823fcd1579611fe1ccec9c58ffaf1109f51439a538d9f369ceff136c4497c59cb1d701b3b94841644b83f343b98787c299b35e8628a64e7431e6a8f705f1ecec74af74f0d565708c254f036a21f79766224f8f4e1c3ee061fd73503c28", 0xca}], 0x2}, 0x40000) sendmsg$kcm(r4, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0xfffffffd, @empty}, 0x80, 0x0}, 0x20000001) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xfffffffeffffffff}, 0xc001, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xfffffffeffffffff}, 0xc001, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x3, 0x10) socket$kcm(0x10, 0x2, 0x0) (async) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000003c0)="2e00000011008b88040f80ec59acbc0413a1f8480f0000005e2900421803001825000a001400000002800000121fb719b6", 0x31}], 0x1}, 0x0) (async) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000003c0)="2e00000011008b88040f80ec59acbc0413a1f8480f0000005e2900421803001825000a001400000002800000121fb719b6", 0x31}], 0x1}, 0x0) sendmsg$kcm(r5, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000300)=[{0x0}, {0x0}], 0x2}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000002140)=ANY=[@ANYBLOB="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"/2734], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040)}, 0x48) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000002140)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000f0ffffff7a0af0ff0000002079a4f0ff00000000b706000000000081ad64020000000000450404000100ff0f1704000001130a00b7050000010000006a0af2fe0000000085000000a3000000b7000000000000009500010000000000060054cd8445974b26c933f7ffffffffe4fbffffff55bb2007ee51050512b5b42128aa090a79507df79f298129daa7a6b2f91af50342115e17392ac627c87881c000006146001e04aeacea799a22a2fa798b5adc43eb27d53319d0ad229e5752548300000000dbc2777df150b7cdd77b85b941092314fd085f028f2ed1a4535550614e09d6378198a6097a670838337af2abd55a87ac0394b2f92ffab7d153d62058d0a413b2173619ccf55520f22c9ca8b6712f3024b7041b1df65b3e1b9bf115646d14ce53d13d0ccacda1ef0900094fa737c28b99938512c816fdcceaede3faedc51d29a47fc813a2ec00f4c7a53ac271d6d7f4ea6bf97f2f33e2ea2e534300bcb3fdc4b4861004eefbda7f54f82a804da4f85db47a4a69bf9bc5fa96ee293fbd165a5a68488e40b030166565a0972aa087975333a78170cefbb1b4cb451de736bb6d43db8db03d4b7745fef1d04ec633dee254a6d491b849a5b787e814c4fd21a18986252a70f8f92eb6f0e8c7db4bf23242a1f2c28159f09943b1b0452d1b72183aacf4a84f9130b775dd4e9e3070756f97ad791fa99dac06b57479321a0574fb30ff0000001989328c8ddc20ea011bf5742e0e0d4334db8b20ce3f9f16cb7fc20fb4791ec85821d0c48fb657c29b309c73f0977e7cde65a82b94c461d7962b0d2277a84af326f37f3e2c25a61ec45c3af97a8f17da954aff3fc8c108755f75ca13fb7c8bbd8b6e7dac1aba4b20dc7de058a4dfa7e85a8bdf1d41a2d8bda74d66f47cc180f82c5f573c6d294d3665016ac59dda0fde4745dba9a53a7ac74a2d32f7528751313694bf5700b20ef0c248ddd3da32396a614cacad4aff2066bb5d4045c958559b7dcb98a6273b8c651e24d9f679e4fbe948dfb4cc4a389469608241730459f0123fd39206000000000000eb55dad46de56ef907b059b90b8aa49afb9a79ae5498f6589880ed6eea7b9c670012be05e7de0940313c5870786554df26236ebced9390cb6941b8375d936a7d2120eca291963eb2d537d8ee4de5c183c960119451c31539b22809e1d7f0cda06a9fb87d64cb77872a2cd8a104e16bb1a2bacf13464ca03aff14a9aa4bd9539f5096412b9243ff98df3347f0e399d1b9f27e3c33269c0e153b28b2d4410572bc45b9d3fa02208d304d455c36300000000022320178b00cc6ed7966130b547dbf8b497af002000000cd1d00000020000000ef19349ee7f31abc11c800000000000000000000000928ee53595a779d243a48cea769470424d28804c04b2c4324ab7f4a5c81921f0128dfd70b438af60b060000000000000056642b49b745f3bf2cf7908b6d7d748308eea09fb4735efbf3411718d6ee7aebf9ef679dbfae9fb4a79f8a836804ed3a1079b0282a12043408cd60b687dcff91af19010000000000000000456f7d2a42bd13da2022f23daec61854f640f701db0276652f6c74f20675eb781925441578e93046aaddea8ec4ca37f71c2710a7e58ae0dc214e1cc275b26adfa892e6de92000000000000000000ddff004cff9ec780f535e62f4eeee50e5bafecea4d4134f9d006c8d6883eca5c9c58c9e93311ab5009c68c73de2f04f15d005387577f480000ea65559eb00e76e9d0ada201bcbb5c252b28a629a770663da451790cc36000906d5a9fad98c308e39bd5ffb6151d79c1cee1cd102e3c8e63e9fba05e3633be3f00000015762e5f5a3a0bc33fdbe28a5ffc83f2b485185cc92fe7f791e8f6429309d6adab4b7e508e5bf024ed8f8a005f2bbf96c89739f5cf1e750d50517a59a3ad09e8802e8f4f535447cc0fc9d5f99a73145dfcedad69da9cd4375c624600e78f4458542b14f29611f95d4a31838eee46eb20c20bb82aa31771cd379ec83554cea5e6539d85b980e358d81f2f2653c4d9818708e27c89b552d7fcd116bce9c764c714c9402c21d181aac59efb28d4f91652f6750b6ec962802c0320f8059195729d60c534ee8e8ff0755b67fe4c25edb85bcff24c757aa8090000000000008c420eb4304f66e3a37aaf000000c42a570f0e9dd5fd545470f862f8c3c14fa9ecd1e877b0d8ca84c044859e85e6158f9184bc61a9a284bc80e4636c25b96174327d82761c26e329555f9290af4100000000000000749efd3763655500344bae34137f5ab0d534b8d63e4ca3b69192c6b59a601fd419adc16e2055b85058f793484305d7a1759782e4c571ee855a47bc00edf5e9020c09ab004321610b857e8717764b633b21cb32f0e03280e09758bd445ab91d20baca005452b79d7b577a007f1d2fe45b3c4e93da3d51de647c10dd49944dc87c92332af00f191b66b6a6f732a91f0e2e9120be61e58c79d497247d278888901d442ad7f8536605a644e9e3d769db497c3960dfde12182334caee994adc38a436367a54b9e182b78e9a0ceb9a2c07953cbe1ad1a7c5a0850920a23c2a86abbdf357849a651733e57f31019876026888c8ccb85c86b4f8ffffff7f000000002c331fca0e541b7ca211c28ed61c525708a13d115b43f8b1894c8fa8a14dc4810f61ae96c18cc7130000000000002157a3609b6fd9843ee19ec647249a9375de5858818f3c2432e6ced4380217ac51a84a4fa6ce46f4d42b07199de8b99231ace58c77819ee214e49666c464d35ca9b5143ed3b3dc8c17a23692759ccf5a205311b7ab22532697b861dfb54609fd88e6043bd52ae84c1bb0c8a6c769f952283a1f4e3842edb3d42c8ebc62887aa46e820a74f91381dcc198e353047db70686d147357024eb3cb94f1e89cb5ba0a56aa046b4dc521a3d9356b4b8b5917c4c860495b240e80063bde261fd00000000007271e28ef6806bc8e139c49b91c76bea3858f7f05b47d3e519f1634e8fbd8d31330d89069f9648a2ff93a113e47edf76f7d116d2b0976cf2ec447c030931651dd315003b7a6a5433a2bb560ae99ec4b227eda2e63a1c31a2c2bd48a822cbe92b6524e0cd809269f816fa748b20ecaa34e19e7141d5e221509342bfe7d294d1eb3de6a50ca0301f89c2ee627e949c68b3a4c526a996d503a26e9a714ee5f72d8805dd1bfbd081f6a5d1f9289dfe14cb9194e26a44fac273461fc5c0e0a33db7f2d43ea8086cf059f40fa2640b6bfb74dd35f5a31059c01517cf4b6641fce9a24b96767b837ca037a1199735c375c705c798e0e208e4a5259d0bfa526b462af45a6eab34000000000000000000000000c4426344ec1a3366515dee221e747f55d7dd02534bc503b9b28277c253e410986bef2111a99cc448d652929f8a67a6a1d3f00dcad91aff428aade3f05714a1d3ef29acd4d49b62339c10c2ec0dac4728288e78980c1184d8223edbccbf9258b7374e79a1f8bf3fb73c8c6dbb7bbdfc399847a11921f97eba0ea14c4fed9a71eedb97c02461792e3a49dac16c60c3fcaab222025d78963c3ac899fa8b63f58a30212c9b2d7fe751e2046b78f86e22861b6504c667350244dd6d9189a8b9c45f8aaff9db694811ca86ed978f23eed7459c0382074170cf1e25b0e9ba3d1cc30935455f6de5b64bcdfaf8ac04ce96c421e5dbc85e168d3559ab13df98163e39e4065e65a2f43412535d6f7c09830f3a086535bd07820e690d2755768612bb7330a8b285f2585892eaffbb43991d40feb5dd0700"/2734], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040)}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r7, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0}}, 0x10) socket$kcm(0x29, 0xf, 0x0) r8 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r8, 0x0, 0x40012100) 8.860930524s ago: executing program 0 (id=2727): r0 = socket$kcm(0xa, 0x2, 0x73) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b26, &(0x7f0000000000)={'wlan1\x00', @random="0202000400"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x20020000, 0x2505, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8}, 0xaeba18b17158a189, 0x4, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x17, 0x0, 0x0, &(0x7f0000000ac0)='GPL\x00', 0x3, 0x0, 0x0, 0x61880, 0x10, '\x00', 0x0, @cgroup_sysctl, 0xffffffffffffffff, 0x8, &(0x7f0000000b00)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000b80)=[0x1, 0x1, 0x1], &(0x7f0000000bc0), 0x10, 0x1000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000100)=ANY=[@ANYRESDEC, @ANYRESHEX, @ANYRES16=0x0, @ANYRES8=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a1c, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x3efd7ab4c41335d9, @perf_config_ext, 0x408, 0x1, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000340), 0x10}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r5, 0x2000012, 0xe, 0x0, &(0x7f0000000500)="8236fca008874827ccf1c8ed1e1f", 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000580)="6700000011008188040f56ecdb4cb9cca7480ef434000000e3bd6efb440009000e000a0010000000ba80010000005a8c3774fa0af3dc59a933c1e7a6d3361d83b20000319cdf5656826edaaa11032701c61ec666d482078ccebcb9a4f187f7a4e98f09cdc2649f", 0x67}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = socket$kcm(0x2, 0x3, 0x84) r7 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x3) ioctl$PERF_EVENT_IOC_DISABLE(r7, 0x2401, 0x9f0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x541b, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r6}, 0x8) r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r8) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2fe937af, 0x2, @perf_config_ext={0xd040, 0x10000}, 0x14403, 0xfffc, 0x0, 0x5, 0x582, 0x20005, 0x8, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 8.582970778s ago: executing program 1 (id=2730): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x183081, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20, 0x12504, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x8}, 0x7602, 0x5, 0x0, 0x0, 0x0, 0x6, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1e000000000000000700760409"], 0x50) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_devices(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="1e0301003c05000128876b60864668f82ffdeefa000000000000ffd2acb165fe580cd568020031b87b548cb74136f366"], 0xffdd) 8.504040862s ago: executing program 3 (id=2731): mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r0 = socket$kcm(0x22, 0x2, 0x21) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x80044944, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000480)="5c00000012006bab9a3fe3d86e17aa0b046b876c1d0048380019001931a0e69ee517d34460bc06000000a701251e6182949a3651f60a84c9f4d4938037e70e4509c51c268811000000000000000000002571cd53b9851b30599980bc", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000780)=""/174, 0xae}, {&(0x7f0000000140)=""/219, 0xdb}, {&(0x7f0000001b40)=""/4050, 0xfd2}, {&(0x7f0000002b40)=""/4090, 0xffa}, {0x0}, {&(0x7f00000002c0)=""/113, 0x71}, {&(0x7f0000000500)=""/151, 0x97}], 0x7}, 0x2020) recvmsg$kcm(r1, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x80) 7.884123523s ago: executing program 3 (id=2732): write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f39138e486dd6349080006"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0763707573740153646370750806"], 0x12) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000020000000000000000ee000095"], 0x0}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 7.635069514s ago: executing program 3 (id=2734): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x6, &(0x7f00000001c0)=@framed={{0x18, 0x2, 0x0, 0x0, 0x40001, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x41}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0xf, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0xe, 0x0, &(0x7f0000000680)="548852ac5b4eba7aeaccd2c62b2b", 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x8}, 0x50) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x80, 0x68, 0x6, 0x10, 0x4e, 0x0, 0x6, 0x2000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x5, 0x7}, 0x0, 0x40, 0x6, 0x9, 0x7fff, 0x4, 0x2, 0x0, 0x0, 0x0, 0xbde}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) 6.811086905s ago: executing program 4 (id=2737): r0 = socket$kcm(0x10, 0x3, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0xffffffff, 0x0, 0xb, 0x3}, {0x10000002, 0x20, 0x400084, 0x3}]}, 0x94) close(0x3) r1 = socket$kcm(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x64, &(0x7f0000000000)=r4, 0x10) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000140)=[{&(0x7f00000005c0)="df", 0x1}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x102) 6.525476339s ago: executing program 4 (id=2738): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000011008108090f9becdb4cb92e0a4831371400000069bd6efb2502eaf60d000300020400bf050005001201", 0x2e}], 0x1}, 0x0) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0x200}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x8, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x3, 0x10) r2 = perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x1c, 0x1, 0x0, 0x3, 0x0, 0x0, 0xf8a1797220f13acd, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000008c0), 0x4}, 0x10c002, 0xac5d, 0x9, 0x2, 0x0, 0x3ff}, 0x0, 0x10, 0xffffffffffffffff, 0x8) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000010c0)='memory.low\x00', 0x2, 0x0) r3 = socket$kcm(0x10, 0x400000002, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={0x0, 0x0, 0xfffffffffffffe3d}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0x6, 0x18, &(0x7f0000000980)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xd}, {}, {}, [@map_idx_val={0x18, 0x6, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7fe}, @alu={0x7, 0x1, 0x0, 0x3, 0x2, 0xfffffffffffffffe, 0xffffffffffffffff}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x2}, @map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8001}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xf}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000900)='syzkaller\x00', 0xf5c2, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000a40)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000a80)={0x0, 0x6, 0x9, 0xef5f}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000b40)=[0xffffffffffffffff, 0xffffffffffffffff, r1], &(0x7f0000000b80)=[{0x0, 0x1, 0x0, 0xc}], 0x10, 0x7ff}, 0x94) write$cgroup_subtree(r3, &(0x7f0000001500)=ANY=[@ANYBLOB="14000000d2e495ebc3f3f473153452d2b7bdd61b171ea41d52ca45c9f2aef318e8c983d7367dcb66930e01595794a26dbf0b31c9b6c4bc28379e66fa"], 0xfe33) r5 = socket$kcm(0x29, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x18) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x108b84, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r7) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000140)={'full'}, 0x2f) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x5452, &(0x7f0000000000)) sendmsg$inet(r5, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x48840) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r8 = socket$kcm(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r9, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) recvmsg$unix(r9, &(0x7f0000000840)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000340)=""/146, 0x92}, {&(0x7f0000000400)=""/33, 0x21}, {&(0x7f0000000500)=""/246, 0xf6}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/181, 0xb5}, {&(0x7f0000000440)=""/64, 0x40}], 0x6}, 0x2000) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030031000b12d25a80648c2594f90124fc603406034002200600053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 4.119073557s ago: executing program 1 (id=2739): mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x94e4, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffa, 0x4, @perf_bp={0x0, 0x6}, 0x19183, 0x1, 0x9, 0xb, 0xa, 0x904813a9, 0x4, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x80, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80}, 0x94) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.throttle.io_serviced\x00', 0x300, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x80, 0x4, 0x4, 0x70, 0x7, 0x0, 0x5, 0x1011, 0x9, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x10acc0, 0x3, 0x1, 0x2, 0x6, 0x4, 0x80, 0x0, 0x718, 0x0, 0xee}, r0, 0xd, 0xffffffffffffffff, 0x1) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) 3.979082904s ago: executing program 3 (id=2740): mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r0 = socket$kcm(0x22, 0x2, 0x21) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x80044944, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000480)="5c00000012006bab9a3fe3d86e17aa0b046b876c1d0048380019001931a0e69ee517d34460bc06000000a701251e6182949a3651f60a84c9f4d4938037e70e4509c51c268811000000000000000000002571cd53b9851b30599980bc", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000780)=""/174, 0xae}, {&(0x7f0000000140)=""/219, 0xdb}, {&(0x7f0000001b40)=""/4050, 0xfd2}, {&(0x7f0000002b40)=""/4090, 0xffa}, {0x0}, {&(0x7f00000002c0)=""/113, 0x71}, {&(0x7f0000000500)=""/151, 0x97}], 0x7}, 0x2020) recvmsg$kcm(r1, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x80) 3.932289576s ago: executing program 1 (id=2741): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="b2bfe1233bf2b445c2ee581f88739503c8f1f907b828e5237665bb76f1ccfee316dd0dda6accc803b9ebb6fcced5266a34837625449049efda2444dd6014bad0d2dcc3f0ff447497948df21b99491a0539ef93be2e16b8629e3b380b127f6060", 0x60}], 0x1}, 0x41) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00'}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000540)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f00000002c0)={'veth0_to_team\x00', @remote}) 3.85927007s ago: executing program 4 (id=2742): write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f39138e486dd6349080006"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0763707573740153646370750806"], 0x12) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000020000000000000000ee000095"], 0x0}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 3.594048543s ago: executing program 4 (id=2743): write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f39138e486dd6349080006"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0763707573740153646370750806"], 0x12) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000020000000000000000ee000095"], 0x0}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xec}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0x0, 0x0, &(0x7f0000000000), 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 3.575836364s ago: executing program 1 (id=2744): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x4, &(0x7f00000001c0)=@framed={{0x18, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0xf, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0xe, 0x0, &(0x7f0000000680)="548852ac5b4eba7aeaccd2c62b2b", 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x8}, 0x50) (fail_nth: 6) 3.518960787s ago: executing program 3 (id=2745): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000028c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000012, 0x0, 0x60e}, 0x2c) 3.237968121s ago: executing program 4 (id=2746): bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0x1, 0xffffffffffffffff}, 0x4) r1 = socket$kcm(0xa, 0x1, 0x106) sendmsg$kcm(r1, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @dev, 0xfffff001}, 0x80, 0x0}, 0xe07e872420dfefca) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x7, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf0, &(0x7f00000001c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000200), &(0x7f0000000340), 0x8, 0x29, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfc, 