last executing test programs: 5.330213908s ago: executing program 0 (id=1992): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x1, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x65, 0x1, 0x0, 0x0, 0x0, 0x3, 0x472, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0x104804}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4bdedd79f2007915, @perf_bp={0x0, 0xa}, 0x11c92d, 0x2, 0x9, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xf, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/30], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x4000000) close(r2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x6c000000}, 0x0) r3 = socket$kcm(0x2, 0x1, 0x84) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="1c0000001900599c6d0e00009bd028ef8020ab0700040005"], 0xfe33) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000e00)={&(0x7f0000000580)=@isdn={0x22, 0x4, 0x1, 0x8, 0x2}, 0x80, 0x0, 0x0, &(0x7f00000009c0)=[{0x60, 0x11b, 0x0, "c493bc31d598415fe77d61241117e0d76755abbba8961a88f99cd22cb477e5ec438be469f345aed444c4f3fe29d4f6195adff74aa081d3840ac4d2ec5ceab3f305163436548b914beacc41be7a7cf0"}, {0xd8, 0x10e, 0x6, "0d0dca9069b405681f1ec6bc81ab1f95d5a20102a794c2c4f593594807267190f89c87e858fcc7611d527e7b0c12ed2daf99cbf2ed6049f741187e176e97b77115b7c7dad725048768ab8c3ed166c191ba2f284fb24e481684168412700b5d00312d728d421cf1cd91b2a581416992b2ffc9529149b2c441307a632938266bafe9f087787be7c78bf5e2fd46896cd814baebf02c063af9fd79c181db9c6f290f3a3be519ce37aac035167d28d6748bf6b4961928bffe453d82f590ccddfea3253d65b8f5"}, {0x10, 0x11, 0x8}, {0x40, 0x104, 0x68, "8eb0367a35fdbb96024e38565c91036ab6447d178af624818d11b1e1abf32e5cfd48511d9210c90fc990b3"}, {0x10, 0x3a, 0x2}, {0x38, 0xff, 0x30, "6d8ecb44092d26c2c5e9c566cc6fbaf7239f103546ae311cf216434749925c0140c9"}, {0xe0, 0xff, 0xef, "922b5c146c69420208ef0d01179d6bf03820debb12c93e923fa915fac202d78464a7076996d31a9cd3f525a775f163796737a7ff4d3920a941ef172a175773b506bb13daf911c79d33ca3990e2cfbcd41d8427eb56425327f9d8bdc0e0029df4abe48a34eb3565b100470d2b584ef98d0f678750c83bbc6da139c4186278301d0bca2c97ea17b56b1a2c45365e5735792dded3b345cd4ac64ca9ad48967d9a185a2d6f16e476909b233148db8cd1a3f3c327b5cba3994a4be6f6a77a10516bec83136b5d66d5e642f5"}, {0x10, 0x3a, 0x80000000}], 0x2c0}, 0x40) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'veth0_vlan\x00', @random="010000201000"}) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000600)="d800000018007bf6e00212ba0d8105040a600000000f040b067c55a1bc0009003e0006990600000015000500fe800000d62c005401000000000000005aa7b755cbdbeb0300014002000c0901ac040098007f6f94007100a007a288747f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d345ef464095cae8c9010000730d7a5025ccca262f3db00f6b8267e04adcdf634c1f215ce3099ad8ffd5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd601edef3d7f452a92307f01000e97", 0xd8}], 0x1, 0x0, 0x0, 0x2663}, 0x4000004) 3.836501739s ago: executing program 0 (id=1999): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$kcm(0x2a, 0x2, 0x0) recvmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000580)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000000400)=""/20, 0x14}, {&(0x7f0000000780)=""/244, 0xf4}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/73, 0x49}, {&(0x7f0000002a00)=""/197, 0xc5}, {&(0x7f0000002b00)}], 0x1000000c, &(0x7f0000002bc0)=""/16, 0x10}, 0x2002) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000980)=ANY=[@ANYBLOB="180200000100000000000000000000008500000087000000850000000700000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) close(r1) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_lsm={0x6, 0x6, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000010000000000000000018200000", @ANYRES32=r3, @ANYBLOB="0000000000000000c30000000000000095"], &(0x7f0000000180)='syzkaller\x00', 0x1}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0), 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000001c0)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="2d84"], 0xffdd) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r5) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1}, 0x1090da, 0x0, 0x0, 0x0, 0x0, 0x4, 0x749}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x21, 0x2, 0x2) r7 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x115905, 0x4, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x1) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000003b40)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() sendmsg$unix(r9, &(0x7f0000003e80)={&(0x7f0000003b80)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000003e00)=[{&(0x7f0000003c00)="9c5fbae212b4b97ac988a7a6f6d4d39766262380cf8d29437d3a499cf4ed0d398518d545ef0e0f1877fa48496919fdfb0a9c25f1b74311f65838f7ac8c823c99ead8dcc83cd0715241eb7787afb7c950d41f8f3351b8b8952e0407a01f5dd77cecb44c6ea4883d5e368ad23bbabb257818e549e99589f801fa56da3fbdd90b145f08e0c1238449526d3edb057d132496dcd70f9db81ebad81857de531cba3a3f9674c6da3caa3c11a9134a8db4099773f34e982f2f4ab3acc2401d414da2bd9e8e8d67", 0xc3}, {&(0x7f0000003d00)="55edf4210267b98783626802a322f9efadda8f456bbfeddfc00ed1dd876f133ed3d3576ac2675da54e97d43aca0b3325183973684d68312e3a443b578f92b898fb8395ca373fac06e589f85c99a4829145aa0621b2acfd9fdde786c0531e2f5104cd1812efe9ae51561bad14de5de02ff3bcfa36784bf9db251e4a3b4f85ee190d9d5ac6ec3c6a2f8ab68a6599af7212cc31723669c7b72371721d6fe86b9cd0e13d46ca96253ff9badc9a583b93542fa262de440ea9f6142f7905e9f334e9ef8c6543c0c9d47ec44059d321d01d2e", 0xcf}], 0x2, 0x0, 0x0, 0x50}, 0x800) sendmsg$kcm(r6, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="180003000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe342"], 0x10b8}, 0x200088c0) 2.586388954s ago: executing program 3 (id=2003): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r1, 0x0, 0x0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000880)={r1, 0x0}, 0xfffffffffffffef7) bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0)={0x0, r1}, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1}, 0x1090da, 0x0, 0x0, 0x0, 0x0, 0x4, 0x749}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@fallback=r2, 0x0, 0x0, 0x40, &(0x7f00000001c0)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000004c0)=ANY=[@ANYRES32=r3, @ANYRES32=r2, @ANYBLOB="0680000002010000", @ANYRES32=r2, @ANYBLOB, @ANYRES32=r0, @ANYBLOB, @ANYRES64=r4], 0x20) r5 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r5, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e64, @loopback}}, 0x80, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x200088c0) close(r5) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000310081044e81f782db44b904021d080005000000e8fe55a1180015000600142603600e120900210000090401a80016000a00014006f5ff00036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r6, 0x0, 0x0}, 0x20) socket$kcm(0x11, 0x3, 0x300) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b708000000000000738af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r9}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b00)={r9, 0xe0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000580)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, &(0x7f00000005c0)=[0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xca, &(0x7f0000000780)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0xb0, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x3, 0x0, &(0x7f0000000040)='syzkaller\x00'}, 0x94) r10 = socket$kcm(0x10, 0x2, 0x0) r11 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x2, @perf_config_ext={0xfffffffffffffffe, 0x1}, 0x15008, 0x0, 0x0, 0x2}, 0x0, 0x0, r3, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r11, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x2, @perf_bp={0x0, 0x8}}) write$cgroup_subtree(r10, &(0x7f0000000040)=ANY=[@ANYBLOB="110000005e0033"], 0xfe33) r12 = socket$kcm(0x10, 0x5, 0x0) sendmsg$inet(r12, &(0x7f0000000040)={0x0, 0x51, &(0x7f0000000100)=[{&(0x7f00000006c0)="5c00000013006bcd9e3fe3dc6e48aa310b6b87033c0000001f03000000000000040014000d000a000d0000009ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 2.556416656s ago: executing program 2 (id=2004): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x0, 0x800000, 0xfffc, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0xffffffff, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) socketpair$unix(0x1, 0x5, 0x1000000, &(0x7f00000029c0)) 2.466696632s ago: executing program 0 (id=2005): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001280), 0x17) (async) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_bp={0x0, 0xa}, 0x104405, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00000000000000"], 0x48) (async) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10004, 0x0, @perf_config_ext={0x8, 0x4}, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xc0}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x200}, 0x50) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x5, 0x2, 0x0, 0x0, 0x0, 0x9, 0x4022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0xfffffffd, 0x0, 0x8, 0x11, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) syz_clone(0x8000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00', 0x200}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) getpid() perf_event_open(&(0x7f0000000e80)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x5, 0x9}, 0x8000, 0xcdd, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="d8000000180081054e81f782db44b904021d005c06007c09e8fe55a10a0015400600142603600e1208000b0000000401a8001600a400014009000200036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360d070100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x800) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x10, 0x1, 0x0, 0x0, 0x0, 0x7ff0, 0x82, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x2, @perf_config_ext={0x1, 0xaea}, 0x4104, 0x2e, 0xfffffbff, 0x3, 0x2, 0x5, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x40009, 0x640b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x1, 0x3fff8000}, 0x0, 0x2, 0x7fffffff, 0x1, 0x9, 0x8, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2.435088484s ago: executing program 1 (id=2006): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0a00000003000039040000000004000000000000", @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0}, &(0x7f0000000140), &(0x7f0000000180)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000850000000800000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xa, 0x0, &(0x7f0000000100)="e0b9547ed3e1dbe9abc8", 0x0, 0x4002000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x14, &(0x7f0000000000), 0x4) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x10000000, &(0x7f0000000080)=[{&(0x7f0000000300)="d8000000180081054e81f783db4cb9040a1d080006007c06e8fc55a10a0015000600142603600e120800020000000401a8000700fec0ffff00000000035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbaceac3c2fb14c2ee5a7cef4090000001fb71b14d6d930dfe1d9d322fe7c9f8775820d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad9e3bb9ad809d5e1cace0d81ed0bffece0b42a9ecbee5de6ccd4e1ffffffffc1c9b6278754ca397c388b0dd6e4edef3d9300"/216, 0xd8}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r4 = socket$kcm(0x2, 0xa, 0x2) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRES32=r5, @ANYBLOB='&\x00\x00\x00\x00\x00\x00\x00', @ANYRES32], 0x20) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x9d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x10102, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x50) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110c23003f) ioctl$TUNGETVNETLE(r6, 0x40047451, &(0x7f0000000180)) ioctl$SIOCSIFHWADDR(r4, 0x8918, &(0x7f0000000000)={'ipvlan0\x00', @random="0200ff7fffff"}) 2.393073997s ago: executing program 2 (id=2007): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x1, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x65, 0x1, 0x0, 0x0, 0x0, 0x3, 0x472, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0x104804}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4bdedd79f2007915, @perf_bp={0x0, 0xa}, 0x11c92d, 0x2, 0x9, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xf, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/30], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x4000000) close(r2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x6c000000}, 0x0) r3 = socket$kcm(0x2, 0x1, 0x84) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="1c0000001900599c6d0e00009bd028ef8020ab0700040005"], 0xfe33) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000e00)={&(0x7f0000000580)=@isdn={0x22, 0x4, 0x1, 0x8, 0x2}, 0x80, 0x0, 0x0, &(0x7f00000009c0)=[{0x60, 0x11b, 0x0, "c493bc31d598415fe77d61241117e0d76755abbba8961a88f99cd22cb477e5ec438be469f345aed444c4f3fe29d4f6195adff74aa081d3840ac4d2ec5ceab3f305163436548b914beacc41be7a7cf0"}, {0xd8, 0x10e, 0x6, "0d0dca9069b405681f1ec6bc81ab1f95d5a20102a794c2c4f593594807267190f89c87e858fcc7611d527e7b0c12ed2daf99cbf2ed6049f741187e176e97b77115b7c7dad725048768ab8c3ed166c191ba2f284fb24e481684168412700b5d00312d728d421cf1cd91b2a581416992b2ffc9529149b2c441307a632938266bafe9f087787be7c78bf5e2fd46896cd814baebf02c063af9fd79c181db9c6f290f3a3be519ce37aac035167d28d6748bf6b4961928bffe453d82f590ccddfea3253d65b8f5"}, {0x10, 0x11, 0x8}, {0x40, 0x104, 0x68, "8eb0367a35fdbb96024e38565c91036ab6447d178af624818d11b1e1abf32e5cfd48511d9210c90fc990b3fea06d27"}, {0x10, 0x3a, 0x2}, {0x38, 0xff, 0x30, "6d8ecb44092d26c2c5e9c566cc6fbaf7239f103546ae311cf216434749925c0140c9"}, {0xe0, 0xff, 0xef, "922b5c146c69420208ef0d01179d6bf03820debb12c93e923fa915fac202d78464a7076996d31a9cd3f525a775f163796737a7ff4d3920a941ef172a175773b506bb13daf911c79d33ca3990e2cfbcd41d8427eb56425327f9d8bdc0e0029df4abe48a34eb3565b100470d2b584ef98d0f678750c83bbc6da139c4186278301d0bca2c97ea17b56b1a2c45365e5735792dded3b345cd4ac64ca9ad48967d9a185a2d6f16e476909b233148db8cd1a3f3c327b5cba3994a4be6f6a77a10516bec83136b5d66d5e642f5"}, {0x10, 0x3a, 0x80000000}], 0x2c0}, 0x40) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'veth0_vlan\x00', @random="010000201000"}) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000600)="d800000018007bf6e00212ba0d8105040a600000000f040b067c55a1bc0009003e0006990600000015000500fe800000d62c005401000000000000005aa7b755cbdbeb0300014002000c0901ac040098007f6f94007100a007a288747f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d345ef464095cae8c9010000730d7a5025ccca262f3db00f6b8267e04adcdf634c1f215ce3099ad8ffd5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd601edef3d7f452a92307f01000e97", 0xd8}], 0x1, 0x0, 0x0, 0x2663}, 0x4000004) 1.940295358s ago: executing program 1 (id=2008): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x0, 0x800000, 0xfffc, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0xffffffff, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (fail_nth: 11) 1.855866294s ago: executing program 3 (id=2009): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000180)="5c00000013006bcd9e3fe3dc4e48aa31086b8703010000001f0000ff00000000040014000d000a00100000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x0) 1.559668043s ago: executing program 2 (id=2010): r0 = socket$kcm(0x10, 0x3, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x0, 0x22, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xafa4, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@tail_call, @exit, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000400)='GPL\x00', 0xfffffff1, 0xc2, &(0x7f0000000680)=""/194, 0x41000, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x1, 0x0, 0x2, 0xd0}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000840)=[{0x5, 0x3, 0x3, 0x3}, {0x1, 0x2, 0x3, 0x7}, {0x2, 0x2, 0x9, 0x6}, {0x4, 0x5, 0x9, 0x9}], 0x10, 0x46cbb3d}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000980)={r1, 0x1}, 0xc) r2 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa16ae, 0x9, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x8}, 0x90, 0xa4, 0x2, 0x1, 0xa1, 0x9b9b, 0x8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000300000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x4, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x10000, 0x2}, 0x0, 0xfffffffffffffff9, 0x10, 0x0, 0x2, 0x0, 0x2, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x2) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000100081044e81f782db44b904021d080307000000e8fea4a1180015000600142603600e120800110000810401040016000a00", 0x36}], 0x1, 0x0, 0x0, 0x7400}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x33fe0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r7) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002a000b05d25a806c8c6f94f90424fc601000127a0a000600073582c137153e37080c188001ac0f000300", 0x33fe0}], 0x1, 0x0, 0x0, 0x8100000}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40500000000000061109c000000000007200000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 1.373496486s ago: executing program 3 (id=2011): bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000900)={@cgroup, 0xffffffffffffffff, 0x2b}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x12, 0x8, 0x4, 0x7cb4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) (fail_nth: 34) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xa, 0x0, 0x0) 872.66449ms ago: executing program 0 (id=2012): socket$kcm(0xa, 0x922000000003, 0x11) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={&(0x7f00000001c0), 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x0, 0x32, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xcfa4) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socket$kcm(0x10, 0x400000002, 0x0) socket$kcm(0xa, 0x2, 0x88) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r2) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r3 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="5c00000015006b0300224ed86e6c1d0002117ea6e070d6064e22000300000000250002000f00000017d34460bc24eab556a705251e6182949a00003d3b48dfd8cdbf9767b4fa51f62a64c9f4060046d88037e786a6d0a5d700000017", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 819.909004ms ago: executing program 1 (id=2013): r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x40, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2e}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000480)={{r1}, &(0x7f0000000400), &(0x7f0000000440)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r2}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000a40)="d8000000180081064e81f782db4cb904021d0800fd007c05e8fe55a10a0005000000000000000e41b0000900ac00060311000000040005000a0012060048035c3b61c102000000007134cf6efb8000a007a290457f01a7cee4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c220175730d16a4683f5ae24e25ccac9e00360db79826835d3a71d95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9000000348cc5614f7da773c20c6a6c8bd414c8da", 0xd8}], 0x1}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd3c0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x3, &(0x7f0000001300)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x94) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00', 0x200}) socketpair(0x1, 0x1, 0x2000006, &(0x7f0000000200)) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x18, 0x0, 0x0, 0x7, 0x520, 0x1, 0x1000, '\x00', 0x0, r6, 0x1, 0x3, 0x5}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={r8, 0x58, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r12 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x20, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [@btf_id={0x18, 0x8, 0x3, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xa}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x1}, @map_fd={0x18, 0x2, 0x1, 0x0, r9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000680)='syzkaller\x00', 0x10, 0x76, &(0x7f00000006c0)=""/118, 0x41100, 0x38, '\x00', r11, 0x0, r12, 0x8, &(0x7f0000000880)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000008c0)=[r6], &(0x7f0000000900)=[{0x0, 0x2, 0xf, 0xb}, {0x5, 0x4, 0x9, 0x5}, {0x4, 0x4, 0xe, 0xb}], 0x10, 0x8}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8946, &(0x7f0000000cc0)='A4st%2\xe1S\xeb\x94N\xc9R\xcfL\x03Y\xe1\x1d\n\x1897\xcfE\xce\x87D\xb4\xd4\xc7\xb8\xfa&\xaa\x0e\xee\x86\xbb\x8ei\xa5\xdd\x9baY7;\xa5&\xfdX\x88\xc0\xdd\xe1g\x03x\xa0\x84.%\xd0i7\x19^!