0xfc, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x4, 0xfffffffe}}, @struct={0xb, 0xa, 0x0, 0x4, 0x1, 0x0, [{0x7, 0x1, 0x325}, {0x4, 0x4, 0x8001}, {0x1, 0x2, 0x1000}, {0xc, 0x3, 0xaac}, {0x8, 0x1, 0x9}, {0x1, 0x2, 0xf}, {0xd, 0x1, 0x7fffffff}, {0xc, 0x4, 0x4}, {0x3, 0x5, 0x2}, {0xa, 0x5, 0x9}]}, @struct={0x4, 0x7, 0x0, 0x4, 0x1, 0x4, [{0xf, 0x3, 0x9}, {0xe, 0x5}, {0x5, 0x0, 0x7}, {0x10, 0x3, 0x7}, {0xe, 0x5, 0x6}, {0xf, 0x5, 0x9}, {0x3, 0x1, 0x7}]}]}, {0x0, [0x2e]}}, &(0x7f0000000640)=""/254, 0x117, 0xfe, 0x1, 0x5, 0x10000}, 0x28) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x15}, 0x0) setsockopt$sock_attach_bpf(r4, 0x107, 0x12, &(0x7f00000008c0)=r6, 0x4) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0xc, 0xf, 0xd, 0x2000, r0, 0xb, '\x00', r2, r3, 0x5, 0x1, 0x0, 0x2}, 0x50) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000080850000008200000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f00000021c0)={r9, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d80)={&(0x7f0000000800)={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000900)="aca93a5530e135039c05b3a5e2d7b91d26f677e733dcf332868df06c17907e614e452123d44072ca9524355080590cfe468cf715496fc191b13dee5fdc91000972755fb07d7c316715f24fa25e326a6af62b3f881c3481c634669126053dd788f4082472930c462c3eca2c6946bccaee4c0c5c3a823388ae1c9776c299b329214c8ff9cfcf0accc5b1effd9ee82275e7fa7f2b4349c7ec2c786aa332e5a34598b4076bc896994573ce072c6f8a8d9c2120b0fbdf281e8dcc3652771d01796402e5004ca0ce3b9cc249d57f9ff59e", 0xce}, {&(0x7f0000000840)="ec7ff43aa7a8e7f2532e9a289ac0e0b5c0c6e3aac7cb97dbe3ed95db3c3d29ef10ae9215f52d479112b2929d7d1cb424d89ba1bac95ff26993d82638c3b680", 0x3f}, {&(0x7f0000000880)="289a148e9762b9a39ac4e27b0204b0225d3f3df4864d8a4bae036a56b7c611e3cdd027a71bd3f2fe2ddac4eabcaa7023ded042b9a63fb02c1cc7dd", 0x3b}, {&(0x7f0000000a00)="105c0062af4caf9a6691f8ee7467811ae29a1182b16a601e52c1614b24cc1a61e46bf8b5634408c3f5a76510b3e379bf04d390c0f92cd90dc3ccc353192b6ba994", 0x41}, {&(0x7f0000000a80)}, {&(0x7f0000000ac0)="628917e8034580a5ff9a187402be882c5b6f27d6656fa5540b760ad645dbdd6f17051a67cff1857e77fa078a1b182650b2ec997fa23f20eb96e330637e2ca3d96eee7b5f2b5535f06dbbdc5f81bac81621c99ea3d23ff178436290c901d81d9b4093967c9f4758119bbe04dd19780d8d674e0b4672ed1d93", 0x78}, {&(0x7f0000000b40)="0327198260f38b792ebf7e64c8fbaac1783b433fa18cd281a9e20743ce99", 0x1e}], 0x7, &(0x7f0000000c00)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_retopts={{0x64, 0x0, 0x7, {[@generic={0x44, 0xb, "2360a72960fe05c821"}, @rr={0x7, 0x27, 0x34, [@rand_addr=0x64010101, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @empty]}, @generic={0xf, 0x9, "1b608207403828"}, @ssrr={0x89, 0x17, 0x87, [@multicast1, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @loopback]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@ssrr={0x89, 0x1b, 0x99, [@multicast2, @loopback, @local, @private=0xa010100, @broadcast, @empty]}, @generic={0x88, 0xb, "952d133df8995d30e9"}, @timestamp_prespec={0x44, 0x34, 0xf4, 0x3, 0x1, [{@multicast2, 0x7}, {@broadcast, 0x4}, {@loopback, 0xffff}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x40}, {@dev={0xac, 0x14, 0x14, 0x2a}, 0x4}, {@multicast2, 0x9}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @loopback, @remote}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @multicast1, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @local, @rand_addr=0x64010102}}}], 0x168}, 0x48800) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000000a80)={r5, r6}) 3.062621369s ago: executing program 1 (id=2747): r0 = socket$kcm(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x37}}, 0x10, 0x0}, 0x48090) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, 0x0) socket$kcm(0x2, 0x5, 0x84) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x800000, 0x3fff8001}, 0x0, 0x32, 0x43e1bd74, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x5, &(0x7f0000000600)=ANY=[@ANYBLOB="18080000f5eb000000000000000039adcede6e30e775af3945bef78acad006a1bf60fb622fcd12d38c5565740127e63413bc85734cfab9e8d874e505d1edaab5a5df712a7513f22ca690032899d550e1c5d0a8366d8ea148be6d4f"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="120000002800000004"], 0x48) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d80)={&(0x7f0000000c80)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000060000000400000000000007000000000000000061"], 0x0, 0x2a}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x6, 0x9, 0x8b, 0x6, 0x2060e, 0xffffffffffffffff, 0x21c, '\x00', r6, r5, 0x4, 0x3}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r5, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r4, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x20}, [@generic={0x91, 0x1, 0x1, 0xba}]}, &(0x7f0000000c40)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x46, 0x0, &(0x7f00000002c0)="b90103616908068c3c270040e700009e0dc5cf1d66fff2fcffff8100632f4305", 0x0, 0x8104, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 3.011762562s ago: executing program 3 (id=2748): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x183081, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20, 0x12504, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x8}, 0x7602, 0x5, 0x0, 0x0, 0x0, 0x6, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1e000000000000000700760409"], 0x50) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_devices(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="1e0301003c05000128876b60864668f82ffdeefa000000000000ffd2acb165fe580cd568020031b87b548cb74136f366da0a"], 0xffdd) 3.8808ms ago: executing program 4 (id=2749): mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x94e4, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffa, 0x4, @perf_bp={0x0, 0x6}, 0x19183, 0x1, 0x9, 0xb, 0xa, 0x904813a9, 0x4, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x80, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80}, 0x94) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.throttle.io_serviced\x00', 0x300, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x80, 0x4, 0x4, 0x70, 0x7, 0x0, 0x5, 0x1011, 0x9, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x10acc0, 0x3, 0x1, 0x2, 0x6, 0x4, 0x80, 0x0, 0x718, 0x0, 0xee}, r0, 0xd, 0xffffffffffffffff, 0x1) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) 0s ago: executing program 1 (id=2750): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x746f2f51, &(0x7f0000000080)=[{&(0x7f0000000040)="3f0400001c00810ce00f80ecdb4cb9f207c804a01f000000400007fb0a0002000a0ada1b40d80300000007000000", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) kernel console output (not intermixed with test programs): fbaf5616090 RCX: 00007fbaf539c799 [ 795.282736][T11904] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 795.290731][T11904] RBP: 00007fbaf6299090 R08: 0000000000000000 R09: 0000000000000000 [ 795.298738][T11904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 795.306736][T11904] R13: 00007fbaf5616128 R14: 00007fbaf5616090 R15: 00007fff6f537d58 [ 795.314750][T11904] [ 796.190663][T11706] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 797.493495][T11706] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 797.571832][T11706] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 797.632045][T11706] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 797.645661][T11939] FAULT_INJECTION: forcing a failure. [ 797.645661][T11939] name failslab, interval 1, probability 0, space 0, times 0 [ 797.702399][T11939] CPU: 0 PID: 11939 Comm: syz.0.2391 Not tainted syzkaller #0 [ 797.709950][T11939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 797.720058][T11939] Call Trace: [ 797.723380][T11939] [ 797.726411][T11939] dump_stack_lvl+0x18c/0x250 [ 797.731156][T11939] ? show_regs_print_info+0x20/0x20 [ 797.736507][T11939] ? load_image+0x400/0x400 [ 797.741155][T11939] ? __lock_acquire+0x7d40/0x7d40 [ 797.746243][T11939] should_fail_ex+0x39d/0x4d0 [ 797.751075][T11939] should_failslab+0x9/0x20 [ 797.755633][T11939] slab_pre_alloc_hook+0x59/0x310 [ 797.760811][T11939] ? bpf_test_init+0x9f/0x140 [ 797.765626][T11939] ? bpf_test_init+0x9f/0x140 [ 797.770361][T11939] __kmem_cache_alloc_node+0x53/0x250 [ 797.775804][T11939] ? bpf_test_init+0x9f/0x140 [ 797.780538][T11939] __kmalloc+0xa4/0x230 [ 797.784754][T11939] bpf_test_init+0x9f/0x140 [ 797.789315][T11939] bpf_prog_test_run_xdp+0x4d1/0x10e0 [ 797.794750][T11939] ? dev_put+0x80/0x80 [ 797.798875][T11939] ? dev_put+0x80/0x80 [ 797.802999][T11939] bpf_prog_test_run+0x321/0x390 [ 797.807997][T11939] __sys_bpf+0x49d/0x890 [ 797.812298][T11939] ? bpf_link_show_fdinfo+0x390/0x390 [ 797.817749][T11939] ? lock_chain_count+0x20/0x20 [ 797.822666][T11939] __x64_sys_bpf+0x7c/0x90 [ 797.827137][T11939] do_syscall_64+0x55/0xa0 [ 797.831616][T11939] ? clear_bhb_loop+0x40/0x90 [ 797.836347][T11939] ? clear_bhb_loop+0x40/0x90 [ 797.841175][T11939] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 797.847133][T11939] RIP: 0033:0x7fbaf539c799 [ 797.851598][T11939] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 797.871260][T11939] RSP: 002b:00007fbaf62ba028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 797.879820][T11939] RAX: ffffffffffffffda RBX: 00007fbaf5615fa0 RCX: 00007fbaf539c799 [ 797.887843][T11939] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 797.895954][T11939] RBP: 00007fbaf62ba090 R08: 0000000000000000 R09: 0000000000000000 [ 797.903996][T11939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 797.912025][T11939] R13: 00007fbaf5616038 R14: 00007fbaf5615fa0 R15: 00007fff6f537d58 [ 797.920066][T11939] [ 798.030665][T11941] netlink: 'syz.3.2390': attribute type 21 has an invalid length. [ 798.194434][T11706] 8021q: adding VLAN 0 to HW filter on device bond0 [ 798.244666][T11706] 8021q: adding VLAN 0 to HW filter on device team0 [ 798.264574][ T5864] bridge0: port 1(bridge_slave_0) entered blocking state [ 798.271842][ T5864] bridge0: port 1(bridge_slave_0) entered forwarding state [ 798.306653][ T5867] bridge0: port 2(bridge_slave_1) entered blocking state [ 798.313906][ T5867] bridge0: port 2(bridge_slave_1) entered forwarding state [ 798.894674][T11946] delete_channel: no stack [ 799.007945][T11706] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 799.118507][T11706] veth0_vlan: entered promiscuous mode [ 799.157768][T11706] veth1_vlan: entered promiscuous mode [ 799.278659][T11706] veth0_macvtap: entered promiscuous mode [ 799.327980][T11706] veth1_macvtap: entered promiscuous mode [ 799.397656][T11706] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 799.432899][T11706] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 799.465058][T11706] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 799.485278][T11706] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 799.512323][T11706] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 799.538126][T11706] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 799.578248][T11706] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 799.623245][T11706] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 799.673058][T11706] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 799.760613][T11706] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 799.817080][T11706] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 799.837383][T11706] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 799.858960][T11706] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 799.871873][T11706] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 799.884320][T11706] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 799.905460][T11706] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 799.971538][T11706] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 800.002379][T11706] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 800.049521][T11706] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 800.085678][T11706] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 800.123779][T11706] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 800.146763][T11706] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 801.527871][ T5867] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 801.576124][ T5867] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 801.673441][ T12] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 801.697951][ T12] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 801.800765][T12021] netlink: 209852 bytes leftover after parsing attributes in process `syz.3.2406'. [ 802.351245][T12011] delete_channel: no stack [ 802.717835][T12026] delete_channel: no stack [ 802.747920][T12034] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2409'. [ 802.781972][T12034] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2409'. [ 802.851067][T12034] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2409'. [ 802.899464][T12034] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2409'. [ 803.116544][ T51] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 803.137102][ T51] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 803.149422][ T51] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 803.159756][ T51] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 803.168279][ T51] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 803.176955][ T51] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 803.193085][T12043] FAULT_INJECTION: forcing a failure. [ 803.193085][T12043] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 803.265199][T12043] CPU: 1 PID: 12043 Comm: syz.0.2412 Not tainted syzkaller #0 [ 803.272749][T12043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 803.282865][T12043] Call Trace: [ 803.286190][T12043] [ 803.289169][T12043] dump_stack_lvl+0x18c/0x250 [ 803.293924][T12043] ? show_regs_print_info+0x20/0x20 [ 803.299361][T12043] ? load_image+0x400/0x400 [ 803.303942][T12043] ? __might_fault+0xaa/0x120 [ 803.308673][T12043] ? __lock_acquire+0x7d40/0x7d40 [ 803.313765][T12043] should_fail_ex+0x39d/0x4d0 [ 803.318522][T12043] _copy_from_user+0x2f/0xe0 [ 803.323192][T12043] dev_ethtool+0xc6/0x18d0 [ 803.327684][T12043] ? ethtool_get_module_eeprom_call+0x170/0x170 [ 803.333982][T12043] ? __lock_acquire+0x7d40/0x7d40 [ 803.339069][T12043] ? __might_fault+0xaa/0x120 [ 803.343799][T12043] ? full_name_hash+0xb0/0xe0 [ 803.348557][T12043] ? dev_load+0x21/0x1f0 [ 803.352863][T12043] dev_ioctl+0x392/0x1140 [ 803.357255][T12043] sock_do_ioctl+0x239/0x310 [ 803.361956][T12043] ? sock_show_fdinfo+0xb0/0xb0 [ 803.366958][T12043] sock_ioctl+0x5ba/0x7e0 [ 803.371348][T12043] ? sock_poll+0x3e0/0x3e0 [ 803.375827][T12043] ? bpf_lsm_file_ioctl+0x9/0x10 [ 803.380819][T12043] ? security_file_ioctl+0x80/0xa0 [ 803.385991][T12043] ? sock_poll+0x3e0/0x3e0 [ 803.390457][T12043] __se_sys_ioctl+0xfd/0x170 [ 803.395136][T12043] do_syscall_64+0x55/0xa0 [ 803.399626][T12043] ? clear_bhb_loop+0x40/0x90 [ 803.404356][T12043] ? clear_bhb_loop+0x40/0x90 [ 803.409179][T12043] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 803.415124][T12043] RIP: 0033:0x7fbaf539c799 [ 803.419594][T12043] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 803.439257][T12043] RSP: 002b:00007fbaf62ba028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 803.447741][T12043] RAX: ffffffffffffffda RBX: 00007fbaf5615fa0 RCX: 00007fbaf539c799 [ 803.455780][T12043] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 0000000000000004 [ 803.463804][T12043] RBP: 00007fbaf62ba090 R08: 0000000000000000 R09: 0000000000000000 [ 803.471831][T12043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 803.479858][T12043] R13: 00007fbaf5616038 R14: 00007fbaf5615fa0 R15: 00007fff6f537d58 [ 803.487902][T12043] [ 803.800825][T12040] chnl_net:caif_netlink_parms(): no params data found [ 804.427469][T12067] FAULT_INJECTION: forcing a failure. [ 804.427469][T12067] name failslab, interval 1, probability 0, space 0, times 0 [ 804.473354][ T59] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 804.484041][T12067] CPU: 1 PID: 12067 Comm: syz.0.2418 Not tainted syzkaller #0 [ 804.484075][T12067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 804.501648][T12067] Call Trace: [ 804.504960][T12067] [ 804.507919][T12067] dump_stack_lvl+0x18c/0x250 [ 804.512637][T12067] ? show_regs_print_info+0x20/0x20 [ 804.517870][T12067] ? load_image+0x400/0x400 [ 804.522407][T12067] ? __might_sleep+0xe0/0xe0 [ 804.527070][T12067] ? __lock_acquire+0x7d40/0x7d40 [ 804.532248][T12067] should_fail_ex+0x39d/0x4d0 [ 804.536965][T12067] should_failslab+0x9/0x20 [ 804.541695][T12067] slab_pre_alloc_hook+0x59/0x310 [ 804.546754][T12067] ? sk_prot_alloc+0xe7/0x210 [ 804.551461][T12067] ? sk_prot_alloc+0xe7/0x210 [ 804.556260][T12067] __kmem_cache_alloc_node+0x53/0x250 [ 804.561682][T12067] ? sk_prot_alloc+0xe7/0x210 [ 804.566387][T12067] __kmalloc+0xa4/0x230 [ 804.570665][T12067] sk_prot_alloc+0xe7/0x210 [ 804.575218][T12067] ? sk_alloc+0x24/0x360 [ 804.579495][T12067] sk_alloc+0x3a/0x360 [ 804.583587][T12067] ? bpf_ctx_init+0x163/0x1a0 [ 804.588288][T12067] ? bpf_prog_test_run_skb+0x273/0x12b0 [ 804.593870][T12067] bpf_prog_test_run_skb+0x3a5/0x12b0 [ 804.599285][T12067] ? __fget_files+0x28/0x4b0 [ 804.603921][T12067] ? __fget_files+0x28/0x4b0 [ 804.608547][T12067] ? __fget_files+0x43d/0x4b0 [ 804.613272][T12067] ? cpu_online+0x60/0x60 [ 804.617640][T12067] bpf_prog_test_run+0x321/0x390 [ 804.622701][T12067] __sys_bpf+0x49d/0x890 [ 804.626979][T12067] ? bpf_link_show_fdinfo+0x390/0x390 [ 804.632392][T12067] ? lock_chain_count+0x20/0x20 [ 804.637318][T12067] __x64_sys_bpf+0x7c/0x90 [ 804.641763][T12067] do_syscall_64+0x55/0xa0 [ 804.646213][T12067] ? clear_bhb_loop+0x40/0x90 [ 804.650925][T12067] ? clear_bhb_loop+0x40/0x90 [ 804.655666][T12067] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 804.661587][T12067] RIP: 0033:0x7fbaf539c799 [ 804.666033][T12067] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 804.685684][T12067] RSP: 002b:00007fbaf62ba028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 804.694214][T12067] RAX: ffffffffffffffda RBX: 00007fbaf5615fa0 RCX: 00007fbaf539c799 [ 804.702211][T12067] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 804.710205][T12067] RBP: 00007fbaf62ba090 R08: 0000000000000000 R09: 0000000000000000 [ 804.718229][T12067] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 804.726222][T12067] R13: 00007fbaf5616038 R14: 00007fbaf5615fa0 R15: 00007fff6f537d58 [ 804.734277][T12067] [ 804.773033][T12040] bridge0: port 1(bridge_slave_0) entered blocking state [ 804.789440][T12040] bridge0: port 1(bridge_slave_0) entered disabled state [ 804.802080][T12040] bridge_slave_0: entered allmulticast mode [ 804.810255][T12040] bridge_slave_0: entered promiscuous mode [ 804.850159][ T59] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 804.869606][T12040] bridge0: port 2(bridge_slave_1) entered blocking state [ 804.877186][T12040] bridge0: port 2(bridge_slave_1) entered disabled state [ 804.884433][T12040] bridge_slave_1: entered allmulticast mode [ 804.892789][T12040] bridge_slave_1: entered promiscuous mode [ 804.938174][T12056] delete_channel: no stack [ 804.944743][ T59] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 805.007227][T12040] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 805.055510][T12040] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 805.103942][ T59] bond0: (slave netdevsim0): Releasing backup interface [ 805.119030][ T59] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 805.260427][T12078] netlink: 'syz.4.2419': attribute type 9 has an invalid length. [ 805.283618][T12078] netlink: 209836 bytes leftover after parsing attributes in process `syz.4.2419'. [ 805.294831][ T51] Bluetooth: hci0: command tx timeout [ 805.382053][T12040] team0: Port device team_slave_0 added [ 805.411477][T12040] team0: Port device team_slave_1 added [ 805.528319][T12040] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 805.546239][T12040] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 805.582139][T12040] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 805.606517][T12040] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 805.613741][T12040] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 805.658572][T12040] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 805.948959][T12072] delete_channel: no stack [ 806.633661][T12040] hsr_slave_0: entered promiscuous mode [ 806.643913][T12040] hsr_slave_1: entered promiscuous mode [ 806.664602][T12040] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 806.675196][T12040] Cannot create hsr debugfs directory [ 806.886305][ T59] bridge0: port 5(ip6gretap0) entered disabled state [ 807.090113][ T59] ip6gretap0 (unregistering): left allmulticast mode [ 807.105038][ T59] ip6gretap0 (unregistering): left promiscuous mode [ 807.120384][ T59] bridge0: port 5(ip6gretap0) entered disabled state [ 807.365189][ T51] Bluetooth: hci0: command tx timeout [ 807.755646][T12094] delete_channel: no stack [ 807.958559][T12119] FAULT_INJECTION: forcing a failure. [ 807.958559][T12119] name failslab, interval 1, probability 0, space 0, times 0 [ 808.025439][T12119] CPU: 1 PID: 12119 Comm: syz.0.2430 Not tainted syzkaller #0 [ 808.032984][T12119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 808.043526][T12119] Call Trace: [ 808.046834][T12119] [ 808.049788][T12119] dump_stack_lvl+0x18c/0x250 [ 808.054534][T12119] ? show_regs_print_info+0x20/0x20 [ 808.059865][T12119] ? load_image+0x400/0x400 [ 808.064416][T12119] ? __might_sleep+0xe0/0xe0 [ 808.069064][T12119] ? __lock_acquire+0x7d40/0x7d40 [ 808.074134][T12119] ? _raw_spin_unlock_irqrestore+0xc5/0x120 [ 808.080079][T12119] should_fail_ex+0x39d/0x4d0 [ 808.084798][T12119] should_failslab+0x9/0x20 [ 808.089521][T12119] slab_pre_alloc_hook+0x59/0x310 [ 808.094583][T12119] ? kvmalloc_node+0x70/0x180 [ 808.099293][T12119] ? kvmalloc_node+0x70/0x180 [ 808.104005][T12119] __kmem_cache_alloc_node+0x53/0x250 [ 808.109416][T12119] ? kvmalloc_node+0x70/0x180 [ 808.114128][T12119] __kmalloc_node+0xa4/0x230 [ 808.118755][T12119] kvmalloc_node+0x70/0x180 [ 808.123477][T12119] bpf_test_run_xdp_live+0x1c2/0x1b20 [ 808.128886][T12119] ? 0xffffffffa0004140 [ 808.133067][T12119] ? 0xffffffffa0004140 [ 808.137250][T12119] ? bpf_dispatcher_change_prog+0xcbf/0xf10 [ 808.143180][T12119] ? 0xffffffffa0004140 [ 808.147450][T12119] ? xdp_convert_md_to_buff+0x330/0x330 [ 808.153054][T12119] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 808.159329][T12119] ? _copy_from_user+0xa5/0xe0 [ 808.164132][T12119] ? bpf_test_init+0x119/0x140 [ 808.168922][T12119] ? xdp_convert_md_to_buff+0x5b/0x330 [ 808.174500][T12119] bpf_prog_test_run_xdp+0x7ca/0x10e0 [ 808.179918][T12119] ? dev_put+0x80/0x80 [ 808.184116][T12119] ? dev_put+0x80/0x80 [ 808.188215][T12119] bpf_prog_test_run+0x321/0x390 [ 808.193290][T12119] __sys_bpf+0x49d/0x890 [ 808.197604][T12119] ? bpf_link_show_fdinfo+0x390/0x390 [ 808.203033][T12119] ? lock_chain_count+0x20/0x20 [ 808.207924][T12119] __x64_sys_bpf+0x7c/0x90 [ 808.212379][T12119] do_syscall_64+0x55/0xa0 [ 808.216884][T12119] ? clear_bhb_loop+0x40/0x90 [ 808.221602][T12119] ? clear_bhb_loop+0x40/0x90 [ 808.226312][T12119] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 808.232229][T12119] RIP: 0033:0x7fbaf539c799 [ 808.236684][T12119] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 808.256328][T12119] RSP: 002b:00007fbaf6299028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 808.264776][T12119] RAX: ffffffffffffffda RBX: 00007fbaf5616090 RCX: 00007fbaf539c799 [ 808.272787][T12119] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 808.280790][T12119] RBP: 00007fbaf6299090 R08: 0000000000000000 R09: 0000000000000000 [ 808.288804][T12119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 808.296819][T12119] R13: 00007fbaf5616128 R14: 00007fbaf5616090 R15: 00007fff6f537d58 [ 808.304844][T12119] [ 808.399282][ T59] bridge0: port 4(erspan0) entered disabled state [ 808.458454][ T59] erspan0 (unregistering): left allmulticast mode [ 808.473691][ T59] erspan0 (unregistering): left promiscuous mode [ 808.495545][ T59] bridge0: port 4(erspan0) entered disabled state [ 808.984503][ T1286] ieee802154 phy0 wpan0: encryption failed: -22 [ 808.991097][ T1286] ieee802154 phy1 wpan1: encryption failed: -22 [ 809.368384][T12132] FAULT_INJECTION: forcing a failure. [ 809.368384][T12132] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 809.416549][T12132] CPU: 1 PID: 12132 Comm: syz.0.2435 Not tainted syzkaller #0 [ 809.424107][T12132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 809.434221][T12132] Call Trace: [ 809.437557][T12132] [ 809.440543][T12132] dump_stack_lvl+0x18c/0x250 [ 809.445288][T12132] ? show_regs_print_info+0x20/0x20 [ 809.446296][ T51] Bluetooth: hci0: command tx timeout [ 809.450528][T12132] ? load_image+0x400/0x400 [ 809.460581][T12132] ? __lock_acquire+0x7d40/0x7d40 [ 809.465670][T12132] ? snprintf+0xe9/0x140 [ 809.469974][T12132] should_fail_ex+0x39d/0x4d0 [ 809.474722][T12132] _copy_to_user+0x2f/0xa0 [ 809.479200][T12132] simple_read_from_buffer+0xe7/0x150 [ 809.484646][T12132] proc_fail_nth_read+0x1e8/0x260 [ 809.489743][T12132] ? proc_fault_inject_write+0x360/0x360 [ 809.495446][T12132] ? fsnotify_perm+0x271/0x5e0 [ 809.500277][T12132] ? proc_fault_inject_write+0x360/0x360 [ 809.506008][T12132] vfs_read+0x28b/0x970 [ 809.510250][T12132] ? kernel_read+0x1e0/0x1e0 [ 809.514895][T12132] ? __fget_files+0x28/0x4b0 [ 809.519535][T12132] ? __fget_files+0x28/0x4b0 [ 809.524158][T12132] ? __fget_files+0x43d/0x4b0 [ 809.528881][T12132] ? __fdget_pos+0x2a3/0x330 [ 809.533505][T12132] ? ksys_read+0x75/0x260 [ 809.538303][T12132] ksys_read+0x150/0x260 [ 809.542583][T12132] ? vfs_write+0x990/0x990 [ 809.547064][T12132] do_syscall_64+0x55/0xa0 [ 809.551517][T12132] ? clear_bhb_loop+0x40/0x90 [ 809.556223][T12132] ? clear_bhb_loop+0x40/0x90 [ 809.560928][T12132] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 809.566857][T12132] RIP: 0033:0x7fbaf535cfce [ 809.571299][T12132] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 809.591105][T12132] RSP: 002b:00007fbaf62b9fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 809.599558][T12132] RAX: ffffffffffffffda RBX: 00007fbaf62ba6c0 RCX: 00007fbaf535cfce [ 809.607590][T12132] RDX: 000000000000000f RSI: 00007fbaf62ba0a0 RDI: 0000000000000009 [ 809.615595][T12132] RBP: 00007fbaf62ba090 R08: 0000000000000000 R09: 0000000000000000 [ 809.623635][T12132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 809.631639][T12132] R13: 00007fbaf5616038 R14: 00007fbaf5615fa0 R15: 00007fff6f537d58 [ 809.639665][T12132] [ 810.654493][T12139] delete_channel: no stack [ 811.527132][ T51] Bluetooth: hci0: command tx timeout [ 812.110176][ T59] hsr_slave_0: left promiscuous mode [ 812.189673][ T59] hsr_slave_1: left promiscuous mode [ 812.204723][ T59] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 812.224822][ T59] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 812.268269][ T59] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 812.295407][ T59] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 812.307035][ T59] hsr0: left allmulticast mode [ 812.312698][ T59] bridge0: port 3(hsr0) entered disabled state [ 812.368820][ T59] bridge_slave_1: left allmulticast mode [ 812.382631][ T59] bridge_slave_1: left promiscuous mode [ 812.402510][ T59] bridge0: port 2(bridge_slave_1) entered disabled state [ 812.450241][ T59] bridge_slave_0: left allmulticast mode [ 812.459437][ T59] bridge_slave_0: left promiscuous mode [ 812.468270][ T59] bridge0: port 1(bridge_slave_0) entered disabled state [ 812.518050][ T59] veth1_vlan: left allmulticast mode [ 812.527561][ T59] veth1_vlan: left promiscuous mode [ 812.533115][ T59] veth0_vlan: left promiscuous mode [ 813.289824][T12206] netlink: 60 bytes leftover after parsing attributes in process `syz.4.2450'. [ 813.805967][ T59] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 813.865588][ T59] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 814.114689][T12205] delete_channel: no stack [ 814.263441][ T59] bond0 (unregistering): Released all slaves [ 814.390135][T12206] netlink: 60 bytes leftover after parsing attributes in process `syz.4.2450'. [ 814.409301][T12040] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 814.434570][T12040] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 814.488953][T12040] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 814.558867][T12040] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 814.769316][T12040] 8021q: adding VLAN 0 to HW filter on device bond0 [ 814.807890][T12040] 8021q: adding VLAN 0 to HW filter on device team0 [ 814.829029][T11187] bridge0: port 1(bridge_slave_0) entered blocking state [ 814.836316][T11187] bridge0: port 1(bridge_slave_0) entered forwarding state [ 814.862826][ T5867] bridge0: port 2(bridge_slave_1) entered blocking state [ 814.870022][ T5867] bridge0: port 2(bridge_slave_1) entered forwarding state [ 815.353212][T12040] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 815.435718][T12221] FAULT_INJECTION: forcing a failure. [ 815.435718][T12221] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 815.465494][T12221] CPU: 0 PID: 12221 Comm: syz.1.2455 Not tainted syzkaller #0 [ 815.473040][T12221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 815.483143][T12221] Call Trace: [ 815.486474][T12221] [ 815.489451][T12221] dump_stack_lvl+0x18c/0x250 [ 815.494200][T12221] ? show_regs_print_info+0x20/0x20 [ 815.499465][T12221] ? load_image+0x400/0x400 [ 815.504034][T12221] ? __might_fault+0xaa/0x120 [ 815.508738][T12040] veth0_vlan: entered promiscuous mode [ 815.514232][T12221] ? __lock_acquire+0x7d40/0x7d40 [ 815.514269][T12221] should_fail_ex+0x39d/0x4d0 [ 815.524063][T12221] _copy_from_user+0x2f/0xe0 [ 815.528721][T12221] __sys_bpf+0x23e/0x890 [ 815.533012][T12221] ? bpf_link_show_fdinfo+0x390/0x390 [ 815.538515][T12221] ? lock_chain_count+0x20/0x20 [ 815.543405][T12221] __x64_sys_bpf+0x7c/0x90 [ 815.547854][T12221] do_syscall_64+0x55/0xa0 [ 815.552512][T12221] ? clear_bhb_loop+0x40/0x90 [ 815.557231][T12221] ? clear_bhb_loop+0x40/0x90 [ 815.561964][T12221] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 815.567917][T12221] RIP: 0033:0x7f436219c799 [ 815.572376][T12221] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 815.592019][T12221] RSP: 002b:00007f4362fab028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 815.600468][T12221] RAX: ffffffffffffffda RBX: 00007f4362415fa0 RCX: 00007f436219c799 [ 815.608602][T12221] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 815.616600][T12221] RBP: 00007f4362fab090 R08: 0000000000000000 R09: 0000000000000000 [ 815.624598][T12221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 815.632589][T12221] R13: 00007f4362416038 R14: 00007f4362415fa0 R15: 00007ffcd15f5e88 [ 815.640600][T12221] [ 815.729046][T12040] veth1_vlan: entered promiscuous mode [ 815.859712][T12040] veth0_macvtap: entered promiscuous mode [ 815.936781][T12040] veth1_macvtap: entered promiscuous mode [ 816.069812][T12040] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 816.094863][T12040] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 816.114313][T12040] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 816.129300][T12040] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 816.139675][T12040] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 816.150769][T12040] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 816.161103][T12040] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 816.173579][T12040] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 816.198585][T12040] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 816.256901][T12040] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 816.273395][T12040] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 816.284300][T12040] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 816.301257][T12040] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 816.316025][T12040] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 816.337185][T12040] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 816.347416][T12040] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 816.358586][T12040] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 816.383743][T12040] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 816.431691][T12040] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 816.449276][T12040] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 816.460704][T12040] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 816.473122][T12040] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 817.359609][T12249] FAULT_INJECTION: forcing a failure. [ 817.359609][T12249] name failslab, interval 1, probability 0, space 0, times 0 [ 817.374185][T12249] CPU: 0 PID: 12249 Comm: syz.4.2465 Not tainted syzkaller #0 [ 817.381732][T12249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 817.392199][T12249] Call Trace: [ 817.395532][T12249] [ 817.398603][T12249] dump_stack_lvl+0x18c/0x250 [ 817.403356][T12249] ? show_regs_print_info+0x20/0x20 [ 817.408627][T12249] ? load_image+0x400/0x400 [ 817.413280][T12249] ? __might_sleep+0xe0/0xe0 [ 817.417919][T12249] ? __lock_acquire+0x7d40/0x7d40 [ 817.423013][T12249] should_fail_ex+0x39d/0x4d0 [ 817.427762][T12249] should_failslab+0x9/0x20 [ 817.432334][T12249] slab_pre_alloc_hook+0x59/0x310 [ 817.437419][T12249] ? apparmor_sk_alloc_security+0x77/0x100 [ 817.443304][T12249] __kmem_cache_alloc_node+0x53/0x250 [ 817.448765][T12249] ? apparmor_sk_alloc_security+0x77/0x100 [ 817.455164][T12249] kmalloc_trace+0x2a/0xe0 [ 817.459649][T12249] apparmor_sk_alloc_security+0x77/0x100 [ 817.465343][T12249] security_sk_alloc+0x6e/0xa0 [ 817.470208][T12249] sk_prot_alloc+0x101/0x210 [ 817.474857][T12249] ? sk_alloc+0x24/0x360 [ 817.479217][T12249] sk_alloc+0x3a/0x360 [ 817.483338][T12249] ? bpf_ctx_init+0x163/0x1a0 [ 817.488066][T12249] ? bpf_prog_test_run_skb+0x273/0x12b0 [ 817.493671][T12249] bpf_prog_test_run_skb+0x3a5/0x12b0 [ 817.499100][T12249] ? __fget_files+0x28/0x4b0 [ 817.503751][T12249] ? __fget_files+0x28/0x4b0 [ 817.508404][T12249] ? __fget_files+0x43d/0x4b0 [ 817.513155][T12249] ? cpu_online+0x60/0x60 [ 817.517549][T12249] bpf_prog_test_run+0x321/0x390 [ 817.522556][T12249] __sys_bpf+0x49d/0x890 [ 817.526943][T12249] ? bpf_link_show_fdinfo+0x390/0x390 [ 817.532382][T12249] ? lock_chain_count+0x20/0x20 [ 817.537321][T12249] __x64_sys_bpf+0x7c/0x90 [ 817.541803][T12249] do_syscall_64+0x55/0xa0 [ 817.546284][T12249] ? clear_bhb_loop+0x40/0x90 [ 817.551017][T12249] ? clear_bhb_loop+0x40/0x90 [ 817.555755][T12249] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 817.561703][T12249] RIP: 0033:0x7f5f7179c799 [ 817.566205][T12249] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 817.585871][T12249] RSP: 002b:00007f5f725cd028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 817.594346][T12249] RAX: ffffffffffffffda RBX: 00007f5f71a15fa0 RCX: 00007f5f7179c799 [ 817.602545][T12249] RDX: 0000000000000050 RSI: 0000200000000080 RDI: 000000000000000a [ 817.610561][T12249] RBP: 00007f5f725cd090 R08: 0000000000000000 R09: 0000000000000000 [ 817.618559][T12249] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 817.626562][T12249] R13: 00007f5f71a16038 R14: 00007f5f71a15fa0 R15: 00007ffd8322df28 [ 817.634614][T12249] [ 817.854120][T12255] FAULT_INJECTION: forcing a failure. [ 817.854120][T12255] name failslab, interval 1, probability 0, space 0, times 0 [ 817.873324][T12255] CPU: 1 PID: 12255 Comm: syz.4.2467 Not tainted syzkaller #0 [ 817.881225][T12255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 817.891330][T12255] Call Trace: [ 817.894834][T12255] [ 817.897802][T12255] dump_stack_lvl+0x18c/0x250 [ 817.902517][T12255] ? show_regs_print_info+0x20/0x20 [ 817.907744][T12255] ? load_image+0x400/0x400 [ 817.912280][T12255] ? __might_sleep+0xe0/0xe0 [ 817.916929][T12255] ? __lock_acquire+0x7d40/0x7d40 [ 817.922006][T12255] should_fail_ex+0x39d/0x4d0 [ 817.926729][T12255] should_failslab+0x9/0x20 [ 817.931360][T12255] slab_pre_alloc_hook+0x59/0x310 [ 817.936421][T12255] ? kvmalloc_node+0x70/0x180 [ 817.941158][T12255] ? kvmalloc_node+0x70/0x180 [ 817.945873][T12255] __kmem_cache_alloc_node+0x53/0x250 [ 817.951289][T12255] ? kvmalloc_node+0x70/0x180 [ 817.955995][T12255] __kmalloc_node+0xa4/0x230 [ 817.960712][T12255] kvmalloc_node+0x70/0x180 [ 817.965254][T12255] bpf_test_run_xdp_live+0x1e9/0x1b20 [ 817.970744][T12255] ? 0xffffffffa0004140 [ 817.974934][T12255] ? 0xffffffffa0004140 [ 817.979118][T12255] ? bpf_dispatcher_change_prog+0xcbf/0xf10 [ 817.985165][T12255] ? 