\x8a\xceL\x98\xae\x02\x00\bh\xd6J\xe3\xcd~\xb2\xce\x12\xfcnP\x11\xf9\x8a\xd8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x01\x00\x00\x00\x00') sendmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000380)="2e0000003e000531d25a80699663b4090224fc602f6e35405dc0ac61d2e740045e91dbd1bd000000000000000000000000760900000000000000d9ff39a4b95e0fd69deeadd5892f7f24b84a9597d8f322fa81c34197738d598364825528dd4d3598a0233662e54db808bc74f1dfb1f9323482ed9ff6d085daa12ed4fee11ab7798c661e064181e797dc7a502516f1510d80b87903569e29214fb7137f40e9025cd71afc29dc42d6eff0c0bcfa2e428ce03916b757251510d393dad90c34a0f152779687304b2f25d81d22effa10e3c628bb93d21e2ee6569d6e869b2192e1290092150dd1f018f349b976", 0xeb}], 0x1, 0x0, 0x0, 0x39c}, 0x20000005) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)="a37551a3dbd29a3af829a85c60a2ba76e1a1171dcfafe7a85c60935fcbccd5f65772ebdfcc5b15fd02d13b0c93a8e33553dd1ae0796693c5a11090f517e626fd0262f2", 0x43}, {&(0x7f0000000140)="c96c4a8648d608063e1a7fe70b1bee980137fa7bcb6928f611bf4d8916e2ebccfa7fc4545050ced90d416ede1d1379a15ec0b54951ff22972aa161935e4b5612c280cf396fc2b9452e19c1e457d7b64bdea2085c030337dba3f634c1137845594dc612387ed2774331bdc773f23ebf03916b8d65a32c655a10a85c7c19e83a35a7a383cee10ba6a375b76af47890d9b12539a131315ee3a9e96102d681b524153fbdb6c6e766490beb8a3507e2d1a7d65393f92929de63857d430c", 0xbb}, {&(0x7f0000000240)="d336fc2ed6a6687faecbcb2b669ac30fdacda0ec8a7792647308365aa431ac94d91431e8766c6c884ff2197efc5cd0", 0x2f}], 0x3, 0x0, 0x0, 0x1f00c00e}, 0x8010) r13 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNSETIFF(r13, 0x400454ca, &(0x7f0000000080)={'gretap0\x00'}) r14 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x10800, 0x0) ioctl$SIOCSIFHWADDR(r14, 0x8924, &(0x7f0000000040)={'batadv_slave_0\x00'}) 770.300727ms ago: executing program 3 (id=2014): r0 = getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) (async) syz_open_procfs$namespace(0x0, 0x0) (async) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x302, 0x4, 0x0, 0x1, 0x9, 0x10000000, 0x1}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x4001, 0x400, 0x98, 0x5, 0x2, 0xfffff271, 0xfff8, 0x0, 0x0, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000280)='cpu.weight\x00', 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) (async, rerun: 64) socket$kcm(0x11, 0x2, 0x0) (async, rerun: 64) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001980)={0x18, 0x3, &(0x7f00000013c0)=@framed, &(0x7f0000001400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xa5, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x32, 0x43a1bd76, 0x8, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xe, 0x3, &(0x7f0000000040)=@framed={{}, [], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) (async) bpf$OBJ_PIN_PROG(0x11, &(0x7f0000000240)=@generic={&(0x7f0000000000)='./file0\x00', r5}, 0x18) (async) r6 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x107, 0x12, &(0x7f0000000100)=r4, 0x4) (async) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73772cc9f1ba1f848420000005e140602000000000e000a0010000000028000001294", 0x2e}], 0x1}, 0x0) 575.84031ms ago: executing program 2 (id=2015): r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10, 0x0}, 0x300440f1) setsockopt$sock_attach_bpf(r0, 0x1, 0x12, &(0x7f0000000300), 0x4) 520.622205ms ago: executing program 1 (id=2016): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0a00000003000039040000000004000000000000", @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1}, &(0x7f0000000140), &(0x7f0000000180)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000850000000800000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0xa, 0x0, &(0x7f0000000100)="e0b9547ed3e1dbe9abc8", 0x0, 0x4002000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r3, 0x84, 0x14, &(0x7f0000000000), 0x4) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x10000000, &(0x7f0000000080)=[{&(0x7f0000000300)="d8000000180081054e81f783db4cb9040a1d080006007c06e8fc55a10a0015000600142603600e120800020000000401a8000700fec0ffff00000000035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbaceac3c2fb14c2ee5a7cef4090000001fb71b14d6d930dfe1d9d322fe7c9f8775820d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad9e3bb9ad809d5e1cace0d81ed0bffece0b42a9ecbee5de6ccd4e1ffffffffc1c9b6278754ca397c388b0dd6e4edef3d9300"/216, 0xd8}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r5 = socket$kcm(0x2, 0xa, 0x2) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRES32=r6, @ANYBLOB='&\x00\x00\x00\x00\x00\x00\x00', @ANYRES32], 0x20) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x9d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x10102, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x50) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110c23003f) ioctl$TUNGETVNETLE(r7, 0x40047451, &(0x7f0000000180)) ioctl$SIOCSIFHWADDR(r5, 0x8918, &(0x7f0000000000)={'ipvlan0\x00', @random="0200ff7fffff"}) 259.941022ms ago: executing program 0 (id=2017): sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)) 231.107884ms ago: executing program 2 (id=2018): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x1, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', r1}, 0x18) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x65, 0x1, 0x0, 0x0, 0x0, 0x3, 0x472, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0x104804}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x3}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4bdedd79f2007915, @perf_bp={0x0, 0xa}, 0x11c92d, 0x2, 0x9, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xf, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/30], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x4000000) close(r2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x6c000000}, 0x0) r3 = socket$kcm(0x2, 0x1, 0x84) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="1c0000001900599c6d0e00009bd028ef8020ab0700040005"], 0xfe33) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000e00)={&(0x7f0000000580)=@isdn={0x22, 0x4, 0x1, 0x8, 0x2}, 0x80, 0x0, 0x0, &(0x7f00000009c0)=[{0x60, 0x11b, 0x0, "c493bc31d598415fe77d61241117e0d76755abbba8961a88f99cd22cb477e5ec438be469f345aed444c4f3fe29d4f6195adff74aa081d3840ac4d2ec5ceab3f305163436548b914beacc41be7a7cf0"}, {0xd8, 0x10e, 0x6, "0d0dca9069b405681f1ec6bc81ab1f95d5a20102a794c2c4f593594807267190f89c87e858fcc7611d527e7b0c12ed2daf99cbf2ed6049f741187e176e97b77115b7c7dad725048768ab8c3ed166c191ba2f284fb24e481684168412700b5d00312d728d421cf1cd91b2a581416992b2ffc9529149b2c441307a632938266bafe9f087787be7c78bf5e2fd46896cd814baebf02c063af9fd79c181db9c6f290f3a3be519ce37aac035167d28d6748bf6b4961928bffe453d82f590ccddfea3253d65b8f5"}, {0x10, 0x11, 0x8}, {0x40, 0x104, 0x68, "8eb0367a35fdbb96024e38565c91036ab6447d178af624818d11b1e1abf32e5cfd48511d9210c90fc990b3fea0"}, {0x10, 0x3a, 0x2}, {0x38, 0xff, 0x30, "6d8ecb44092d26c2c5e9c566cc6fbaf7239f103546ae311cf216434749925c0140c9"}, {0xe0, 0xff, 0xef, "922b5c146c69420208ef0d01179d6bf03820debb12c93e923fa915fac202d78464a7076996d31a9cd3f525a775f163796737a7ff4d3920a941ef172a175773b506bb13daf911c79d33ca3990e2cfbcd41d8427eb56425327f9d8bdc0e0029df4abe48a34eb3565b100470d2b584ef98d0f678750c83bbc6da139c4186278301d0bca2c97ea17b56b1a2c45365e5735792dded3b345cd4ac64ca9ad48967d9a185a2d6f16e476909b233148db8cd1a3f3c327b5cba3994a4be6f6a77a10516bec83136b5d66d5e642f5"}, {0x10, 0x3a, 0x80000000}], 0x2c0}, 0x40) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'veth0_vlan\x00', @random="010000201000"}) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000600)="d800000018007bf6e00212ba0d8105040a600000000f040b067c55a1bc0009003e0006990600000015000500fe800000d62c005401000000000000005aa7b755cbdbeb0300014002000c0901ac040098007f6f94007100a007a288747f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d345ef464095cae8c9010000730d7a5025ccca262f3db00f6b8267e04adcdf634c1f215ce3099ad8ffd5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd601edef3d7f452a92307f01000e97", 0xd8}], 0x1, 0x0, 0x0, 0x2663}, 0x4000004) 178.402518ms ago: executing program 3 (id=2019): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0xfffc, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) close(0x3) bpf$MAP_CREATE(0x0, 0x0, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000002540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) 158.794539ms ago: executing program 1 (id=2020): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x41}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x6e}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6}, 0x70) 87.039524ms ago: executing program 0 (id=2021): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0f000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000fdffffff000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000fcfdffff7b8ab8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0xb, 0x0, 0x0, 0x40f00, 0xc, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x7, 0xe2e5f6f2, 0x43, 0x8, 0x20, r2, 0xfffffc01, '\x00', r3, 0xffffffffffffffff, 0x0, 0x3, 0x1}, 0x50) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10, 0x0}, 0x300440f1) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000005, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x11540}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB="000000000000004699cad8dc606b0c131dd1c31ae7d428000000000000000075a23353b66aaf45b4b40000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r7}, &(0x7f00000006c0), &(0x7f0000000700)=r6}, 0x20) recvmsg$unix(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000280)=""/102, 0x66}], 0x1}, 0x102) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x9, 0x1, 0x7fe2, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r9) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') setsockopt$sock_attach_bpf(r1, 0x1, 0x12, &(0x7f0000000300), 0x4) 41.288607ms ago: executing program 3 (id=2022): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x41}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x6e}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6}, 0x70) (fail_nth: 2) 40.020487ms ago: executing program 1 (id=2023): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x1, 0x10001}, 0x0, 0x32, 0x1c55, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xd) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3efd7ab4c41335d9, @perf_bp={&(0x7f0000000240), 0xc}, 0x0, 0xfffffffffffffffe, 0x0, 0x3, 0x0, 0x8000, 0xfffc}, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x3, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x4, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10797e, 0x2, @perf_bp={&(0x7f0000000280), 0x4}, 0x0, 0x32, 0x43a1bd74, 0x7, 0x9, 0x8, 0x2, 0x0, 0x0, 0x0, 0x100200c}, 0x0, 0x0, r1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x88, 0x67, &(0x7f00000002c0), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x10, &(0x7f0000000000), 0x4) close(r2) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000c40)="5c00000016006bab9a3fe3d86e17aa0a046b876c060048007ea60864160af36504811a0038001d001931a0e69ee517d34460be06000000a705251e6182949a9a7b9bcb84c9f4d4938037e70e4509c5bb4de385aa2adb88a899a655ab", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff7ffa}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x58fb59ac, 0x80}, 0x0, 0x4, 0xffffffffffffffff, 0x1) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="d8000000180081054e81f783db4cb9040a1d080006007c09e8fc55a10a0015000600142603600e1208000f00fff00401a80008000800114004080000055c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb71b14d6d930dfe144ecc447c65e206d25b4084121d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad9e3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd4e1ffffffffc1c9b6278754ca397c388b0dd6e4edef3d9300fc0d15", 0xd8}], 0x1}, 0x4000000) sendmsg$inet(r3, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x8004) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030010000b3fd25a806c8c6394f90324fc60100002000a000200053582c137153e3704020180fc5409000c00", 0x33fe0}], 0x1}, 0x0) gettid() openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) 0s ago: executing program 2 (id=2024): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e22, @empty}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000ac0)="ee", 0xfffffe5e}], 0x1, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b57000000860f5878c37ffe36e1165814d435be5b317c6c8189587d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988ab013f40afe403041323110f62055394412158e7a3adb148d641aa40d4ab077fe34232aa8b31851466d0998a61d7da0c86d70000001010"], 0x10b8}, 0x8000) (fail_nth: 5) kernel console output (not intermixed with test programs): syzkaller0: entered promiscuous mode [ 318.029456][ T9688] syzkaller0: entered allmulticast mode [ 318.315830][ T9700] FAULT_INJECTION: forcing a failure. [ 318.315830][ T9700] name failslab, interval 1, probability 0, space 0, times 0 [ 318.352056][ T9700] CPU: 1 PID: 9700 Comm: syz.3.1391 Not tainted syzkaller #0 [ 318.359533][ T9700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 318.369738][ T9700] Call Trace: [ 318.373101][ T9700] [ 318.376059][ T9700] dump_stack_lvl+0x18c/0x250 [ 318.380788][ T9700] ? show_regs_print_info+0x20/0x20 [ 318.386034][ T9700] ? load_image+0x420/0x420 [ 318.390586][ T9700] ? __might_sleep+0xe0/0xe0 [ 318.395244][ T9700] ? __lock_acquire+0x7d40/0x7d40 [ 318.400327][ T9700] should_fail_ex+0x39d/0x4d0 [ 318.405063][ T9700] should_failslab+0x9/0x20 [ 318.409606][ T9700] slab_pre_alloc_hook+0x59/0x310 [ 318.414761][ T9700] ? sk_prot_alloc+0xe7/0x210 [ 318.419474][ T9700] ? sk_prot_alloc+0xe7/0x210 [ 318.424189][ T9700] __kmem_cache_alloc_node+0x53/0x250 [ 318.429615][ T9700] ? sk_prot_alloc+0xe7/0x210 [ 318.434337][ T9700] __kmalloc+0xa4/0x230 [ 318.438546][ T9700] sk_prot_alloc+0xe7/0x210 [ 318.443094][ T9700] ? sk_alloc+0x24/0x360 [ 318.447422][ T9700] sk_alloc+0x3a/0x360 [ 318.451528][ T9700] ? bpf_ctx_init+0x163/0x1a0 [ 318.456247][ T9700] ? bpf_prog_test_run_skb+0x273/0x12b0 [ 318.461826][ T9700] bpf_prog_test_run_skb+0x3a5/0x12b0 [ 318.467231][ T9700] ? __fget_files+0x43d/0x4b0 [ 318.471963][ T9700] ? cpu_online+0x60/0x60 [ 318.476323][ T9700] bpf_prog_test_run+0x321/0x390 [ 318.481296][ T9700] __sys_bpf+0x49d/0x890 [ 318.485582][ T9700] ? bpf_link_show_fdinfo+0x390/0x390 [ 318.491275][ T9700] ? lock_chain_count+0x20/0x20 [ 318.496158][ T9700] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 318.502181][ T9700] __x64_sys_bpf+0x7c/0x90 [ 318.506635][ T9700] do_syscall_64+0x55/0xa0 [ 318.511180][ T9700] ? clear_bhb_loop+0x40/0x90 [ 318.515994][ T9700] ? clear_bhb_loop+0x40/0x90 [ 318.520709][ T9700] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 318.526642][ T9700] RIP: 0033:0x7f8e3099c819 [ 318.531097][ T9700] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 318.551029][ T9700] RSP: 002b:00007f8e317b1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 318.559490][ T9700] RAX: ffffffffffffffda RBX: 00007f8e30c15fa0 RCX: 00007f8e3099c819 [ 318.567589][ T9700] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 318.575698][ T9700] RBP: 00007f8e317b1090 R08: 0000000000000000 R09: 0000000000000000 [ 318.583726][ T9700] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 318.591820][ T9700] R13: 00007f8e30c16038 R14: 00007f8e30c15fa0 R15: 00007ffc2effc0a8 [ 318.599845][ T9700] [ 319.256764][ T9708] : port 1(ip6gretap0) entered blocking state [ 319.277794][ T9708] : port 1(ip6gretap0) entered disabled state [ 319.313611][ T9708] ip6gretap0: entered allmulticast mode [ 319.437791][ T9708] ip6gretap0: entered promiscuous mode [ 319.634403][ T9709] ip6gretap0: left allmulticast mode [ 319.679347][ T9709] ip6gretap0: left promiscuous mode [ 319.761436][ T9709] : port 1(ip6gretap0) entered disabled state [ 320.191289][ T9726] sctp: [Deprecated]: syz.3.1399 (pid 9726) Use of struct sctp_assoc_value in delayed_ack socket option. [ 320.191289][ T9726] Use struct sctp_sack_info instead [ 320.239146][ T9726] netlink: 'syz.3.1399': attribute type 10 has an invalid length. [ 320.259288][ T9726] netlink: 212412 bytes leftover after parsing attributes in process `syz.3.1399'. [ 320.279777][ T9726] openvswitch: netlink: Flow key attr not present in new flow. [ 320.346577][ T9730] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1400'. [ 321.284596][ T9740] : port 1(ip6gretap0) entered blocking state [ 321.292303][ T9740] : port 1(ip6gretap0) entered disabled state [ 321.300464][ T9740] ip6gretap0: entered allmulticast mode [ 321.318159][ T9740] ip6gretap0: entered promiscuous mode [ 321.384109][ T9740] ip6gretap0: left allmulticast mode [ 321.400769][ T9740] ip6gretap0: left promiscuous mode [ 321.412378][ T9740] : port 1(ip6gretap0) entered disabled state [ 323.048040][ T9782] : port 1(ip6gretap0) entered blocking state [ 323.062568][ T9782] : port 1(ip6gretap0) entered disabled state [ 323.092956][ T9782] ip6gretap0: entered allmulticast mode [ 323.215395][ T9782] ip6gretap0: entered promiscuous mode [ 323.348959][ T9788] ip6gretap0: left allmulticast mode [ 323.381377][ T9788] ip6gretap0: left promiscuous mode [ 323.401079][ T9788] : port 1(ip6gretap0) entered disabled state [ 324.271949][ T9802] netlink: 'syz.0.1425': attribute type 3 has an invalid length. [ 324.327344][ T9802] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1425'. [ 325.452808][ T9813] netlink: 'syz.3.1430': attribute type 10 has an invalid length. [ 325.493943][ T9813] team0: Port device macvlan0 added [ 325.540270][ T9819] netlink: 'syz.0.1432': attribute type 10 has an invalid length. [ 325.560909][ T9819] bond0: (slave lo): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 325.713040][ T9821] : port 1(ip6gretap0) entered blocking state [ 325.720255][ T9821] : port 1(ip6gretap0) entered disabled state [ 325.733787][ T9821] ip6gretap0: entered allmulticast mode [ 325.743684][ T9825] netlink: 'syz.0.1435': attribute type 12 has an invalid length. [ 325.757995][ T9821] ip6gretap0: entered promiscuous mode [ 325.758669][ T9825] netlink: 'syz.0.1435': attribute type 11 has an invalid length. [ 325.772292][ T9825] netlink: 188816 bytes leftover after parsing attributes in process `syz.0.1435'. [ 325.833288][ T9828] ip6gretap0: left allmulticast mode [ 325.874168][ T9828] ip6gretap0: left promiscuous mode [ 325.913529][ T9828] : port 1(ip6gretap0) entered disabled state [ 326.357825][ T9837] : port 1(ip6gretap0) entered blocking state [ 326.368686][ T9837] : port 1(ip6gretap0) entered disabled state [ 326.389982][ T9837] ip6gretap0: entered allmulticast mode [ 326.400396][ T9837] ip6gretap0: entered promiscuous mode [ 326.754384][ T9835] ip6gretap0: left allmulticast mode [ 326.760107][ T9835] ip6gretap0: left promiscuous mode [ 326.783247][ T9835] : port 1(ip6gretap0) entered disabled state [ 326.875181][ T9836] : port 1(ip6gretap0) entered blocking state [ 326.920417][ T9836] : port 1(ip6gretap0) entered disabled state [ 326.945879][ T9836] ip6gretap0: entered allmulticast mode [ 327.108195][ T9836] ip6gretap0: entered promiscuous mode [ 327.192832][ T9838] ip6gretap0: left allmulticast mode [ 327.224647][ T9838] ip6gretap0: left promiscuous mode [ 327.257762][ T9838] : port 1(ip6gretap0) entered disabled state [ 329.828714][ T9866] sctp: [Deprecated]: syz.2.1448 (pid 9866) Use of int in max_burst socket option deprecated. [ 329.828714][ T9866] Use struct sctp_assoc_value instead [ 329.872751][ T9866] netlink: 'syz.2.1448': attribute type 21 has an invalid length. [ 330.237033][ T9879] netlink: 'syz.2.1452': attribute type 10 has an invalid length. [ 330.539366][ T9879] veth0_vlan: left promiscuous mode [ 330.567691][ T9879] veth0_vlan: entered promiscuous mode [ 330.585657][ T9879] team0: Device veth0_vlan failed to register rx_handler [ 330.847308][ T9887] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1455'. [ 330.949755][ T9889] netlink: 'syz.1.1456': attribute type 12 has an invalid length. [ 330.958042][ T9889] netlink: 'syz.1.1456': attribute type 11 has an invalid length. [ 330.967871][ T9889] netlink: 188816 bytes leftover after parsing attributes in process `syz.1.1456'. [ 331.000811][ T9879] syz.2.1452 (9879) used greatest stack depth: 19088 bytes left [ 331.215128][ T9895] : port 1(ip6gretap0) entered blocking state [ 331.222420][ T9895] : port 1(ip6gretap0) entered disabled state [ 331.229865][ T9895] ip6gretap0: entered allmulticast mode [ 331.249563][ T9895] ip6gretap0: entered promiscuous mode [ 331.277029][ T9895] ip6gretap0: left allmulticast mode [ 331.291943][ T9895] ip6gretap0: left promiscuous mode [ 331.299903][ T9895] : port 1(ip6gretap0) entered disabled state [ 331.317175][ T9902] sctp: [Deprecated]: syz.2.1460 (pid 9902) Use of int in max_burst socket option deprecated. [ 331.317175][ T9902] Use struct sctp_assoc_value instead [ 331.338084][ T9902] netlink: 'syz.2.1460': attribute type 21 has an invalid length. [ 332.615806][ T9927] FAULT_INJECTION: forcing a failure. [ 332.615806][ T9927] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 332.629251][ T9927] CPU: 0 PID: 9927 Comm: syz.1.1469 Not tainted syzkaller #0 [ 332.636705][ T9927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 332.646832][ T9927] Call Trace: [ 332.650203][ T9927] [ 332.653191][ T9927] dump_stack_lvl+0x18c/0x250 [ 332.658218][ T9927] ? show_regs_print_info+0x20/0x20 [ 332.663480][ T9927] ? load_image+0x420/0x420 [ 332.668036][ T9927] ? __might_fault+0xaa/0x120 [ 332.672764][ T9927] ? __lock_acquire+0x7d40/0x7d40 [ 332.677847][ T9927] should_fail_ex+0x39d/0x4d0 [ 332.682602][ T9927] _copy_from_user+0x2f/0xe0 [ 332.687348][ T9927] ___sys_sendmsg+0x1c7/0x360 [ 332.692078][ T9927] ? get_pid_task+0x20/0x1e0 [ 332.696804][ T9927] ? __sys_sendmsg+0x2a0/0x2a0 [ 332.701640][ T9927] ? __lock_acquire+0x7d40/0x7d40 [ 332.706738][ T9927] __se_sys_sendmsg+0x1c2/0x2b0 [ 332.711628][ T9927] ? __x64_sys_sendmsg+0x80/0x80 [ 332.716648][ T9927] ? lockdep_hardirqs_on+0x98/0x150 [ 332.721912][ T9927] do_syscall_64+0x55/0xa0 [ 332.726404][ T9927] ? clear_bhb_loop+0x40/0x90 [ 332.731224][ T9927] ? clear_bhb_loop+0x40/0x90 [ 332.735968][ T9927] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 332.741915][ T9927] RIP: 0033:0x7fb5f459c819 [ 332.746388][ T9927] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 332.766057][ T9927] RSP: 002b:00007fb5f54e6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 332.774627][ T9927] RAX: ffffffffffffffda RBX: 00007fb5f4815fa0 RCX: 00007fb5f459c819 [ 332.782656][ T9927] RDX: 0000000000008040 RSI: 0000200000000940 RDI: 0000000000000003 [ 332.790667][ T9927] RBP: 00007fb5f54e6090 R08: 0000000000000000 R09: 0000000000000000 [ 332.798688][ T9927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 332.806844][ T9927] R13: 00007fb5f4816038 R14: 00007fb5f4815fa0 R15: 00007ffc7bbc8d98 [ 332.814886][ T9927] [ 332.848919][ T9929] : port 1(ip6gretap0) entered blocking state [ 332.873273][ T9929] : port 1(ip6gretap0) entered disabled state [ 332.895239][ T9929] ip6gretap0: entered allmulticast mode [ 332.919625][ T9929] ip6gretap0: entered promiscuous mode [ 332.976110][ T9923] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1468'. [ 332.990843][ T9925] ip6gretap0: left allmulticast mode [ 333.002043][ T9925] ip6gretap0: left promiscuous mode [ 333.038702][ T9925] : port 1(ip6gretap0) entered disabled state [ 333.063649][ T9934] sctp: [Deprecated]: syz.1.1471 (pid 9934) Use of int in max_burst socket option deprecated. [ 333.063649][ T9934] Use struct sctp_assoc_value instead [ 333.139016][ T9934] netlink: 'syz.1.1471': attribute type 21 has an invalid length. [ 333.744272][ T9954] netlink: 132 bytes leftover after parsing attributes in process `syz.2.1480'. [ 336.833755][ T9958] : port 1(ip6gretap0) entered blocking state [ 336.841079][ T9958] : port 1(ip6gretap0) entered disabled state [ 336.859434][ T9958] ip6gretap0: entered allmulticast mode [ 336.885313][ T9958] ip6gretap0: entered promiscuous mode [ 336.941643][ T9963] sctp: [Deprecated]: syz.1.1483 (pid 9963) Use of int in max_burst socket option deprecated. [ 336.941643][ T9963] Use struct sctp_assoc_value instead [ 336.967524][ T9964] ip6gretap0: left allmulticast mode [ 336.982072][ T9964] ip6gretap0: left promiscuous mode [ 337.006320][ T9964] : port 1(ip6gretap0) entered disabled state [ 337.223725][ T9963] netlink: 'syz.1.1483': attribute type 21 has an invalid length. [ 337.234756][ T9969] : port 1(ip6gretap0) entered blocking state [ 337.244470][ T9969] : port 1(ip6gretap0) entered disabled state [ 337.254155][ T9969] ip6gretap0: entered allmulticast mode [ 337.260371][ T9976] sctp: [Deprecated]: syz.3.1486 (pid 9976) Use of int in max_burst socket option deprecated. [ 337.260371][ T9976] Use struct sctp_assoc_value instead [ 337.271988][ T9969] ip6gretap0: entered promiscuous mode [ 337.285943][ T9976] netlink: 'syz.3.1486': attribute type 21 has an invalid length. [ 337.297446][ T9972] ip6gretap0: left allmulticast mode [ 337.339556][ T9972] ip6gretap0: left promiscuous mode [ 337.429578][ T9972] : port 1(ip6gretap0) entered disabled state [ 337.490284][ T9981] FAULT_INJECTION: forcing a failure. [ 337.490284][ T9981] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 337.503887][ T9981] CPU: 1 PID: 9981 Comm: syz.1.1489 Not tainted syzkaller #0 [ 337.511329][ T9981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 337.521448][ T9981] Call Trace: [ 337.524767][ T9981] [ 337.527731][ T9981] dump_stack_lvl+0x18c/0x250 [ 337.532456][ T9981] ? show_regs_print_info+0x20/0x20 [ 337.537693][ T9981] ? load_image+0x420/0x420 [ 337.542236][ T9981] ? __might_fault+0xaa/0x120 [ 337.546945][ T9981] ? __lock_acquire+0x7d40/0x7d40 [ 337.552036][ T9981] should_fail_ex+0x39d/0x4d0 [ 337.556867][ T9981] _copy_from_user+0x2f/0xe0 [ 337.561505][ T9981] ___sys_sendmsg+0x1c7/0x360 [ 337.566232][ T9981] ? __sys_sendmsg+0x2a0/0x2a0 [ 337.571072][ T9981] ? __lock_acquire+0x7d40/0x7d40 [ 337.576154][ T9981] __se_sys_sendmsg+0x1c2/0x2b0 [ 337.581049][ T9981] ? __x64_sys_sendmsg+0x80/0x80 [ 337.586131][ T9981] ? lockdep_hardirqs_on+0x98/0x150 [ 337.591494][ T9981] do_syscall_64+0x55/0xa0 [ 337.596030][ T9981] ? clear_bhb_loop+0x40/0x90 [ 337.600742][ T9981] ? clear_bhb_loop+0x40/0x90 [ 337.605553][ T9981] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 337.611610][ T9981] RIP: 0033:0x7fb5f459c819 [ 337.616064][ T9981] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 337.635727][ T9981] RSP: 002b:00007fb5f54e6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 337.644200][ T9981] RAX: ffffffffffffffda RBX: 00007fb5f4815fa0 RCX: 00007fb5f459c819 [ 337.652329][ T9981] RDX: 0000000000000000 RSI: 00002000000005c0 RDI: 0000000000000003 [ 337.660340][ T9981] RBP: 00007fb5f54e6090 R08: 0000000000000000 R09: 0000000000000000 [ 337.668348][ T9981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 337.676535][ T9981] R13: 00007fb5f4816038 R14: 00007fb5f4815fa0 R15: 00007ffc7bbc8d98 [ 337.684667][ T9981] [ 337.773430][ T9985] netlink: 'syz.1.1490': attribute type 33 has an invalid length. [ 337.793535][ T9984] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1488'. [ 337.833804][ T9985] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.1490'. [ 338.960513][ T49] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 341.208680][T10014] sctp: [Deprecated]: syz.0.1500 (pid 10014) Use of int in max_burst socket option deprecated. [ 341.208680][T10014] Use struct sctp_assoc_value instead [ 341.230612][T10014] netlink: 'syz.0.1500': attribute type 21 has an invalid length. [ 341.308084][T10015] : port 1(ip6gretap0) entered blocking state [ 341.318017][T10015] : port 1(ip6gretap0) entered disabled state [ 341.326465][T10015] ip6gretap0: entered allmulticast mode [ 341.336181][T10015] ip6gretap0: entered promiscuous mode [ 341.371596][T10016] : port 1(ip6gretap0) entered blocking state [ 341.401465][T10016] : port 1(ip6gretap0) entered disabled state [ 341.409552][T10016] ip6gretap0: entered allmulticast mode [ 341.425413][T10019] sctp: [Deprecated]: syz.0.1501 (pid 10019) Use of int in max_burst socket option deprecated. [ 341.425413][T10019] Use struct sctp_assoc_value instead [ 341.441842][T10016] ip6gretap0: entered promiscuous mode [ 341.468463][T10019] netlink: 'syz.0.1501': attribute type 21 has an invalid length. [ 341.478940][T10015] ip6gretap0: left allmulticast mode [ 341.498543][T10015] ip6gretap0: left promiscuous mode [ 341.505031][T10015] : port 1(ip6gretap0) entered disabled state [ 341.544157][T10020] ip6gretap0: left allmulticast mode [ 341.554928][T10020] ip6gretap0: left promiscuous mode [ 341.581485][T10020] : port 1(ip6gretap0) entered disabled state [ 341.905463][T10031] netlink: 'syz.2.1505': attribute type 21 has an invalid length. [ 341.919454][T10031] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 341.927547][T10031] IPv6: NLM_F_CREATE should be set when creating new route [ 341.935251][T10031] IPv6: NLM_F_CREATE should be set when creating new route [ 341.942885][T10031] IPv6: NLM_F_CREATE should be set when creating new route [ 342.398616][T10037] netlink: set zone limit has 8 unknown bytes [ 342.486666][T10043] sctp: [Deprecated]: syz.3.1510 (pid 10043) Use of int in max_burst socket option deprecated. [ 342.486666][T10043] Use struct sctp_assoc_value instead [ 342.568542][T10043] netlink: 'syz.3.1510': attribute type 21 has an invalid length. [ 343.251510][T10054] : port 1(ip6gretap0) entered blocking state [ 343.262059][T10054] : port 1(ip6gretap0) entered disabled state [ 343.280421][T10054] ip6gretap0: entered allmulticast mode [ 343.320401][T10054] ip6gretap0: entered promiscuous mode [ 343.367621][T10057] ip6gretap0: left allmulticast mode [ 343.382656][T10057] ip6gretap0: left promiscuous mode [ 343.412999][T10057] : port 1(ip6gretap0) entered disabled state [ 343.833190][T10055] : port 1(ip6gretap0) entered blocking state [ 343.849633][T10055] : port 1(ip6gretap0) entered disabled state [ 343.858446][T10055] ip6gretap0: entered allmulticast mode [ 343.874454][T10055] ip6gretap0: entered promiscuous mode [ 343.900575][T10056] ip6gretap0: left allmulticast mode [ 343.927643][T10056] ip6gretap0: left promiscuous mode [ 343.973914][T10056] : port 1(ip6gretap0) entered disabled state [ 344.294467][T10062] : port 1(ip6gretap0) entered blocking state [ 344.301106][T10062] : port 1(ip6gretap0) entered disabled state [ 344.311746][T10062] ip6gretap0: entered allmulticast mode [ 344.319130][T10062] ip6gretap0: entered promiscuous mode [ 344.327769][T10072] netlink: 'syz.0.1518': attribute type 4 has an invalid length. [ 344.347798][T10074] netlink: 152 bytes leftover after parsing attributes in process `syz.3.1519'. [ 344.357750][T10074] netlink: 6 bytes leftover after parsing attributes in process `syz.3.1519'. [ 344.373991][T10065] ip6gretap0: left allmulticast mode [ 344.379418][T10065] ip6gretap0: left promiscuous mode [ 344.388462][T10065] : port 1(ip6gretap0) entered disabled state [ 344.493078][T10077] sctp: [Deprecated]: syz.2.1520 (pid 10077) Use of int in max_burst socket option deprecated. [ 344.493078][T10077] Use struct sctp_assoc_value instead [ 344.521263][T10077] netlink: 'syz.2.1520': attribute type 21 has an invalid length. [ 345.015879][T10092] : port 1(ip6gretap0) entered blocking state [ 345.027001][T10092] : port 1(ip6gretap0) entered disabled state [ 345.036533][T10092] ip6gretap0: entered allmulticast mode [ 345.072029][T10092] ip6gretap0: entered promiscuous mode [ 345.118091][T10092] ip6gretap0: left allmulticast mode [ 345.127142][T10092] ip6gretap0: left promiscuous mode [ 345.135615][T10092] : port 1(ip6gretap0) entered disabled state [ 345.402355][T10097] FAULT_INJECTION: forcing a failure. [ 345.402355][T10097] name failslab, interval 1, probability 0, space 0, times 0 [ 345.441618][T10097] CPU: 0 PID: 10097 Comm: syz.2.1527 Not tainted syzkaller #0 [ 345.449187][T10097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 345.459320][T10097] Call Trace: [ 345.462685][T10097] [ 345.465662][T10097] dump_stack_lvl+0x18c/0x250 [ 345.470584][T10097] ? show_regs_print_info+0x20/0x20 [ 345.475888][T10097] ? load_image+0x420/0x420 [ 345.480461][T10097] ? verify_lock_unused+0x140/0x140 [ 345.485772][T10097] should_fail_ex+0x39d/0x4d0 [ 345.490636][T10097] should_failslab+0x9/0x20 [ 345.495209][T10097] slab_pre_alloc_hook+0x59/0x310 [ 345.500346][T10097] kmem_cache_alloc+0x5a/0x2d0 [ 345.505176][T10097] ? skb_clone+0x1eb/0x370 [ 345.509651][T10097] skb_clone+0x1eb/0x370 [ 345.513964][T10097] __netlink_deliver_tap+0x41c/0x830 [ 345.519317][T10097] ? netlink_deliver_tap+0x2e/0x1b0 [ 345.524560][T10097] netlink_deliver_tap+0x19c/0x1b0 [ 345.529725][T10097] netlink_unicast+0x72c/0x8d0 [ 345.534539][T10097] netlink_sendmsg+0x8d0/0xbf0 [ 345.539360][T10097] ? netlink_getsockopt+0x590/0x590 [ 345.544687][T10097] ? aa_sock_msg_perm+0x94/0x150 [ 345.549668][T10097] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 345.555087][T10097] ? security_socket_sendmsg+0x80/0xa0 [ 345.560843][T10097] ? netlink_getsockopt+0x590/0x590 [ 345.566194][T10097] ____sys_sendmsg+0x5ba/0x960 [ 345.571168][T10097] ? __asan_memset+0x22/0x40 [ 345.575881][T10097] ? __sys_sendmsg_sock+0x30/0x30 [ 345.580947][T10097] ? __import_iovec+0x5f2/0x850 [ 345.585842][T10097] ? import_iovec+0x73/0xa0 [ 345.590407][T10097] ___sys_sendmsg+0x2a6/0x360 [ 345.595135][T10097] ? __sys_sendmsg+0x2a0/0x2a0 [ 345.600218][T10097] ? trace_call_bpf+0xc3/0x6c0 [ 345.605053][T10097] __se_sys_sendmsg+0x1c2/0x2b0 [ 345.610041][T10097] ? __x64_sys_sendmsg+0x80/0x80 [ 345.615217][T10097] ? lockdep_hardirqs_on+0x98/0x150 [ 345.620476][T10097] do_syscall_64+0x55/0xa0 [ 345.624926][T10097] ? clear_bhb_loop+0x40/0x90 [ 345.629674][T10097] ? clear_bhb_loop+0x40/0x90 [ 345.634485][T10097] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 345.640671][T10097] RIP: 0033:0x7f4bb139c819 [ 345.645131][T10097] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 345.664964][T10097] RSP: 002b:00007f4bb218d028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 345.673792][T10097] RAX: ffffffffffffffda RBX: 00007f4bb1615fa0 RCX: 00007f4bb139c819 [ 345.681796][T10097] RDX: 0000000020008040 RSI: 0000200000000040 RDI: 0000000000000003 [ 345.689808][T10097] RBP: 00007f4bb218d090 R08: 0000000000000000 R09: 0000000000000000 [ 345.697833][T10097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 345.705867][T10097] R13: 00007f4bb1616038 R14: 00007f4bb1615fa0 R15: 00007ffe78565fc8 [ 345.713892][T10097] [ 345.907746][T10097] netlink: 'syz.2.1527': attribute type 4 has an invalid length. [ 346.305404][T10127] sctp: [Deprecated]: syz.2.1535 (pid 10127) Use of int in max_burst socket option deprecated. [ 346.305404][T10127] Use struct sctp_assoc_value instead [ 346.408601][T10096] netlink: 'syz.3.1528': attribute type 10 has an invalid length. [ 346.528129][T10096] team0 (unregistering): Port device C removed [ 346.562125][T10096] team0 (unregistering): Port device team_slave_1 removed [ 346.616691][T10096] team0 (unregistering): Port device macvlan0 removed [ 346.662095][T10127] netlink: 'syz.2.1535': attribute type 21 has an invalid length. [ 346.678511][T10120] : port 1(ip6gretap0) entered blocking state [ 346.691627][T10120] : port 1(ip6gretap0) entered disabled state [ 346.702843][T10120] ip6gretap0: entered allmulticast mode [ 346.711896][T10138] netlink: 52711 bytes leftover after parsing attributes in process `syz.1.1537'. [ 346.724673][T10120] ip6gretap0: entered promiscuous mode [ 346.735030][T10122] ip6gretap0: left allmulticast mode [ 346.801844][T10122] ip6gretap0: left promiscuous mode [ 346.816761][T10122] : port 1(ip6gretap0) entered disabled state [ 347.271894][T10141] : port 1(ip6gretap0) entered blocking state [ 347.297058][T10141] : port 1(ip6gretap0) entered disabled state [ 347.338574][T10141] ip6gretap0: entered allmulticast mode [ 347.402620][T10141] ip6gretap0: entered promiscuous mode [ 347.473531][T10143] ip6gretap0: left allmulticast mode [ 347.493796][T10143] ip6gretap0: left promiscuous mode [ 347.505358][T10143] : port 1(ip6gretap0) entered disabled state [ 350.306541][T10145] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1539'. [ 350.316515][T10149] netlink: 'syz.1.1539': attribute type 10 has an invalid length. [ 350.324647][T10149] netlink: 2 bytes leftover after parsing attributes in process `syz.1.1539'. [ 350.351526][T10158] netlink: 'syz.0.1541': attribute type 10 has an invalid length. [ 350.362970][T10158] bridge0: port 4(bond0) entered disabled state [ 350.369793][T10158] bridge0: port 3(hsr0) entered disabled state [ 350.376323][T10158] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.384149][T10158] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.416859][T10158] bond0: (slave bridge0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 350.475878][T10158] bridge0: port 4(bond0) entered blocking state [ 350.482424][T10158] bridge0: port 4(bond0) entered forwarding state [ 350.489245][T10158] bridge0: port 3(hsr0) entered blocking state [ 350.495666][T10158] bridge0: port 3(hsr0) entered forwarding state [ 350.502400][T10158] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.509664][T10158] bridge0: port 2(bridge_slave_1) entered forwarding state [ 350.517365][T10158] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.524688][T10158] bridge0: port 1(bridge_slave_0) entered forwarding state [ 350.547193][T10158] bridge0: port 4(bond0) entered disabled state [ 350.553883][T10158] bridge0: port 3(hsr0) entered disabled state [ 350.560387][T10158] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.567738][T10158] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.757514][T10173] netlink: 209852 bytes leftover after parsing attributes in process `syz.3.1546'. [ 350.855068][T10179] sctp: [Deprecated]: syz.1.1548 (pid 10179) Use of int in max_burst socket option deprecated. [ 350.855068][T10179] Use struct sctp_assoc_value instead [ 351.553551][T10198] : port 1(ip6gretap0) entered blocking state [ 351.578271][T10198] : port 1(ip6gretap0) entered disabled state [ 351.607071][T10198] ip6gretap0: entered allmulticast mode [ 351.655090][T10198] ip6gretap0: entered promiscuous mode [ 351.708291][T10199] ip6gretap0: left allmulticast mode [ 351.739456][T10199] ip6gretap0: left promiscuous mode [ 351.775601][T10199] : port 1(ip6gretap0) entered disabled state [ 354.210324][T10208] FAULT_INJECTION: forcing a failure. [ 354.210324][T10208] name failslab, interval 1, probability 0, space 0, times 0 [ 354.241688][T10208] CPU: 0 PID: 10208 Comm: syz.2.1557 Not tainted syzkaller #0 [ 354.249255][T10208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 354.259373][T10208] Call Trace: [ 354.262711][T10208] [ 354.265780][T10208] dump_stack_lvl+0x18c/0x250 [ 354.270531][T10208] ? show_regs_print_info+0x20/0x20 [ 354.275798][T10208] ? load_image+0x420/0x420 [ 354.280373][T10208] ? __might_sleep+0xe0/0xe0 [ 354.285093][T10208] ? __lock_acquire+0x7d40/0x7d40 [ 354.290185][T10208] should_fail_ex+0x39d/0x4d0 [ 354.294936][T10208] should_failslab+0x9/0x20 [ 354.299508][T10208] slab_pre_alloc_hook+0x59/0x310 [ 354.304607][T10208] ? kernfs_fop_write_iter+0x159/0x520 [ 354.310184][T10208] ? kernfs_fop_write_iter+0x159/0x520 [ 354.315728][T10208] __kmem_cache_alloc_node+0x53/0x250 [ 354.321232][T10208] ? kernfs_fop_write_iter+0x159/0x520 [ 354.326862][T10208] __kmalloc+0xa4/0x230 [ 354.331084][T10208] kernfs_fop_write_iter+0x159/0x520 [ 354.336405][T10208] vfs_write+0x46c/0x990 [ 354.340692][T10208] ? file_end_write+0x250/0x250 [ 354.345709][T10208] ? __fget_files+0x43d/0x4b0 [ 354.350435][T10208] ? __fdget_pos+0x2a3/0x330 [ 354.355070][T10208] ? ksys_write+0x75/0x260 [ 354.359723][T10208] ksys_write+0x150/0x260 [ 354.364095][T10208] ? __ia32_sys_read+0x90/0x90 [ 354.368902][T10208] ? lockdep_hardirqs_on+0x98/0x150 [ 354.374134][T10208] do_syscall_64+0x55/0xa0 [ 354.378576][T10208] ? clear_bhb_loop+0x40/0x90 [ 354.383288][T10208] ? clear_bhb_loop+0x40/0x90 [ 354.388040][T10208] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 354.393990][T10208] RIP: 0033:0x7f4bb139c819 [ 354.398444][T10208] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 354.418094][T10208] RSP: 002b:00007f4bb218d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 354.426574][T10208] RAX: ffffffffffffffda RBX: 00007f4bb1615fa0 RCX: 00007f4bb139c819 [ 354.434677][T10208] RDX: 000000000000000a RSI: 0000200000000000 RDI: 0000000000000004 [ 354.442677][T10208] RBP: 00007f4bb218d090 R08: 0000000000000000 R09: 0000000000000000 [ 354.450755][T10208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 354.458806][T10208] R13: 00007f4bb1616038 R14: 00007f4bb1615fa0 R15: 00007ffe78565fc8 [ 354.466831][T10208] [ 354.516394][T10213] sctp: [Deprecated]: syz.1.1559 (pid 10213) Use of int in max_burst socket option deprecated. [ 354.516394][T10213] Use struct sctp_assoc_value instead [ 354.769019][T10224] delete_channel: no stack [ 354.774008][T10224] delete_channel: no stack [ 354.800944][T10225] : port 1(ip6gretap0) entered blocking state [ 354.818129][T10225] : port 1(ip6gretap0) entered disabled state [ 354.825025][T10224] delete_channel: no stack [ 354.855632][T10225] ip6gretap0: entered allmulticast mode [ 354.899766][T10225] ip6gretap0: entered promiscuous mode [ 354.909389][T10224] netlink: 'syz.1.1565': attribute type 10 has an invalid length. [ 355.504381][T10219] ip6gretap0: left allmulticast mode [ 355.510047][T10219] ip6gretap0: left promiscuous mode [ 355.524843][T10219] : port 1(ip6gretap0) entered disabled state [ 355.558088][T10230] : port 1(ip6gretap0) entered blocking state [ 355.567718][T10230] : port 1(ip6gretap0) entered disabled state [ 355.585885][T10230] ip6gretap0: entered allmulticast mode [ 355.601952][T10230] ip6gretap0: entered promiscuous mode [ 355.628865][T10231] ip6gretap0: left allmulticast mode [ 355.644887][T10223] delete_channel: no stack [ 355.655806][T10231] ip6gretap0: left promiscuous mode [ 355.682729][T10231] : port 1(ip6gretap0) entered disabled state [ 356.093174][T10247] sctp: [Deprecated]: syz.0.1573 (pid 10247) Use of int in max_burst socket option deprecated. [ 356.093174][T10247] Use struct sctp_assoc_value instead [ 357.440264][T10265] FAULT_INJECTION: forcing a failure. [ 357.440264][T10265] name failslab, interval 1, probability 0, space 0, times 0 [ 357.453329][T10265] CPU: 1 PID: 10265 Comm: syz.2.1581 Not tainted syzkaller #0 [ 357.460870][T10265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 357.470990][T10265] Call Trace: [ 357.474334][T10265] [ 357.477316][T10265] dump_stack_lvl+0x18c/0x250 [ 357.482059][T10265] ? show_regs_print_info+0x20/0x20 [ 357.487320][T10265] ? load_image+0x420/0x420 [ 357.491909][T10265] ? verify_lock_unused+0x140/0x140 [ 357.497187][T10265] should_fail_ex+0x39d/0x4d0 [ 357.501934][T10265] should_failslab+0x9/0x20 [ 357.506618][T10265] slab_pre_alloc_hook+0x59/0x310 [ 357.511723][T10265] kmem_cache_alloc+0x5a/0x2d0 [ 357.516573][T10265] ? skb_clone+0x1eb/0x370 [ 357.521047][T10265] skb_clone+0x1eb/0x370 [ 357.525354][T10265] __netlink_deliver_tap+0x41c/0x830 [ 357.530726][T10265] ? netlink_deliver_tap+0x2e/0x1b0 [ 357.535986][T10265] netlink_deliver_tap+0x19c/0x1b0 [ 357.541165][T10265] netlink_unicast+0x72c/0x8d0 [ 357.546017][T10265] netlink_sendmsg+0x8d0/0xbf0 [ 357.550867][T10265] ? netlink_getsockopt+0x590/0x590 [ 357.556145][T10265] ? aa_sock_msg_perm+0x94/0x150 [ 357.561190][T10265] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 357.566551][T10265] ? security_socket_sendmsg+0x80/0xa0 [ 357.572081][T10265] ? netlink_getsockopt+0x590/0x590 [ 357.577345][T10265] ____sys_sendmsg+0x5ba/0x960 [ 357.582174][T10265] ? __asan_memset+0x22/0x40 [ 357.586832][T10265] ? __sys_sendmsg_sock+0x30/0x30 [ 357.591921][T10265] ? __import_iovec+0x5f2/0x850 [ 357.596892][T10265] ? import_iovec+0x73/0xa0 [ 357.601453][T10265] ___sys_sendmsg+0x2a6/0x360 [ 357.606365][T10265] ? get_pid_task+0x20/0x1e0 [ 357.611020][T10265] ? __sys_sendmsg+0x2a0/0x2a0 [ 357.615943][T10265] ? __lock_acquire+0x7d40/0x7d40 [ 357.621085][T10265] __se_sys_sendmsg+0x1c2/0x2b0 [ 357.625998][T10265] ? __x64_sys_sendmsg+0x80/0x80 [ 357.631011][T10265] ? lockdep_hardirqs_on+0x98/0x150 [ 357.636277][T10265] do_syscall_64+0x55/0xa0 [ 357.640743][T10265] ? clear_bhb_loop+0x40/0x90 [ 357.645483][T10265] ? clear_bhb_loop+0x40/0x90 [ 357.650228][T10265] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 357.656179][T10265] RIP: 0033:0x7f4bb139c819 [ 357.660640][T10265] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 357.680410][T10265] RSP: 002b:00007f4bb218d028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 357.688897][T10265] RAX: ffffffffffffffda RBX: 00007f4bb1615fa0 RCX: 00007f4bb139c819 [ 357.697008][T10265] RDX: 0000000020008040 RSI: 0000200000000040 RDI: 