0xffffffffa0004140 [ 817.989355][T12255] ? xdp_convert_md_to_buff+0x330/0x330 [ 817.994971][T12255] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 818.001269][T12255] ? _copy_from_user+0xa5/0xe0 [ 818.006069][T12255] ? bpf_test_init+0x119/0x140 [ 818.010859][T12255] ? xdp_convert_md_to_buff+0x5b/0x330 [ 818.016348][T12255] bpf_prog_test_run_xdp+0x7ca/0x10e0 [ 818.021759][T12255] ? dev_put+0x80/0x80 [ 818.025862][T12255] ? dev_put+0x80/0x80 [ 818.029966][T12255] bpf_prog_test_run+0x321/0x390 [ 818.034958][T12255] __sys_bpf+0x49d/0x890 [ 818.039231][T12255] ? bpf_link_show_fdinfo+0x390/0x390 [ 818.044642][T12255] ? lock_chain_count+0x20/0x20 [ 818.049550][T12255] __x64_sys_bpf+0x7c/0x90 [ 818.054018][T12255] do_syscall_64+0x55/0xa0 [ 818.058489][T12255] ? clear_bhb_loop+0x40/0x90 [ 818.063212][T12255] ? clear_bhb_loop+0x40/0x90 [ 818.067917][T12255] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 818.073834][T12255] RIP: 0033:0x7f5f7179c799 [ 818.078276][T12255] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 818.098094][T12255] RSP: 002b:00007f5f725cd028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 818.106551][T12255] RAX: ffffffffffffffda RBX: 00007f5f71a15fa0 RCX: 00007f5f7179c799 [ 818.114566][T12255] RDX: 0000000000000050 RSI: 0000200000000080 RDI: 000000000000000a [ 818.122663][T12255] RBP: 00007f5f725cd090 R08: 0000000000000000 R09: 0000000000000000 [ 818.130660][T12255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 818.138663][T12255] R13: 00007f5f71a16038 R14: 00007f5f71a15fa0 R15: 00007ffd8322df28 [ 818.146675][T12255] [ 819.866942][ T5867] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 819.887678][ T5867] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 819.968309][ T59] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 819.991858][ T59] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 820.498329][T12273] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.2473'. [ 820.541678][T12271] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.2473'. [ 823.586267][T12283] netlink: 'syz.0.2477': attribute type 10 has an invalid length. [ 823.594264][T12283] netlink: 55 bytes leftover after parsing attributes in process `syz.0.2477'. [ 824.020774][T12307] netlink: 63503 bytes leftover after parsing attributes in process `syz.4.2485'. [ 824.299152][T12316] netlink: 60 bytes leftover after parsing attributes in process `syz.4.2489'. [ 824.365427][T12316] netlink: 60 bytes leftover after parsing attributes in process `syz.4.2489'. [ 824.418473][T12316] netlink: 60 bytes leftover after parsing attributes in process `syz.4.2489'. [ 824.488204][T12319] netlink: 60 bytes leftover after parsing attributes in process `syz.4.2489'. [ 824.576404][T12315] delete_channel: no stack [ 825.120375][T12328] netlink: 'syz.4.2492': attribute type 1 has an invalid length. [ 825.156000][T12328] netlink: 193500 bytes leftover after parsing attributes in process `syz.4.2492'. [ 825.883700][T12343] netlink: 1047 bytes leftover after parsing attributes in process `syz.4.2497'. [ 826.135940][T12348] FAULT_INJECTION: forcing a failure. [ 826.135940][T12348] name failslab, interval 1, probability 0, space 0, times 0 [ 826.175060][T12348] CPU: 0 PID: 12348 Comm: syz.4.2499 Not tainted syzkaller #0 [ 826.182961][T12348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 826.193075][T12348] Call Trace: [ 826.196405][T12348] [ 826.199395][T12348] dump_stack_lvl+0x18c/0x250 [ 826.204145][T12348] ? show_regs_print_info+0x20/0x20 [ 826.209405][T12348] ? load_image+0x400/0x400 [ 826.213968][T12348] ? __might_sleep+0xe0/0xe0 [ 826.218626][T12348] ? __lock_acquire+0x7d40/0x7d40 [ 826.223704][T12348] should_fail_ex+0x39d/0x4d0 [ 826.228452][T12348] should_failslab+0x9/0x20 [ 826.233024][T12348] slab_pre_alloc_hook+0x59/0x310 [ 826.238110][T12348] ? apparmor_sk_alloc_security+0x77/0x100 [ 826.243994][T12348] __kmem_cache_alloc_node+0x53/0x250 [ 826.249419][T12348] ? apparmor_sk_alloc_security+0x77/0x100 [ 826.255270][T12348] kmalloc_trace+0x2a/0xe0 [ 826.259727][T12348] apparmor_sk_alloc_security+0x77/0x100 [ 826.265399][T12348] security_sk_alloc+0x6e/0xa0 [ 826.270199][T12348] sk_prot_alloc+0x101/0x210 [ 826.274824][T12348] ? sk_alloc+0x24/0x360 [ 826.279096][T12348] sk_alloc+0x3a/0x360 [ 826.283194][T12348] ? bpf_ctx_init+0x163/0x1a0 [ 826.287899][T12348] ? bpf_prog_test_run_skb+0x273/0x12b0 [ 826.293476][T12348] bpf_prog_test_run_skb+0x3a5/0x12b0 [ 826.298882][T12348] ? __fget_files+0x28/0x4b0 [ 826.303502][T12348] ? __fget_files+0x28/0x4b0 [ 826.308131][T12348] ? __fget_files+0x43d/0x4b0 [ 826.312854][T12348] ? cpu_online+0x60/0x60 [ 826.317212][T12348] bpf_prog_test_run+0x321/0x390 [ 826.322200][T12348] __sys_bpf+0x49d/0x890 [ 826.326473][T12348] ? bpf_link_show_fdinfo+0x390/0x390 [ 826.331887][T12348] ? lock_chain_count+0x20/0x20 [ 826.336781][T12348] __x64_sys_bpf+0x7c/0x90 [ 826.341256][T12348] do_syscall_64+0x55/0xa0 [ 826.345729][T12348] ? clear_bhb_loop+0x40/0x90 [ 826.350463][T12348] ? clear_bhb_loop+0x40/0x90 [ 826.355200][T12348] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 826.361150][T12348] RIP: 0033:0x7f5f7179c799 [ 826.365611][T12348] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 826.385251][T12348] RSP: 002b:00007f5f725cd028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 826.393701][T12348] RAX: ffffffffffffffda RBX: 00007f5f71a15fa0 RCX: 00007f5f7179c799 [ 826.401696][T12348] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 826.409692][T12348] RBP: 00007f5f725cd090 R08: 0000000000000000 R09: 0000000000000000 [ 826.417704][T12348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 826.425723][T12348] R13: 00007f5f71a16038 R14: 00007f5f71a15fa0 R15: 00007ffd8322df28 [ 826.433795][T12348] [ 826.551186][T12350] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2501'. [ 826.603516][T12355] netlink: 'syz.4.2502': attribute type 10 has an invalid length. [ 826.636482][T12355] netlink: 65015 bytes leftover after parsing attributes in process `syz.4.2502'. [ 826.712423][T12350] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2501'. [ 826.766079][T12354] netlink: 'syz.4.2502': attribute type 10 has an invalid length. [ 826.782821][T12354] netlink: 65015 bytes leftover after parsing attributes in process `syz.4.2502'. [ 826.803289][T12351] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2501'. [ 826.824355][T12357] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2501'. [ 826.843762][ T5839] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 826.856354][ T5839] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 826.868251][ T5839] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 826.877019][T12345] delete_channel: no stack [ 826.882169][ T5839] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 826.915685][ T5839] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 826.923285][ T5839] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 827.158139][T12366] FAULT_INJECTION: forcing a failure. [ 827.158139][T12366] name failslab, interval 1, probability 0, space 0, times 0 [ 827.235122][T12366] CPU: 1 PID: 12366 Comm: syz.1.2505 Not tainted syzkaller #0 [ 827.242677][T12366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 827.252897][T12366] Call Trace: [ 827.256230][T12366] [ 827.259203][T12366] dump_stack_lvl+0x18c/0x250 [ 827.263953][T12366] ? show_regs_print_info+0x20/0x20 [ 827.269226][T12366] ? load_image+0x400/0x400 [ 827.273790][T12366] ? __lock_acquire+0x7d40/0x7d40 [ 827.278885][T12366] should_fail_ex+0x39d/0x4d0 [ 827.283634][T12366] should_failslab+0x9/0x20 [ 827.288201][T12366] slab_pre_alloc_hook+0x59/0x310 [ 827.293380][T12366] ? bpf_test_init+0x9f/0x140 [ 827.298121][T12366] ? bpf_test_init+0x9f/0x140 [ 827.302857][T12366] __kmem_cache_alloc_node+0x53/0x250 [ 827.308309][T12366] ? bpf_test_init+0x9f/0x140 [ 827.313049][T12366] __kmalloc+0xa4/0x230 [ 827.317272][T12366] bpf_test_init+0x9f/0x140 [ 827.321836][T12366] bpf_prog_test_run_xdp+0x4d1/0x10e0 [ 827.327290][T12366] ? dev_put+0x80/0x80 [ 827.331468][T12366] ? dev_put+0x80/0x80 [ 827.335595][T12366] bpf_prog_test_run+0x321/0x390 [ 827.340589][T12366] __sys_bpf+0x49d/0x890 [ 827.344937][T12366] ? bpf_link_show_fdinfo+0x390/0x390 [ 827.350475][T12366] ? lock_chain_count+0x20/0x20 [ 827.355390][T12366] __x64_sys_bpf+0x7c/0x90 [ 827.359859][T12366] do_syscall_64+0x55/0xa0 [ 827.364345][T12366] ? clear_bhb_loop+0x40/0x90 [ 827.369085][T12366] ? clear_bhb_loop+0x40/0x90 [ 827.373821][T12366] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 827.379856][T12366] RIP: 0033:0x7f436219c799 [ 827.384322][T12366] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 827.404077][T12366] RSP: 002b:00007f4362fab028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 827.412554][T12366] RAX: ffffffffffffffda RBX: 00007f4362415fa0 RCX: 00007f436219c799 [ 827.420588][T12366] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 827.428624][T12366] RBP: 00007f4362fab090 R08: 0000000000000000 R09: 0000000000000000 [ 827.436716][T12366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 827.444744][T12366] R13: 00007f4362416038 R14: 00007f4362415fa0 R15: 00007ffcd15f5e88 [ 827.452797][T12366] [ 827.495096][T11187] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 827.626599][T11187] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 827.693619][T12372] netlink: 'syz.3.2508': attribute type 10 has an invalid length. [ 827.774625][T12372] team0: Device hsr_slave_0 failed to register rx_handler [ 827.869468][T11187] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 827.952916][T12385] FAULT_INJECTION: forcing a failure. [ 827.952916][T12385] name failslab, interval 1, probability 0, space 0, times 0 [ 827.972091][T12385] CPU: 0 PID: 12385 Comm: syz.4.2511 Not tainted syzkaller #0 [ 827.979636][T12385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 827.989739][T12385] Call Trace: [ 827.993120][T12385] [ 827.996080][T12385] dump_stack_lvl+0x18c/0x250 [ 828.000824][T12385] ? show_regs_print_info+0x20/0x20 [ 828.006088][T12385] ? load_image+0x400/0x400 [ 828.010669][T12385] ? __might_sleep+0xe0/0xe0 [ 828.015328][T12385] ? __lock_acquire+0x7d40/0x7d40 [ 828.020379][T12385] should_fail_ex+0x39d/0x4d0 [ 828.025099][T12385] should_failslab+0x9/0x20 [ 828.029659][T12385] slab_pre_alloc_hook+0x59/0x310 [ 828.034734][T12385] ? kvmalloc_node+0x70/0x180 [ 828.039442][T12385] ? kvmalloc_node+0x70/0x180 [ 828.044230][T12385] __kmem_cache_alloc_node+0x53/0x250 [ 828.049657][T12385] ? kvmalloc_node+0x70/0x180 [ 828.054377][T12385] __kmalloc_node+0xa4/0x230 [ 828.058999][T12385] kvmalloc_node+0x70/0x180 [ 828.063528][T12385] bpf_test_run_xdp_live+0x1e9/0x1b20 [ 828.068927][T12385] ? bpf_dispatcher_xdp+0x800/0x1000 [ 828.074235][T12385] ? bpf_dispatcher_xdp+0x800/0x1000 [ 828.079730][T12385] ? bpf_dispatcher_change_prog+0xcbf/0xf10 [ 828.085770][T12385] ? bpf_dispatcher_xdp+0x800/0x1000 [ 828.091135][T12385] ? xdp_convert_md_to_buff+0x330/0x330 [ 828.096730][T12385] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 828.103008][T12385] ? _copy_from_user+0xa5/0xe0 [ 828.107792][T12385] ? bpf_test_init+0x119/0x140 [ 828.112582][T12385] ? xdp_convert_md_to_buff+0x5b/0x330 [ 828.118061][T12385] bpf_prog_test_run_xdp+0x7ca/0x10e0 [ 828.124173][T12385] ? dev_put+0x80/0x80 [ 828.128291][T12385] ? dev_put+0x80/0x80 [ 828.132378][T12385] bpf_prog_test_run+0x321/0x390 [ 828.137343][T12385] __sys_bpf+0x49d/0x890 [ 828.141619][T12385] ? bpf_link_show_fdinfo+0x390/0x390 [ 828.147019][T12385] ? lock_chain_count+0x20/0x20 [ 828.151891][T12385] __x64_sys_bpf+0x7c/0x90 [ 828.156326][T12385] do_syscall_64+0x55/0xa0 [ 828.160760][T12385] ? clear_bhb_loop+0x40/0x90 [ 828.165466][T12385] ? clear_bhb_loop+0x40/0x90 [ 828.170203][T12385] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 828.176148][T12385] RIP: 0033:0x7f5f7179c799 [ 828.180593][T12385] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 828.200266][T12385] RSP: 002b:00007f5f725cd028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 828.208703][T12385] RAX: ffffffffffffffda RBX: 00007f5f71a15fa0 RCX: 00007f5f7179c799 [ 828.216689][T12385] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 828.224686][T12385] RBP: 00007f5f725cd090 R08: 0000000000000000 R09: 0000000000000000 [ 828.232710][T12385] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 828.240705][T12385] R13: 00007f5f71a16038 R14: 00007f5f71a15fa0 R15: 00007ffd8322df28 [ 828.248731][T12385] [ 828.281609][T11187] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 828.473012][T12391] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2512'. [ 828.483584][T12391] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2512'. [ 828.509994][T12391] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2512'. [ 828.531219][T12388] delete_channel: no stack [ 828.702262][T12359] chnl_net:caif_netlink_parms(): no params data found [ 828.975111][ T5839] Bluetooth: hci1: command tx timeout [ 829.117307][T12359] bridge0: port 1(bridge_slave_0) entered blocking state [ 829.151571][T12359] bridge0: port 1(bridge_slave_0) entered disabled state [ 829.171442][T12359] bridge_slave_0: entered allmulticast mode [ 829.182016][T12359] bridge_slave_0: entered promiscuous mode [ 829.228579][T11187] bridge0: port 3(ip6gretap0) entered disabled state [ 829.780797][T12418] FAULT_INJECTION: forcing a failure. [ 829.780797][T12418] name failslab, interval 1, probability 0, space 0, times 0 [ 829.805545][T12418] CPU: 0 PID: 12418 Comm: syz.1.2519 Not tainted syzkaller #0 [ 829.813110][T12418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 829.823219][T12418] Call Trace: [ 829.826552][T12418] [ 829.829537][T12418] dump_stack_lvl+0x18c/0x250 [ 829.834279][T12418] ? show_regs_print_info+0x20/0x20 [ 829.839534][T12418] ? load_image+0x400/0x400 [ 829.844096][T12418] ? __might_sleep+0xe0/0xe0 [ 829.848739][T12418] ? __lock_acquire+0x7d40/0x7d40 [ 829.853831][T12418] should_fail_ex+0x39d/0x4d0 [ 829.858584][T12418] should_failslab+0x9/0x20 [ 829.863150][T12418] slab_pre_alloc_hook+0x59/0x310 [ 829.868227][T12418] ? __lock_acquire+0x7d40/0x7d40 [ 829.873287][T12418] ? kvmalloc_node+0x70/0x180 [ 829.878015][T12418] ? kvmalloc_node+0x70/0x180 [ 829.882726][T12418] __kmem_cache_alloc_node+0x53/0x250 [ 829.888134][T12418] ? __schedule_delayed_monitor_work+0x200/0x200 [ 829.894590][T12418] ? kvmalloc_node+0x70/0x180 [ 829.899337][T12418] __kmalloc_node+0xa4/0x230 [ 829.903963][T12418] kvmalloc_node+0x70/0x180 [ 829.908505][T12418] bpf_test_run_xdp_live+0x1c2/0x1b20 [ 829.913918][T12418] ? bpf_dispatcher_xdp+0x800/0x1000 [ 829.919243][T12418] ? bpf_dispatcher_xdp+0x800/0x1000 [ 829.924560][T12418] ? bpf_dispatcher_change_prog+0xcbf/0xf10 [ 829.930492][T12418] ? bpf_dispatcher_xdp+0x800/0x1000 [ 829.935818][T12418] ? xdp_convert_md_to_buff+0x330/0x330 [ 829.941439][T12418] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 829.947719][T12418] ? _copy_from_user+0xa5/0xe0 [ 829.952515][T12418] ? bpf_test_init+0x119/0x140 [ 829.957312][T12418] ? xdp_convert_md_to_buff+0x5b/0x330 [ 829.962804][T12418] bpf_prog_test_run_xdp+0x7ca/0x10e0 [ 829.968225][T12418] ? dev_put+0x80/0x80 [ 829.972335][T12418] ? dev_put+0x80/0x80 [ 829.976442][T12418] bpf_prog_test_run+0x321/0x390 [ 829.981416][T12418] __sys_bpf+0x49d/0x890 [ 829.985708][T12418] ? bpf_link_show_fdinfo+0x390/0x390 [ 829.991120][T12418] ? lock_chain_count+0x20/0x20 [ 829.996032][T12418] __x64_sys_bpf+0x7c/0x90 [ 830.000476][T12418] do_syscall_64+0x55/0xa0 [ 830.004944][T12418] ? clear_bhb_loop+0x40/0x90 [ 830.009657][T12418] ? clear_bhb_loop+0x40/0x90 [ 830.014372][T12418] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 830.020293][T12418] RIP: 0033:0x7f436219c799 [ 830.024751][T12418] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 830.044403][T12418] RSP: 002b:00007f4362f8a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 830.052853][T12418] RAX: ffffffffffffffda RBX: 00007f4362416090 RCX: 00007f436219c799 [ 830.060860][T12418] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 830.068859][T12418] RBP: 00007f4362f8a090 R08: 0000000000000000 R09: 0000000000000000 [ 830.076861][T12418] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 830.084857][T12418] R13: 00007f4362416128 R14: 00007f4362416090 R15: 00007ffcd15f5e88 [ 830.092886][T12418] [ 830.208733][T11187] ip6gretap0 (unregistering): left allmulticast mode [ 830.217707][T11187] ip6gretap0 (unregistering): left promiscuous mode [ 830.227373][T11187] bridge0: port 3(ip6gretap0) entered disabled state [ 830.281579][T12359] bridge0: port 2(bridge_slave_1) entered blocking state [ 830.298543][T12359] bridge0: port 2(bridge_slave_1) entered disabled state [ 830.315292][T12359] bridge_slave_1: entered allmulticast mode [ 830.335099][T12359] bridge_slave_1: entered promiscuous mode [ 830.477758][T12359] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 830.510439][T12359] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 830.712355][T12359] team0: Port device team_slave_0 added [ 830.748509][T12359] team0: Port device team_slave_1 added [ 830.781079][T12428] delete_channel: no stack [ 831.027543][T12433] __nla_validate_parse: 7 callbacks suppressed [ 831.027569][T12433] netlink: 60 bytes leftover after parsing attributes in process `syz.4.2523'. [ 831.045125][ T5839] Bluetooth: hci1: command tx timeout [ 831.114195][T12359] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 831.168920][T12359] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 831.235094][T12359] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 831.267926][T12359] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 831.285730][T12359] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 831.343542][T12359] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 831.443182][T12436] netlink: 60 bytes leftover after parsing attributes in process `syz.4.2523'. [ 832.063825][T12459] FAULT_INJECTION: forcing a failure. [ 832.063825][T12459] name failslab, interval 1, probability 0, space 0, times 0 [ 832.093027][T12459] CPU: 1 PID: 12459 Comm: syz.1.2529 Not tainted syzkaller #0 [ 832.100580][T12459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 832.110683][T12459] Call Trace: [ 832.114021][T12459] [ 832.116998][T12459] dump_stack_lvl+0x18c/0x250 [ 832.121743][T12459] ? show_regs_print_info+0x20/0x20 [ 832.126996][T12459] ? load_image+0x400/0x400 [ 832.131559][T12459] ? __lock_acquire+0x7d40/0x7d40 [ 832.136643][T12459] should_fail_ex+0x39d/0x4d0 [ 832.141389][T12459] should_failslab+0x9/0x20 [ 832.145952][T12459] slab_pre_alloc_hook+0x59/0x310 [ 832.151075][T12459] ? bpf_test_init+0x9f/0x140 [ 832.155916][T12459] ? bpf_test_init+0x9f/0x140 [ 832.160630][T12459] __kmem_cache_alloc_node+0x53/0x250 [ 832.166048][T12459] ? bpf_test_init+0x9f/0x140 [ 832.170758][T12459] __kmalloc+0xa4/0x230 [ 832.174981][T12459] bpf_test_init+0x9f/0x140 [ 832.179527][T12459] bpf_prog_test_run_xdp+0x4d1/0x10e0 [ 832.184946][T12459] ? dev_put+0x80/0x80 [ 832.189083][T12459] ? dev_put+0x80/0x80 [ 832.193300][T12459] bpf_prog_test_run+0x321/0x390 [ 832.198295][T12459] __sys_bpf+0x49d/0x890 [ 832.202586][T12459] ? bpf_link_show_fdinfo+0x390/0x390 [ 832.208007][T12459] ? lock_chain_count+0x20/0x20 [ 832.212895][T12459] __x64_sys_bpf+0x7c/0x90 [ 832.217341][T12459] do_syscall_64+0x55/0xa0 [ 832.221794][T12459] ? clear_bhb_loop+0x40/0x90 [ 832.226603][T12459] ? clear_bhb_loop+0x40/0x90 [ 832.231320][T12459] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 832.237244][T12459] RIP: 0033:0x7f436219c799 [ 832.241690][T12459] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 832.262134][T12459] RSP: 002b:00007f4362fab028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 832.270761][T12459] RAX: ffffffffffffffda RBX: 00007f4362415fa0 RCX: 00007f436219c799 [ 832.278900][T12459] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 832.286898][T12459] RBP: 00007f4362fab090 R08: 0000000000000000 R09: 0000000000000000 [ 832.294895][T12459] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 832.302894][T12459] R13: 00007f4362416038 R14: 00007f4362415fa0 R15: 00007ffcd15f5e88 [ 832.311024][T12459] [ 832.791808][T12359] hsr_slave_0: entered promiscuous mode [ 832.856861][T12359] hsr_slave_1: entered promiscuous mode [ 832.981896][T12470] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2531'. [ 833.071560][T12470] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2531'. [ 833.132212][ T5839] Bluetooth: hci1: command tx timeout [ 833.136088][T12473] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2531'. [ 833.242399][T12477] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2531'. [ 833.272996][T12475] raw_sendmsg: syz.4.2533 forgot to set AF_INET. Fix it! [ 833.300844][T12469] delete_channel: no stack [ 833.526490][T12485] FAULT_INJECTION: forcing a failure. [ 833.526490][T12485] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 833.555037][T12485] CPU: 1 PID: 12485 Comm: syz.3.2535 Not tainted syzkaller #0 [ 833.562580][T12485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 833.572675][T12485] Call Trace: [ 833.575992][T12485] [ 833.578964][T12485] dump_stack_lvl+0x18c/0x250 [ 833.583712][T12485] ? show_regs_print_info+0x20/0x20 [ 833.588990][T12485] ? load_image+0x400/0x400 [ 833.593578][T12485] ? __lock_acquire+0x7d40/0x7d40 [ 833.598652][T12485] ? __virt_addr_valid+0x18c/0x540 [ 833.603840][T12485] should_fail_ex+0x39d/0x4d0 [ 833.608574][T12485] _copy_from_user+0x2f/0xe0 [ 833.613221][T12485] bpf_test_init+0xde/0x140 [ 833.617781][T12485] bpf_prog_test_run_xdp+0x4d1/0x10e0 [ 833.623219][T12485] ? dev_put+0x80/0x80 [ 833.627347][T12485] ? dev_put+0x80/0x80 [ 833.631632][T12485] bpf_prog_test_run+0x321/0x390 [ 833.636622][T12485] __sys_bpf+0x49d/0x890 [ 833.640910][T12485] ? bpf_link_show_fdinfo+0x390/0x390 [ 833.646339][T12485] ? lock_chain_count+0x20/0x20 [ 833.651251][T12485] __x64_sys_bpf+0x7c/0x90 [ 833.655712][T12485] do_syscall_64+0x55/0xa0 [ 833.660192][T12485] ? clear_bhb_loop+0x40/0x90 [ 833.664911][T12485] ? clear_bhb_loop+0x40/0x90 [ 833.669624][T12485] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 833.675559][T12485] RIP: 0033:0x7fdcaeb9c799 [ 833.680019][T12485] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 833.699717][T12485] RSP: 002b:00007fdcafad6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 833.708194][T12485] RAX: ffffffffffffffda RBX: 00007fdcaee15fa0 RCX: 00007fdcaeb9c799 [ 833.716302][T12485] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 833.724347][T12485] RBP: 00007fdcafad6090 R08: 0000000000000000 R09: 0000000000000000 [ 833.732369][T12485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 833.740379][T12485] R13: 00007fdcaee16038 R14: 00007fdcaee15fa0 R15: 00007ffcd38c94c8 [ 833.748411][T12485] [ 834.512888][T11187] hsr_slave_0: left promiscuous mode [ 834.603358][T12511] FAULT_INJECTION: forcing a failure. [ 834.603358][T12511] name failslab, interval 1, probability 0, space 0, times 0 [ 834.618609][T12511] CPU: 1 PID: 12511 Comm: syz.4.2541 Not tainted syzkaller #0 [ 834.626224][T12511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 834.636417][T12511] Call Trace: [ 834.639740][T12511] [ 834.642791][T12511] dump_stack_lvl+0x18c/0x250 [ 834.647553][T12511] ? show_regs_print_info+0x20/0x20 [ 834.652809][T12511] ? load_image+0x400/0x400 [ 834.657368][T12511] ? __lock_acquire+0x7d40/0x7d40 [ 834.662521][T12511] should_fail_ex+0x39d/0x4d0 [ 834.667361][T12511] should_failslab+0x9/0x20 [ 834.671940][T12511] slab_pre_alloc_hook+0x59/0x310 [ 834.677033][T12511] ? bpf_test_init+0x9f/0x140 [ 834.681758][T12511] ? bpf_test_init+0x9f/0x140 [ 834.686481][T12511] __kmem_cache_alloc_node+0x53/0x250 [ 834.692011][T12511] ? bpf_test_init+0x9f/0x140 [ 834.696739][T12511] __kmalloc+0xa4/0x230 [ 834.700996][T12511] bpf_test_init+0x9f/0x140 [ 834.705553][T12511] bpf_prog_test_run_xdp+0x4d1/0x10e0 [ 834.711000][T12511] ? dev_put+0x80/0x80 [ 834.715135][T12511] ? dev_put+0x80/0x80 [ 834.719271][T12511] bpf_prog_test_run+0x321/0x390 [ 834.724288][T12511] __sys_bpf+0x49d/0x890 [ 834.728592][T12511] ? bpf_link_show_fdinfo+0x390/0x390 [ 834.734033][T12511] ? lock_chain_count+0x20/0x20 [ 834.738950][T12511] __x64_sys_bpf+0x7c/0x90 [ 834.743424][T12511] do_syscall_64+0x55/0xa0 [ 834.747896][T12511] ? clear_bhb_loop+0x40/0x90 [ 834.752641][T12511] ? clear_bhb_loop+0x40/0x90 [ 834.757378][T12511] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 834.763325][T12511] RIP: 0033:0x7f5f7179c799 [ 834.767787][T12511] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 834.787461][T12511] RSP: 002b:00007f5f725cd028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 834.795933][T12511] RAX: ffffffffffffffda RBX: 00007f5f71a15fa0 RCX: 00007f5f7179c799 [ 834.803946][T12511] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 834.811987][T12511] RBP: 00007f5f725cd090 R08: 0000000000000000 R09: 0000000000000000 [ 834.820001][T12511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 834.828014][T12511] R13: 00007f5f71a16038 R14: 00007f5f71a15fa0 R15: 00007ffd8322df28 [ 834.836051][T12511] [ 835.044554][T12518] netlink: 60 bytes leftover after parsing attributes in process `syz.4.2543'. [ 835.205045][ T5839] Bluetooth: hci1: command tx timeout [ 835.332649][T11187] hsr_slave_1: left promiscuous mode [ 835.471035][T11187] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 835.479406][T11187] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 835.505325][T11187] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 835.512902][T11187] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 835.535923][T11187] bridge_slave_1: left allmulticast mode [ 835.545693][T11187] bridge_slave_1: left promiscuous mode [ 835.558086][T11187] bridge0: port 2(bridge_slave_1) entered disabled state [ 835.591516][T11187] bridge_slave_0: left allmulticast mode [ 835.599417][T11187] bridge_slave_0: left promiscuous mode [ 835.611348][T11187] bridge0: port 1(bridge_slave_0) entered disabled state [ 835.687317][T11187] veth1_macvtap: left promiscuous mode [ 835.692974][T11187] veth0_macvtap: left promiscuous mode [ 835.699694][T11187] veth0_vlan: left promiscuous mode [ 835.848509][T12517] delete_channel: no stack [ 836.601903][T11187] team0 (unregistering): Port device team_slave_1 removed [ 836.662803][T11187] team0 (unregistering): Port device team_slave_0 removed [ 836.724721][T11187] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 836.788215][T11187] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 837.204208][T11187] bond0 (unregistering): Released all slaves [ 837.314112][T12518] netlink: 60 bytes leftover after parsing attributes in process `syz.4.2543'. [ 837.905771][T12550] syzkaller1: tun_chr_ioctl cmd 1074025677 [ 837.912734][T12550] syzkaller1: linktype set to 786 [ 837.956708][T12550] macvlan1: entered promiscuous mode [ 837.982772][T12550] macvlan1: entered allmulticast mode [ 838.005151][T12550] veth1_vlan: entered allmulticast mode [ 841.157262][T12359] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 841.178885][T12359] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 841.190928][T12359] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 841.248775][T12359] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 841.288249][ T5839] Bluetooth: hci4: unexpected event 0x05 length: 151 > 4 [ 841.330099][T12583] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2555'. [ 841.371287][T12583] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2555'. [ 841.417154][T12583] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2555'. [ 841.452360][T12583] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2555'. [ 841.473513][T12581] delete_channel: no stack [ 841.604761][T12359] 8021q: adding VLAN 0 to HW filter on device bond0 [ 841.674861][T12359] 8021q: adding VLAN 0 to HW filter on device team0 [ 841.727015][ T5875] bridge0: port 1(bridge_slave_0) entered blocking state [ 841.734276][ T5875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 841.893096][ T5867] bridge0: port 2(bridge_slave_1) entered blocking state [ 841.900395][ T5867] bridge0: port 2(bridge_slave_1) entered forwarding state [ 842.503440][T12616] netlink: 'syz.3.2561': attribute type 8 has an invalid length. [ 842.549163][T12616] netlink: 199836 bytes leftover after parsing attributes in process `syz.3.2561'. [ 842.941312][T12623] FAULT_INJECTION: forcing a failure. [ 842.941312][T12623] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 842.995353][T12623] CPU: 1 PID: 12623 Comm: syz.3.2563 Not tainted syzkaller #0 [ 843.002910][T12623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 843.013017][T12623] Call Trace: [ 843.016343][T12623] [ 843.018037][T12625] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2564'. [ 843.019304][T12623] dump_stack_lvl+0x18c/0x250 [ 843.019348][T12623] ? show_regs_print_info+0x20/0x20 [ 843.019382][T12623] ? load_image+0x400/0x400 [ 843.019415][T12623] ? __might_fault+0xaa/0x120 [ 843.019444][T12623] should_fail_ex+0x39d/0x4d0 [ 843.019483][T12623] copyin+0x1a/0x90 [ 843.019515][T12623] _copy_from_iter+0x404/0x12e0 [ 843.019546][T12623] ? __virt_addr_valid+0x18c/0x540 [ 843.019576][T12623] ? __lock_acquire+0x7d40/0x7d40 [ 843.019609][T12623] ? copyout_mc+0x70/0x70 [ 843.019644][T12623] ? __virt_addr_valid+0x18c/0x540 [ 843.019672][T12623] ? __virt_addr_valid+0x18c/0x540 [ 843.019700][T12623] ? __virt_addr_valid+0x469/0x540 [ 843.019731][T12623] ? __check_object_size+0x506/0xa20 [ 843.019771][T12623] skb_copy_datagram_from_iter+0xf4/0x6e0 [ 843.019803][T12623] ? dev_get_by_index+0x22/0x2d0 [ 843.019827][T12623] ? skb_put+0x11b/0x210 [ 843.019853][T12623] packet_sendmsg+0x3566/0x4d70 [ 843.019914][T12623] ? verify_lock_unused+0x140/0x140 [ 843.019942][T12623] ? perf_trace_lock_acquire+0x104/0x410 [ 843.019986][T12623] ? aa_sk_perm+0x83c/0x970 [ 843.020026][T12623] ? packet_getsockopt+0xad0/0xad0 [ 843.020072][T12623] ? aa_sock_msg_perm+0x94/0x150 [ 843.020102][T12623] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 843.020128][T12623] ? security_socket_sendmsg+0x80/0xa0 [ 843.020152][T12623] ? packet_getsockopt+0xad0/0xad0 [ 843.020184][T12623] ____sys_sendmsg+0x5ba/0x960 [ 843.020206][T12623] ? __lock_acquire+0x7d40/0x7d40 [ 843.020236][T12623] ? __asan_memset+0x22/0x40 [ 843.020266][T12623] ? __sys_sendmsg_sock+0x30/0x30 [ 843.020285][T12623] ? __import_iovec+0x3fa/0x850 [ 843.020329][T12623] ? import_iovec+0x73/0xa0 [ 843.020354][T12623] ___sys_sendmsg+0x2a6/0x360 [ 843.020375][T12623] ? get_pid_task+0x20/0x1e0 [ 843.020409][T12623] ? __sys_sendmsg+0x2a0/0x2a0 [ 843.020456][T12623] ? __lock_acquire+0x7d40/0x7d40 [ 843.020511][T12623] __se_sys_sendmsg+0x1c2/0x2b0 [ 843.020537][T12623] ? __x64_sys_sendmsg+0x80/0x80 [ 843.020578][T12623] ? lockdep_hardirqs_on+0x98/0x150 [ 843.020608][T12623] do_syscall_64+0x55/0xa0 [ 843.020643][T12623] ? clear_bhb_loop+0x40/0x90 [ 843.020669][T12623] ? clear_bhb_loop+0x40/0x90 [ 843.020696][T12623] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 843.020721][T12623] RIP: 0033:0x7fdcaeb9c799 [ 843.020742][T12623] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 843.020761][T12623] RSP: 002b:00007fdcafad6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 843.020785][T12623] RAX: ffffffffffffffda RBX: 00007fdcaee15fa0 RCX: 00007fdcaeb9c799 [ 843.020802][T12623] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000003 [ 843.020817][T12623] RBP: 00007fdcafad6090 R08: 0000000000000000 R09: 0000000000000000 [ 843.020830][T12623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 843.020843][T12623] R13: 00007fdcaee16038 R14: 00007fdcaee15fa0 R15: 00007ffcd38c94c8 [ 843.020877][T12623] [ 843.373843][T12359] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 843.631182][T12625] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2564'. [ 843.647760][T12627] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2564'. [ 843.702321][T12628] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2564'. [ 843.714773][T12359] veth0_vlan: entered promiscuous mode [ 843.727149][T12624] delete_channel: no stack [ 843.785326][T12359] veth1_vlan: entered promiscuous mode [ 843.901954][T12359] veth0_macvtap: entered promiscuous mode [ 843.951139][T12359] veth1_macvtap: entered promiscuous mode [ 844.024693][T12359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 844.053951][T12359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 844.070971][T12359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 844.082347][T12359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 844.094943][T12359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 844.113322][T12359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 844.124678][T12359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 844.141170][T12359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 844.153569][T12359] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 844.194305][T12359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 844.210984][T12359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 844.233025][T12359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 844.246381][T12359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 844.266557][T12359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 844.283009][T12359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 844.293616][T12359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 844.311292][T12359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 844.323485][T12359] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 844.362978][T12359] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 844.371973][T12359] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 844.389593][T12359] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 844.400337][T12359] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 845.419708][ T5839] Bluetooth: hci0: unexpected event 0x05 length: 151 > 4 [ 845.536959][T12658] netlink: 1047 bytes leftover after parsing attributes in process `syz.1.2573'. [ 845.706039][ T5867] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 845.753020][ T5867] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 846.077811][ T59] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 846.143269][ T59] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 846.520672][T12673] FAULT_INJECTION: forcing a failure. [ 846.520672][T12673] name failslab, interval 1, probability 0, space 0, times 0 [ 846.579478][T12673] CPU: 0 PID: 12673 Comm: syz.4.2570 Not tainted syzkaller #0 [ 846.587032][T12673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 846.597138][T12673] Call Trace: [ 846.600459][T12673] [ 846.603428][T12673] dump_stack_lvl+0x18c/0x250 [ 846.608167][T12673] ? show_regs_print_info+0x20/0x20 [ 846.613439][T12673] ? load_image+0x400/0x400 [ 846.618007][T12673] ? __might_sleep+0xe0/0xe0 [ 846.622676][T12673] ? __lock_acquire+0x7d40/0x7d40 [ 846.627801][T12673] should_fail_ex+0x39d/0x4d0 [ 846.632558][T12673] should_failslab+0x9/0x20 [ 846.637144][T12673] slab_pre_alloc_hook+0x59/0x310 [ 846.642339][T12673] ? __lock_acquire+0x7d40/0x7d40 [ 846.647423][T12673] ? kvmalloc_node+0x70/0x180 [ 846.652169][T12673] ? kvmalloc_node+0x70/0x180 [ 846.656905][T12673] __kmem_cache_alloc_node+0x53/0x250 [ 846.662349][T12673] ? __schedule_delayed_monitor_work+0x200/0x200 [ 846.668747][T12673] ? kvmalloc_node+0x70/0x180 [ 846.673490][T12673] __kmalloc_node+0xa4/0x230 [ 846.678156][T12673] kvmalloc_node+0x70/0x180 [ 846.682725][T12673] bpf_test_run_xdp_live+0x1c2/0x1b20 [ 846.688166][T12673] ? 0xffffffffa0004140 [ 846.692460][T12673] ? 0xffffffffa0004140 [ 846.696682][T12673] ? bpf_dispatcher_change_prog+0xcbf/0xf10 [ 846.702652][T12673] ? 0xffffffffa0004140 [ 846.706878][T12673] ? xdp_convert_md_to_buff+0x330/0x330 [ 846.712538][T12673] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 846.718889][T12673] ? _copy_from_user+0xa5/0xe0 [ 846.723723][T12673] ? bpf_test_init+0x119/0x140 [ 846.728547][T12673] ? xdp_convert_md_to_buff+0x5b/0x330 [ 846.734074][T12673] bpf_prog_test_run_xdp+0x7ca/0x10e0 [ 846.739574][T12673] ? dev_put+0x80/0x80 [ 846.743742][T12673] ? dev_put+0x80/0x80 [ 846.747942][T12673] bpf_prog_test_run+0x321/0x390 [ 846.752955][T12673] __sys_bpf+0x49d/0x890 [ 846.757267][T12673] ? bpf_link_show_fdinfo+0x390/0x390 [ 846.762763][T12673] ? lock_chain_count+0x20/0x20 [ 846.767688][T12673] __x64_sys_bpf+0x7c/0x90 [ 846.772163][T12673] do_syscall_64+0x55/0xa0 [ 846.776673][T12673] ? clear_bhb_loop+0x40/0x90 [ 846.781413][T12673] ? clear_bhb_loop+0x40/0x90 [ 846.786159][T12673] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 846.792149][T12673] RIP: 0033:0x7f5f7179c799 [ 846.796622][T12673] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 846.816368][T12673] RSP: 002b:00007f5f725cd028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 846.824851][T12673] RAX: ffffffffffffffda RBX: 00007f5f71a15fa0 RCX: 00007f5f7179c799 [ 846.832881][T12673] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 846.840916][T12673] RBP: 00007f5f725cd090 R08: 0000000000000000 R09: 0000000000000000 [ 846.848944][T12673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 846.856980][T12673] R13: 00007f5f71a16038 R14: 00007f5f71a15fa0 R15: 00007ffd8322df28 [ 846.865027][T12673] [ 847.110534][T12688] FAULT_INJECTION: forcing a failure. [ 847.110534][T12688] name failslab, interval 1, probability 0, space 0, times 0 [ 847.143145][T12688] CPU: 0 PID: 12688 Comm: syz.4.2574 Not tainted syzkaller #0 [ 847.150700][T12688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 847.160812][T12688] Call Trace: [ 847.164232][T12688] [ 847.167212][T12688] dump_stack_lvl+0x18c/0x250 [ 847.172048][T12688] ? show_regs_print_info+0x20/0x20 [ 847.177320][T12688] ? load_image+0x400/0x400 [ 847.181887][T12688] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 847.188111][T12688] ? __asan_memset+0x22/0x40 [ 847.192778][T12688] should_fail_ex+0x39d/0x4d0 [ 847.197531][T12688] should_failslab+0x9/0x20 [ 847.202102][T12688] slab_pre_alloc_hook+0x59/0x310 [ 847.207224][T12688] ? __debug_object_init+0xec/0x450 [ 847.212498][T12688] kmem_cache_alloc+0x5a/0x2d0 [ 847.217367][T12688] ? slab_build_skb+0x2b/0x3f0 [ 847.222223][T12688] slab_build_skb+0x2b/0x3f0 [ 847.226887][T12688] bpf_prog_test_run_skb+0x3c8/0x12b0 [ 847.232327][T12688] ? __fget_files+0x28/0x4b0 [ 847.237000][T12688] ? __fget_files+0x28/0x4b0 [ 847.242223][T12688] ? __fget_files+0x43d/0x4b0 [ 847.247148][T12688] ? cpu_online+0x60/0x60 [ 847.251533][T12688] bpf_prog_test_run+0x321/0x390 [ 847.256629][T12688] __sys_bpf+0x49d/0x890 [ 847.260935][T12688] ? bpf_link_show_fdinfo+0x390/0x390 [ 847.266461][T12688] ? lock_chain_count+0x20/0x20 [ 847.271916][T12688] __x64_sys_bpf+0x7c/0x90 [ 847.276441][T12688] do_syscall_64+0x55/0xa0 [ 847.280936][T12688] ? clear_bhb_loop+0x40/0x90 [ 847.285670][T12688] ? clear_bhb_loop+0x40/0x90 [ 847.290408][T12688] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 847.296553][T12688] RIP: 0033:0x7f5f7179c799 [ 847.301027][T12688] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 847.320710][T12688] RSP: 002b:00007f5f725cd028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 847.329192][T12688] RAX: ffffffffffffffda RBX: 00007f5f71a15fa0 RCX: 00007f5f7179c799 [ 847.337243][T12688] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 847.345310][T12688] RBP: 00007f5f725cd090 R08: 0000000000000000 R09: 0000000000000000 [ 847.345679][T12685] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2572'. [ 847.353486][T12688] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 847.353504][T12688] R13: 00007f5f71a16038 R14: 00007f5f71a15fa0 R15: 00007ffd8322df28 [ 847.353535][T12688] [ 847.436094][T12685] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2572'. [ 847.495193][T12692] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2572'. [ 847.549082][ T5839] Bluetooth: hci1: unexpected event 0x05 length: 151 > 4 [ 847.550441][T12685] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2572'. [ 847.597433][T12683] delete_channel: no stack [ 847.884752][T12708] FAULT_INJECTION: forcing a failure. [ 847.884752][T12708] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 847.926270][T12708] CPU: 0 PID: 12708 Comm: syz.3.2579 Not tainted syzkaller #0 [ 847.933902][T12708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 847.944094][T12708] Call Trace: [ 847.947426][T12708] [ 847.950402][T12708] dump_stack_lvl+0x18c/0x250 [ 847.955159][T12708] ? show_regs_print_info+0x20/0x20 [ 847.960434][T12708] ? load_image+0x400/0x400 [ 847.965005][T12708] ? __lock_acquire+0x7d40/0x7d40 [ 847.970698][T12708] ? __virt_addr_valid+0x18c/0x540 [ 847.975920][T12708] should_fail_ex+0x39d/0x4d0 [ 847.980670][T12708] _copy_from_user+0x2f/0xe0 [ 847.985318][T12708] bpf_test_init+0xde/0x140 [ 847.989976][T12708] bpf_prog_test_run_xdp+0x4d1/0x10e0 [ 847.995426][T12708] ? dev_put+0x80/0x80 [ 847.999563][T12708] ? dev_put+0x80/0x80 [ 848.003681][T12708] bpf_prog_test_run+0x321/0x390 [ 848.008671][T12708] __sys_bpf+0x49d/0x890 [ 848.013068][T12708] ? bpf_link_show_fdinfo+0x390/0x390 [ 848.018505][T12708] ? lock_chain_count+0x20/0x20 [ 848.023435][T12708] __x64_sys_bpf+0x7c/0x90 [ 848.027909][T12708] do_syscall_64+0x55/0xa0 [ 848.032390][T12708] ? clear_bhb_loop+0x40/0x90 [ 848.037166][T12708] ? clear_bhb_loop+0x40/0x90 [ 848.041899][T12708] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 848.047840][T12708] RIP: 0033:0x7fdcaeb9c799 [ 848.052302][T12708] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 848.071983][T12708] RSP: 002b:00007fdcafab5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 848.080470][T12708] RAX: ffffffffffffffda RBX: 00007fdcaee16090 RCX: 00007fdcaeb9c799 [ 848.088503][T12708] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 848.096534][T12708] RBP: 00007fdcafab5090 R08: 0000000000000000 R09: 0000000000000000 [ 848.104568][T12708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 848.112595][T12708] R13: 00007fdcaee16128 R14: 00007fdcaee16090 R15: 00007ffcd38c94c8 [ 848.120633][T12708] [ 850.824572][T12717] FAULT_INJECTION: forcing a failure. [ 850.824572][T12717] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 850.881218][T12717] CPU: 0 PID: 12717 Comm: syz.1.2582 Not tainted syzkaller #0 [ 850.888769][T12717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 850.898935][T12717] Call Trace: [ 850.902260][T12717] [ 850.905229][T12717] dump_stack_lvl+0x18c/0x250 [ 850.909977][T12717] ? show_regs_print_info+0x20/0x20 [ 850.915246][T12717] ? load_image+0x400/0x400 [ 850.919826][T12717] ? __lock_acquire+0x7d40/0x7d40 [ 850.924928][T12717] should_fail_ex+0x39d/0x4d0 [ 850.929678][T12717] prepare_alloc_pages+0x1e2/0x5f0 [ 850.934878][T12717] __alloc_pages+0x134/0x460 [ 850.939536][T12717] ? rcu_is_watching+0x15/0xb0 [ 850.944366][T12717] ? zone_statistics+0x170/0x170 [ 850.949356][T12717] ? __build_skb_around+0x255/0x3d0 [ 850.954668][T12717] alloc_skb_with_frags+0x23c/0x7b0 [ 850.959945][T12717] sock_alloc_send_pskb+0x883/0x9a0 [ 850.965269][T12717] ? sock_kzfree_s+0x50/0x50 [ 850.969950][T12717] tun_get_user+0x82c/0x3ca0 [ 850.974618][T12717] ? aa_file_perm+0x11b/0xee0 [ 850.979366][T12717] ? rcu_read_unlock+0xa0/0xa0 [ 850.984398][T12717] ? tun_get+0x1c/0x2e0 [ 850.988625][T12717] ? __lock_acquire+0x7d40/0x7d40 [ 850.993724][T12717] ? tun_get+0x1c/0x2e0 [ 850.997953][T12717] tun_chr_write_iter+0x119/0x200 [ 851.003041][T12717] vfs_write+0x46c/0x990 [ 851.007448][T12717] ? file_end_write+0x250/0x250 [ 851.012377][T12717] ? __fget_files+0x43d/0x4b0 [ 851.017148][T12717] ? __fdget_pos+0x1d8/0x330 [ 851.021812][T12717] ? ksys_write+0x75/0x260 [ 851.026301][T12717] ksys_write+0x150/0x260 [ 851.030702][T12717] ? __ia32_sys_read+0x90/0x90 [ 851.035542][T12717] ? lockdep_hardirqs_on+0x98/0x150 [ 851.040803][T12717] do_syscall_64+0x55/0xa0 [ 851.045287][T12717] ? clear_bhb_loop+0x40/0x90 [ 851.050021][T12717] ? clear_bhb_loop+0x40/0x90 [ 851.054751][T12717] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 851.060692][T12717] RIP: 0033:0x7f436219c799 [ 851.065154][T12717] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 851.084830][T12717] RSP: 002b:00007f4362fab028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 851.093310][T12717] RAX: ffffffffffffffda RBX: 00007f4362415fa0 RCX: 00007f436219c799 [ 851.101343][T12717] RDX: 000000000000fdef RSI: 00002000000004c0 RDI: 00000000000000c8 [ 851.109373][T12717] RBP: 00007f4362fab090 R08: 0000000000000000 R09: 0000000000000000 [ 851.117413][T12717] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 851.125448][T12717] R13: 00007f4362416038 R14: 00007f4362415fa0 R15: 00007ffcd15f5e88 [ 851.133521][T12717] [ 851.398728][ T59] tipc: Subscription rejected, illegal request [ 851.457268][T12735] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2587'. [ 851.478870][T12736] FAULT_INJECTION: forcing a failure. [ 851.478870][T12736] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 851.514424][T12736] CPU: 1 PID: 12736 Comm: syz.3.2586 Not tainted syzkaller #0 [ 851.522006][T12736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 851.532122][T12736] Call Trace: [ 851.535510][T12736] [ 851.538490][T12736] dump_stack_lvl+0x18c/0x250 [ 851.543237][T12736] ? show_regs_print_info+0x20/0x20 [ 851.548510][T12736] ? load_image+0x400/0x400 [ 851.553082][T12736] ? __might_fault+0xaa/0x120 [ 851.557823][T12736] ? __lock_acquire+0x7d40/0x7d40 [ 851.562922][T12736] should_fail_ex+0x39d/0x4d0 [ 851.567673][T12736] _copy_from_user+0x2f/0xe0 [ 851.572327][T12736] ethtool_get_link_ksettings+0x163/0x400 [ 851.578120][T12736] ? ethtool_set_per_queue+0x1f0/0x1f0 [ 851.583637][T12736] ? trace_contention_end+0x39/0xe0 [ 851.589241][T12736] ? __mutex_lock+0x315/0xcc0 [ 851.594003][T12736] ? full_name_hash+0xb0/0xe0 [ 851.598753][T12736] dev_ethtool+0x94d/0x18d0 [ 851.603325][T12736] ? ethtool_get_module_eeprom_call+0x170/0x170 [ 851.609640][T12736] ? __lock_acquire+0x7d40/0x7d40 [ 851.614693][T12736] ? __might_fault+0xaa/0x120 [ 851.619498][T12736] ? full_name_hash+0xb0/0xe0 [ 851.624255][T12736] ? dev_load+0x21/0x1f0 [ 851.628561][T12736] dev_ioctl+0x392/0x1140 [ 851.632973][T12736] sock_do_ioctl+0x239/0x310 [ 851.637626][T12736] ? sock_show_fdinfo+0xb0/0xb0 [ 851.642543][T12736] sock_ioctl+0x5ba/0x7e0 [ 851.646932][T12736] ? sock_poll+0x3e0/0x3e0 [ 851.651402][T12736] ? bpf_lsm_file_ioctl+0x9/0x10 [ 851.656396][T12736] ? security_file_ioctl+0x80/0xa0 [ 851.661578][T12736] ? sock_poll+0x3e0/0x3e0 [ 851.666056][T12736] __se_sys_ioctl+0xfd/0x170 [ 851.670708][T12736] do_syscall_64+0x55/0xa0 [ 851.675616][T12736] ? clear_bhb_loop+0x40/0x90 [ 851.680351][T12736] ? clear_bhb_loop+0x40/0x90 [ 851.685087][T12736] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 851.691113][T12736] RIP: 0033:0x7fdcaeb9c799 [ 851.695820][T12736] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 851.715483][T12736] RSP: 002b:00007fdcafad6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 851.723958][T12736] RAX: ffffffffffffffda RBX: 00007fdcaee15fa0 RCX: 00007fdcaeb9c799 [ 851.731979][T12736] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 0000000000000004 [ 851.740036][T12736] RBP: 00007fdcafad6090 R08: 0000000000000000 R09: 0000000000000000 [ 851.748051][T12736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 851.756066][T12736] R13: 00007fdcaee16038 R14: 00007fdcaee15fa0 R15: 00007ffcd38c94c8 [ 851.764080][T12736] [ 851.786485][T12735] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2587'. [ 851.798494][T12739] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2587'. [ 851.805510][T12743] FAULT_INJECTION: forcing a failure. [ 851.805510][T12743] name failslab, interval 1, probability 0, space 0, times 0 [ 851.851456][T12743] CPU: 0 PID: 12743 Comm: syz.4.2588 Not tainted syzkaller #0 [ 851.859018][T12743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 851.869143][T12743] Call Trace: [ 851.872476][T12743] [ 851.875456][T12743] dump_stack_lvl+0x18c/0x250 [ 851.880203][T12743] ? show_regs_print_info+0x20/0x20 [ 851.885479][T12743] ? load_image+0x400/0x400 [ 851.890057][T12743] ? __might_sleep+0xe0/0xe0 [ 851.894716][T12743] ? __lock_acquire+0x7d40/0x7d40 [ 851.899808][T12743] should_fail_ex+0x39d/0x4d0 [ 851.904573][T12743] should_failslab+0x9/0x20 [ 851.909231][T12743] slab_pre_alloc_hook+0x59/0x310 [ 851.914331][T12743] ? page_pool_create+0x71/0x5c0 [ 851.919392][T12743] __kmem_cache_alloc_node+0x53/0x250 [ 851.924806][T12743] ? page_pool_create+0x71/0x5c0 [ 851.929780][T12743] kmalloc_node_trace+0x26/0xe0 [ 851.934669][T12743] page_pool_create+0x71/0x5c0 [ 851.939468][T12743] bpf_test_run_xdp_live+0x203/0x1b20 [ 851.944978][T12743] ? 0xffffffffa0004140 [ 851.949167][T12743] ? 0xffffffffa0004140 [ 851.953358][T12743] ? bpf_dispatcher_change_prog+0xcbf/0xf10 [ 851.959279][T12743] ? 0xffffffffa0004140 [ 851.963464][T12743] ? xdp_convert_md_to_buff+0x330/0x330 [ 851.969060][T12743] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 851.975332][T12743] ? _copy_from_user+0xa5/0xe0 [ 851.980134][T12743] ? bpf_test_init+0x119/0x140 [ 851.984933][T12743] ? xdp_convert_md_to_buff+0x5b/0x330 [ 851.990426][T12743] bpf_prog_test_run_xdp+0x7ca/0x10e0 [ 851.995851][T12743] ? dev_put+0x80/0x80 [ 851.999958][T12743] ? dev_put+0x80/0x80 [ 852.004058][T12743] bpf_prog_test_run+0x321/0x390 [ 852.009021][T12743] __sys_bpf+0x49d/0x890 [ 852.013292][T12743] ? bpf_link_show_fdinfo+0x390/0x390 [ 852.018705][T12743] ? lock_chain_count+0x20/0x20 [ 852.023672][T12743] __x64_sys_bpf+0x7c/0x90 [ 852.028143][T12743] do_syscall_64+0x55/0xa0 [ 852.032630][T12743] ? clear_bhb_loop+0x40/0x90 [ 852.037358][T12743] ? clear_bhb_loop+0x40/0x90 [ 852.042080][T12743] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 852.048010][T12743] RIP: 0033:0x7f5f7179c799 [ 852.052459][T12743] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 852.072182][T12743] RSP: 002b:00007f5f725ac028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 852.080630][T12743] RAX: ffffffffffffffda RBX: 00007f5f71a16090 RCX: 00007f5f7179c799 [ 852.088739][T12743] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 852.096783][T12743] RBP: 00007f5f725ac090 R08: 0000000000000000 R09: 0000000000000000 [ 852.104891][T12743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 852.112985][T12743] R13: 00007f5f71a16128 R14: 00007f5f71a16090 R15: 00007ffd8322df28 [ 852.120995][T12743] [ 852.166090][T12742] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2587'. [ 852.226821][T12734] delete_channel: no stack [ 853.340858][T12790] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2600'. [ 854.136485][T12789] delete_channel: no stack [ 854.382816][T12811] FAULT_INJECTION: forcing a failure. [ 854.382816][T12811] name failslab, interval 1, probability 0, space 0, times 0 [ 854.397302][T12811] CPU: 0 PID: 12811 Comm: syz.1.2602 Not tainted syzkaller #0 [ 854.404834][T12811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 854.414951][T12811] Call Trace: [ 854.418285][T12811] [ 854.421262][T12811] dump_stack_lvl+0x18c/0x250 [ 854.426043][T12811] ? show_regs_print_info+0x20/0x20 [ 854.431306][T12811] ? load_image+0x400/0x400 [ 854.435877][T12811] ? __might_sleep+0xe0/0xe0 [ 854.440529][T12811] ? __lock_acquire+0x7d40/0x7d40 [ 854.445645][T12811] should_fail_ex+0x39d/0x4d0 [ 854.450470][T12811] should_failslab+0x9/0x20 [ 854.455027][T12811] slab_pre_alloc_hook+0x59/0x310 [ 854.460120][T12811] ? __lock_acquire+0x7d40/0x7d40 [ 854.465201][T12811] ? kvmalloc_node+0x70/0x180 [ 854.469938][T12811] ? kvmalloc_node+0x70/0x180 [ 854.474667][T12811] __kmem_cache_alloc_node+0x53/0x250 [ 854.480093][T12811] ? __schedule_delayed_monitor_work+0x200/0x200 [ 854.486483][T12811] ? kvmalloc_node+0x70/0x180 [ 854.491220][T12811] __kmalloc_node+0xa4/0x230 [ 854.495861][T12811] kvmalloc_node+0x70/0x180 [ 854.500432][T12811] bpf_test_run_xdp_live+0x1c2/0x1b20 [ 854.505872][T12811] ? 0xffffffffa0004140 [ 854.510060][T12811] ? 0xffffffffa0004140 [ 854.514244][T12811] ? bpf_dispatcher_change_prog+0xcbf/0xf10 [ 854.520171][T12811] ? 0xffffffffa0004140 [ 854.524445][T12811] ? xdp_convert_md_to_buff+0x330/0x330 [ 854.530062][T12811] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 854.536336][T12811] ? _copy_from_user+0xa5/0xe0 [ 854.541159][T12811] ? bpf_test_init+0x119/0x140 [ 854.545968][T12811] ? xdp_convert_md_to_buff+0x5b/0x330 [ 854.551467][T12811] bpf_prog_test_run_xdp+0x7ca/0x10e0 [ 854.556897][T12811] ? dev_put+0x80/0x80 [ 854.561198][T12811] ? dev_put+0x80/0x80 [ 854.565302][T12811] bpf_prog_test_run+0x321/0x390 [ 854.570310][T12811] __sys_bpf+0x49d/0x890 [ 854.574671][T12811] ? bpf_link_show_fdinfo+0x390/0x390 [ 854.580085][T12811] ? lock_chain_count+0x20/0x20 [ 854.584976][T12811] __x64_sys_bpf+0x7c/0x90 [ 854.589429][T12811] do_syscall_64+0x55/0xa0 [ 854.593880][T12811] ? clear_bhb_loop+0x40/0x90 [ 854.598588][T12811] ? clear_bhb_loop+0x40/0x90 [ 854.603312][T12811] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 854.609254][T12811] RIP: 0033:0x7f436219c799 [ 854.613702][T12811] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 854.633342][T12811] RSP: 002b:00007f4362fab028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 854.641812][T12811] RAX: ffffffffffffffda RBX: 00007f4362415fa0 RCX: 00007f436219c799 [ 854.649811][T12811] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 854.657808][T12811] RBP: 00007f4362fab090 R08: 0000000000000000 R09: 0000000000000000 [ 854.665805][T12811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 854.673901][T12811] R13: 00007f4362416038 R14: 00007f4362415fa0 R15: 00007ffcd15f5e88 [ 854.681951][T12811] [ 856.522418][T12790] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2600'. [ 857.700040][T12835] FAULT_INJECTION: forcing a failure. [ 857.700040][T12835] name failslab, interval 1, probability 0, space 0, times 0 [ 857.716677][T12835] CPU: 1 PID: 12835 Comm: syz.0.2611 Not tainted syzkaller #0 [ 857.724218][T12835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 857.734353][T12835] Call Trace: [ 857.737667][T12835] [ 857.740647][T12835] dump_stack_lvl+0x18c/0x250 [ 857.745372][T12835] ? show_regs_print_info+0x20/0x20 [ 857.750703][T12835] ? load_image+0x400/0x400 [ 857.755258][T12835] ? __might_sleep+0xe0/0xe0 [ 857.759976][T12835] ? __lock_acquire+0x7d40/0x7d40 [ 857.765038][T12835] should_fail_ex+0x39d/0x4d0 [ 857.769771][T12835] should_failslab+0x9/0x20 [ 857.774314][T12835] slab_pre_alloc_hook+0x59/0x310 [ 857.779384][T12835] ? kvmalloc_node+0x70/0x180 [ 857.784099][T12835] ? kvmalloc_node+0x70/0x180 [ 857.788812][T12835] __kmem_cache_alloc_node+0x53/0x250 [ 857.794229][T12835] ? kvmalloc_node+0x70/0x180 [ 857.798949][T12835] __kmalloc_node+0xa4/0x230 [ 857.803584][T12835] kvmalloc_node+0x70/0x180 [ 857.808133][T12835] page_pool_create+0x1eb/0x5c0 [ 857.813033][T12835] bpf_test_run_xdp_live+0x203/0x1b20 [ 857.818447][T12835] ? 0xffffffffa0004140 [ 857.822629][T12835] ? 0xffffffffa0004140 [ 857.826809][T12835] ? bpf_dispatcher_change_prog+0xcbf/0xf10 [ 857.832906][T12835] ? 0xffffffffa0004140 [ 857.837116][T12835] ? xdp_convert_md_to_buff+0x330/0x330 [ 857.842721][T12835] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 857.849003][T12835] ? _copy_from_user+0xa5/0xe0 [ 857.853887][T12835] ? bpf_test_init+0x119/0x140 [ 857.858681][T12835] ? xdp_convert_md_to_buff+0x5b/0x330 [ 857.864173][T12835] bpf_prog_test_run_xdp+0x7ca/0x10e0 [ 857.869594][T12835] ? dev_put+0x80/0x80 [ 857.873712][T12835] ? dev_put+0x80/0x80 [ 857.877823][T12835] bpf_prog_test_run+0x321/0x390 [ 857.882845][T12835] __sys_bpf+0x49d/0x890 [ 857.887131][T12835] ? bpf_link_show_fdinfo+0x390/0x390 [ 857.892546][T12835] ? lock_chain_count+0x20/0x20 [ 857.897502][T12835] __x64_sys_bpf+0x7c/0x90 [ 857.901949][T12835] do_syscall_64+0x55/0xa0 [ 857.906576][T12835] ? clear_bhb_loop+0x40/0x90 [ 857.911294][T12835] ? clear_bhb_loop+0x40/0x90 [ 857.916004][T12835] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 857.922556][T12835] RIP: 0033:0x7f749e79c799 [ 857.927000][T12835] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 857.946849][T12835] RSP: 002b:00007f749f727028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 857.955297][T12835] RAX: ffffffffffffffda RBX: 00007f749ea15fa0 RCX: 00007f749e79c799 [ 857.963391][T12835] RDX: 0000000000000050 RSI: 0000200000000080 RDI: 000000000000000a [ 857.971583][T12835] RBP: 00007f749f727090 R08: 0000000000000000 R09: 0000000000000000 [ 857.979599][T12835] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 857.987617][T12835] R13: 00007f749ea16038 R14: 00007f749ea15fa0 R15: 00007ffda9f9a618 [ 857.995639][T12835] [ 858.035483][T12835] page_pool_create() gave up with errno -12 [ 858.138568][T12841] netlink: 'syz.4.2612': attribute type 29 has an invalid length. [ 858.147135][T12841] netlink: 'syz.4.2612': attribute type 29 has an invalid length. [ 858.157603][T12841] netlink: 'syz.4.2612': attribute type 29 has an invalid length. [ 858.167510][T12841] netlink: 'syz.4.2612': attribute type 29 has an invalid length. [ 858.199980][T12841] netlink: 'syz.4.2612': attribute type 29 has an invalid length. [ 858.317357][ T5839] Bluetooth: hci2: ACL packet for unknown connection handle 0 [ 858.455002][T12843] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2613'. [ 858.467047][T12843] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2613'. [ 858.491494][T12845] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2613'. [ 858.512548][T12843] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2613'. [ 858.533439][T12842] delete_channel: no stack [ 858.811136][T12850] netlink: zone id is out of range [ 858.825149][T12850] netlink: set zone limit has 8 unknown bytes [ 859.371553][T12864] netlink: 'syz.3.2620': attribute type 29 has an invalid length. [ 861.107622][T12864] netlink: 'syz.3.2620': attribute type 29 has an invalid length. [ 861.750176][T12877] netlink: 'syz.3.2625': attribute type 4 has an invalid length. [ 861.822896][T12877] netlink: 152 bytes leftover after parsing attributes in process `syz.3.2625'. [ 861.913480][T12877] A link change request failed with some changes committed already. Interface hsr_slave_1 may have been left with an inconsistent configuration, please check. [ 861.966927][T12873] netlink: 'syz.4.2621': attribute type 10 has an invalid length. [ 862.006055][T12873] netlink: 55 bytes leftover after parsing attributes in process `syz.4.2621'. [ 862.122008][T12885] netlink: 'syz.3.2626': attribute type 29 has an invalid length. [ 862.165128][ T5839] Bluetooth: hci0: ACL packet for unknown connection handle 0 [ 862.643307][T12903] netlink: 1039 bytes leftover after parsing attributes in process `syz.1.2633'. [ 862.659065][T12903] bridge_slave_1: default FDB implementation only supports local addresses [ 863.329362][T12917] validate_nla: 6 callbacks suppressed [ 863.329452][T12917] netlink: 'syz.1.2636': attribute type 3 has an invalid length. [ 863.343316][T12917] netlink: 130984 bytes leftover after parsing attributes in process `syz.1.2636'. [ 867.693298][T12936] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2642'. [ 867.729426][T12936] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2642'. [ 867.804196][T12938] FAULT_INJECTION: forcing a failure. [ 867.804196][T12938] name failslab, interval 1, probability 0, space 0, times 0 [ 867.818440][T12938] CPU: 0 PID: 12938 Comm: syz.1.2643 Not tainted syzkaller #0 [ 867.825956][T12938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 867.836044][T12938] Call Trace: [ 867.839347][T12938] [ 867.842302][T12938] dump_stack_lvl+0x18c/0x250 [ 867.847030][T12938] ? show_regs_print_info+0x20/0x20 [ 867.852286][T12938] ? load_image+0x400/0x400 [ 867.856830][T12938] ? __might_sleep+0xe0/0xe0 [ 867.861453][T12938] ? __lock_acquire+0x7d40/0x7d40 [ 867.866596][T12938] should_fail_ex+0x39d/0x4d0 [ 867.871744][T12938] should_failslab+0x9/0x20 [ 867.876374][T12938] slab_pre_alloc_hook+0x59/0x310 [ 867.881443][T12938] ? kvmalloc_node+0x70/0x180 [ 867.886157][T12938] ? kvmalloc_node+0x70/0x180 [ 867.890865][T12938] __kmem_cache_alloc_node+0x53/0x250 [ 867.896280][T12938] ? kvmalloc_node+0x70/0x180 [ 867.900992][T12938] __kmalloc_node+0xa4/0x230 [ 867.905621][T12938] kvmalloc_node+0x70/0x180 [ 867.910174][T12938] bpf_test_run_xdp_live+0x1e9/0x1b20 [ 867.915601][T12938] ? 