0000000000000003 [ 357.705037][T10265] RBP: 00007f4bb218d090 R08: 0000000000000000 R09: 0000000000000000 [ 357.713053][T10265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 357.721068][T10265] R13: 00007f4bb1616038 R14: 00007f4bb1615fa0 R15: 00007ffe78565fc8 [ 357.729108][T10265] [ 357.746188][T10267] : port 1(ip6gretap0) entered blocking state [ 357.773853][T10267] : port 1(ip6gretap0) entered disabled state [ 357.780470][T10267] ip6gretap0: entered allmulticast mode [ 357.788223][T10267] ip6gretap0: entered promiscuous mode [ 357.817712][T10265] netlink: 'syz.2.1581': attribute type 4 has an invalid length. [ 357.887165][T10263] ip6gretap0: left allmulticast mode [ 357.899272][T10263] ip6gretap0: left promiscuous mode [ 357.915796][T10263] : port 1(ip6gretap0) entered disabled state [ 358.650770][T10280] netlink: 'syz.3.1587': attribute type 29 has an invalid length. [ 358.660736][T10280] netlink: 'syz.3.1587': attribute type 29 has an invalid length. [ 358.673812][T10280] FAULT_INJECTION: forcing a failure. [ 358.673812][T10280] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 358.751775][T10280] CPU: 0 PID: 10280 Comm: syz.3.1587 Not tainted syzkaller #0 [ 358.759324][T10280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 358.769531][T10280] Call Trace: [ 358.772847][T10280] [ 358.775808][T10280] dump_stack_lvl+0x18c/0x250 [ 358.780524][T10280] ? show_regs_print_info+0x20/0x20 [ 358.786025][T10280] ? load_image+0x420/0x420 [ 358.790567][T10280] ? __might_fault+0xaa/0x120 [ 358.795274][T10280] should_fail_ex+0x39d/0x4d0 [ 358.800011][T10280] copyout+0x1a/0x90 [ 358.804037][T10280] _copy_to_iter+0x432/0x1120 [ 358.808768][T10280] ? iov_iter_init+0x1e0/0x1e0 [ 358.813755][T10280] ? __virt_addr_valid+0x18c/0x540 [ 358.819080][T10280] ? __virt_addr_valid+0x469/0x540 [ 358.824503][T10280] ? __phys_addr_symbol+0x2f/0x70 [ 358.829588][T10280] __skb_datagram_iter+0xdb/0x780 [ 358.834895][T10280] ? skb_copy_datagram_iter+0x200/0x200 [ 358.840490][T10280] skb_copy_datagram_iter+0xb1/0x200 [ 358.845823][T10280] netlink_recvmsg+0x2d4/0xe60 [ 358.850632][T10280] ? netlink_sendmsg+0xbf0/0xbf0 [ 358.855616][T10280] ? aa_af_perm+0x330/0x330 [ 358.860244][T10280] ? __lock_acquire+0x1273/0x7d40 [ 358.865320][T10280] ? bpf_lsm_socket_recvmsg+0x9/0x10 [ 358.870657][T10280] ? security_socket_recvmsg+0x89/0xb0 [ 358.876146][T10280] ? netlink_sendmsg+0xbf0/0xbf0 [ 358.881304][T10280] ____sys_recvmsg+0x2ce/0x5e0 [ 358.886121][T10280] ? __sys_recvmsg_sock+0x50/0x50 [ 358.891187][T10280] ? import_iovec+0x73/0xa0 [ 358.895745][T10280] ___sys_recvmsg+0x216/0x590 [ 358.900457][T10280] ? __sys_recvmsg+0x2a0/0x2a0 [ 358.905349][T10280] ? trace_call_bpf+0xc3/0x6c0 [ 358.910150][T10280] ? trace_call_bpf+0x5e9/0x6c0 [ 358.915051][T10280] ? __fget_files+0x43d/0x4b0 [ 358.919887][T10280] __x64_sys_recvmsg+0x20c/0x2e0 [ 358.925211][T10280] ? perf_trace_preemptirq_template+0x269/0x330 [ 358.931506][T10280] ? ___sys_recvmsg+0x590/0x590 [ 358.936429][T10280] ? lockdep_hardirqs_on+0x98/0x150 [ 358.941676][T10280] do_syscall_64+0x55/0xa0 [ 358.946152][T10280] ? clear_bhb_loop+0x40/0x90 [ 358.950903][T10280] ? clear_bhb_loop+0x40/0x90 [ 358.955662][T10280] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 358.961598][T10280] RIP: 0033:0x7f8e3099c819 [ 358.966044][T10280] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 358.985683][T10280] RSP: 002b:00007f8e317b1028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 358.994136][T10280] RAX: ffffffffffffffda RBX: 00007f8e30c15fa0 RCX: 00007f8e3099c819 [ 359.002140][T10280] RDX: 0000000040012100 RSI: 0000200000000000 RDI: 0000000000000003 [ 359.010138][T10280] RBP: 00007f8e317b1090 R08: 0000000000000000 R09: 0000000000000000 [ 359.018226][T10280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 359.026312][T10280] R13: 00007f8e30c16038 R14: 00007f8e30c15fa0 R15: 00007ffc2effc0a8 [ 359.034330][T10280] [ 359.072007][T10280] netlink: 'syz.3.1587': attribute type 29 has an invalid length. [ 359.104904][T10283] sctp: [Deprecated]: syz.0.1585 (pid 10283) Use of int in max_burst socket option deprecated. [ 359.104904][T10283] Use struct sctp_assoc_value instead [ 360.014167][T10303] FAULT_INJECTION: forcing a failure. [ 360.014167][T10303] name failslab, interval 1, probability 0, space 0, times 0 [ 360.030806][T10303] CPU: 0 PID: 10303 Comm: syz.0.1593 Not tainted syzkaller #0 [ 360.038377][T10303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 360.048562][T10303] Call Trace: [ 360.051915][T10303] [ 360.055001][T10303] dump_stack_lvl+0x18c/0x250 [ 360.059856][T10303] ? sctp_sendmsg+0x1575/0x28c0 [ 360.064788][T10303] ? ___sys_sendmsg+0x2a6/0x360 [ 360.069722][T10303] ? show_regs_print_info+0x20/0x20 [ 360.075105][T10303] ? load_image+0x420/0x420 [ 360.079763][T10303] should_fail_ex+0x39d/0x4d0 [ 360.084544][T10303] should_failslab+0x9/0x20 [ 360.089139][T10303] slab_pre_alloc_hook+0x59/0x310 [ 360.094254][T10303] ? sctp_add_bind_addr+0x8c/0x360 [ 360.099474][T10303] __kmem_cache_alloc_node+0x53/0x250 [ 360.104936][T10303] ? sctp_add_bind_addr+0x8c/0x360 [ 360.110209][T10303] kmalloc_trace+0x2a/0xe0 [ 360.114745][T10303] sctp_add_bind_addr+0x8c/0x360 [ 360.119766][T10303] sctp_copy_local_addr_list+0x315/0x4f0 [ 360.125566][T10303] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 360.131366][T10303] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 360.137518][T10303] ? sctp_v6_is_any+0x64/0x70 [ 360.142284][T10303] ? sctp_copy_one_addr+0x8c/0x350 [ 360.147479][T10303] sctp_bind_addr_copy+0xb3/0x3c0 [ 360.152580][T10303] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 360.159016][T10303] sctp_connect_new_asoc+0x2f9/0x6a0 [ 360.164481][T10303] ? __sctp_connect+0xd80/0xd80 [ 360.169411][T10303] ? __local_bh_enable_ip+0x13a/0x1c0 [ 360.174850][T10303] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 360.180651][T10303] ? security_sctp_bind_connect+0x89/0xb0 [ 360.186419][T10303] sctp_sendmsg+0x1575/0x28c0 [ 360.191226][T10303] ? sctp_getsockopt+0xb60/0xb60 [ 360.196251][T10303] ? aa_sk_perm+0x83c/0x970 [ 360.200862][T10303] ? aa_af_perm+0x330/0x330 [ 360.205434][T10303] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 360.211934][T10303] ? sock_rps_record_flow+0x19/0x3f0 [ 360.217325][T10303] ? inet_sendmsg+0xe9/0x2f0 [ 360.221987][T10303] ? inet_send_prepare+0x260/0x260 [ 360.227355][T10303] ____sys_sendmsg+0x5ba/0x960 [ 360.232187][T10303] ? __lock_acquire+0x7d40/0x7d40 [ 360.237289][T10303] ? __asan_memset+0x22/0x40 [ 360.241951][T10303] ? __sys_sendmsg_sock+0x30/0x30 [ 360.247043][T10303] ? __import_iovec+0x5f2/0x850 [ 360.252017][T10303] ? import_iovec+0x73/0xa0 [ 360.256616][T10303] ___sys_sendmsg+0x2a6/0x360 [ 360.261391][T10303] ? __sys_sendmsg+0x2a0/0x2a0 [ 360.266277][T10303] ? __lock_acquire+0x7d40/0x7d40 [ 360.271438][T10303] __se_sys_sendmsg+0x1c2/0x2b0 [ 360.276377][T10303] ? __x64_sys_sendmsg+0x80/0x80 [ 360.281420][T10303] ? lockdep_hardirqs_on+0x98/0x150 [ 360.286710][T10303] do_syscall_64+0x55/0xa0 [ 360.291191][T10303] ? clear_bhb_loop+0x40/0x90 [ 360.296123][T10303] ? clear_bhb_loop+0x40/0x90 [ 360.300876][T10303] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 360.306837][T10303] RIP: 0033:0x7f8b3db9c819 [ 360.311312][T10303] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 360.331078][T10303] RSP: 002b:00007f8b3eabd028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 360.339582][T10303] RAX: ffffffffffffffda RBX: 00007f8b3de15fa0 RCX: 00007f8b3db9c819 [ 360.347644][T10303] RDX: 0000000000000041 RSI: 0000200000002dc0 RDI: 0000000000000004 [ 360.355773][T10303] RBP: 00007f8b3eabd090 R08: 0000000000000000 R09: 0000000000000000 [ 360.363830][T10303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 360.371877][T10303] R13: 00007f8b3de16038 R14: 00007f8b3de15fa0 R15: 00007fff91e60068 [ 360.379948][T10303] [ 360.472872][T10307] : port 1(ip6gretap0) entered blocking state [ 360.479885][T10307] : port 1(ip6gretap0) entered disabled state [ 360.502702][T10307] ip6gretap0: entered allmulticast mode [ 360.528792][T10307] ip6gretap0: entered promiscuous mode [ 360.566610][T10307] ip6gretap0: left allmulticast mode [ 360.573233][T10307] ip6gretap0: left promiscuous mode [ 360.579452][T10307] : port 1(ip6gretap0) entered disabled state [ 360.601483][T10309] netlink: 'syz.0.1598': attribute type 10 has an invalid length. [ 360.713565][T10315] sctp: [Deprecated]: syz.3.1599 (pid 10315) Use of int in max_burst socket option deprecated. [ 360.713565][T10315] Use struct sctp_assoc_value instead [ 361.515375][T10339] : port 1(ip6gretap0) entered blocking state [ 361.527168][T10339] : port 1(ip6gretap0) entered disabled state [ 361.536786][T10339] ip6gretap0: entered allmulticast mode [ 361.556357][T10339] ip6gretap0: entered promiscuous mode [ 361.613708][T10339] ip6gretap0: left allmulticast mode [ 361.628423][T10339] ip6gretap0: left promiscuous mode [ 361.648976][T10339] : port 1(ip6gretap0) entered disabled state [ 361.796574][T10349] : port 1(ip6gretap0) entered blocking state [ 361.810119][T10349] : port 1(ip6gretap0) entered disabled state [ 361.818901][T10349] ip6gretap0: entered allmulticast mode [ 361.826981][T10349] ip6gretap0: entered promiscuous mode [ 361.835565][T10345] ip6gretap0: left allmulticast mode [ 361.841154][T10345] ip6gretap0: left promiscuous mode [ 361.878671][T10351] sctp: [Deprecated]: syz.2.1613 (pid 10351) Use of int in max_burst socket option deprecated. [ 361.878671][T10351] Use struct sctp_assoc_value instead [ 361.895404][T10345] : port 1(ip6gretap0) entered disabled state [ 362.728972][T10373] netlink: 'syz.3.1620': attribute type 21 has an invalid length. [ 362.738880][T10373] netlink: 128 bytes leftover after parsing attributes in process `syz.3.1620'. [ 362.751908][T10373] netlink: 'syz.3.1620': attribute type 5 has an invalid length. [ 362.760286][T10373] netlink: 'syz.3.1620': attribute type 6 has an invalid length. [ 362.774043][T10373] netlink: 3 bytes leftover after parsing attributes in process `syz.3.1620'. [ 362.811609][T10372] : port 1(ip6gretap0) entered blocking state [ 362.824283][T10372] : port 1(ip6gretap0) entered disabled state [ 362.839944][T10372] ip6gretap0: entered allmulticast mode [ 362.868240][T10372] ip6gretap0: entered promiscuous mode [ 362.935965][T10372] ip6gretap0: left allmulticast mode [ 362.942578][T10372] ip6gretap0: left promiscuous mode [ 362.953089][T10372] : port 1(ip6gretap0) entered disabled state [ 363.239187][T10382] netlink: 'syz.0.1624': attribute type 21 has an invalid length. [ 364.502291][T10401] netlink: 64859 bytes leftover after parsing attributes in process `syz.1.1631'. [ 364.536771][T10401] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1631'. [ 364.965731][T10401] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1631'. [ 365.022349][T10408] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1631'. [ 365.032498][T10411] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1631'. [ 365.056227][T10409] : port 1(ip6gretap0) entered blocking state [ 365.064403][T10409] : port 1(ip6gretap0) entered disabled state [ 365.075992][T10409] ip6gretap0: entered allmulticast mode [ 365.084551][T10409] ip6gretap0: entered promiscuous mode [ 365.110354][T10410] ip6gretap0: left allmulticast mode [ 365.137423][T10410] ip6gretap0: left promiscuous mode [ 365.182040][T10410] : port 1(ip6gretap0) entered disabled state [ 365.211784][T10417] FAULT_INJECTION: forcing a failure. [ 365.211784][T10417] name failslab, interval 1, probability 0, space 0, times 0 [ 365.230134][T10417] CPU: 1 PID: 10417 Comm: syz.3.1633 Not tainted syzkaller #0 [ 365.237696][T10417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 365.247809][T10417] Call Trace: [ 365.251128][T10417] [ 365.254100][T10417] dump_stack_lvl+0x18c/0x250 [ 365.258834][T10417] ? sctp_sendmsg+0x1575/0x28c0 [ 365.263838][T10417] ? ___sys_sendmsg+0x2a6/0x360 [ 365.268771][T10417] ? show_regs_print_info+0x20/0x20 [ 365.274060][T10417] ? load_image+0x420/0x420 [ 365.278946][T10417] should_fail_ex+0x39d/0x4d0 [ 365.283880][T10417] should_failslab+0x9/0x20 [ 365.288433][T10417] slab_pre_alloc_hook+0x59/0x310 [ 365.293508][T10417] ? sctp_add_bind_addr+0x8c/0x360 [ 365.298747][T10417] __kmem_cache_alloc_node+0x53/0x250 [ 365.304259][T10417] ? sctp_add_bind_addr+0x8c/0x360 [ 365.309407][T10417] kmalloc_trace+0x2a/0xe0 [ 365.313995][T10417] sctp_add_bind_addr+0x8c/0x360 [ 365.319011][T10417] sctp_copy_local_addr_list+0x315/0x4f0 [ 365.325149][T10417] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 365.330987][T10417] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 365.337205][T10417] ? sctp_v4_is_any+0x35/0x60 [ 365.342010][T10417] ? sctp_copy_one_addr+0x8c/0x350 [ 365.347169][T10417] sctp_bind_addr_copy+0xb3/0x3c0 [ 365.352245][T10417] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 365.358724][T10417] sctp_connect_new_asoc+0x2f9/0x6a0 [ 365.364083][T10417] ? __sctp_connect+0xd80/0xd80 [ 365.369001][T10417] ? __local_bh_enable_ip+0x13a/0x1c0 [ 365.374419][T10417] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 365.380076][T10417] ? security_sctp_bind_connect+0x89/0xb0 [ 365.385856][T10417] sctp_sendmsg+0x1575/0x28c0 [ 365.390631][T10417] ? sctp_getsockopt+0xb60/0xb60 [ 365.395641][T10417] ? aa_sk_perm+0x83c/0x970 [ 365.400322][T10417] ? aa_af_perm+0x330/0x330 [ 365.404878][T10417] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 365.411346][T10417] ? sock_rps_record_flow+0x19/0x3f0 [ 365.416677][T10417] ? inet_sendmsg+0xe9/0x2f0 [ 365.421401][T10417] ? inet_send_prepare+0x260/0x260 [ 365.426570][T10417] ____sys_sendmsg+0x5ba/0x960 [ 365.431460][T10417] ? __lock_acquire+0x7d40/0x7d40 [ 365.436533][T10417] ? __asan_memset+0x22/0x40 [ 365.441169][T10417] ? __sys_sendmsg_sock+0x30/0x30 [ 365.446252][T10417] ? __import_iovec+0x5f2/0x850 [ 365.451241][T10417] ? import_iovec+0x73/0xa0 [ 365.455784][T10417] ___sys_sendmsg+0x2a6/0x360 [ 365.460512][T10417] ? __sys_sendmsg+0x2a0/0x2a0 [ 365.465345][T10417] ? __lock_acquire+0x7d40/0x7d40 [ 365.470435][T10417] __se_sys_sendmsg+0x1c2/0x2b0 [ 365.475323][T10417] ? __x64_sys_sendmsg+0x80/0x80 [ 365.480427][T10417] ? lockdep_hardirqs_on+0x98/0x150 [ 365.485720][T10417] do_syscall_64+0x55/0xa0 [ 365.490263][T10417] ? clear_bhb_loop+0x40/0x90 [ 365.494993][T10417] ? clear_bhb_loop+0x40/0x90 [ 365.499712][T10417] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 365.505650][T10417] RIP: 0033:0x7f8e3099c819 [ 365.510195][T10417] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 365.530044][T10417] RSP: 002b:00007f8e31790028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 365.538588][T10417] RAX: ffffffffffffffda RBX: 00007f8e30c16090 RCX: 00007f8e3099c819 [ 365.546607][T10417] RDX: 00000000000080d1 RSI: 0000200000000140 RDI: 0000000000000004 [ 365.554785][T10417] RBP: 00007f8e31790090 R08: 0000000000000000 R09: 0000000000000000 [ 365.562792][T10417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 365.570806][T10417] R13: 00007f8e30c16128 R14: 00007f8e30c16090 R15: 00007ffc2effc0a8 [ 365.578838][T10417] [ 365.604371][T10416] netlink: 'syz.2.1634': attribute type 21 has an invalid length. [ 366.033396][T10436] netlink: 'syz.3.1640': attribute type 10 has an invalid length. [ 366.244716][T10436] bond0: (slave hsr0): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 366.292485][T10436] bond0: (slave hsr0): The slave device specified does not support setting the MAC address [ 366.314167][T10436] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 366.327062][T10436] bond0: (slave hsr0): Error -22 calling dev_set_mtu [ 366.758425][T10451] netlink: 'syz.3.1645': attribute type 21 has an invalid length. [ 366.806525][T10446] : port 1(ip6gretap0) entered blocking state [ 366.828999][T10446] : port 1(ip6gretap0) entered disabled state [ 366.839074][T10446] ip6gretap0: entered allmulticast mode [ 366.855310][T10446] ip6gretap0: entered promiscuous mode [ 366.888043][T10449] ip6gretap0: left allmulticast mode [ 366.907919][T10449] ip6gretap0: left promiscuous mode [ 366.933705][T10449] : port 1(ip6gretap0) entered disabled state [ 367.823755][T10465] mac80211_hwsim hwsim4 wlan0: entered promiscuous mode [ 367.831139][T10465] mac80211_hwsim hwsim4 wlan0: entered allmulticast mode [ 368.404167][T10484] netlink: 'syz.2.1655': attribute type 21 has an invalid length. [ 368.520184][T10490] : port 1(ip6gretap0) entered blocking state [ 368.529966][T10490] : port 1(ip6gretap0) entered disabled state [ 368.538745][T10490] ip6gretap0: entered allmulticast mode [ 368.577627][T10490] ip6gretap0: entered promiscuous mode [ 368.649117][T10490] ip6gretap0: left allmulticast mode [ 368.658279][T10490] ip6gretap0: left promiscuous mode [ 368.667185][T10490] : port 1(ip6gretap0) entered disabled state [ 369.057778][T10509] FAULT_INJECTION: forcing a failure. [ 369.057778][T10509] name failslab, interval 1, probability 0, space 0, times 0 [ 369.071652][T10509] CPU: 0 PID: 10509 Comm: syz.1.1664 Not tainted syzkaller #0 [ 369.079215][T10509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 369.089734][T10509] Call Trace: [ 369.093070][T10509] [ 369.096046][T10509] dump_stack_lvl+0x18c/0x250 [ 369.100791][T10509] ? sctp_sendmsg+0x1575/0x28c0 [ 369.105784][T10509] ? ___sys_sendmsg+0x2a6/0x360 [ 369.110870][T10509] ? show_regs_print_info+0x20/0x20 [ 369.116148][T10509] ? load_image+0x420/0x420 [ 369.120741][T10509] should_fail_ex+0x39d/0x4d0 [ 369.125501][T10509] should_failslab+0x9/0x20 [ 369.130117][T10509] slab_pre_alloc_hook+0x59/0x310 [ 369.135224][T10509] ? sctp_add_bind_addr+0x8c/0x360 [ 369.140489][T10509] __kmem_cache_alloc_node+0x53/0x250 [ 369.145950][T10509] ? sctp_add_bind_addr+0x8c/0x360 [ 369.151142][T10509] kmalloc_trace+0x2a/0xe0 [ 369.155652][T10509] sctp_add_bind_addr+0x8c/0x360 [ 369.160780][T10509] sctp_copy_local_addr_list+0x315/0x4f0 [ 369.166803][T10509] ? sctp_copy_local_addr_list+0xa5/0x4f0 [ 369.172695][T10509] ? sctp_do_8_2_transport_strike+0x8a0/0x8a0 [ 369.179058][T10509] ? sctp_v4_is_any+0x35/0x60 [ 369.183791][T10509] ? sctp_copy_one_addr+0x8c/0x350 [ 369.189008][T10509] sctp_bind_addr_copy+0xb3/0x3c0 [ 369.194108][T10509] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 369.200487][T10509] sctp_connect_new_asoc+0x2f9/0x6a0 [ 369.205831][T10509] ? __sctp_connect+0xd80/0xd80 [ 369.210913][T10509] ? __local_bh_enable_ip+0x13a/0x1c0 [ 369.216322][T10509] ? bpf_lsm_sctp_bind_connect+0x9/0x10 [ 369.221908][T10509] ? security_sctp_bind_connect+0x89/0xb0 [ 369.227762][T10509] sctp_sendmsg+0x1575/0x28c0 [ 369.232480][T10509] ? sctp_getsockopt+0xb60/0xb60 [ 369.237478][T10509] ? aa_sk_perm+0x83c/0x970 [ 369.242043][T10509] ? aa_af_perm+0x330/0x330 [ 369.246622][T10509] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 369.253099][T10509] ? sock_rps_record_flow+0x19/0x3f0 [ 369.258437][T10509] ? inet_sendmsg+0xe9/0x2f0 [ 369.263301][T10509] ? inet_send_prepare+0x260/0x260 [ 369.268485][T10509] ____sys_sendmsg+0x5ba/0x960 [ 369.273300][T10509] ? __lock_acquire+0x7d40/0x7d40 [ 369.278454][T10509] ? __asan_memset+0x22/0x40 [ 369.283146][T10509] ? __sys_sendmsg_sock+0x30/0x30 [ 369.288239][T10509] ? __import_iovec+0x5f2/0x850 [ 369.293160][T10509] ? import_iovec+0x73/0xa0 [ 369.298052][T10509] ___sys_sendmsg+0x2a6/0x360 [ 369.302857][T10509] ? get_pid_task+0x20/0x1e0 [ 369.307836][T10509] ? __sys_sendmsg+0x2a0/0x2a0 [ 369.312657][T10509] ? __lock_acquire+0x7d40/0x7d40 [ 369.317832][T10509] __se_sys_sendmsg+0x1c2/0x2b0 [ 369.322746][T10509] ? __x64_sys_sendmsg+0x80/0x80 [ 369.327749][T10509] ? lockdep_hardirqs_on+0x98/0x150 [ 369.332994][T10509] do_syscall_64+0x55/0xa0 [ 369.337462][T10509] ? clear_bhb_loop+0x40/0x90 [ 369.342709][T10509] ? clear_bhb_loop+0x40/0x90 [ 369.347610][T10509] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 369.353754][T10509] RIP: 0033:0x7fb5f459c819 [ 369.358230][T10509] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 369.378007][T10509] RSP: 002b:00007fb5f54e6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 369.386493][T10509] RAX: ffffffffffffffda RBX: 00007fb5f4815fa0 RCX: 00007fb5f459c819 [ 369.394823][T10509] RDX: 0000000000000000 RSI: 0000200000000340 RDI: 0000000000000003 [ 369.402863][T10509] RBP: 00007fb5f54e6090 R08: 0000000000000000 R09: 0000000000000000 [ 369.410990][T10509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 369.419005][T10509] R13: 00007fb5f4816038 R14: 00007fb5f4815fa0 R15: 00007ffc7bbc8d98 [ 369.427121][T10509] [ 369.536568][T10515] netlink: 'syz.1.1667': attribute type 21 has an invalid length. [ 369.693975][T10510] netlink: 209844 bytes leftover after parsing attributes in process `syz.3.1661'. [ 370.441978][T10546] netlink: 'syz.1.1676': attribute type 21 has an invalid length. [ 371.101948][T10553] : port 1(ip6gretap0) entered blocking state [ 371.109885][T10553] : port 1(ip6gretap0) entered disabled state [ 371.121207][T10553] ip6gretap0: entered allmulticast mode [ 371.136804][T10553] ip6gretap0: entered promiscuous mode [ 371.194817][T10555] ip6gretap0: left allmulticast mode [ 371.213029][T10555] ip6gretap0: left promiscuous mode [ 371.254635][T10555] : port 1(ip6gretap0) entered disabled state [ 371.820053][T10571] netlink: 209844 bytes leftover after parsing attributes in process `syz.2.1682'. [ 372.246102][ T11] wlan1: Trigger new scan to find an IBSS to join [ 373.231310][T10594] mac80211_hwsim hwsim2 wlan0: entered promiscuous mode [ 373.270600][T10594] mac80211_hwsim hwsim2 wlan0: entered allmulticast mode [ 373.609883][T10597] netlink: 'syz.1.1692': attribute type 10 has an invalid length. [ 374.029531][T10597] team0: Port device geneve1 