0xffffffffa0004140 [ 867.919843][T12938] ? 0xffffffffa0004140 [ 867.924023][T12938] ? bpf_dispatcher_change_prog+0xcbf/0xf10 [ 867.930000][T12938] ? 0xffffffffa0004140 [ 867.934270][T12938] ? xdp_convert_md_to_buff+0x330/0x330 [ 867.939879][T12938] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 867.946254][T12938] ? _copy_from_user+0xa5/0xe0 [ 867.951074][T12938] ? bpf_test_init+0x119/0x140 [ 867.955874][T12938] ? xdp_convert_md_to_buff+0x5b/0x330 [ 867.961385][T12938] bpf_prog_test_run_xdp+0x7ca/0x10e0 [ 867.966808][T12938] ? dev_put+0x80/0x80 [ 867.970923][T12938] ? dev_put+0x80/0x80 [ 867.975031][T12938] bpf_prog_test_run+0x321/0x390 [ 867.980013][T12938] __sys_bpf+0x49d/0x890 [ 867.984284][T12938] ? bpf_link_show_fdinfo+0x390/0x390 [ 867.989700][T12938] ? lock_chain_count+0x20/0x20 [ 867.994589][T12938] __x64_sys_bpf+0x7c/0x90 [ 867.999034][T12938] do_syscall_64+0x55/0xa0 [ 868.003483][T12938] ? clear_bhb_loop+0x40/0x90 [ 868.008198][T12938] ? clear_bhb_loop+0x40/0x90 [ 868.012914][T12938] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 868.018837][T12938] RIP: 0033:0x7f436219c799 [ 868.023319][T12938] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 868.043007][T12938] RSP: 002b:00007f4362fab028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 868.051490][T12938] RAX: ffffffffffffffda RBX: 00007f4362415fa0 RCX: 00007f436219c799 [ 868.059518][T12938] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 868.067516][T12938] RBP: 00007f4362fab090 R08: 0000000000000000 R09: 0000000000000000 [ 868.075514][T12938] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 868.083509][T12938] R13: 00007f4362416038 R14: 00007f4362415fa0 R15: 00007ffcd15f5e88 [ 868.091630][T12938] [ 868.243013][T12936] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2642'. [ 868.295133][T12940] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2642'. [ 868.306004][T12935] delete_channel: no stack [ 868.361896][T12943] FAULT_INJECTION: forcing a failure. [ 868.361896][T12943] name failslab, interval 1, probability 0, space 0, times 0 [ 868.374663][T12943] CPU: 1 PID: 12943 Comm: syz.4.2644 Not tainted syzkaller #0 [ 868.382181][T12943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 868.392289][T12943] Call Trace: [ 868.395616][T12943] [ 868.398614][T12943] dump_stack_lvl+0x18c/0x250 [ 868.403357][T12943] ? show_regs_print_info+0x20/0x20 [ 868.408614][T12943] ? load_image+0x400/0x400 [ 868.413189][T12943] should_fail_ex+0x39d/0x4d0 [ 868.417936][T12943] should_failslab+0x9/0x20 [ 868.422494][T12943] slab_pre_alloc_hook+0x59/0x310 [ 868.427581][T12943] ? verify_lock_unused+0x140/0x140 [ 868.432838][T12943] kmem_cache_alloc+0x5a/0x2d0 [ 868.437658][T12943] ? skb_clone+0x1eb/0x370 [ 868.442138][T12943] skb_clone+0x1eb/0x370 [ 868.446433][T12943] bpf_clone_redirect+0x167/0x4a0 [ 868.451581][T12943] bpf_prog_208b094576c80b22+0x5e/0x63 [ 868.457074][T12943] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 868.463096][T12943] ? lock_chain_count+0x20/0x20 [ 868.467977][T12943] ? seqcount_lockdep_reader_access+0x12b/0x1d0 [ 868.474248][T12943] ? lockdep_softirqs_on+0x580/0x580 [ 868.479567][T12943] ? ktime_get+0x7f/0x280 [ 868.483921][T12943] ? seqcount_lockdep_reader_access+0x191/0x1d0 [ 868.490197][T12943] ? ktime_get_real_ts64+0x440/0x440 [ 868.495653][T12943] ? __x64_sys_bpf+0x7c/0x90 [ 868.500310][T12943] ? __local_bh_disable_ip+0x108/0x1a0 [ 868.505819][T12943] ? __cant_sleep+0x220/0x220 [ 868.510535][T12943] ? read_tsc+0x9/0x20 [ 868.514635][T12943] ? ktime_get+0x24b/0x280 [ 868.519083][T12943] ? bpf_test_run+0x174/0x870 [ 868.523787][T12943] bpf_test_run+0x2df/0x870 [ 868.528349][T12943] ? bpf_test_run+0x174/0x870 [ 868.533071][T12943] ? convert___skb_to_skb+0x590/0x590 [ 868.538486][T12943] ? eth_get_headlen+0x210/0x210 [ 868.543644][T12943] ? slab_build_skb+0x25f/0x3f0 [ 868.548530][T12943] ? convert___skb_to_skb+0x3d/0x590 [ 868.553887][T12943] bpf_prog_test_run_skb+0xad2/0x12b0 [ 868.559301][T12943] ? cpu_online+0x60/0x60 [ 868.563658][T12943] bpf_prog_test_run+0x321/0x390 [ 868.568633][T12943] __sys_bpf+0x49d/0x890 [ 868.572911][T12943] ? bpf_link_show_fdinfo+0x390/0x390 [ 868.578334][T12943] ? lock_chain_count+0x20/0x20 [ 868.583233][T12943] __x64_sys_bpf+0x7c/0x90 [ 868.587680][T12943] do_syscall_64+0x55/0xa0 [ 868.592404][T12943] ? clear_bhb_loop+0x40/0x90 [ 868.597113][T12943] ? clear_bhb_loop+0x40/0x90 [ 868.601819][T12943] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 868.607759][T12943] RIP: 0033:0x7f5f7179c799 [ 868.612197][T12943] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 868.631840][T12943] RSP: 002b:00007f5f725cd028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 868.640303][T12943] RAX: ffffffffffffffda RBX: 00007f5f71a15fa0 RCX: 00007f5f7179c799 [ 868.648311][T12943] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 868.656310][T12943] RBP: 00007f5f725cd090 R08: 0000000000000000 R09: 0000000000000000 [ 868.664311][T12943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 868.672310][T12943] R13: 00007f5f71a16038 R14: 00007f5f71a15fa0 R15: 00007ffd8322df28 [ 868.680324][T12943] [ 868.738370][T12947] FAULT_INJECTION: forcing a failure. [ 868.738370][T12947] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 868.763091][T12947] CPU: 0 PID: 12947 Comm: syz.1.2653 Not tainted syzkaller #0 [ 868.770644][T12947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 868.780747][T12947] Call Trace: [ 868.784080][T12947] [ 868.787059][T12947] dump_stack_lvl+0x18c/0x250 [ 868.791804][T12947] ? show_regs_print_info+0x20/0x20 [ 868.797058][T12947] ? load_image+0x400/0x400 [ 868.801625][T12947] ? __might_fault+0xaa/0x120 [ 868.806351][T12947] ? __lock_acquire+0x7d40/0x7d40 [ 868.811452][T12947] should_fail_ex+0x39d/0x4d0 [ 868.816191][T12947] _copy_to_user+0x2f/0xa0 [ 868.820652][T12947] ethtool_get_link_ksettings+0x2ce/0x400 [ 868.826424][T12947] ? ethtool_set_per_queue+0x1f0/0x1f0 [ 868.831933][T12947] ? trace_contention_end+0x39/0xe0 [ 868.837190][T12947] ? full_name_hash+0xb0/0xe0 [ 868.841931][T12947] dev_ethtool+0x94d/0x18d0 [ 868.846514][T12947] ? ethtool_get_module_eeprom_call+0x170/0x170 [ 868.852807][T12947] ? __lock_acquire+0x7d40/0x7d40 [ 868.857894][T12947] ? __might_fault+0xaa/0x120 [ 868.862618][T12947] ? full_name_hash+0xb0/0xe0 [ 868.867348][T12947] ? dev_load+0x21/0x1f0 [ 868.871640][T12947] dev_ioctl+0x392/0x1140 [ 868.876030][T12947] sock_do_ioctl+0x239/0x310 [ 868.880665][T12947] ? sock_show_fdinfo+0xb0/0xb0 [ 868.885569][T12947] sock_ioctl+0x5ba/0x7e0 [ 868.889948][T12947] ? sock_poll+0x3e0/0x3e0 [ 868.894416][T12947] ? bpf_lsm_file_ioctl+0x9/0x10 [ 868.899434][T12947] ? security_file_ioctl+0x80/0xa0 [ 868.904604][T12947] ? sock_poll+0x3e0/0x3e0 [ 868.909055][T12947] __se_sys_ioctl+0xfd/0x170 [ 868.913703][T12947] do_syscall_64+0x55/0xa0 [ 868.918170][T12947] ? clear_bhb_loop+0x40/0x90 [ 868.922908][T12947] ? clear_bhb_loop+0x40/0x90 [ 868.927628][T12947] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 868.933562][T12947] RIP: 0033:0x7f436219c799 [ 868.938023][T12947] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 868.958019][T12947] RSP: 002b:00007f4362fab028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 868.966495][T12947] RAX: ffffffffffffffda RBX: 00007f4362415fa0 RCX: 00007f436219c799 [ 868.974518][T12947] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 0000000000000004 [ 868.982532][T12947] RBP: 00007f4362fab090 R08: 0000000000000000 R09: 0000000000000000 [ 868.990671][T12947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 868.998730][T12947] R13: 00007f4362416038 R14: 00007f4362415fa0 R15: 00007ffcd15f5e88 [ 869.006773][T12947] [ 869.089185][T12949] netlink: 'syz.0.2646': attribute type 29 has an invalid length. [ 869.387077][T12949] netlink: 'syz.0.2646': attribute type 29 has an invalid length. [ 870.411387][ T1286] ieee802154 phy0 wpan0: encryption failed: -22 [ 870.417982][ T1286] ieee802154 phy1 wpan1: encryption failed: -22 [ 872.194943][T12980] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2656'. [ 872.216024][T12980] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2656'. [ 872.275522][T12982] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2656'. [ 872.297317][T12980] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2656'. [ 872.372777][T12979] delete_channel: no stack [ 872.488499][T12992] netlink: 'syz.1.2660': attribute type 29 has an invalid length. [ 872.508845][T12992] netlink: 'syz.1.2660': attribute type 29 has an invalid length. [ 872.521001][T12992] netlink: 'syz.1.2660': attribute type 29 has an invalid length. [ 872.535844][T12992] netlink: 'syz.1.2660': attribute type 29 has an invalid length. [ 872.549493][T12992] netlink: 'syz.1.2660': attribute type 29 has an invalid length. [ 872.578717][ T5839] Bluetooth: hci4: ACL packet for unknown connection handle 0 [ 873.000831][T13001] FAULT_INJECTION: forcing a failure. [ 873.000831][T13001] name failslab, interval 1, probability 0, space 0, times 0 [ 873.014456][T13001] CPU: 1 PID: 13001 Comm: syz.0.2664 Not tainted syzkaller #0 [ 873.021996][T13001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 873.032112][T13001] Call Trace: [ 873.035449][T13001] [ 873.038438][T13001] dump_stack_lvl+0x18c/0x250 [ 873.043201][T13001] ? show_regs_print_info+0x20/0x20 [ 873.048471][T13001] ? load_image+0x400/0x400 [ 873.053023][T13001] ? __might_sleep+0xe0/0xe0 [ 873.057654][T13001] ? __lock_acquire+0x7d40/0x7d40 [ 873.062721][T13001] should_fail_ex+0x39d/0x4d0 [ 873.067439][T13001] should_failslab+0x9/0x20 [ 873.071990][T13001] slab_pre_alloc_hook+0x59/0x310 [ 873.077052][T13001] ? __lock_acquire+0x7d40/0x7d40 [ 873.082105][T13001] ? kvmalloc_node+0x70/0x180 [ 873.086899][T13001] ? kvmalloc_node+0x70/0x180 [ 873.091614][T13001] __kmem_cache_alloc_node+0x53/0x250 [ 873.097022][T13001] ? __schedule_delayed_monitor_work+0x200/0x200 [ 873.103384][T13001] ? kvmalloc_node+0x70/0x180 [ 873.108094][T13001] __kmalloc_node+0xa4/0x230 [ 873.112718][T13001] kvmalloc_node+0x70/0x180 [ 873.117257][T13001] bpf_test_run_xdp_live+0x1c2/0x1b20 [ 873.122664][T13001] ? 0xffffffffa0004140 [ 873.126846][T13001] ? 0xffffffffa0004140 [ 873.131228][T13001] ? bpf_dispatcher_change_prog+0xcbf/0xf10 [ 873.137147][T13001] ? 0xffffffffa0004140 [ 873.141331][T13001] ? xdp_convert_md_to_buff+0x330/0x330 [ 873.146934][T13001] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 873.153216][T13001] ? _copy_from_user+0xa5/0xe0 [ 873.158015][T13001] ? bpf_test_init+0x119/0x140 [ 873.162889][T13001] ? xdp_convert_md_to_buff+0x5b/0x330 [ 873.168480][T13001] bpf_prog_test_run_xdp+0x7ca/0x10e0 [ 873.173906][T13001] ? dev_put+0x80/0x80 [ 873.178014][T13001] ? dev_put+0x80/0x80 [ 873.182114][T13001] bpf_prog_test_run+0x321/0x390 [ 873.187089][T13001] __sys_bpf+0x49d/0x890 [ 873.191361][T13001] ? bpf_link_show_fdinfo+0x390/0x390 [ 873.196776][T13001] ? lock_chain_count+0x20/0x20 [ 873.201669][T13001] __x64_sys_bpf+0x7c/0x90 [ 873.206118][T13001] do_syscall_64+0x55/0xa0 [ 873.210586][T13001] ? clear_bhb_loop+0x40/0x90 [ 873.215311][T13001] ? clear_bhb_loop+0x40/0x90 [ 873.220080][T13001] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 873.226021][T13001] RIP: 0033:0x7f749e79c799 [ 873.230507][T13001] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 873.250159][T13001] RSP: 002b:00007f749f727028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 873.258618][T13001] RAX: ffffffffffffffda RBX: 00007f749ea15fa0 RCX: 00007f749e79c799 [ 873.266630][T13001] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 873.274750][T13001] RBP: 00007f749f727090 R08: 0000000000000000 R09: 0000000000000000 [ 873.282836][T13001] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 873.290838][T13001] R13: 00007f749ea16038 R14: 00007f749ea15fa0 R15: 00007ffda9f9a618 [ 873.299026][T13001] [ 873.630704][T13009] netlink: 'syz.0.2666': attribute type 29 has an invalid length. [ 874.372939][T13022] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2669'. [ 875.196799][T13021] delete_channel: no stack [ 875.703128][T13009] netlink: 'syz.0.2666': attribute type 29 has an invalid length. [ 875.711644][T13012] tap0: tun_chr_ioctl cmd 1074025677 [ 875.723567][T13012] tap0: linktype set to 6 [ 875.728615][T13022] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2669'. [ 875.919548][T13028] netlink: 'syz.1.2671': attribute type 29 has an invalid length. [ 875.935393][T13028] netlink: 'syz.1.2671': attribute type 29 has an invalid length. [ 875.964118][T13028] netlink: 'syz.1.2671': attribute type 29 has an invalid length. [ 875.995491][T13028] netlink: 'syz.1.2671': attribute type 29 has an invalid length. [ 876.025305][T13028] netlink: 'syz.1.2671': attribute type 29 has an invalid length. [ 876.056240][ T5839] Bluetooth: hci4: ACL packet for unknown connection handle 0 [ 876.135031][T13034] FAULT_INJECTION: forcing a failure. [ 876.135031][T13034] name failslab, interval 1, probability 0, space 0, times 0 [ 876.154361][T13034] CPU: 1 PID: 13034 Comm: syz.3.2673 Not tainted syzkaller #0 [ 876.161912][T13034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 876.172037][T13034] Call Trace: [ 876.175366][T13034] [ 876.178340][T13034] dump_stack_lvl+0x18c/0x250 [ 876.183087][T13034] ? show_regs_print_info+0x20/0x20 [ 876.188351][T13034] ? load_image+0x400/0x400 [ 876.192922][T13034] ? __might_sleep+0xe0/0xe0 [ 876.197575][T13034] ? __lock_acquire+0x7d40/0x7d40 [ 876.202690][T13034] should_fail_ex+0x39d/0x4d0 [ 876.207431][T13034] should_failslab+0x9/0x20 [ 876.212002][T13034] slab_pre_alloc_hook+0x59/0x310 [ 876.217193][T13034] ? kvmalloc_node+0x70/0x180 [ 876.221938][T13034] ? kvmalloc_node+0x70/0x180 [ 876.226762][T13034] __kmem_cache_alloc_node+0x53/0x250 [ 876.232203][T13034] ? kvmalloc_node+0x70/0x180 [ 876.236938][T13034] __kmalloc_node+0xa4/0x230 [ 876.241680][T13034] kvmalloc_node+0x70/0x180 [ 876.246249][T13034] bpf_test_run_xdp_live+0x1e9/0x1b20 [ 876.251683][T13034] ? 0xffffffffa0004140 [ 876.255898][T13034] ? 0xffffffffa0004140 [ 876.260094][T13034] ? bpf_dispatcher_change_prog+0xcbf/0xf10 [ 876.266039][T13034] ? 