added [ 374.038300][T10602] : port 1(ip6gretap0) entered blocking state [ 374.046668][T10602] : port 1(ip6gretap0) entered disabled state [ 374.052774][T10597] syz.1.1692 (10597) used greatest stack depth: 18536 bytes left [ 374.065908][T10602] ip6gretap0: entered allmulticast mode [ 374.073967][T10602] ip6gretap0: entered promiscuous mode [ 374.100908][T10606] netlink: 'syz.3.1694': attribute type 39 has an invalid length. [ 374.123642][T10603] ip6gretap0: left allmulticast mode [ 374.142374][T10603] ip6gretap0: left promiscuous mode [ 374.201616][T10603] : port 1(ip6gretap0) entered disabled state [ 374.657787][T10623] netlink: 209844 bytes leftover after parsing attributes in process `syz.1.1698'. [ 375.092234][T10635] netlink: 'syz.0.1704': attribute type 10 has an invalid length. [ 375.127586][T10635] team0: Port device geneve1 added [ 375.659510][T10641] mac80211_hwsim hwsim8 wlan0: entered promiscuous mode [ 375.667720][T10641] mac80211_hwsim hwsim8 wlan0: entered allmulticast mode [ 376.229352][T10655] netlink: 'syz.3.1710': attribute type 29 has an invalid length. [ 376.243275][ T49] wlan1: Trigger new scan to find an IBSS to join [ 376.251791][T10651] : port 1(ip6gretap0) entered blocking state [ 376.273865][T10651] : port 1(ip6gretap0) entered disabled state [ 376.285625][T10651] ip6gretap0: entered allmulticast mode [ 376.300407][T10651] ip6gretap0: entered promiscuous mode [ 376.340816][T10655] netlink: 'syz.3.1710': attribute type 29 has an invalid length. [ 376.378560][T10656] ip6gretap0: left allmulticast mode [ 376.411290][T10656] ip6gretap0: left promiscuous mode [ 376.461442][T10656] : port 1(ip6gretap0) entered disabled state [ 376.465616][T10663] netlink: 209844 bytes leftover after parsing attributes in process `syz.0.1712'. [ 376.609547][T10667] netlink: 121460 bytes leftover after parsing attributes in process `syz.3.1714'. [ 376.655116][T10667] netlink: 22788 bytes leftover after parsing attributes in process `syz.3.1714'. [ 376.950418][T10672] : port 1(ip6gretap0) entered blocking state [ 376.983752][T10672] : port 1(ip6gretap0) entered disabled state [ 377.013368][T10672] ip6gretap0: entered allmulticast mode [ 377.048812][T10672] ip6gretap0: entered promiscuous mode [ 377.130343][T10677] ip6gretap0: left allmulticast mode [ 377.239557][T10677] ip6gretap0: left promiscuous mode [ 377.245516][ T1128] wlan1: Creating new IBSS network, BSSID 2a:61:03:9c:fa:ef [ 377.298535][T10683] netlink: 209852 bytes leftover after parsing attributes in process `syz.0.1721'. [ 377.299361][T10677] : port 1(ip6gretap0) entered disabled state [ 377.371900][T10683] openvswitch: netlink: IP tunnel attribute has 3052 unknown bytes. [ 377.602502][T10687] pimreg0: tun_chr_ioctl cmd 1074025681 [ 377.627386][T10683] netlink: 'syz.0.1721': attribute type 3 has an invalid length. [ 377.638950][T10683] netlink: 16066 bytes leftover after parsing attributes in process `syz.0.1721'. [ 377.724275][T10693] netlink: 60 bytes leftover after parsing attributes in process `syz.2.1724'. [ 377.735191][T10693] netlink: 60 bytes leftover after parsing attributes in process `syz.2.1724'. [ 377.748047][T10693] netlink: 60 bytes leftover after parsing attributes in process `syz.2.1724'. [ 377.786543][T10693] netlink: 60 bytes leftover after parsing attributes in process `syz.2.1724'. [ 377.812116][T10693] FAULT_INJECTION: forcing a failure. [ 377.812116][T10693] name failslab, interval 1, probability 0, space 0, times 0 [ 377.841997][T10693] CPU: 1 PID: 10693 Comm: syz.2.1724 Not tainted syzkaller #0 [ 377.849557][T10693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 377.859665][T10693] Call Trace: [ 377.863167][T10693] [ 377.866157][T10693] dump_stack_lvl+0x18c/0x250 [ 377.870906][T10693] ? show_regs_print_info+0x20/0x20 [ 377.876176][T10693] ? load_image+0x420/0x420 [ 377.880753][T10693] should_fail_ex+0x39d/0x4d0 [ 377.885594][T10693] should_failslab+0x9/0x20 [ 377.890178][T10693] slab_pre_alloc_hook+0x59/0x310 [ 377.895281][T10693] kmem_cache_alloc+0x5a/0x2d0 [ 377.900111][T10693] ? skb_clone+0x1eb/0x370 [ 377.904598][T10693] skb_clone+0x1eb/0x370 [ 377.908897][T10693] __netlink_deliver_tap+0x41c/0x830 [ 377.914268][T10693] ? netlink_deliver_tap+0x2e/0x1b0 [ 377.919536][T10693] netlink_deliver_tap+0x19c/0x1b0 [ 377.924720][T10693] netlink_dump+0x94b/0xe50 [ 377.929313][T10693] ? netlink_lookup+0x200/0x200 [ 377.934250][T10693] ? slab_free_freelist_hook+0x130/0x1a0 [ 377.939974][T10693] ? netlink_recvmsg+0x5e7/0xe60 [ 377.945044][T10693] ? kmem_cache_free+0xf8/0x270 [ 377.949970][T10693] netlink_recvmsg+0x693/0xe60 [ 377.954807][T10693] ? netlink_sendmsg+0xbf0/0xbf0 [ 377.959820][T10693] ? aa_af_perm+0x330/0x330 [ 377.964392][T10693] ? __lock_acquire+0x1273/0x7d40 [ 377.969480][T10693] ? verify_lock_unused+0x140/0x140 [ 377.974736][T10693] ? bpf_lsm_socket_recvmsg+0x9/0x10 [ 377.980082][T10693] ? security_socket_recvmsg+0x89/0xb0 [ 377.985608][T10693] ? netlink_sendmsg+0xbf0/0xbf0 [ 377.990698][T10693] ____sys_recvmsg+0x2ce/0x5e0 [ 377.995526][T10693] ? __sys_recvmsg_sock+0x50/0x50 [ 378.000622][T10693] ? import_iovec+0x73/0xa0 [ 378.005214][T10693] ___sys_recvmsg+0x216/0x590 [ 378.010155][T10693] ? __sys_recvmsg+0x2a0/0x2a0 [ 378.014990][T10693] ? ksys_write+0x1c4/0x260 [ 378.019562][T10693] ? __fget_files+0x43d/0x4b0 [ 378.024314][T10693] __x64_sys_recvmsg+0x20c/0x2e0 [ 378.029311][T10693] ? ___sys_recvmsg+0x590/0x590 [ 378.034228][T10693] ? lockdep_hardirqs_on+0x98/0x150 [ 378.039489][T10693] do_syscall_64+0x55/0xa0 [ 378.044313][T10693] ? clear_bhb_loop+0x40/0x90 [ 378.049047][T10693] ? clear_bhb_loop+0x40/0x90 [ 378.053791][T10693] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 378.059764][T10693] RIP: 0033:0x7f4bb139c819 [ 378.064251][T10693] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 378.083928][T10693] RSP: 002b:00007f4bb218d028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 378.092550][T10693] RAX: ffffffffffffffda RBX: 00007f4bb1615fa0 RCX: 00007f4bb139c819 [ 378.100590][T10693] RDX: 0000000040000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 378.108635][T10693] RBP: 00007f4bb218d090 R08: 0000000000000000 R09: 0000000000000000 [ 378.116664][T10693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 378.124694][T10693] R13: 00007f4bb1616038 R14: 00007f4bb1615fa0 R15: 00007ffe78565fc8 [ 378.132783][T10693] [ 378.232542][T10700] FAULT_INJECTION: forcing a failure. [ 378.232542][T10700] name failslab, interval 1, probability 0, space 0, times 0 [ 378.245315][T10700] CPU: 1 PID: 10700 Comm: syz.3.1728 Not tainted syzkaller #0 [ 378.253021][T10700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 378.263225][T10700] Call Trace: [ 378.266551][T10700] [ 378.269527][T10700] dump_stack_lvl+0x18c/0x250 [ 378.274279][T10700] ? show_regs_print_info+0x20/0x20 [ 378.279551][T10700] ? load_image+0x420/0x420 [ 378.284116][T10700] ? netdev_core_pick_tx+0x340/0x340 [ 378.289478][T10700] should_fail_ex+0x39d/0x4d0 [ 378.294227][T10700] should_failslab+0x9/0x20 [ 378.298790][T10700] slab_pre_alloc_hook+0x59/0x310 [ 378.303887][T10700] kmem_cache_alloc+0x5a/0x2d0 [ 378.308709][T10700] ? skb_clone+0x1eb/0x370 [ 378.313180][T10700] skb_clone+0x1eb/0x370 [ 378.317486][T10700] bpf_clone_redirect+0x167/0x4a0 [ 378.322583][T10700] bpf_prog_81ed5507648eb997+0x5e/0x63 [ 378.328446][T10700] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 378.334485][T10700] ? lock_chain_count+0x20/0x20 [ 378.339400][T10700] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 378.345439][T10700] ? lockdep_softirqs_on+0x580/0x580 [ 378.350782][T10700] ? lock_chain_count+0x20/0x20 [ 378.355691][T10700] ? seqcount_lockdep_reader_access+0x191/0x1d0 [ 378.362012][T10700] ? __local_bh_disable_ip+0x108/0x1a0 [ 378.367714][T10700] ? __cant_sleep+0x220/0x220 [ 378.372466][T10700] ? __local_bh_enable_ip+0x13a/0x1c0 [ 378.377910][T10700] ? _local_bh_enable+0xa0/0xa0 [ 378.382879][T10700] ? bpf_test_timer_continue+0x135/0x380 [ 378.388609][T10700] ? bpf_test_run+0x174/0x870 [ 378.393435][T10700] bpf_test_run+0x2df/0x870 [ 378.398014][T10700] ? bpf_test_run+0x174/0x870 [ 378.402756][T10700] ? convert___skb_to_skb+0x590/0x590 [ 378.408234][T10700] ? eth_get_headlen+0x210/0x210 [ 378.413590][T10700] ? slab_build_skb+0x25f/0x3f0 [ 378.418491][T10700] ? convert___skb_to_skb+0x3d/0x590 [ 378.423839][T10700] bpf_prog_test_run_skb+0xad2/0x12b0 [ 378.429378][T10700] ? cpu_online+0x60/0x60 [ 378.433765][T10700] bpf_prog_test_run+0x321/0x390 [ 378.438764][T10700] __sys_bpf+0x49d/0x890 [ 378.443088][T10700] ? bpf_link_show_fdinfo+0x390/0x390 [ 378.448567][T10700] ? lock_chain_count+0x20/0x20 [ 378.453487][T10700] __x64_sys_bpf+0x7c/0x90 [ 378.457991][T10700] do_syscall_64+0x55/0xa0 [ 378.462460][T10700] ? clear_bhb_loop+0x40/0x90 [ 378.467203][T10700] ? clear_bhb_loop+0x40/0x90 [ 378.472077][T10700] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 378.478038][T10700] RIP: 0033:0x7f8e3099c819 [ 378.482601][T10700] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 378.502387][T10700] RSP: 002b:00007f8e317b1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 378.511001][T10700] RAX: ffffffffffffffda RBX: 00007f8e30c15fa0 RCX: 00007f8e3099c819 [ 378.519037][T10700] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 378.527254][T10700] RBP: 00007f8e317b1090 R08: 0000000000000000 R09: 0000000000000000 [ 378.535284][T10700] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 378.543312][T10700] R13: 00007f8e30c16038 R14: 00007f8e30c15fa0 R15: 00007ffc2effc0a8 [ 378.551445][T10700] [ 378.810398][T10705] netlink: 'syz.1.1730': attribute type 21 has an invalid length. [ 378.864175][T10705] netlink: 'syz.1.1730': attribute type 1 has an invalid length. [ 379.000645][ T1283] ieee802154 phy0 wpan0: encryption failed: -22 [ 379.007615][ T1283] ieee802154 phy1 wpan1: encryption failed: -22 [ 379.326503][T10718] : port 1(ip6gretap0) entered blocking state [ 379.337288][T10718] : port 1(ip6gretap0) entered disabled state [ 379.345787][T10718] ip6gretap0: entered allmulticast mode [ 379.384610][T10718] ip6gretap0: entered promiscuous mode [ 379.433440][T10721] netlink: 'syz.3.1735': attribute type 21 has an invalid length. [ 379.464093][T10724] netlink: 'syz.3.1735': attribute type 17 has an invalid length. [ 379.482174][T10724] netlink: 152 bytes leftover after parsing attributes in process `syz.3.1735'. [ 379.495811][T10724] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 379.516059][T10723] ip6gretap0: left allmulticast mode [ 379.555550][T10723] ip6gretap0: left promiscuous mode [ 379.578497][T10723] : port 1(ip6gretap0) entered disabled state [ 379.618741][T10731] netlink: 'syz.2.1737': attribute type 1 has an invalid length. [ 379.632013][T10731] netlink: 'syz.2.1737': attribute type 3 has an invalid length. [ 380.569842][T10745] openvswitch: netlink: ufid size 3064 bytes exceeds the range (1, 16) [ 380.594406][T10745] openvswitch: netlink: Flow set message rejected, Key attribute missing. [ 381.327715][T10759] : port 1(ip6gretap0) entered blocking state [ 381.339367][T10759] : port 1(ip6gretap0) entered disabled state [ 381.352481][T10759] ip6gretap0: entered allmulticast mode [ 381.370911][T10759] ip6gretap0: entered promiscuous mode [ 381.403847][T10766] ip6gretap0: left allmulticast mode [ 381.416051][T10766] ip6gretap0: left promiscuous mode [ 381.442125][T10766] : port 1(ip6gretap0) entered disabled state [ 381.740663][T10772] veth1_to_bond: entered allmulticast mode [ 381.771312][T10761] : port 1(ip6gretap0) entered blocking state [ 381.797590][T10761] : port 1(ip6gretap0) entered disabled state [ 381.808084][T10761] ip6gretap0: entered allmulticast mode [ 381.824616][T10761] ip6gretap0: entered promiscuous mode [ 381.859207][T10767] ip6gretap0: left allmulticast mode [ 381.893904][T10767] ip6gretap0: left promiscuous mode [ 381.902305][T10777] __nla_validate_parse: 2 callbacks suppressed [ 381.902322][T10777] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1754'. [ 382.024582][T10767] : port 1(ip6gretap0) entered disabled state [ 382.289987][T10777] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1754'. [ 382.299952][T10782] netlink: 'syz.0.1756': attribute type 27 has an invalid length. [ 382.313043][T10775] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1754'. [ 382.337805][T10776] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1754'. [ 382.499024][T10788] netlink: 'syz.3.1759': attribute type 21 has an invalid length. [ 382.537493][T10788] netlink: 'syz.3.1759': attribute type 1 has an invalid length. [ 382.551882][T10786] netlink: 156 bytes leftover after parsing attributes in process `syz.2.1757'. [ 382.983601][T10795] netlink: 'syz.3.1761': attribute type 5 has an invalid length. [ 383.054552][T10797] : port 1(ip6gretap0) entered blocking state [ 383.071791][T10797] : port 1(ip6gretap0) entered disabled state [ 383.079184][T10797] ip6gretap0: entered allmulticast mode [ 383.104223][T10797] ip6gretap0: entered promiscuous mode [ 383.174706][T10797] ip6gretap0: left allmulticast mode [ 383.185226][T10797] ip6gretap0: left promiscuous mode [ 383.201250][T10797] : port 1(ip6gretap0) entered disabled state [ 383.474432][T10808] netlink: 156 bytes leftover after parsing attributes in process `syz.3.1765'. [ 383.508341][T10812] : port 1(ip6gretap0) entered blocking state [ 383.523703][T10812] : port 1(ip6gretap0) entered disabled state [ 383.530293][T10812] ip6gretap0: entered allmulticast mode [ 383.552878][T10812] ip6gretap0: entered promiscuous mode [ 383.790151][T10814] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 383.848065][T10826] FAULT_INJECTION: forcing a failure. [ 383.848065][T10826] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 383.864018][T10826] CPU: 1 PID: 10826 Comm: syz.3.1772 Not tainted syzkaller #0 [ 383.871583][T10826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 383.881828][T10826] Call Trace: [ 383.885155][T10826] [ 383.888150][T10826] dump_stack_lvl+0x18c/0x250 [ 383.893334][T10826] ? show_regs_print_info+0x20/0x20 [ 383.898613][T10826] ? load_image+0x420/0x420 [ 383.903182][T10826] ? __lock_acquire+0x7d40/0x7d40 [ 383.908275][T10826] ? snprintf+0xe9/0x140 [ 383.912585][T10826] should_fail_ex+0x39d/0x4d0 [ 383.917344][T10826] _copy_to_user+0x2f/0xa0 [ 383.921832][T10826] simple_read_from_buffer+0xe7/0x150 [ 383.927321][T10826] proc_fail_nth_read+0x1e8/0x260 [ 383.932467][T10826] ? proc_fault_inject_write+0x360/0x360 [ 383.938255][T10826] ? fsnotify_perm+0x271/0x5e0 [ 383.943079][T10826] ? proc_fault_inject_write+0x360/0x360 [ 383.948762][T10826] vfs_read+0x28b/0x970 [ 383.953018][T10826] ? kernel_read+0x1e0/0x1e0 [ 383.957663][T10826] ? __fget_files+0x28/0x4b0 [ 383.962312][T10826] ? __fget_files+0x28/0x4b0 [ 383.966958][T10826] ? __fget_files+0x43d/0x4b0 [ 383.971717][T10826] ? __fdget_pos+0x2a3/0x330 [ 383.976388][T10826] ? ksys_read+0x75/0x260 [ 383.980806][T10826] ksys_read+0x150/0x260 [ 383.985125][T10826] ? vfs_write+0x990/0x990 [ 383.989602][T10826] ? lockdep_hardirqs_on+0x98/0x150 [ 383.994883][T10826] do_syscall_64+0x55/0xa0 [ 383.999339][T10826] ? clear_bhb_loop+0x40/0x90 [ 384.004066][T10826] ? clear_bhb_loop+0x40/0x90 [ 384.008797][T10826] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 384.014771][T10826] RIP: 0033:0x7f8e3095d04e [ 384.019242][T10826] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 384.038909][T10826] RSP: 002b:00007f8e317b0fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 384.047379][T10826] RAX: ffffffffffffffda RBX: 00007f8e317b16c0 RCX: 00007f8e3095d04e [ 384.055397][T10826] RDX: 000000000000000f RSI: 00007f8e317b10a0 RDI: 000000000000000f [ 384.063431][T10826] RBP: 00007f8e317b1090 R08: 0000000000000000 R09: 0000000000000000 [ 384.071450][T10826] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 384.079529][T10826] R13: 00007f8e30c16038 R14: 00007f8e30c15fa0 R15: 00007ffc2effc0a8 [ 384.087807][T10826] [ 384.700670][T10840] : port 1(ip6gretap0) entered blocking state [ 384.712435][T10840] : port 1(ip6gretap0) entered disabled state [ 384.726000][T10840] ip6gretap0: entered allmulticast mode [ 384.787075][T10840] ip6gretap0: entered promiscuous mode [ 384.861910][T10845] ip6gretap0: left allmulticast mode [ 384.873904][T10845] ip6gretap0: left promiscuous mode [ 384.889340][T10845] : port 1(ip6gretap0) entered disabled state [ 385.107170][T10847] : port 1(ip6gretap0) entered blocking state [ 385.124387][T10847] : port 1(ip6gretap0) entered disabled state [ 385.132421][T10847] ip6gretap0: entered allmulticast mode [ 385.139859][T10847] ip6gretap0: entered promiscuous mode [ 385.149765][T10849] ip6gretap0: left allmulticast mode [ 385.186842][T10849] ip6gretap0: left promiscuous mode [ 385.242929][T10849] : port 1(ip6gretap0) entered disabled state [ 385.629076][T10860] : port 1(ip6gretap0) entered blocking state [ 385.645666][T10860] : port 1(ip6gretap0) entered disabled state [ 385.665705][T10860] ip6gretap0: entered allmulticast mode [ 385.692719][T10860] ip6gretap0: entered promiscuous mode [ 385.712631][T10861] ip6gretap0: left allmulticast mode [ 385.753537][T10861] ip6gretap0: left promiscuous mode [ 385.841456][T10861] : port 1(ip6gretap0) entered disabled state [ 385.927760][T10867] FAULT_INJECTION: forcing a failure. [ 385.927760][T10867] name failslab, interval 1, probability 0, space 0, times 0 [ 385.944195][T10867] CPU: 1 PID: 10867 Comm: syz.1.1783 Not tainted syzkaller #0 [ 385.951819][T10867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 385.962147][T10867] Call Trace: [ 385.965506][T10867] [ 385.968607][T10867] dump_stack_lvl+0x18c/0x250 [ 385.973518][T10867] ? show_regs_print_info+0x20/0x20 [ 385.978825][T10867] ? load_image+0x420/0x420 [ 385.983440][T10867] ? __might_sleep+0xe0/0xe0 [ 385.988151][T10867] ? __lock_acquire+0x7d40/0x7d40 [ 385.993294][T10867] should_fail_ex+0x39d/0x4d0 [ 385.998223][T10867] should_failslab+0x9/0x20 [ 386.002832][T10867] slab_pre_alloc_hook+0x59/0x310 [ 386.007972][T10867] ? genl_start+0x1c9/0x6b0 [ 386.012566][T10867] __kmem_cache_alloc_node+0x53/0x250 [ 386.018019][T10867] ? genl_start+0x1c9/0x6b0 [ 386.022581][T10867] kmalloc_trace+0x2a/0xe0 [ 386.027064][T10867] genl_start+0x1c9/0x6b0 [ 386.031466][T10867] ? netlink_lookup+0x30/0x200 [ 386.036309][T10867] __netlink_dump_start+0x4a9/0x810 [ 386.041599][T10867] genl_family_rcv_msg_dumpit+0x214/0x310 [ 386.047456][T10867] ? genl_rcv_msg+0x7a0/0x7a0 [ 386.052192][T10867] ? genl_get_cmd+0x4a9/0x920 [ 386.056953][T10867] ? genl_family_rcv_msg_doit+0x310/0x310 [ 386.062756][T10867] ? genl_start+0x6b0/0x6b0 [ 386.067309][T10867] ? genl_dumpit+0x1a0/0x1a0 [ 386.071996][T10867] genl_rcv_msg+0x5e5/0x7a0 [ 386.076572][T10867] ? genl_bind+0x360/0x360 [ 386.081054][T10867] ? devlink_nl_trap_policer_fill+0x480/0x480 [ 386.087192][T10867] ? perf_trace_lock+0x304/0x3b0 [ 386.092306][T10867] netlink_rcv_skb+0x241/0x4d0 [ 386.097145][T10867] ? genl_bind+0x360/0x360 [ 386.101630][T10867] ? netlink_ack+0x1180/0x1180 [ 386.106653][T10867] ? __lock_acquire+0x7d40/0x7d40 [ 386.111791][T10867] ? down_read+0x1ac/0x2e0 [ 386.116288][T10867] genl_rcv+0x28/0x40 [ 386.120346][T10867] netlink_unicast+0x751/0x8d0 [ 386.125204][T10867] netlink_sendmsg+0x8d0/0xbf0 [ 386.130064][T10867] ? perf_trace_lock+0x304/0x3b0 [ 386.135092][T10867] ? netlink_getsockopt+0x590/0x590 [ 386.140360][T10867] ? aa_sock_msg_perm+0x94/0x150 [ 386.145396][T10867] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 386.150735][T10867] ? security_socket_sendmsg+0x80/0xa0 [ 386.156265][T10867] ? netlink_getsockopt+0x590/0x590 [ 386.161536][T10867] ____sys_sendmsg+0x5ba/0x960 [ 386.166374][T10867] ? __asan_memset+0x22/0x40 [ 386.171110][T10867] ? __sys_sendmsg_sock+0x30/0x30 [ 386.176181][T10867] ? __import_iovec+0x5f2/0x850 [ 386.181148][T10867] ? import_iovec+0x73/0xa0 [ 386.185717][T10867] ___sys_sendmsg+0x2a6/0x360 [ 386.190563][T10867] ? __sys_sendmsg+0x2a0/0x2a0 [ 386.195547][T10867] ? trace_call_bpf+0xc3/0x6c0 [ 386.200442][T10867] __se_sys_sendmsg+0x1c2/0x2b0 [ 386.205364][T10867] ? __x64_sys_sendmsg+0x80/0x80 [ 386.210406][T10867] ? lockdep_hardirqs_on+0x98/0x150 [ 386.215681][T10867] do_syscall_64+0x55/0xa0 [ 386.220324][T10867] ? clear_bhb_loop+0x40/0x90 [ 386.225057][T10867] ? clear_bhb_loop+0x40/0x90 [ 386.229884][T10867] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 386.235832][T10867] RIP: 0033:0x7fb5f459c819 [ 386.240313][T10867] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 386.260502][T10867] RSP: 002b:00007fb5f54e6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 386.269075][T10867] RAX: ffffffffffffffda RBX: 00007fb5f4815fa0 RCX: 00007fb5f459c819 [ 386.277184][T10867] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000005 [ 386.285207][T10867] RBP: 00007fb5f54e6090 R08: 0000000000000000 R09: 0000000000000000 [ 386.293224][T10867] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 386.301260][T10867] R13: 00007fb5f4816038 R14: 00007fb5f4815fa0 R15: 00007ffc7bbc8d98 [ 386.309370][T10867] [ 387.072571][T10878] : port 1(ip6gretap0) entered blocking state [ 387.102733][T10878] : port 1(ip6gretap0) entered disabled state [ 387.123619][T10878] ip6gretap0: entered allmulticast mode [ 387.158354][T10878] ip6gretap0: entered promiscuous mode [ 387.299716][T10882] ip6gretap0: left allmulticast mode [ 387.320952][T10882] ip6gretap0: left promiscuous mode [ 387.350718][T10882] : port 1(ip6gretap0) entered disabled state [ 387.616323][T10872] macsec0: entered promiscuous mode [ 387.639426][T10872] macsec0: entered allmulticast mode [ 387.646830][T10872] veth1_macvtap: entered allmulticast mode [ 388.456426][T10900] : port 1(ip6gretap0) entered blocking state [ 388.474196][T10900] : port 1(ip6gretap0) entered disabled state [ 388.493953][T10900] ip6gretap0: entered allmulticast mode [ 388.517785][T10900] ip6gretap0: entered promiscuous mode [ 388.611758][T10904] ip6gretap0: left allmulticast mode [ 388.623058][T10906] validate_nla: 2 callbacks suppressed [ 388.623077][T10906] netlink: 'syz.0.1793': attribute type 3 has an invalid length. [ 388.623122][T10906] netlink: 'syz.0.1793': attribute type 1 has an invalid length. [ 388.623136][T10906] netlink: 181400 bytes leftover after parsing attributes in process `syz.0.1793'. [ 388.693132][T10904] ip6gretap0: left promiscuous mode [ 388.728951][T10904] : port 1(ip6gretap0) entered disabled state [ 389.137887][T10913] netlink: 40 bytes leftover after parsing attributes in process `syz.1.1794'. [ 389.157802][T10913] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1794'. [ 389.184653][T10914] netlink: 184 bytes leftover after parsing attributes in process `syz.2.1795'. [ 389.214924][T10915] netlink: 184 bytes leftover after parsing attributes in process `syz.2.1795'. [ 389.690103][T10930] ip6gretap0: left allmulticast mode [ 389.701642][T10930] ip6gretap0: left promiscuous mode [ 389.707585][T10930] : port 1(ip6gretap0) entered disabled state [ 390.108999][T10943] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.1806'. [ 393.508878][T10959] netlink: 1047 bytes leftover after parsing attributes in process `syz.2.1813'. [ 393.573727][T10960] netlink: 'syz.3.1814': attribute type 39 has an invalid length. [ 393.916050][T10966] netlink: 'syz.2.1817': attribute type 22 has an invalid length. [ 393.933766][T10966] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1817'. [ 394.900900][T10977] netlink: 203516 bytes leftover after parsing attributes in process `syz.2.1823'. [ 394.924178][T10977] netlink: 6116 bytes leftover after parsing attributes in process `syz.2.1823'. [ 394.949616][T10977] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1823'. [ 395.654506][T11009] netlink: 'syz.1.1831': attribute type 39 has an invalid length. [ 395.794759][T11014] netlink: 'syz.2.1834': attribute type 2 has an invalid length. [ 395.816274][T11019] sctp: [Deprecated]: syz.3.1836 (pid 11019) Use of int in max_burst socket option deprecated. [ 395.816274][T11019] Use struct sctp_assoc_value instead [ 395.832402][T11014] netlink: 'syz.2.1834': attribute type 8 has an invalid length. [ 395.840467][T11014] netlink: 132 bytes leftover after parsing attributes in process `syz.2.1834'. [ 395.862316][T11019] netlink: 'syz.3.1836': attribute type 21 has an invalid length. [ 395.895258][T11014] netlink: 'syz.2.1834': attribute type 2 has an invalid length. [ 395.913879][T11014] netlink: 'syz.2.1834': attribute type 8 has an invalid length. [ 395.928948][T11014] netlink: 132 bytes leftover after parsing attributes in process `syz.2.1834'. [ 396.045830][T11023] sctp: [Deprecated]: syz.0.1837 (pid 11023) Use of int in max_burst socket option deprecated. [ 396.045830][T11023] Use struct sctp_assoc_value instead [ 396.065413][T11023] netlink: 'syz.0.1837': attribute type 21 has an invalid length. [ 396.566454][T11030] netlink: 9275 bytes leftover after parsing attributes in process `syz.2.1839'. [ 397.332102][T11025] netlink: 209852 bytes leftover after parsing attributes in process `syz.1.1835'. [ 397.553897][T11025] sysfs: cannot create duplicate filename '/class/ieee80211/!!ô' [ 397.604630][T11025] CPU: 0 PID: 11025 Comm: syz.1.1835 Not tainted syzkaller #0 [ 397.612208][T11025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 397.622323][T11025] Call Trace: [ 397.625656][T11025] [ 397.628640][T11025] dump_stack_lvl+0x18c/0x250 [ 397.633393][T11025] ? show_regs_print_info+0x20/0x20 [ 397.638683][T11025] ? load_image+0x420/0x420 [ 397.643275][T11025] sysfs_warn_dup+0x8e/0xa0 [ 397.647857][T11025] sysfs_do_create_link_sd+0xc0/0x110 [ 397.653306][T11025] device_add_class_symlinks+0x1cf/0x240 [ 397.659018][T11025] device_add+0x507/0xc20 [ 397.663429][T11025] wiphy_register+0x1dad/0x2ae0 [ 397.668405][T11025] ? cfg80211_event_work+0x40/0x40 [ 397.673672][T11025] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 397.679922][T11025] ieee80211_register_hw+0x3464/0x4250 [ 397.685477][T11025] ? ieee80211_tasklet_handler+0x20/0x20 [ 397.691176][T11025] ? _raw_spin_unlock_irqrestore+0xc5/0x120 [ 397.697152][T11025] ? __debug_object_init+0xec/0x450 [ 397.702610][T11025] ? __asan_memset+0x22/0x40 [ 397.707632][T11025] ? __hrtimer_init+0x186/0x270 [ 397.712548][T11025] mac80211_hwsim_new_radio+0x2a00/0x4d10 [ 397.718365][T11025] ? mac80211_hwsim_free+0x220/0x220 [ 397.723809][T11025] ? kstrndup+0xbd/0x140 [ 397.728133][T11025] hwsim_new_radio_nl+0xdc9/0x1a90 [ 397.733331][T11025] ? __nla_validate+0x50/0x50 [ 397.738092][T11025] ? lockdep_hardirqs_on_prepare+0x40d/0x770 [ 397.744255][T11025] ? hwsim_tx_info_frame_received_nl+0xd60/0xd60 [ 397.750662][T11025] ? lockdep_hardirqs_on+0x98/0x150 [ 397.755951][T11025] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 397.762196][T11025] ? __nla_parse+0x40/0x50 [ 397.766683][T11025] ? genl_family_rcv_msg_attrs_parse+0x1c6/0x290 [ 397.773086][T11025] genl_family_rcv_msg_doit+0x211/0x310 [ 397.778717][T11025] ? end_current_label_crit_section+0x170/0x170 [ 397.785049][T11025] ? genl_family_rcv_msg_dumpit+0x310/0x310 [ 397.791023][T11025] ? bpf_lsm_capable+0x9/0x10 [ 397.795836][T11025] ? security_capable+0x89/0xb0 [ 397.800787][T11025] genl_rcv_msg+0x619/0x7a0 [ 397.805407][T11025] ? genl_bind+0x360/0x360 [ 397.809988][T11025] ? hwsim_tx_info_frame_received_nl+0xd60/0xd60 [ 397.816492][T11025] netlink_rcv_skb+0x241/0x4d0 [ 397.821349][T11025] ? genl_bind+0x360/0x360 [ 397.825863][T11025] ? netlink_ack+0x1180/0x1180 [ 397.830737][T11025] ? genl_bind+0x360/0x360 [ 397.835337][T11025] genl_rcv+0x28/0x40 [ 397.839382][T11025] netlink_unicast+0x751/0x8d0 [ 397.844243][T11025] netlink_sendmsg+0x8d0/0xbf0 [ 397.849083][T11025] ? lockdep_hardirqs_on+0x98/0x150 [ 397.854459][T11025] ? netlink_getsockopt+0x590/0x590 [ 397.859735][T11025] ? aa_sock_msg_perm+0x94/0x150 [ 397.864837][T11025] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 397.870287][T11025] ? security_socket_sendmsg+0x80/0xa0 [ 397.875883][T11025] ? netlink_getsockopt+0x590/0x590 [ 397.881157][T11025] ____sys_sendmsg+0x5ba/0x960 [ 397.885995][T11025] ? __asan_memset+0x22/0x40 [ 397.890652][T11025] ? __sys_sendmsg_sock+0x30/0x30 [ 397.895746][T11025] ? __import_iovec+0x5f2/0x850 [ 397.900718][T11025] ? import_iovec+0x73/0xa0 [ 397.905286][T11025] ___sys_sendmsg+0x2a6/0x360 [ 397.910035][T11025] ? __sys_sendmsg+0x2a0/0x2a0 [ 397.914961][T11025] __se_sys_sendmsg+0x1c2/0x2b0 [ 397.919886][T11025] ? __x64_sys_sendmsg+0x80/0x80 [ 397.924918][T11025] ? syscall_enter_from_user_mode+0x2e/0x80 [ 397.930939][T11025] do_syscall_64+0x55/0xa0 [ 397.935444][T11025] ? clear_bhb_loop+0x40/0x90 [ 397.940162][T11025] ? clear_bhb_loop+0x40/0x90 [ 397.944925][T11025] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 397.950894][T11025] RIP: 0033:0x7fb5f459c819 [ 397.955373][T11025] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 397.975053][T11025] RSP: 002b:00007fb5f54c5028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 397.983547][T11025] RAX: ffffffffffffffda RBX: 00007fb5f4816090 RCX: 00007fb5f459c819 [ 397.991621][T11025] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 000000000000000a [ 397.999769][T11025] RBP: 00007fb5f4632c91 R08: 0000000000000000 R09: 0000000000000000 [ 398.007829][T11025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 398.015945][T11025] R13: 00007fb5f4816128 R14: 00007fb5f4816090 R15: 00007ffc7bbc8d98 [ 398.024089][T11025] [ 398.044655][T11045] netlink: 'syz.0.1842': attribute type 10 has an invalid length. [ 398.069636][T11045] netlink: 2 bytes leftover after parsing attributes in process `syz.0.1842'. [ 398.124477][T11044] FAULT_INJECTION: forcing a failure. [ 398.124477][T11044] name failslab, interval 1, probability 0, space 0, times 0 [ 398.170007][T11044] CPU: 0 PID: 11044 Comm: syz.3.1843 Not tainted syzkaller #0 [ 398.177656][T11044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 398.187895][T11044] Call Trace: [ 398.191232][T11044] [ 398.194205][T11044] dump_stack_lvl+0x18c/0x250 [ 398.198993][T11044] ? show_regs_print_info+0x20/0x20 [ 398.204269][T11044] ? load_image+0x420/0x420 [ 398.208852][T11044] ? __lock_acquire+0x7d40/0x7d40 [ 398.213962][T11044] should_fail_ex+0x39d/0x4d0 [ 398.218711][T11044] should_failslab+0x9/0x20 [ 398.223278][T11044] slab_pre_alloc_hook+0x59/0x310 [ 398.228405][T11044] ? bpf_test_init+0x9f/0x140 [ 398.233148][T11044] ? bpf_test_init+0x9f/0x140 [ 398.237887][T11044] __kmem_cache_alloc_node+0x53/0x250 [ 398.243335][T11044] ? bpf_test_init+0x9f/0x140 [ 398.248065][T11044] __kmalloc+0xa4/0x230 [ 398.252328][T11044] bpf_test_init+0x9f/0x140 [ 398.256910][T11044] bpf_prog_test_run_xdp+0x4d1/0x10e0 [ 398.262324][T11044] ? lock_chain_count+0x20/0x20 [ 398.267209][T11044] ? dev_put+0x80/0x80 [ 398.271320][T11044] ? dev_put+0x80/0x80 [ 398.275424][T11044] bpf_prog_test_run+0x321/0x390 [ 398.280401][T11044] __sys_bpf+0x49d/0x890 [ 398.284679][T11044] ? bpf_link_show_fdinfo+0x390/0x390 [ 398.290091][T11044] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 398.296289][T11044] __x64_sys_bpf+0x7c/0x90 [ 398.300742][T11044] do_syscall_64+0x55/0xa0 [ 398.305199][T11044] ? clear_bhb_loop+0x40/0x90 [ 398.310258][T11044] ? clear_bhb_loop+0x40/0x90 [ 398.314968][T11044] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 398.320977][T11044] RIP: 0033:0x7f8e3099c819 [ 398.325428][T11044] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 398.345173][T11044] RSP: 002b:00007f8e317b1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 398.353630][T11044] RAX: ffffffffffffffda RBX: 00007f8e30c15fa0 RCX: 00007f8e3099c819 [ 398.361654][T11044] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 398.369664][T11044] RBP: 00007f8e317b1090 R08: 0000000000000000 R09: 0000000000000000 [ 398.377685][T11044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 398.385694][T11044] R13: 00007f8e30c16038 R14: 00007f8e30c15fa0 R15: 00007ffc2effc0a8 [ 398.393737][T11044] [ 398.457423][T11051] sctp: [Deprecated]: syz.2.1846 (pid 11051) Use of int in max_burst socket option deprecated. [ 398.457423][T11051] Use struct sctp_assoc_value instead [ 398.480956][T11051] netlink: 'syz.2.1846': attribute type 21 has an invalid length. [ 398.662729][T11056] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1848'. [ 398.805981][T11060] bond0: entered promiscuous mode [ 398.811286][T11060] bond_slave_0: entered promiscuous mode [ 398.819827][T11060] bond_slave_1: entered promiscuous mode [ 398.826395][T11060] dummy0: entered promiscuous mode [ 398.836517][T11060] 8021q: adding VLAN 0 to HW filter on device bond0 [ 398.850792][T11060] bridge0: port 4(bond0) entered blocking state [ 398.860036][T11060] bridge0: port 4(bond0) entered disabled state [ 398.867691][T11060] bond0: entered allmulticast mode [ 398.873492][T11060] bond_slave_0: entered allmulticast mode [ 398.879422][T11060] bond_slave_1: entered allmulticast mode [ 398.886279][T11060] dummy0: entered allmulticast mode [ 398.895976][T11060] bridge0: port 4(bond0) entered blocking state [ 398.902616][T11060] bridge0: port 4(bond0) entered forwarding state [ 399.107399][T11069] __nla_validate_parse: 2 callbacks suppressed [ 399.107420][T11069] netlink: 63503 bytes leftover after parsing attributes in process `syz.3.1854'. [ 399.186043][T11073] netlink: 68 bytes leftover after parsing attributes in process `syz.2.1855'. [ 399.294507][T11079] sctp: [Deprecated]: syz.3.1857 (pid 11079) Use of int in max_burst socket option deprecated. [ 399.294507][T11079] Use struct sctp_assoc_value instead [ 399.327170][T11079] validate_nla: 5 callbacks suppressed [ 399.327191][T11079] netlink: 'syz.3.1857': attribute type 21 has an invalid length. [ 399.438049][T11081] netlink: 203516 bytes leftover after parsing attributes in process `syz.2.1858'. [ 399.523726][T11081] netlink: 6324 bytes leftover after parsing attributes in process `syz.2.1858'. [ 399.673253][T11085] netlink: 'syz.0.1859': attribute type 3 has an invalid length. [ 399.705287][T11085] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1859'. [ 400.203340][T11089] netlink: 'syz.1.1860': attribute type 2 has an invalid length. [ 400.211544][T11089] netlink: 'syz.1.1860': attribute type 8 has an invalid length. [ 400.219941][T11089] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1860'. [ 400.233821][T11089] netlink: 'syz.1.1860': attribute type 2 has an invalid length. [ 400.242178][T11089] netlink: 'syz.1.1860': attribute type 8 has an invalid length. [ 400.250317][T11089] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1860'. [ 400.352230][T11092] netlink: 'syz.2.1861': attribute type 4 has an invalid length. [ 400.944011][T11110] FAULT_INJECTION: forcing a failure. [ 400.944011][T11110] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 400.971633][T11110] CPU: 0 PID: 11110 Comm: syz.1.1867 Not tainted syzkaller #0 [ 400.979206][T11110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 400.989410][T11110] Call Trace: [ 400.992744][T11110] [ 400.995722][T11110] dump_stack_lvl+0x18c/0x250 [ 401.000468][T11110] ? show_regs_print_info+0x20/0x20 [ 401.005746][T11110] ? load_image+0x420/0x420 [ 401.010312][T11110] ? __might_fault+0xaa/0x120 [ 401.015031][T11110] ? __lock_acquire+0x7d40/0x7d40 [ 401.020097][T11110] should_fail_ex+0x39d/0x4d0 [ 401.024826][T11110] _copy_to_user+0x2f/0xa0 [ 401.029281][T11110] bpf_test_finish+0x206/0x650 [ 401.034193][T11110] ? convert___skb_to_skb+0x590/0x590 [ 401.039601][T11110] ? convert_skb_to___skb+0x420/0x420 [ 401.045014][T11110] ? slab_build_skb+0x25f/0x3f0 [ 401.049907][T11110] bpf_prog_test_run_skb+0xcc3/0x12b0 [ 401.055422][T11110] ? cpu_online+0x60/0x60 [ 401.059783][T11110] bpf_prog_test_run+0x321/0x390 [ 401.064766][T11110] __sys_bpf+0x49d/0x890 [ 401.069044][T11110] ? bpf_link_show_fdinfo+0x390/0x390 [ 401.074475][T11110] ? lock_chain_count+0x20/0x20 [ 401.079459][T11110] __x64_sys_bpf+0x7c/0x90 [ 401.083906][T11110] do_syscall_64+0x55/0xa0 [ 401.088349][T11110] ? clear_bhb_loop+0x40/0x90 [ 401.093144][T11110] ? clear_bhb_loop+0x40/0x90 [ 401.097856][T11110] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 401.103788][T11110] RIP: 0033:0x7fb5f459c819 [ 401.108232][T11110] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 401.127877][T11110] RSP: 002b:00007fb5f54e6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 401.136504][T11110] RAX: ffffffffffffffda RBX: 00007fb5f4815fa0 RCX: 00007fb5f459c819 [ 401.144510][T11110] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 401.152539][T11110] RBP: 00007fb5f54e6090 R08: 0000000000000000 R09: 0000000000000000 [ 401.160545][T11110] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 401.168542][T11110] R13: 00007fb5f4816038 R14: 00007fb5f4815fa0 R15: 00007ffc7bbc8d98 [ 401.176567][T11110] [ 402.156338][T11112] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1868'. [ 402.775910][T11126] sctp: [Deprecated]: syz.2.1870 (pid 11126) Use of int in max_burst socket option deprecated. [ 402.775910][T11126] Use struct sctp_assoc_value instead [ 402.819909][T11129] netlink: 'syz.2.1870': attribute type 21 has an invalid length. [ 403.067645][T11138] netlink: 'syz.0.1874': attribute type 21 has an invalid length. [ 403.507019][T11153] sctp: [Deprecated]: syz.2.1881 (pid 11153) Use of int in max_burst socket option deprecated. [ 403.507019][T11153] Use struct sctp_assoc_value instead [ 403.624734][T11153] netlink: 'syz.2.1881': attribute type 21 has an invalid length. [ 404.070699][T11165] FAULT_INJECTION: forcing a failure. [ 404.070699][T11165] name failslab, interval 1, probability 0, space 0, times 0 [ 404.093858][T11165] CPU: 1 PID: 11165 Comm: syz.2.1883 Not tainted syzkaller #0 [ 404.101511][T11165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 404.111797][T11165] Call Trace: [ 404.115138][T11165] [ 404.118347][T11165] dump_stack_lvl+0x18c/0x250 [ 404.123110][T11165] ? show_regs_print_info+0x20/0x20 [ 404.128563][T11165] ? load_image+0x420/0x420 [ 404.133204][T11165] ? __might_sleep+0xe0/0xe0 [ 404.137870][T11165] ? __lock_acquire+0x7d40/0x7d40 [ 404.142972][T11165] ? __lock_acquire+0x1273/0x7d40 [ 404.148071][T11165] should_fail_ex+0x39d/0x4d0 [ 404.152935][T11165] should_failslab+0x9/0x20 [ 404.157626][T11165] slab_pre_alloc_hook+0x59/0x310 [ 404.162827][T11165] kmem_cache_alloc_node+0x60/0x320 [ 404.168101][T11165] ? __alloc_skb+0x103/0x2c0 [ 404.172768][T11165] __alloc_skb+0x103/0x2c0 [ 404.177327][T11165] alloc_skb_with_frags+0xca/0x7b0 [ 404.182534][T11165] ? perf_trace_lock+0xfc/0x3b0 [ 404.187473][T11165] sock_alloc_send_pskb+0x883/0x9a0 [ 404.192774][T11165] ? sock_kzfree_s+0x50/0x50 [ 404.197479][T11165] ? __lock_acquire+0x7d40/0x7d40 [ 404.202576][T11165] ? sock_def_readable+0xad/0x420 [ 404.207761][T11165] ? sock_def_readable+0xad/0x420 [ 404.213009][T11165] ? sock_def_readable+0x2ac/0x420 [ 404.218163][T11165] unix_stream_sendmsg+0x48b/0xbf0 [ 404.223419][T11165] ? unix_show_fdinfo+0x270/0x270 [ 404.228480][T11165] ? tomoyo_socket_sendmsg_permission+0x1e1/0x2f0 [ 404.234940][T11165] ? __might_fault+0xaa/0x120 [ 404.239653][T11165] ? aa_sock_msg_perm+0x94/0x150 [ 404.244746][T11165] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 404.250072][T11165] ? security_socket_sendmsg+0x80/0xa0 [ 404.255655][T11165] ? unix_show_fdinfo+0x270/0x270 [ 404.260747][T11165] ____sys_sendmsg+0x5ba/0x960 [ 404.265662][T11165] ? __sys_sendmsg_sock+0x30/0x30 [ 404.270725][T11165] ? __import_iovec+0x5f2/0x850 [ 404.275795][T11165] ? import_iovec+0x73/0xa0 [ 404.280337][T11165] ___sys_sendmsg+0x2a6/0x360 [ 404.285179][T11165] ? __sys_sendmsg+0x2a0/0x2a0 [ 404.290005][T11165] ? __lock_acquire+0x7d40/0x7d40 [ 404.295156][T11165] __se_sys_sendmsg+0x1c2/0x2b0 [ 404.300046][T11165] ? __x64_sys_sendmsg+0x80/0x80 [ 404.305052][T11165] ? lockdep_hardirqs_on+0x98/0x150 [ 404.310294][T11165] do_syscall_64+0x55/0xa0 [ 404.314828][T11165] ? clear_bhb_loop+0x40/0x90 [ 404.319572][T11165] ? clear_bhb_loop+0x40/0x90 [ 404.324310][T11165] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 404.330326][T11165] RIP: 0033:0x7f4bb139c819 [ 404.334804][T11165] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 404.354463][T11165] RSP: 002b:00007f4bb218d028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 404.362923][T11165] RAX: ffffffffffffffda RBX: 00007f4bb1615fa0 RCX: 00007f4bb139c819 [ 404.370929][T11165] RDX: 0000000000008841 RSI: 0000200000000500 RDI: 0000000000000004 [ 404.378966][T11165] RBP: 00007f4bb218d090 R08: 0000000000000000 R09: 0000000000000000 [ 404.386973][T11165] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 404.395184][T11165] R13: 00007f4bb1616038 R14: 00007f4bb1615fa0 R15: 00007ffe78565fc8 [ 404.403212][T11165] [ 404.900436][T11174] netlink: 'syz.2.1886': attribute type 10 has an invalid length. [ 404.921429][T11174] netlink: 55 bytes leftover after parsing attributes in process `syz.2.1886'. [ 405.397318][T11181] netlink: 56 bytes leftover after parsing attributes in process `syz.0.1888'. [ 405.468230][T11181] netlink: 56 bytes leftover after parsing attributes in process `syz.0.1888'. [ 405.569661][T11186] sctp: [Deprecated]: syz.2.1891 (pid 11186) Use of int in max_burst socket option deprecated. [ 405.569661][T11186] Use struct sctp_assoc_value instead [ 405.632005][T11186] netlink: 'syz.2.1891': attribute type 21 has an invalid length. [ 405.896216][T11190] netlink: 156 bytes leftover after parsing attributes in process `syz.2.1893'. [ 406.283907][T11201] netlink: 'syz.3.1898': attribute type 10 has an invalid length. [ 406.323896][T11201] netlink: 2 bytes leftover after parsing attributes in process `syz.3.1898'. [ 406.535576][T11208] sctp: [Deprecated]: syz.3.1901 (pid 11208) Use of int in max_burst socket option deprecated. [ 406.535576][T11208] Use struct sctp_assoc_value instead [ 406.562108][T11209] netlink: 'syz.1.1900': attribute type 1 has an invalid length. [ 406.585673][T11209] netlink: 161700 bytes leftover after parsing attributes in process `syz.1.1900'. [ 406.600833][T11208] netlink: 'syz.3.1901': attribute type 21 has an invalid length. [ 407.629089][T11220] FAULT_INJECTION: forcing a failure. [ 407.629089][T11220] name failslab, interval 1, probability 0, space 0, times 0 [ 407.731528][T11220] CPU: 1 PID: 11220 Comm: syz.0.1905 Not tainted syzkaller #0 [ 407.739096][T11220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 407.749286][T11220] Call Trace: [ 407.752608][T11220] [ 407.755608][T11220] dump_stack_lvl+0x18c/0x250 [ 407.760363][T11220] ? show_regs_print_info+0x20/0x20 [ 407.765634][T11220] ? load_image+0x420/0x420 [ 407.770257][T11220] should_fail_ex+0x39d/0x4d0 [ 407.775079][T11220] should_failslab+0x9/0x20 [ 407.779627][T11220] slab_pre_alloc_hook+0x59/0x310 [ 407.784695][T11220] ? sock_def_readable+0xad/0x420 [ 407.790109][T11220] kmem_cache_alloc+0x5a/0x2d0 [ 407.795203][T11220] ? skb_clone+0x1eb/0x370 [ 407.799670][T11220] skb_clone+0x1eb/0x370 [ 407.803958][T11220] ? pfkey_broadcast_one+0x7d/0x340 [ 407.809196][T11220] pfkey_broadcast_one+0x9b/0x340 [ 407.814268][T11220] ? pfkey_broadcast+0x1c5/0x3e0 [ 407.819415][T11220] pfkey_broadcast+0x1d5/0x3e0 [ 407.824302][T11220] ? pfkey_broadcast+0x48/0x3e0 [ 407.829189][T11220] pfkey_sendmsg+0x4f0/0x10e0 [ 407.834037][T11220] ? __might_sleep+0xe0/0xe0 [ 407.838735][T11220] ? pfkey_release+0x320/0x320 [ 