0xffffffffa0004140 [ 876.270333][T13034] ? xdp_convert_md_to_buff+0x330/0x330 [ 876.275969][T13034] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 876.282268][T13034] ? _copy_from_user+0xa5/0xe0 [ 876.287100][T13034] ? bpf_test_init+0x119/0x140 [ 876.291919][T13034] ? xdp_convert_md_to_buff+0x5b/0x330 [ 876.297435][T13034] bpf_prog_test_run_xdp+0x7ca/0x10e0 [ 876.302894][T13034] ? dev_put+0x80/0x80 [ 876.307034][T13034] ? dev_put+0x80/0x80 [ 876.311157][T13034] bpf_prog_test_run+0x321/0x390 [ 876.316151][T13034] __sys_bpf+0x49d/0x890 [ 876.320558][T13034] ? bpf_link_show_fdinfo+0x390/0x390 [ 876.326086][T13034] ? lock_chain_count+0x20/0x20 [ 876.331004][T13034] __x64_sys_bpf+0x7c/0x90 [ 876.335497][T13034] do_syscall_64+0x55/0xa0 [ 876.339985][T13034] ? clear_bhb_loop+0x40/0x90 [ 876.344723][T13034] ? clear_bhb_loop+0x40/0x90 [ 876.349464][T13034] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 876.355433][T13034] RIP: 0033:0x7fdcaeb9c799 [ 876.359918][T13034] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 876.379583][T13034] RSP: 002b:00007fdcafad6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 876.388066][T13034] RAX: ffffffffffffffda RBX: 00007fdcaee15fa0 RCX: 00007fdcaeb9c799 [ 876.396093][T13034] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 876.404108][T13034] RBP: 00007fdcafad6090 R08: 0000000000000000 R09: 0000000000000000 [ 876.412226][T13034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 876.420332][T13034] R13: 00007fdcaee16038 R14: 00007fdcaee15fa0 R15: 00007ffcd38c94c8 [ 876.428365][T13034] [ 876.682818][T13047] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2679'. [ 876.778123][T13047] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2679'. [ 876.813013][T13049] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2679'. [ 877.504062][T13065] netlink: 'syz.3.2685': attribute type 29 has an invalid length. [ 877.516262][T13046] delete_channel: no stack [ 877.730448][ T5839] Bluetooth: hci0: ACL packet for unknown connection handle 0 [ 879.047534][T13052] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2679'. [ 879.057216][T13065] netlink: 'syz.3.2685': attribute type 29 has an invalid length. [ 879.231296][T13073] netlink: 'syz.3.2688': attribute type 29 has an invalid length. [ 879.240140][T13073] netlink: 'syz.3.2688': attribute type 29 has an invalid length. [ 879.979797][T13091] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2694'. [ 880.006636][T13091] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2694'. [ 880.028829][T13091] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2694'. [ 880.056383][T13091] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2694'. [ 880.081514][T13088] delete_channel: no stack [ 880.108226][ T5839] Bluetooth: hci2: ACL packet for unknown connection handle 0 [ 880.186019][T13098] netlink: 1047 bytes leftover after parsing attributes in process `syz.1.2698'. [ 880.213247][T13098] bridge_slave_1: default FDB implementation only supports local addresses [ 880.867344][T13121] netlink: 209852 bytes leftover after parsing attributes in process `syz.4.2702'. [ 883.313737][T13110] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2703'. [ 883.349494][T13113] validate_nla: 7 callbacks suppressed [ 883.349511][T13113] netlink: 'syz.4.2702': attribute type 21 has an invalid length. [ 883.363393][T13113] netlink: 'syz.4.2702': attribute type 11 has an invalid length. [ 883.523494][T13126] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2706'. [ 883.543999][T13126] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2706'. [ 883.564690][T13126] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2706'. [ 883.607622][T13125] delete_channel: no stack [ 883.658678][T13132] netlink: 'syz.4.2708': attribute type 29 has an invalid length. [ 883.678715][T13132] netlink: 'syz.4.2708': attribute type 29 has an invalid length. [ 883.703412][T13132] netlink: 'syz.4.2708': attribute type 29 has an invalid length. [ 883.712796][T13132] netlink: 'syz.4.2708': attribute type 29 has an invalid length. [ 883.735860][T13132] netlink: 'syz.4.2708': attribute type 29 has an invalid length. [ 883.749333][ T5839] Bluetooth: hci2: ACL packet for unknown connection handle 0 [ 883.887592][T13139] FAULT_INJECTION: forcing a failure. [ 883.887592][T13139] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 883.909578][T13139] CPU: 0 PID: 13139 Comm: syz.4.2712 Not tainted syzkaller #0 [ 883.917222][T13139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 883.927426][T13139] Call Trace: [ 883.930744][T13139] [ 883.933704][T13139] dump_stack_lvl+0x18c/0x250 [ 883.938433][T13139] ? show_regs_print_info+0x20/0x20 [ 883.943669][T13139] ? load_image+0x400/0x400 [ 883.948212][T13139] ? __lock_acquire+0x7d40/0x7d40 [ 883.953270][T13139] ? __might_fault+0xaa/0x120 [ 883.958063][T13139] ? full_name_hash+0xb0/0xe0 [ 883.962793][T13139] should_fail_ex+0x39d/0x4d0 [ 883.967521][T13139] _copy_to_user+0x2f/0xa0 [ 883.971962][T13139] put_user_ifreq+0x78/0xb0 [ 883.976490][T13139] sock_do_ioctl+0x268/0x310 [ 883.981111][T13139] ? sock_show_fdinfo+0xb0/0xb0 [ 883.985996][T13139] sock_ioctl+0x5ba/0x7e0 [ 883.990356][T13139] ? sock_poll+0x3e0/0x3e0 [ 883.994802][T13139] ? bpf_lsm_file_ioctl+0x9/0x10 [ 883.999776][T13139] ? security_file_ioctl+0x80/0xa0 [ 884.004936][T13139] ? sock_poll+0x3e0/0x3e0 [ 884.009382][T13139] __se_sys_ioctl+0xfd/0x170 [ 884.014001][T13139] do_syscall_64+0x55/0xa0 [ 884.018546][T13139] ? clear_bhb_loop+0x40/0x90 [ 884.023255][T13139] ? clear_bhb_loop+0x40/0x90 [ 884.028012][T13139] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 884.033956][T13139] RIP: 0033:0x7f5f7179c799 [ 884.038490][T13139] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 884.058137][T13139] RSP: 002b:00007f5f725cd028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 884.066582][T13139] RAX: ffffffffffffffda RBX: 00007f5f71a15fa0 RCX: 00007f5f7179c799 [ 884.074581][T13139] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 0000000000000004 [ 884.082666][T13139] RBP: 00007f5f725cd090 R08: 0000000000000000 R09: 0000000000000000 [ 884.090680][T13139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 884.098726][T13139] R13: 00007f5f71a16038 R14: 00007f5f71a15fa0 R15: 00007ffd8322df28 [ 884.106838][T13139] [ 887.457134][T13163] __nla_validate_parse: 2 callbacks suppressed [ 887.457211][T13163] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2718'. [ 887.856548][ T5839] Bluetooth: hci2: command 0x0406 tx timeout [ 888.280777][T13162] delete_channel: no stack [ 890.079363][T13163] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2718'. [ 890.105129][T13172] netlink: 14 bytes leftover after parsing attributes in process `syz.0.2720'. [ 890.284319][T13172] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 890.321413][T13172] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 890.360075][T13172] bond0 (unregistering): Released all slaves [ 890.585465][T13187] netlink: 1047 bytes leftover after parsing attributes in process `syz.4.2726'. [ 890.596042][T13187] bridge_slave_1: default FDB implementation only supports local addresses [ 890.871625][T13194] netlink: 4595 bytes leftover after parsing attributes in process `syz.4.2729'. [ 890.909927][T13194] netlink: 4595 bytes leftover after parsing attributes in process `syz.4.2729'. [ 890.970272][T13196] netlink: 4595 bytes leftover after parsing attributes in process `syz.4.2729'. [ 891.112140][T13200] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2731'. [ 891.277519][T13200] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2731'. [ 891.300068][T13204] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2731'. [ 891.453943][T13199] delete_channel: no stack [ 891.945681][ T51] Bluetooth: hci2: unexpected event 0x05 length: 151 > 4 [ 893.280570][T13228] netlink: 'syz.4.2738': attribute type 3 has an invalid length. [ 893.315039][T13228] __nla_validate_parse: 2 callbacks suppressed [ 893.315059][T13228] netlink: 201336 bytes leftover after parsing attributes in process `syz.4.2738'. [ 895.193550][T13225] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 895.203167][T13225] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 895.224472][T13225] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 895.232892][T13225] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 895.546593][T13233] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2740'. [ 895.572173][T13233] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2740'. [ 895.626940][T13235] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2740'. [ 895.666460][T13236] veth0_to_team: entered allmulticast mode [ 895.714066][T13233] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2740'. [ 895.799901][T13232] delete_channel: no stack [ 895.908856][T13242] FAULT_INJECTION: forcing a failure. [ 895.908856][T13242] name failslab, interval 1, probability 0, space 0, times 0 [ 895.922079][T13242] CPU: 1 PID: 13242 Comm: syz.1.2744 Not tainted syzkaller #0 [ 895.929602][T13242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 895.939707][T13242] Call Trace: [ 895.943047][T13242] [ 895.946021][T13242] dump_stack_lvl+0x18c/0x250 [ 895.950760][T13242] ? show_regs_print_info+0x20/0x20 [ 895.956056][T13242] ? load_image+0x400/0x400 [ 895.960620][T13242] ? __might_sleep+0xe0/0xe0 [ 895.965265][T13242] ? __lock_acquire+0x7d40/0x7d40 [ 895.970346][T13242] should_fail_ex+0x39d/0x4d0 [ 895.975096][T13242] should_failslab+0x9/0x20 [ 895.979672][T13242] slab_pre_alloc_hook+0x59/0x310 [ 895.984850][T13242] ? page_pool_create+0x71/0x5c0 [ 895.989846][T13242] __kmem_cache_alloc_node+0x53/0x250 [ 895.995367][T13242] ? page_pool_create+0x71/0x5c0 [ 896.000393][T13242] kmalloc_node_trace+0x26/0xe0 [ 896.005301][T13242] page_pool_create+0x71/0x5c0 [ 896.010134][T13242] bpf_test_run_xdp_live+0x203/0x1b20 [ 896.015658][T13242] ? bpf_dispatcher_xdp+0x800/0x1000 [ 896.020993][T13242] ? bpf_dispatcher_xdp+0x800/0x1000 [ 896.026326][T13242] ? bpf_dispatcher_change_prog+0xcbf/0xf10 [ 896.032286][T13242] ? bpf_dispatcher_xdp+0x800/0x1000 [ 896.037636][T13242] ? xdp_convert_md_to_buff+0x330/0x330 [ 896.043280][T13242] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 896.049669][T13242] ? _copy_from_user+0xa5/0xe0 [ 896.054556][T13242] ? bpf_test_init+0x119/0x140 [ 896.059374][T13242] ? xdp_convert_md_to_buff+0x5b/0x330 [ 896.064896][T13242] bpf_prog_test_run_xdp+0x7ca/0x10e0 [ 896.070351][T13242] ? dev_put+0x80/0x80 [ 896.074499][T13242] ? dev_put+0x80/0x80 [ 896.078622][T13242] bpf_prog_test_run+0x321/0x390 [ 896.083630][T13242] __sys_bpf+0x49d/0x890 [ 896.087940][T13242] ? bpf_link_show_fdinfo+0x390/0x390 [ 896.093395][T13242] ? lock_chain_count+0x20/0x20 [ 896.098318][T13242] __x64_sys_bpf+0x7c/0x90 [ 896.102877][T13242] do_syscall_64+0x55/0xa0 [ 896.107360][T13242] ? clear_bhb_loop+0x40/0x90 [ 896.112273][T13242] ? clear_bhb_loop+0x40/0x90 [ 896.117103][T13242] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 896.123232][T13242] RIP: 0033:0x7f436219c799 [ 896.127715][T13242] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 896.147380][T13242] RSP: 002b:00007f4362fab028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 896.155853][T13242] RAX: ffffffffffffffda RBX: 00007f4362415fa0 RCX: 00007f436219c799 [ 896.163884][T13242] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 896.171937][T13242] RBP: 00007f4362fab090 R08: 0000000000000000 R09: 0000000000000000 [ 896.179968][T13242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 896.187998][T13242] R13: 00007f4362416038 R14: 00007f4362415fa0 R15: 00007ffcd15f5e88 [ 896.196094][T13242] [ 900.495552][ T29] INFO: task syz.2.2181:11252 blocked for more than 143 seconds. [ 900.503442][ T29] Not tainted syzkaller #0 [ 900.516843][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 900.526073][ T29] task:syz.2.2181 state:D stack:25448 pid:11252 ppid:5822 flags:0x00004002 [ 900.535894][ T29] Call Trace: [ 900.539233][ T29] [ 900.542229][ T29] __schedule+0x1553/0x45a0 [ 900.547223][ T29] ? rcu_is_watching+0x15/0xb0 [ 900.552083][ T29] ? asan.module_dtor+0x20/0x20 [ 900.557069][ T29] ? trace_contention_end+0x39/0xe0 [ 900.562816][ T29] ? task_work_cancel+0xa5/0x220 [ 900.569372][ T29] ? task_work_cancel_func+0x210/0x210 [ 900.589003][ T29] schedule+0xbd/0x170 [ 900.593187][ T29] ? _free_event+0xfe/0xf30 [ 900.598162][ T29] _free_event+0x174/0xf30 [ 900.602664][ T29] perf_event_release_kernel+0x842/0x8d0 [ 900.616074][ T29] ? __might_sleep+0xe0/0xe0 [ 900.620761][ T29] ? calc_timer_values+0x400/0x400 [ 900.630872][ T29] ? perf_mmap+0x15c0/0x15c0 [ 900.635663][ T29] perf_release+0x3b/0x40 [ 900.640207][ T29] __fput+0x234/0x970 [ 900.644238][ T29] task_work_run+0x1d4/0x260 [ 900.654221][ T29] ? task_work_cancel+0x220/0x220 [ 900.659574][ T29] do_exit+0x95a/0x2460 [ 900.663834][ T29] ? put_task_struct+0xc0/0xc0 [ 900.673741][ T29] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 900.683559][ T29] ? get_signal+0x1068/0x13f0 [ 900.695221][ T29] ? lock_chain_count+0x20/0x20 [ 900.700215][ T29] ? _raw_spin_lock_irq+0xbb/0xf0 [ 900.705421][ T29] do_group_exit+0x21b/0x2d0 [ 900.710095][ T29] ? lockdep_hardirqs_on+0x98/0x150 [ 900.716319][ T29] get_signal+0x12fc/0x13f0 [ 900.720928][ T29] arch_do_signal_or_restart+0xc2/0x800 [ 900.728779][ T29] ? get_sigframe_size+0x20/0x20 [ 900.733833][ T29] ? exit_to_user_mode_loop+0x3b/0x110 [ 900.740068][ T29] exit_to_user_mode_loop+0x70/0x110 [ 900.745748][ T29] exit_to_user_mode_prepare+0xee/0x180 [ 900.751875][ T29] syscall_exit_to_user_mode+0x1a/0x50 [ 900.758024][ T29] do_syscall_64+0x61/0xa0 [ 900.762708][ T29] ? clear_bhb_loop+0x40/0x90 [ 900.767997][ T29] ? clear_bhb_loop+0x40/0x90 [ 900.772902][ T29] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 900.779109][ T29] RIP: 0033:0x7f1a1079c799 [ 900.788351][ T29] RSP: 002b:00007f1a11683028 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 900.798339][ T29] RAX: 0000000000000007 RBX: 00007f1a10a15fa0 RCX: 00007f1a1079c799 [ 900.806595][ T29] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000200000000000 [ 900.814634][ T29] RBP: 00007f1a10832c99 R08: 0000000000000000 R09: 0000000000000000 [ 900.822738][ T29] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 900.831092][ T29] R13: 00007f1a10a16038 R14: 00007f1a10a15fa0 R15: 00007ffffa9c7a08 [ 900.839294][ T29] [ 900.851359][ T29] [ 900.851359][ T29] Showing all locks held in the system: [ 900.867940][ T29] 3 locks held by kworker/u4:1/12: [ 900.873135][ T29] #0: ffff8880b8e3c018 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2a/0x140 [ 900.883420][ T29] #1: ffffffff8d132060 (rcu_read_lock){....}-{1:2}, at: ___perf_sw_event+0x199/0x730 [ 900.899895][ T29] #2: ffff8880b8e29598 (&base->lock){-.-.}-{2:2}, at: __mod_timer+0x73b/0xdb0 [ 900.914488][ T29] 1 lock held by khungtaskd/29: [ 900.919636][ T29] #0: ffffffff8d132060 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x55/0x290 [ 900.930242][ T29] 2 locks held by getty/5526: [ 900.935224][ T29] #0: ffff88802d3770a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 [ 900.945499][ T29] #1: ffffc9000328b2f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x433/0x1390 [ 900.957504][ T29] 3 locks held by kworker/u4:9/11184: [ 900.962945][ T29] #0: ffff888017c71538 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_scheduled_works+0x96f/0x15d0 [ 900.975571][ T29] #1: ffffc9000b7d7d00 ((linkwatch_work).work){+.+.}-{0:0}, at: process_scheduled_works+0x96f/0x15d0 [ 900.992502][ T29] #2: ffffffff8e3c0d48 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0xe/0x60 [ 901.001726][ T29] 2 locks held by syz.0.2727/13201: [ 901.007183][ T29] #0: ffffffff8e3b3d10 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x351/0x5e0 [ 901.017239][ T29] #1: ffffffff8e3c0d48 (rtnl_mutex){+.+.}-{3:3}, at: ip_tunnel_delete_nets+0xd4/0x370 [ 901.027200][ T29] 2 locks held by syz.3.2748/13250: [ 901.032540][ T29] #0: ffffffff8e3c0d48 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x41/0x1c0 [ 901.049169][ T29] #1: ffffffff8d137a38 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x306/0x880 [ 901.060549][ T29] 1 lock held by syz.4.2749/13255: [ 901.066113][ T29] #0: ffffffff8e3c0d48 (rtnl_mutex){+.+.}-{3:3}, at: dev_ioctl+0x83c/0x1140 [ 901.075345][ T29] 1 lock held by syz.1.2750/13258: [ 901.080607][ T29] #0: ffffffff8e3c0d48 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x811/0xfa0 [ 901.091875][ T29] [ 901.094265][ T29] ============================================= [ 901.094265][ T29] [ 901.103364][ T29] NMI backtrace for cpu 1 [ 901.107750][ T29] CPU: 1 PID: 29 Comm: khungtaskd Not tainted syzkaller #0 [ 901.114994][ T29] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 901.125191][ T29] Call Trace: [ 901.128531][ T29] [ 901.131540][ T29] dump_stack_lvl+0x18c/0x250 [ 901.136278][ T29] ? nmi_cpu_backtrace+0x1b6/0x3e0 [ 901.141440][ T29] ? show_regs_print_info+0x20/0x20 [ 901.146867][ T29] ? load_image+0x400/0x400 [ 901.151421][ T29] nmi_cpu_backtrace+0x3a6/0x3e0 [ 901.156407][ T29] ? nmi_trigger_cpumask_backtrace+0x2f0/0x2f0 [ 901.162579][ T29] ? _printk+0xde/0x130 [ 901.166752][ T29] ? load_image+0x400/0x400 [ 901.171283][ T29] ? load_image+0x400/0x400 [ 901.175825][ T29] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 901.181963][ T29] nmi_trigger_cpumask_backtrace+0x17a/0x2f0 [ 901.187992][ T29] watchdog+0xf3d/0xf80 [ 901.192207][ T29] ? watchdog+0x1e1/0xf80 [ 901.196595][ T29] kthread+0x2fa/0x390 [ 901.200719][ T29] ? hungtask_pm_notify+0x90/0x90 [ 901.205801][ T29] ? kthread_blkcg+0xd0/0xd0 [ 901.210426][ T29] ret_from_fork+0x48/0x80 [ 901.214878][ T29] ? kthread_blkcg+0xd0/0xd0 [ 901.219499][ T29] ret_from_fork_asm+0x11/0x20 [ 901.224331][ T29] [ 901.230855][ T29] Sending NMI from CPU 1 to CPUs 0: [ 901.237463][ C0] NMI backtrace for cpu 0 [ 901.237474][ C0] CPU: 0 PID: 5867 Comm: kworker/u4:5 Not tainted syzkaller #0 [ 901.237492][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 901.237502][ C0] Workqueue: bat_events batadv_nc_worker [ 901.237647][ C0] RIP: 0010:__lock_acquire+0x57b/0x7d40 [ 901.237726][ C0] Code: 81 e3 ff 1f 00 00 41 c1 ef 03 41 81 e7 f8 03 00 00 49 8d bf 00 15 1c 91 be 08 00 00 00 e8 2d 1a 77 00 48 0f a3 1d 15 e2 b3 0f <73> 1f 48 69 c3 d0 00 00 00 48 8d 98 c0 93 b2 90 48 ba 00 00 00 00 [ 901.237741][ C0] RSP: 0018:ffffc90004b4f7c0 EFLAGS: 00000057 [ 901.237807][ C0] RAX: 0000000000000001 RBX: 0000000000000021 RCX: ffffffff816832e3 [ 901.237821][ C0] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff911c1500 [ 901.237835][ C0] RBP: ffffc90004b4fa08 R08: ffffffff911c1507 R09: 1ffffffff22382a0 [ 901.237848][ C0] R10: dffffc0000000000 R11: fffffbfff22382a1 R12: ffff888023d364c4 [ 901.237860][ C0] R13: ffff888023d35a00 R14: 0000000000000000 R15: 0000000000000000 [ 901.237871][ C0] FS: 0000000000000000(0000) GS:ffff8880b8e00000(0000) knlGS:0000000000000000 [ 901.237885][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 901.237897][ C0] CR2: 000000110c286cd7 CR3: 000000006be5f000 CR4: 00000000003506f0 [ 901.237912][ C0] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 901.237921][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 901.237932][ C0] Call Trace: [ 901.237939][ C0] [ 901.237964][ C0] ? verify_lock_unused+0x140/0x140 [ 901.237992][ C0] ? perf_trace_lock_acquire+0x104/0x410 [ 901.238022][ C0] ? trace_event_raw_event_lock_acquire+0x2c0/0x2c0 [ 901.238048][ C0] ? perf_trace_lock_acquire+0x104/0x410 [ 901.238078][ C0] ? trace_event_raw_event_lock_acquire+0x2c0/0x2c0 [ 901.238106][ C0] lock_acquire+0x19e/0x420 [ 901.238124][ C0] ? batadv_nc_worker+0xd2/0x610 [ 901.238154][ C0] ? batadv_nc_worker+0xd2/0x610 [ 901.238180][ C0] ? read_lock_is_recursive+0x20/0x20 [ 901.238200][ C0] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 901.238222][ C0] ? batadv_nc_worker+0xd2/0x610 [ 901.238247][ C0] batadv_nc_worker+0xef/0x610 [ 901.238272][ C0] ? batadv_nc_worker+0xd2/0x610 [ 901.238299][ C0] ? process_scheduled_works+0x96f/0x15d0 [ 901.238322][ C0] process_scheduled_works+0xa5d/0x15d0 [ 901.238359][ C0] ? worker_attach_to_pool+0x380/0x380 [ 901.238384][ C0] ? assign_work+0x3d2/0x5d0 [ 901.238424][ C0] worker_thread+0xa55/0xfc0 [ 901.238461][ C0] kthread+0x2fa/0x390 [ 901.238477][ C0] ? pr_cont_work+0x560/0x560 [ 901.238498][ C0] ? kthread_blkcg+0xd0/0xd0 [ 901.238514][ C0] ret_from_fork+0x48/0x80 [ 901.238535][ C0] ? kthread_blkcg+0xd0/0xd0 [ 901.238552][ C0] ret_from_fork_asm+0x11/0x20 [ 901.238585][ C0] [ 901.242265][ T29] Kernel panic - not syncing: hung_task: blocked tasks [ 901.520439][ T29] CPU: 1 PID: 29 Comm: khungtaskd Not tainted syzkaller #0 [ 901.527672][ T29] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 901.537748][ T29] Call Trace: [ 901.541043][ T29] [ 901.543995][ T29] dump_stack_lvl+0x18c/0x250 [ 901.548716][ T29] ? show_regs_print_info+0x20/0x20 [ 901.553948][ T29] ? load_image+0x400/0x400 [ 901.558581][ T29] panic+0x2dc/0x730 [ 901.562689][ T29] ? schedule_preempt_disabled+0x20/0x20 [ 901.568390][ T29] ? bpf_jit_dump+0xd0/0xd0 [ 901.572932][ T29] ? __irq_work_queue_local+0x13a/0x3b0 [ 901.578522][ T29] ? nmi_trigger_cpumask_backtrace+0x2a4/0x2f0 [ 901.584728][ T29] watchdog+0xf7c/0xf80 [ 901.589440][ T29] ? watchdog+0x1e1/0xf80 [ 901.593799][ T29] kthread+0x2fa/0x390 [ 901.597889][ T29] ? hungtask_pm_notify+0x90/0x90 [ 901.602951][ T29] ? kthread_blkcg+0xd0/0xd0 [ 901.607577][ T29] ret_from_fork+0x48/0x80 [ 901.612030][ T29] ? kthread_blkcg+0xd0/0xd0 [ 901.616655][ T29] ret_from_fork_asm+0x11/0x20 [ 901.621469][ T29] [ 901.625094][ T29] Kernel Offset: disabled [ 901.629431][ T29] Rebooting in 86400 seconds..