407.843711][T11220] ? aa_sock_msg_perm+0x94/0x150 [ 407.848731][T11220] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 407.854053][T11220] ? security_socket_sendmsg+0x80/0xa0 [ 407.859559][T11220] ? pfkey_release+0x320/0x320 [ 407.864395][T11220] ____sys_sendmsg+0x5ba/0x960 [ 407.869556][T11220] ? __asan_memset+0x22/0x40 [ 407.874202][T11220] ? __sys_sendmsg_sock+0x30/0x30 [ 407.879287][T11220] ? __import_iovec+0x5f2/0x850 [ 407.884292][T11220] ? import_iovec+0x73/0xa0 [ 407.888835][T11220] ___sys_sendmsg+0x2a6/0x360 [ 407.893603][T11220] ? __sys_sendmsg+0x2a0/0x2a0 [ 407.898430][T11220] ? __lock_acquire+0x7d40/0x7d40 [ 407.903607][T11220] __se_sys_sendmsg+0x1c2/0x2b0 [ 407.908595][T11220] ? __x64_sys_sendmsg+0x80/0x80 [ 407.913594][T11220] ? lockdep_hardirqs_on+0x98/0x150 [ 407.918835][T11220] do_syscall_64+0x55/0xa0 [ 407.923306][T11220] ? clear_bhb_loop+0x40/0x90 [ 407.928055][T11220] ? clear_bhb_loop+0x40/0x90 [ 407.932788][T11220] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 407.938725][T11220] RIP: 0033:0x7f8b3db9c819 [ 407.943199][T11220] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 407.962962][T11220] RSP: 002b:00007f8b3eabd028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 407.971527][T11220] RAX: ffffffffffffffda RBX: 00007f8b3de15fa0 RCX: 00007f8b3db9c819 [ 407.979556][T11220] RDX: 0000000000000000 RSI: 0000200000003780 RDI: 0000000000000003 [ 407.987569][T11220] RBP: 00007f8b3eabd090 R08: 0000000000000000 R09: 0000000000000000 [ 407.995574][T11220] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 408.003575][T11220] R13: 00007f8b3de16038 R14: 00007f8b3de15fa0 R15: 00007fff91e60068 [ 408.011601][T11220] [ 408.462016][T11232] sctp: [Deprecated]: syz.1.1912 (pid 11232) Use of int in max_burst socket option deprecated. [ 408.462016][T11232] Use struct sctp_assoc_value instead [ 409.086313][T11232] netlink: 'syz.1.1912': attribute type 21 has an invalid length. [ 409.107889][T11237] veth1_to_bond: entered allmulticast mode [ 409.439191][T11244] netlink: 'syz.1.1916': attribute type 10 has an invalid length. [ 409.447513][T11244] netlink: 2 bytes leftover after parsing attributes in process `syz.1.1916'. [ 409.739242][ T1090] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 412.717105][T11256] netlink: 'syz.0.1918': attribute type 3 has an invalid length. [ 412.774545][T11256] netlink: 130984 bytes leftover after parsing attributes in process `syz.0.1918'. [ 415.829303][T11271] syzkaller0: entered promiscuous mode [ 415.835061][T11271] syzkaller0: entered allmulticast mode [ 415.925520][T11286] sctp: [Deprecated]: syz.3.1924 (pid 11286) Use of int in max_burst socket option deprecated. [ 415.925520][T11286] Use struct sctp_assoc_value instead [ 417.727045][T11286] netlink: 'syz.3.1924': attribute type 21 has an invalid length. [ 417.839357][T11290] netlink: 'syz.3.1925': attribute type 10 has an invalid length. [ 418.107564][T11300] hsr0: entered allmulticast mode [ 418.117845][T11300] hsr_slave_0: entered allmulticast mode [ 418.125538][T11300] hsr_slave_1: entered allmulticast mode [ 418.147385][T11300] netlink: 164 bytes leftover after parsing attributes in process `syz.2.1929'. [ 418.171214][T11300] netlink: 164 bytes leftover after parsing attributes in process `syz.2.1929'. [ 418.759961][T11314] sctp: [Deprecated]: syz.2.1933 (pid 11314) Use of int in max_burst socket option deprecated. [ 418.759961][T11314] Use struct sctp_assoc_value instead [ 418.817182][T11314] netlink: 'syz.2.1933': attribute type 21 has an invalid length. [ 419.086183][T11320] syzkaller0: entered promiscuous mode [ 419.131945][T11320] syzkaller0: entered allmulticast mode [ 419.272584][T11320] netlink: 1047 bytes leftover after parsing attributes in process `syz.3.1936'. [ 419.883784][T11334] netlink: 'syz.0.1940': attribute type 12 has an invalid length. [ 419.909098][T11334] netlink: 'syz.0.1940': attribute type 11 has an invalid length. [ 419.932896][T11334] netlink: 188816 bytes leftover after parsing attributes in process `syz.0.1940'. [ 419.946241][T11331] netlink: 'syz.0.1940': attribute type 12 has an invalid length. [ 419.954701][T11331] netlink: 'syz.0.1940': attribute type 11 has an invalid length. [ 419.975809][T11331] netlink: 188816 bytes leftover after parsing attributes in process `syz.0.1940'. [ 420.159556][T11340] netlink: 209844 bytes leftover after parsing attributes in process `syz.0.1943'. [ 422.938486][T11353] sctp: [Deprecated]: syz.1.1945 (pid 11353) Use of int in max_burst socket option deprecated. [ 422.938486][T11353] Use struct sctp_assoc_value instead [ 422.984048][T11353] netlink: 'syz.1.1945': attribute type 21 has an invalid length. [ 423.172990][T11357] netlink: 'syz.3.1947': attribute type 1 has an invalid length. [ 423.187465][T11357] netlink: 161700 bytes leftover after parsing attributes in process `syz.3.1947'. [ 423.568086][T11357] netlink: 'syz.3.1947': attribute type 27 has an invalid length. [ 423.919770][T11369] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1951'. [ 423.954453][T11369] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1951'. [ 424.038071][T11369] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1951'. [ 424.076744][T11370] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1951'. [ 424.099770][T11372] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 424.162377][T11372] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 424.237615][T11372] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 424.251492][T11372] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 424.272047][T11372] batman_adv: batadv0: Interface deactivated: veth1_virt_wifi [ 424.280025][T11372] batman_adv: batadv0: Removing interface: veth1_virt_wifi [ 424.515690][T11374] netlink: 152 bytes leftover after parsing attributes in process `syz.1.1955'. [ 424.559693][T11374] netlink: 6 bytes leftover after parsing attributes in process `syz.1.1955'. [ 425.425602][T11391] netlink: 'syz.1.1959': attribute type 4 has an invalid length. [ 425.535571][T11397] FAULT_INJECTION: forcing a failure. [ 425.535571][T11397] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 425.574227][T11397] CPU: 0 PID: 11397 Comm: syz.2.1960 Not tainted syzkaller #0 [ 425.581803][T11397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 425.592093][T11397] Call Trace: [ 425.595438][T11397] [ 425.598414][T11397] dump_stack_lvl+0x18c/0x250 [ 425.603253][T11397] ? show_regs_print_info+0x20/0x20 [ 425.608525][T11397] ? load_image+0x420/0x420 [ 425.613197][T11397] ? __might_fault+0xaa/0x120 [ 425.617953][T11397] ? __lock_acquire+0x7d40/0x7d40 [ 425.623143][T11397] should_fail_ex+0x39d/0x4d0 [ 425.627884][T11397] _copy_from_user+0x2f/0xe0 [ 425.632522][T11397] __sys_bpf+0x23e/0x890 [ 425.636823][T11397] ? bpf_link_show_fdinfo+0x390/0x390 [ 425.642242][T11397] ? lock_chain_count+0x20/0x20 [ 425.647130][T11397] __x64_sys_bpf+0x7c/0x90 [ 425.651585][T11397] do_syscall_64+0x55/0xa0 [ 425.656124][T11397] ? clear_bhb_loop+0x40/0x90 [ 425.660836][T11397] ? clear_bhb_loop+0x40/0x90 [ 425.665546][T11397] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 425.671494][T11397] RIP: 0033:0x7f4bb139c819 [ 425.676031][T11397] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 425.695752][T11397] RSP: 002b:00007f4bb218d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 425.704203][T11397] RAX: ffffffffffffffda RBX: 00007f4bb1615fa0 RCX: 00007f4bb139c819 [ 425.712204][T11397] RDX: 000000000000000c RSI: 00002000000004c0 RDI: 000000000000000a [ 425.720212][T11397] RBP: 00007f4bb218d090 R08: 0000000000000000 R09: 0000000000000000 [ 425.728354][T11397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 425.736375][T11397] R13: 00007f4bb1616038 R14: 00007f4bb1615fa0 R15: 00007ffe78565fc8 [ 425.744430][T11397] [ 425.895252][T11406] FAULT_INJECTION: forcing a failure. [ 425.895252][T11406] name failslab, interval 1, probability 0, space 0, times 0 [ 425.910491][T11406] CPU: 1 PID: 11406 Comm: syz.0.1967 Not tainted syzkaller #0 [ 425.918138][T11406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 425.928260][T11406] Call Trace: [ 425.931594][T11406] [ 425.934604][T11406] dump_stack_lvl+0x18c/0x250 [ 425.939367][T11406] ? show_regs_print_info+0x20/0x20 [ 425.944648][T11406] ? load_image+0x420/0x420 [ 425.949371][T11406] ? __might_sleep+0xe0/0xe0 [ 425.954128][T11406] ? __lock_acquire+0x7d40/0x7d40 [ 425.959275][T11406] should_fail_ex+0x39d/0x4d0 [ 425.964049][T11406] should_failslab+0x9/0x20 [ 425.969349][T11406] slab_pre_alloc_hook+0x59/0x310 [ 425.974537][T11406] ? subflow_ulp_init+0x95/0x530 [ 425.979531][T11406] __kmem_cache_alloc_node+0x53/0x250 [ 425.985048][T11406] ? tcp_set_ulp+0xb1/0x5f0 [ 425.989704][T11406] ? subflow_ulp_init+0x95/0x530 [ 425.994699][T11406] kmalloc_trace+0x2a/0xe0 [ 425.999231][T11406] subflow_ulp_init+0x95/0x530 [ 426.004074][T11406] ? tcp_set_ulp+0xb1/0x5f0 [ 426.008715][T11406] tcp_set_ulp+0x536/0x5f0 [ 426.013189][T11406] mptcp_subflow_create_socket+0x60e/0xac0 [ 426.019127][T11406] ? mark_lock+0x94/0x320 [ 426.023501][T11406] ? __mptcp_subflow_connect+0x1450/0x1450 [ 426.029427][T11406] ? lock_chain_count+0x20/0x20 [ 426.034315][T11406] __mptcp_nmpc_sk+0x157/0x740 [ 426.039144][T11406] ? __local_bh_enable_ip+0x13a/0x1c0 [ 426.044580][T11406] ? __bpf_trace_subflow_check_data_avail+0x160/0x160 [ 426.051435][T11406] mptcp_setsockopt+0xfef/0x3390 [ 426.056415][T11406] ? __fget_files+0x28/0x4b0 [ 426.061086][T11406] ? pm_nl_exit_net+0x230/0x230 [ 426.065986][T11406] ? aa_af_perm+0x330/0x330 [ 426.070573][T11406] ? __fget_files+0x28/0x4b0 [ 426.075235][T11406] ? __fget_files+0x28/0x4b0 [ 426.079891][T11406] ? aa_sock_opt_perm+0x74/0x100 [ 426.084946][T11406] ? sock_common_setsockopt+0x36/0xc0 [ 426.090388][T11406] ? sock_common_recvmsg+0x190/0x190 [ 426.095723][T11406] do_sock_setsockopt+0x175/0x1a0 [ 426.100879][T11406] ? __fdget+0x180/0x210 [ 426.105190][T11406] __x64_sys_setsockopt+0x182/0x200 [ 426.110472][T11406] do_syscall_64+0x55/0xa0 [ 426.114930][T11406] ? clear_bhb_loop+0x40/0x90 [ 426.119755][T11406] ? clear_bhb_loop+0x40/0x90 [ 426.124525][T11406] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 426.130468][T11406] RIP: 0033:0x7f8b3db9c819 [ 426.134934][T11406] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 426.154777][T11406] RSP: 002b:00007f8b3eabd028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 426.163257][T11406] RAX: ffffffffffffffda RBX: 00007f8b3de15fa0 RCX: 00007f8b3db9c819 [ 426.171663][T11406] RDX: 0000000000000022 RSI: 0000000000000006 RDI: 0000000000000003 [ 426.179705][T11406] RBP: 00007f8b3eabd090 R08: 0000000000000000 R09: 0000000000000000 [ 426.187720][T11406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 426.195837][T11406] R13: 00007f8b3de16038 R14: 00007f8b3de15fa0 R15: 00007fff91e60068 [ 426.204133][T11406] [ 426.337818][T11417] sctp: [Deprecated]: syz.0.1969 (pid 11417) Use of int in max_burst socket option deprecated. [ 426.337818][T11417] Use struct sctp_assoc_value instead [ 426.366759][T11417] netlink: 'syz.0.1969': attribute type 21 has an invalid length. [ 426.573741][T11422] netlink: 'syz.3.1972': attribute type 39 has an invalid length. [ 427.355571][T11438] FAULT_INJECTION: forcing a failure. [ 427.355571][T11438] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 427.372881][T11438] CPU: 1 PID: 11438 Comm: syz.0.1978 Not tainted syzkaller #0 [ 427.380434][T11438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 427.390634][T11438] Call Trace: [ 427.394081][T11438] [ 427.397062][T11438] dump_stack_lvl+0x18c/0x250 [ 427.401809][T11438] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 427.408041][T11438] ? show_regs_print_info+0x20/0x20 [ 427.413318][T11438] ? load_image+0x420/0x420 [ 427.417900][T11438] should_fail_ex+0x39d/0x4d0 [ 427.422651][T11438] _copy_from_user+0x2f/0xe0 [ 427.427298][T11438] __sys_bpf+0x23e/0x890 [ 427.431598][T11438] ? bpf_link_show_fdinfo+0x390/0x390 [ 427.437055][T11438] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 427.443291][T11438] __x64_sys_bpf+0x7c/0x90 [ 427.447766][T11438] do_syscall_64+0x55/0xa0 [ 427.452233][T11438] ? clear_bhb_loop+0x40/0x90 [ 427.456964][T11438] ? clear_bhb_loop+0x40/0x90 [ 427.461693][T11438] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 427.467642][T11438] RIP: 0033:0x7f8b3db9c819 [ 427.472119][T11438] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 427.491920][T11438] RSP: 002b:00007f8b3ea9c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 427.500478][T11438] RAX: ffffffffffffffda RBX: 00007f8b3de16090 RCX: 00007f8b3db9c819 [ 427.508677][T11438] RDX: 0000000000000048 RSI: 00002000000054c0 RDI: 0000000000000005 [ 427.516700][T11438] RBP: 00007f8b3ea9c090 R08: 0000000000000000 R09: 0000000000000000 [ 427.524803][T11438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 427.532817][T11438] R13: 00007f8b3de16128 R14: 00007f8b3de16090 R15: 00007fff91e60068 [ 427.540859][T11438] [ 427.876438][T11440] sctp: [Deprecated]: syz.2.1979 (pid 11440) Use of int in max_burst socket option deprecated. [ 427.876438][T11440] Use struct sctp_assoc_value instead [ 427.918563][T11440] netlink: 'syz.2.1979': attribute type 21 has an invalid length. [ 427.920130][T11442] netlink: 'syz.1.1980': attribute type 33 has an invalid length. [ 427.953104][T11442] netlink: 199836 bytes leftover after parsing attributes in process `syz.1.1980'. [ 428.209549][T11452] netlink: 152 bytes leftover after parsing attributes in process `syz.0.1984'. [ 428.226392][T11452] netlink: 6 bytes leftover after parsing attributes in process `syz.0.1984'. [ 429.734136][T11474] FAULT_INJECTION: forcing a failure. [ 429.734136][T11474] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 429.750183][T11474] CPU: 0 PID: 11474 Comm: syz.3.1989 Not tainted syzkaller #0 [ 429.757730][T11474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 429.767847][T11474] Call Trace: [ 429.771261][T11474] [ 429.774243][T11474] dump_stack_lvl+0x18c/0x250 [ 429.778998][T11474] ? show_regs_print_info+0x20/0x20 [ 429.784273][T11474] ? load_image+0x420/0x420 [ 429.788845][T11474] ? __might_fault+0xaa/0x120 [ 429.793926][T11474] ? __lock_acquire+0x7d40/0x7d40 [ 429.799104][T11474] should_fail_ex+0x39d/0x4d0 [ 429.803874][T11474] _copy_to_user+0x2f/0xa0 [ 429.808359][T11474] bpf_test_finish+0x19f/0x650 [ 429.813190][T11474] ? convert___skb_to_skb+0x590/0x590 [ 429.818715][T11474] ? convert_skb_to___skb+0x420/0x420 [ 429.824160][T11474] bpf_prog_test_run_skb+0xcc3/0x12b0 [ 429.829707][T11474] ? cpu_online+0x60/0x60 [ 429.834130][T11474] bpf_prog_test_run+0x321/0x390 [ 429.839135][T11474] __sys_bpf+0x49d/0x890 [ 429.843453][T11474] ? bpf_link_show_fdinfo+0x390/0x390 [ 429.848901][T11474] ? lock_chain_count+0x20/0x20 [ 429.853821][T11474] __x64_sys_bpf+0x7c/0x90 [ 429.858301][T11474] do_syscall_64+0x55/0xa0 [ 429.862778][T11474] ? clear_bhb_loop+0x40/0x90 [ 429.867516][T11474] ? clear_bhb_loop+0x40/0x90 [ 429.872340][T11474] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 429.878299][T11474] RIP: 0033:0x7f8e3099c819 [ 429.882781][T11474] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 429.902466][T11474] RSP: 002b:00007f8e317b1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 429.910943][T11474] RAX: ffffffffffffffda RBX: 00007f8e30c15fa0 RCX: 00007f8e3099c819 [ 429.918977][T11474] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 429.927009][T11474] RBP: 00007f8e317b1090 R08: 0000000000000000 R09: 0000000000000000 [ 429.935181][T11474] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 429.943314][T11474] R13: 00007f8e30c16038 R14: 00007f8e30c15fa0 R15: 00007ffc2effc0a8 [ 429.951526][T11474] [ 430.090111][T11478] sctp: [Deprecated]: syz.3.1991 (pid 11478) Use of int in max_burst socket option deprecated. [ 430.090111][T11478] Use struct sctp_assoc_value instead [ 430.912744][T11478] netlink: 'syz.3.1991': attribute type 21 has an invalid length. [ 431.312730][T11489] FAULT_INJECTION: forcing a failure. [ 431.312730][T11489] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 431.342895][T11489] CPU: 0 PID: 11489 Comm: syz.1.1995 Not tainted syzkaller #0 [ 431.350456][T11489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 431.360578][T11489] Call Trace: [ 431.363909][T11489] [ 431.366980][T11489] dump_stack_lvl+0x18c/0x250 [ 431.371721][T11489] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 431.377946][T11489] ? show_regs_print_info+0x20/0x20 [ 431.383217][T11489] ? load_image+0x420/0x420 [ 431.387829][T11489] should_fail_ex+0x39d/0x4d0 [ 431.392580][T11489] _copy_from_user+0x2f/0xe0 [ 431.397226][T11489] bpf_test_init+0xde/0x140 [ 431.402230][T11489] bpf_prog_test_run_xdp+0x4d1/0x10e0 [ 431.407678][T11489] ? dev_put+0x80/0x80 [ 431.411825][T11489] ? dev_put+0x80/0x80 [ 431.415953][T11489] bpf_prog_test_run+0x321/0x390 [ 431.420959][T11489] __sys_bpf+0x49d/0x890 [ 431.425282][T11489] ? bpf_link_show_fdinfo+0x390/0x390 [ 431.430733][T11489] ? lock_chain_count+0x20/0x20 [ 431.435660][T11489] __x64_sys_bpf+0x7c/0x90 [ 431.440417][T11489] do_syscall_64+0x55/0xa0 [ 431.444916][T11489] ? clear_bhb_loop+0x40/0x90 [ 431.449650][T11489] ? clear_bhb_loop+0x40/0x90 [ 431.454521][T11489] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 431.460494][T11489] RIP: 0033:0x7fb5f459c819 [ 431.464974][T11489] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 431.484738][T11489] RSP: 002b:00007fb5f54e6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 431.493321][T11489] RAX: ffffffffffffffda RBX: 00007fb5f4815fa0 RCX: 00007fb5f459c819 [ 431.501350][T11489] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 431.509464][T11489] RBP: 00007fb5f54e6090 R08: 0000000000000000 R09: 0000000000000000 [ 431.517492][T11489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 431.525520][T11489] R13: 00007fb5f4816038 R14: 00007fb5f4815fa0 R15: 00007ffc7bbc8d98 [ 431.533592][T11489] [ 431.737726][T11498] netlink: 'syz.2.1998': attribute type 10 has an invalid length. [ 431.747491][T11498] netlink: 2 bytes leftover after parsing attributes in process `syz.2.1998'. [ 431.760770][T11498] bond0: entered promiscuous mode [ 431.769810][T11498] bond_slave_0: entered promiscuous mode [ 431.783452][T11498] bond_slave_1: entered promiscuous mode [ 433.095898][T11515] netlink: 152 bytes leftover after parsing attributes in process `syz.3.2003'. [ 433.113598][T11515] netlink: 6 bytes leftover after parsing attributes in process `syz.3.2003'. [ 433.154622][T11525] sctp: [Deprecated]: syz.1.2006 (pid 11525) Use of int in max_burst socket option deprecated. [ 433.154622][T11525] Use struct sctp_assoc_value instead [ 433.224869][T11525] netlink: 'syz.1.2006': attribute type 21 has an invalid length. [ 433.612782][T11532] FAULT_INJECTION: forcing a failure. [ 433.612782][T11532] name failslab, interval 1, probability 0, space 0, times 0 [ 433.671234][T11532] CPU: 0 PID: 11532 Comm: syz.1.2008 Not tainted syzkaller #0 [ 433.678993][T11532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 433.689147][T11532] Call Trace: [ 433.692501][T11532] [ 433.695491][T11532] dump_stack_lvl+0x18c/0x250 [ 433.700262][T11532] ? show_regs_print_info+0x20/0x20 [ 433.705565][T11532] ? load_image+0x420/0x420 [ 433.710248][T11532] ? __might_sleep+0xe0/0xe0 [ 433.714947][T11532] ? __lock_acquire+0x7d40/0x7d40 [ 433.720080][T11532] should_fail_ex+0x39d/0x4d0 [ 433.724872][T11532] should_failslab+0x9/0x20 [ 433.729475][T11532] slab_pre_alloc_hook+0x59/0x310 [ 433.734597][T11532] ? d_instantiate+0x6f/0x90 [ 433.739275][T11532] kmem_cache_alloc+0x5a/0x2d0 [ 433.744149][T11532] ? alloc_empty_file+0x9e/0x1d0 [ 433.749193][T11532] alloc_empty_file+0x9e/0x1d0 [ 433.754111][T11532] alloc_file+0x5c/0x600 [ 433.758444][T11532] alloc_file_pseudo+0x184/0x210 [ 433.763472][T11532] ? alloc_empty_backing_file+0xe0/0xe0 [ 433.769118][T11532] ? init_peercred+0x263/0x2c0 [ 433.773966][T11532] sock_alloc_file+0xb7/0x280 [ 433.778731][T11532] __sys_socketpair+0x2d0/0x550 [ 433.783683][T11532] __x64_sys_socketpair+0x9b/0xb0 [ 433.788786][T11532] do_syscall_64+0x55/0xa0 [ 433.793383][T11532] ? clear_bhb_loop+0x40/0x90 [ 433.798249][T11532] ? clear_bhb_loop+0x40/0x90 [ 433.803122][T11532] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 433.809294][T11532] RIP: 0033:0x7fb5f459c819 [ 433.813795][T11532] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 433.833584][T11532] RSP: 002b:00007fb5f54e6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 433.842184][T11532] RAX: ffffffffffffffda RBX: 00007fb5f4815fa0 RCX: 00007fb5f459c819 [ 433.850236][T11532] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000001 [ 433.858279][T11532] RBP: 00007fb5f54e6090 R08: 0000000000000000 R09: 0000000000000000 [ 433.866317][T11532] R10: 00002000000029c0 R11: 0000000000000246 R12: 0000000000000002 [ 433.874351][T11532] R13: 00007fb5f4816038 R14: 00007fb5f4815fa0 R15: 00007ffc7bbc8d98 [ 433.882460][T11532] [ 433.939996][T11536] netlink: 'syz.3.2009': attribute type 10 has an invalid length. [ 433.948023][T11536] netlink: 40 bytes leftover after parsing attributes in process `syz.3.2009'. [ 433.958188][T11536] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 434.094454][T11537] netlink: 'syz.2.2010': attribute type 17 has an invalid length. [ 434.106174][T11539] FAULT_INJECTION: forcing a failure. [ 434.106174][T11539] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 434.120945][T11537] netlink: 152 bytes leftover after parsing attributes in process `syz.2.2010'. [ 434.136905][T11539] CPU: 0 PID: 11539 Comm: syz.3.2011 Not tainted syzkaller #0 [ 434.144534][T11539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 434.154916][T11539] Call Trace: [ 434.158279][T11539] [ 434.161275][T11539] dump_stack_lvl+0x18c/0x250 [ 434.166043][T11539] ? show_regs_print_info+0x20/0x20 [ 434.171316][T11539] ? load_image+0x420/0x420 [ 434.175924][T11539] ? __lock_acquire+0x7d40/0x7d40 [ 434.181090][T11539] should_fail_ex+0x39d/0x4d0 [ 434.185877][T11539] prepare_alloc_pages+0x1e2/0x5f0 [ 434.191100][T11539] __alloc_pages+0x134/0x460 [ 434.195860][T11539] ? zone_statistics+0x170/0x170 [ 434.200891][T11539] ? alloc_pages+0x4dc/0x740 [ 434.205634][T11539] ? do_raw_spin_unlock+0x121/0x230 [ 434.210928][T11539] __get_free_pages+0xc/0x30 [ 434.215587][T11539] kasan_populate_vmalloc_pte+0x35/0x100 [ 434.221436][T11539] __apply_to_page_range+0x860/0xdd0 [ 434.226829][T11539] ? kasan_populate_vmalloc+0x70/0x70 [ 434.232281][T11539] ? apply_to_page_range+0x50/0x50 [ 434.237487][T11539] ? do_raw_spin_unlock+0x121/0x230 [ 434.242872][T11539] alloc_vmap_area+0x1d0c/0x1e30 [ 434.247951][T11539] ? vm_map_ram+0xcb0/0xcb0 [ 434.252535][T11539] ? rcu_is_watching+0x15/0xb0 [ 434.257396][T11539] __get_vm_area_node+0x162/0x370 [ 434.262515][T11539] __vmalloc_node_range+0x36e/0x1330 [ 434.267883][T11539] ? sock_hash_alloc+0x261/0x4d0 [ 434.272978][T11539] ? free_vm_area+0x50/0x50 [ 434.277592][T11539] ? bpf_map_area_alloc+0x5e/0x110 [ 434.282863][T11539] ? rcu_is_watching+0x15/0xb0 [ 434.287697][T11539] ? bpf_map_area_alloc+0x5e/0x110 [ 434.292885][T11539] bpf_map_area_alloc+0xf1/0x110 [ 434.297914][T11539] ? sock_hash_alloc+0x261/0x4d0 [ 434.302924][T11539] sock_hash_alloc+0x261/0x4d0 [ 434.307775][T11539] map_create+0x877/0x12f0 [ 434.312433][T11539] ? bpf_lsm_bpf+0x9/0x10 [ 434.317023][T11539] __sys_bpf+0x651/0x890 [ 434.321354][T11539] ? bpf_link_show_fdinfo+0x390/0x390 [ 434.326939][T11539] ? lock_chain_count+0x20/0x20 [ 434.331899][T11539] __x64_sys_bpf+0x7c/0x90 [ 434.336399][T11539] do_syscall_64+0x55/0xa0 [ 434.340868][T11539] ? clear_bhb_loop+0x40/0x90 [ 434.345696][T11539] ? clear_bhb_loop+0x40/0x90 [ 434.350702][T11539] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 434.356654][T11539] RIP: 0033:0x7f8e3099c819 [ 434.361134][T11539] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 434.380814][T11539] RSP: 002b:00007f8e317b1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 434.389381][T11539] RAX: ffffffffffffffda RBX: 00007f8e30c15fa0 RCX: 00007f8e3099c819 [ 434.397412][T11539] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 0000000000000000 [ 434.405444][T11539] RBP: 00007f8e317b1090 R08: 0000000000000000 R09: 0000000000000000 [ 434.413485][T11539] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 434.421518][T11539] R13: 00007f8e30c16038 R14: 00007f8e30c15fa0 R15: 00007ffc2effc0a8 [ 434.429596][T11539] [ 434.465014][T11540] netlink: 209844 bytes leftover after parsing attributes in process `syz.2.2010'. [ 434.742428][T11544] netlink: 'syz.1.2013': attribute type 5 has an invalid length. [ 435.157497][T11556] sctp: [Deprecated]: syz.1.2016 (pid 11556) Use of int in max_burst socket option deprecated. [ 435.157497][T11556] Use struct sctp_assoc_value instead [ 435.196359][T11556] netlink: 'syz.1.2016': attribute type 21 has an invalid length. [ 435.461224][ C0] [ 435.461234][ C0] ================================ [ 435.461239][ C0] WARNING: inconsistent lock state [ 435.461250][ C0] syzkaller #0 Not tainted [ 435.461260][ C0] -------------------------------- [ 435.461265][ C0] inconsistent {INITIAL USE} -> {IN-NMI} usage. [ 435.461273][ C0] syz.0.2021/11566 [HC1[1]:SC0[0]:HE0:SE1] takes: [ 435.461293][ C0] ffff8880218e5d20 (&htab->lockdep_key){....}-{2:2}, at: htab_lock_bucket+0x17d/0x300 [ 435.461346][ C0] {INITIAL USE} state was registered at: [ 435.461357][ C0] lock_acquire+0x19e/0x420 [ 435.461377][ C0] _raw_spin_lock+0x2e/0x40 [ 435.461396][ C0] htab_lock_bucket+0x17d/0x300 [ 435.461414][ C0] htab_lru_map_delete_elem+0x1a4/0x650 [ 435.461433][ C0] bpf_prog_2c29ac5cdc6b1842+0x42/0x46 [ 435.461452][ C0] bpf_overflow_handler+0x1fc/0x510 [ 435.461477][ C0] __perf_event_overflow+0x447/0x630 [ 435.461496][ C0] perf_swevent_event+0x319/0x570 [ 435.461515][ C0] perf_bp_event+0x319/0x430 [ 435.461533][ C0] hw_breakpoint_exceptions_notify+0x23e/0x670 [ 435.461554][ C0] notifier_call_chain+0x197/0x380 [ 435.461574][ C0] atomic_notifier_call_chain+0xda/0x180 [ 435.461595][ C0] notify_die+0x145/0x1a0 [ 435.461615][ C0] notify_debug+0x2e/0x50 [ 435.461629][ C0] noist_exc_debug+0x77/0x120 [ 435.461644][ C0] asm_exc_debug+0x33/0x40 [ 435.461665][ C0] irq event stamp: 1704 [ 435.461671][ C0] hardirqs last enabled at (1703): [] syscall_enter_from_user_mode+0x25/0x80 [ 435.461700][ C0] hardirqs last disabled at (1704): [] exc_debug+0x73/0x140 [ 435.461723][ C0] softirqs last enabled at (1404): [] bpf_prog_load+0x1266/0x1670 [ 435.461749][ C0] softirqs last disabled at (1402): [] bpf_ksym_add+0x2d/0x340 [ 435.461775][ C0] [ 435.461775][ C0] other info that might help us debug this: [ 435.461780][ C0] Possible unsafe locking scenario: [ 435.461780][ C0] [ 435.461784][ C0] CPU0 [ 435.461788][ C0] ---- [ 435.461791][ C0] lock(&htab->lockdep_key); [ 435.461804][ C0] [ 435.461807][ C0] lock(&htab->lockdep_key); [ 435.461818][ C0] [ 435.461818][ C0] *** DEADLOCK *** [ 435.461818][ C0] [ 435.461822][ C0] no locks held by syz.0.2021/11566. [ 435.461830][ C0] [ 435.461830][ C0] stack backtrace: [ 435.461836][ C0] CPU: 0 PID: 11566 Comm: syz.0.2021 Not tainted syzkaller #0 [ 435.461853][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 435.461864][ C0] Call Trace: [ 435.461872][ C0] <#DB> [ 435.461881][ C0] dump_stack_lvl+0x18c/0x250 [ 435.461920][ C0] ? show_regs_print_info+0x20/0x20 [ 435.461964][ C0] ? print_usage_bug+0x475/0x690 [ 435.461988][ C0] ? verify_lock_unused+0x18/0x140 [ 435.462019][ C0] lock_acquire+0x2c2/0x420 [ 435.462049][ C0] ? htab_lock_bucket+0x17d/0x300 [ 435.462075][ C0] ? read_lock_is_recursive+0x20/0x20 [ 435.462118][ C0] _raw_spin_lock+0x2e/0x40 [ 435.462138][ C0] ? htab_lock_bucket+0x17d/0x300 [ 435.462158][ C0] htab_lock_bucket+0x17d/0x300 [ 435.462192][ C0] ? htab_lru_map_delete_node+0x760/0x760 [ 435.462220][ C0] ? verify_lock_unused+0x18/0x140 [ 435.462247][ C0] ? jhash+0x34e/0x740 [ 435.462272][ C0] htab_lru_map_delete_elem+0x1a4/0x650 [ 435.462304][ C0] ? htab_lru_map_update_elem+0x990/0x990 [ 435.462326][ C0] ? perf_callchain+0x220/0x220 [ 435.462359][ C0] bpf_prog_2c29ac5cdc6b1842+0x42/0x46 [ 435.462383][ C0] bpf_overflow_handler+0x1fc/0x510 [ 435.462413][ C0] ? perf_prepare_header+0x1e0/0x1e0 [ 435.462437][ C0] ? bpf_overflow_handler+0xde/0x510 [ 435.462463][ C0] ? tp_perf_event_destroy+0x20/0x20 [ 435.462503][ C0] ? __perf_event_account_interrupt+0x187/0x280 [ 435.462531][ C0] __perf_event_overflow+0x447/0x630 [ 435.462566][ C0] perf_swevent_event+0x319/0x570 [ 435.462594][ C0] ? perf_tp_event+0x1520/0x1520 [ 435.462616][ C0] ? perf_trace_buf_alloc+0x290/0x290 [ 435.462659][ C0] perf_bp_event+0x319/0x430 [ 435.462691][ C0] ? perf_event_free_bpf_prog+0x120/0x120 [ 435.462766][ C0] ? lock_acquire+0x2c2/0x420 [ 435.462801][ C0] hw_breakpoint_exceptions_notify+0x23e/0x670 [ 435.462833][ C0] notifier_call_chain+0x197/0x380 [ 435.462863][ C0] ? atomic_notifier_call_chain+0x26/0x180 [ 435.462892][ C0] atomic_notifier_call_chain+0xda/0x180 [ 435.462921][ C0] notify_die+0x145/0x1a0 [ 435.462950][ C0] ? srcu_init_notifier_head+0x90/0x90 [ 435.462988][ C0] ? rcu_is_watching+0x15/0xb0 [ 435.463020][ C0] notify_debug+0x2e/0x50 [ 435.463039][ C0] exc_debug+0xde/0x140 [ 435.463065][ C0] asm_exc_debug+0x1e/0x40 [ 435.463088][ C0] RIP: 0010:rep_movs_alternative+0x15/0x90 [ 435.463109][ C0] Code: 8b 1c 24 4c 8b 64 24 08 48 83 c4 10 c3 cc cc cc cc cc cc cc cc f3 0f 1e fa 48 83 f9 40 73 40 83 f9 08 73 21 85 c9 74 0f 8a 06 <88> 07 48 ff c7 48 ff c6 48 ff c9 75 f1 c3 66 2e 0f 1f 84 00 00 00 [ 435.463125][ C0] RSP: 0018:ffffc9000433fc70 EFLAGS: 00040202 [ 435.463141][ C0] RAX: ffffffff842a1fff RBX: 0000000000000004 RCX: 0000000000000004 [ 435.463154][ C0] RDX: 0000000000000001 RSI: 0000200000000300 RDI: ffffc9000433fd60 [ 435.463167][ C0] RBP: ffffc9000433fe78 R08: 0000000000000003 R09: 0000000000000004 [ 435.463187][ C0] R10: dffffc0000000000 R11: fffff52000867fac R12: 0000200000000304 [ 435.463200][ C0] R13: 0000000000000012 R14: ffffc9000433fd60 R15: 0000200000000300 [ 435.463226][ C0] ? _copy_to_user+0x2f/0xa0 [ 435.463267][ C0] [ 435.463273][ C0] [ 435.463278][ C0] _copy_from_user+0x8b/0xe0 [ 435.463307][ C0] sk_setsockopt+0x2b2/0x2bc0 [ 435.463343][ C0] ? sockopt_capable+0x60/0x60 [ 435.463376][ C0] ? aa_sk_perm+0x83c/0x970 [ 435.463406][ C0] ? __fget_files+0x28/0x4b0 [ 435.463446][ C0] ? aa_af_perm+0x330/0x330 [ 435.463483][ C0] ? __fget_files+0x28/0x4b0 [ 435.463507][ C0] ? __fget_files+0x28/0x4b0 [ 435.463533][ C0] ? aa_sock_opt_perm+0x74/0x100 [ 435.463564][ C0] ? bpf_lsm_socket_setsockopt+0x9/0x10 [ 435.463589][ C0] ? security_socket_setsockopt+0x7e/0xa0 [ 435.463620][ C0] do_sock_setsockopt+0x11b/0x1a0 [ 435.463648][ C0] __x64_sys_setsockopt+0x182/0x200 [ 435.463678][ C0] do_syscall_64+0x55/0xa0 [ 435.463695][ C0] ? clear_bhb_loop+0x40/0x90 [ 435.463718][ C0] ? clear_bhb_loop+0x40/0x90 [ 435.463747][ C0] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 435.463771][ C0] RIP: 0033:0x7f8b3db9c819 [ 435.463788][ C0] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 435.463804][ C0] RSP: 002b:00007f8b3eabd028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 435.463823][ C0] RAX: ffffffffffffffda RBX: 00007f8b3de15fa0 RCX: 00007f8b3db9c819 [ 435.463837][ C0] RDX: 0000000000000012 RSI: 0000000000000001 RDI: 0000000000000004 [ 435.463848][ C0] RBP: 00007f8b3dc32c91 R08: 0000000000000004 R09: 0000000000000000 [ 435.463859][ C0] R10: 0000200000000300 R11: 0000000000000246 R12: 0000000000000000 [ 435.463870][ C0] R13: 00007f8b3de16038 R14: 00007f8b3de15fa0 R15: 00007fff91e60068 [ 435.463910][ C0] [ 436.165852][T11570] FAULT_INJECTION: forcing a failure. [ 436.165852][T11570] name failslab, interval 1, probability 0, space 0, times 0 [ 436.186582][T11570] CPU: 0 PID: 11570 Comm: syz.3.2022 Not tainted syzkaller #0 [ 436.194138][T11570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 436.204246][T11570] Call Trace: [ 436.207571][T11570] [ 436.210543][T11570] dump_stack_lvl+0x18c/0x250 [ 436.215283][T11570] ? slab_pre_alloc_hook+0x31/0x310 [ 436.220548][T11570] ? show_regs_print_info+0x20/0x20 [ 436.225909][T11570] ? load_image+0x420/0x420 [ 436.230471][T11570] ? __might_sleep+0xe0/0xe0 [ 436.235114][T11570] ? __lock_acquire+0x7d40/0x7d40 [ 436.240193][T11570] ? rcu_is_watching+0x15/0xb0 [ 436.245024][T11570] ? mntput_no_expire+0xc2/0x870 [ 436.250034][T11570] should_fail_ex+0x39d/0x4d0 [ 436.254791][T11570] should_failslab+0x9/0x20 [ 436.259797][T11570] slab_pre_alloc_hook+0x59/0x310 [ 436.264890][T11570] ? __get_vm_area_node+0x125/0x370 [ 436.270159][T11570] __kmem_cache_alloc_node+0x53/0x250 [ 436.275587][T11570] ? __get_vm_area_node+0x125/0x370 [ 436.280849][T11570] kmalloc_node_trace+0x26/0xe0 [ 436.285759][T11570] __get_vm_area_node+0x125/0x370 [ 436.290856][T11570] __vmalloc_node_range+0x36e/0x1330 [ 436.296288][T11570] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 436.297106][T11575] FAULT_INJECTION: forcing a failure. [ 436.297106][T11575] name failslab, interval 1, probability 0, space 0, times 0 [ 436.301891][T11570] ? trace_event_raw_event_lock+0x250/0x250 [ 436.301918][T11570] ? __might_fault+0xaa/0x120 [ 436.301941][T11570] ? free_vm_area+0x50/0x50 [ 436.301966][T11570] ? end_current_label_crit_section+0x170/0x170 [ 436.302002][T11570] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 436.342062][T11570] __vmalloc+0x7a/0x90 [ 436.346178][T11570] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 436.351754][T11570] bpf_prog_alloc_no_stats+0x47/0x440 [ 436.357178][T11570] ? bpf_prog_alloc+0x2b/0x1a0 [ 436.361983][T11570] bpf_prog_alloc+0x3d/0x1a0 [ 436.366638][T11570] bpf_prog_load+0x6eb/0x1670 [ 436.371360][T11570] ? vfs_write+0x7dd/0x990 [ 436.376005][T11570] ? map_freeze+0x420/0x420 [ 436.380545][T11570] ? lock_release+0xb5/0x8c0 [ 436.385167][T11570] ? __might_sleep+0xe0/0xe0 [ 436.389799][T11570] ? read_lock_is_recursive+0x20/0x20 [ 436.395210][T11570] ? __lock_acquire+0x7d40/0x7d40 [ 436.400265][T11570] ? file_end_write+0x159/0x250 [ 436.405153][T11570] ? __might_fault+0xaa/0x120 [ 436.409867][T11570] ? __might_fault+0xc6/0x120 [ 436.414668][T11570] ? __might_fault+0xaa/0x120 [ 436.419468][T11570] ? bpf_lsm_bpf+0x9/0x10 [ 436.423832][T11570] ? security_bpf+0x7e/0xa0 [ 436.428374][T11570] __sys_bpf+0x5ba/0x890 [ 436.432655][T11570] ? bpf_link_show_fdinfo+0x390/0x390 [ 436.438151][T11570] ? ksys_write+0x1fb/0x260 [ 436.442706][T11570] ? lock_chain_count+0x20/0x20 [ 436.447593][T11570] __x64_sys_bpf+0x7c/0x90 [ 436.452055][T11570] do_syscall_64+0x55/0xa0 [ 436.456500][T11570] ? clear_bhb_loop+0x40/0x90 [ 436.461217][T11570] ? clear_bhb_loop+0x40/0x90 [ 436.466017][T11570] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 436.472029][T11570] RIP: 0033:0x7f8e3099c819 [ 436.476571][T11570] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 436.496227][T11570] RSP: 002b:00007f8e317b1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 436.504771][T11570] RAX: ffffffffffffffda RBX: 00007f8e30c15fa0 RCX: 00007f8e3099c819 [ 436.512770][T11570] RDX: 0000000000000070 RSI: 0000200000000440 RDI: 0000000000000005 [ 436.520771][T11570] RBP: 00007f8e317b1090 R08: 0000000000000000 R09: 0000000000000000 [ 436.528823][T11570] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 436.536873][T11570] R13: 00007f8e30c16038 R14: 00007f8e30c15fa0 R15: 00007ffc2effc0a8 [ 436.544895][T11570] [ 436.549733][T11568] netlink: 'syz.1.2023': attribute type 21 has an invalid length. [ 436.560359][T11568] netlink: 'syz.1.2023': attribute type 1 has an invalid length. [ 436.562740][T11575] CPU: 1 PID: 11575 Comm: syz.2.2024 Not tainted syzkaller #0 [ 436.575637][T11575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 436.585930][T11575] Call Trace: [ 436.586169][T11570] syz.3.2022: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null) [ 436.589245][T11575] [ 436.589253][T11575] dump_stack_lvl+0x18c/0x250 [ 436.603539][T11570] ,cpuset= [ 436.606042][T11575] ? show_regs_print_info+0x20/0x20 [ 436.610907][T11570] syz3 [ 436.613792][T11575] ? load_image+0x420/0x420 [ 436.619410][T11570] ,mems_allowed=0-1 [ 436.621692][T11575] ? __might_sleep+0xe0/0xe0 [ 436.621726][T11575] ? rcu_is_watching+0x15/0xb0 [ 436.621753][T11575] ? __lock_acquire+0x7d40/0x7d40 [ 436.621775][T11575] ? trace_contention_end+0x39/0xe0 [ 436.621796][T11575] should_fail_ex+0x39d/0x4d0 [ 436.626797][T11570] [ 436.630324][T11575] should_failslab+0x9/0x20 [ 436.630359][T11575] slab_pre_alloc_hook+0x59/0x310 [ 436.666660][T11575] ? mutex_lock_nested+0x20/0x20 [ 436.671642][T11575] ? rxrpc_lookup_local+0x579/0x1610 [ 436.676972][T11575] __kmem_cache_alloc_node+0x53/0x250 [ 436.682399][T11575] ? __up_read+0x2b6/0x6b0 [ 436.686848][T11575] ? rxrpc_lookup_local+0x579/0x1610 [ 436.692172][T11575] kmalloc_trace+0x2a/0xe0 [ 436.696628][T11575] rxrpc_lookup_local+0x579/0x1610 [ 436.701775][T11575] ? rxrpc_sendmsg+0x106/0x5b0 [ 436.706567][T11575] ? rxrpc_local_dont_fragment+0x70/0x70 [ 436.712246][T11575] ? rcu_is_watching+0x15/0xb0 [ 436.717044][T11575] ? rxrpc_sendmsg+0x106/0x5b0 [ 436.721948][T11575] ? __local_bh_enable_ip+0x13a/0x1c0 [ 436.727443][T11575] ? _local_bh_enable+0xa0/0xa0 [ 436.732329][T11575] rxrpc_sendmsg+0x30a/0x5b0 [ 436.736951][T11575] ? rxrpc_getsockopt+0x150/0x150 [ 436.742008][T11575] ____sys_sendmsg+0x5ba/0x960 [ 436.746920][T11575] ? __lock_acquire+0x7d40/0x7d40 [ 436.752022][T11575] ? __sys_sendmsg_sock+0x30/0x30 [ 436.757260][T11575] ? __import_iovec+0x5f2/0x850 [ 436.762231][T11575] ? import_iovec+0x73/0xa0 [ 436.766819][T11575] ___sys_sendmsg+0x2a6/0x360 [ 436.771528][T11575] ? __sys_sendmsg+0x2a0/0x2a0 [ 436.776380][T11575] ? lock_release+0xb5/0x8c0 [ 436.781118][T11575] ? __lock_acquire+0x7d40/0x7d40 [ 436.786207][T11575] __se_sys_sendmsg+0x1c2/0x2b0 [ 436.791183][T11575] ? __x64_sys_sendmsg+0x80/0x80 [ 436.796236][T11575] do_syscall_64+0x55/0xa0 [ 436.800684][T11575] ? clear_bhb_loop+0x40/0x90 [ 436.805395][T11575] ? clear_bhb_loop+0x40/0x90 [ 436.810114][T11575] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 436.816151][T11575] RIP: 0033:0x7f4bb139c819 [ 436.820688][T11575] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 436.840961][T11575] RSP: 002b:00007f4baf5f6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 436.849416][T11575] RAX: ffffffffffffffda RBX: 00007f4bb1616090 RCX: 00007f4bb139c819 [ 436.857515][T11575] RDX: 0000000000008000 RSI: 0000200000000000 RDI: 0000000000000004 [ 436.865518][T11575] RBP: 00007f4baf5f6090 R08: 0000000000000000 R09: 0000000000000000 [ 436.873609][T11575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 436.881615][T11575] R13: 00007f4bb1616128 R14: 00007f4bb1616090 R15: 00007ffe78565fc8 [ 436.889631][T11575] [ 436.892700][T11570] CPU: 0 PID: 11570 Comm: syz.3.2022 Not tainted syzkaller #0 [ 436.900363][T11570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 436.910641][T11570] Call Trace: [ 436.913968][T11570] [ 436.916951][T11570] dump_stack_lvl+0x18c/0x250 [ 436.921697][T11570] ? load_image+0x420/0x420 [ 436.926276][T11570] ? show_regs_print_info+0x20/0x20 [ 436.931534][T11570] ? load_image+0x420/0x420 [ 436.936106][T11570] ? __rcu_read_unlock+0x7c/0xd0 [ 436.941122][T11570] ? cpuset_print_current_mems_allowed+0x1f/0x360 [ 436.947595][T11570] ? cpuset_print_current_mems_allowed+0x2e7/0x360 [ 436.954233][T11570] warn_alloc+0x246/0x340 [ 436.958664][T11570] ? __get_vm_area_node+0x125/0x370 [ 436.964006][T11570] ? zone_watermark_ok_safe+0x230/0x230 [ 436.969625][T11570] ? rcu_is_watching+0x15/0xb0 [ 436.974447][T11570] ? __get_vm_area_node+0x356/0x370 [ 436.980053][T11570] __vmalloc_node_range+0x393/0x1330 [ 436.985479][T11570] ? trace_event_raw_event_lock+0x250/0x250 [ 436.991410][T11570] ? __might_fault+0xaa/0x120 [ 436.996140][T11570] ? free_vm_area+0x50/0x50 [ 437.000698][T11570] ? end_current_label_crit_section+0x170/0x170 [ 437.006985][T11570] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 437.012573][T11570] __vmalloc+0x7a/0x90 [ 437.016671][T11570] ? bpf_prog_alloc_no_stats+0x47/0x440 [ 437.022249][T11570] bpf_prog_alloc_no_stats+0x47/0x440 [ 437.027669][T11570] ? bpf_prog_alloc+0x2b/0x1a0 [ 437.032553][T11570] bpf_prog_alloc+0x3d/0x1a0 [ 437.037189][T11570] bpf_prog_load+0x6eb/0x1670 [ 437.041907][T11570] ? vfs_write+0x7dd/0x990 [ 437.046369][T11570] ? map_freeze+0x420/0x420 [ 437.051263][T11570] ? lock_release+0xb5/0x8c0 [ 437.055882][T11570] ? __might_sleep+0xe0/0xe0 [ 437.060512][T11570] ? read_lock_is_recursive+0x20/0x20 [ 437.065925][T11570] ? __lock_acquire+0x7d40/0x7d40 [ 437.070994][T11570] ? file_end_write+0x159/0x250 [ 437.075882][T11570] ? __might_fault+0xaa/0x120 [ 437.080627][T11570] ? __might_fault+0xc6/0x120 [ 437.085365][T11570] ? __might_fault+0xaa/0x120 [ 437.090172][T11570] ? bpf_lsm_bpf+0x9/0x10 [ 437.094549][T11570] ? security_bpf+0x7e/0xa0 [ 437.099188][T11570] __sys_bpf+0x5ba/0x890 [ 437.103486][T11570] ? bpf_link_show_fdinfo+0x390/0x390 [ 437.108981][T11570] ? ksys_write+0x1fb/0x260 [ 437.113521][T11570] ? lock_chain_count+0x20/0x20 [ 437.118403][T11570] __x64_sys_bpf+0x7c/0x90 [ 437.122863][T11570] do_syscall_64+0x55/0xa0 [ 437.127423][T11570] ? clear_bhb_loop+0x40/0x90 [ 437.132130][T11570] ? clear_bhb_loop+0x40/0x90 [ 437.136948][T11570] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 437.142899][T11570] RIP: 0033:0x7f8e3099c819 [ 437.147341][T11570] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 437.166982][T11570] RSP: 002b:00007f8e317b1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 437.175511][T11570] RAX: ffffffffffffffda RBX: 00007f8e30c15fa0 RCX: 00007f8e3099c819 [ 437.183537][T11570] RDX: 0000000000000070 RSI: 0000200000000440 RDI: 0000000000000005 [ 437.191545][T11570] RBP: 00007f8e317b1090 R08: 0000000000000000 R09: 0000000000000000 [ 437.199540][T11570] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 437.207530][T11570] R13: 00007f8e30c16038 R14: 00007f8e30c15fa0 R15: 00007ffc2effc0a8 [ 437.215548][T11570] [ 437.227021][T11570] Mem-Info: [ 437.230263][T11570] active_anon:14223 inactive_anon:0 isolated_anon:0 [ 437.230263][T11570] active_file:16689 inactive_file:40069 isolated_file:0 [ 437.230263][T11570] unevictable:768 dirty:386 writeback:0 [ 437.230263][T11570] slab_reclaimable:10591 slab_unreclaimable:97590 [ 437.230263][T11570] mapped:24583 shmem:1361 pagetables:580 [ 437.230263][T11570] sec_pagetables:0 bounce:0 [ 437.230263][T11570] kernel_misc_reclaimable:0 [ 437.230263][T11570] free:1331623 free_pcp:10857 free_cma:0 [ 437.302640][T11570] Node 0 active_anon:56592kB inactive_anon:0kB active_file:66756kB inactive_file:160076kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:98132kB dirty:1544kB writeback:0kB shmem:3908kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:10040kB pagetables:2120kB sec_pagetables:0kB all_unreclaimable? no [ 437.335540][T11570] Node 1 active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:200kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:1536kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:16kB pagetables:0kB sec_pagetables:0kB all_unreclaimable? no [ 437.368076][T11570] Node 0 DMA free:15360kB boost:0kB min:204kB low:252kB high:300kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 437.396490][T11570] lowmem_reserve[]: 0 2521 2522 2522 2522 [ 437.402423][T11570] Node 0 DMA32 free:1416128kB boost:0kB min:34644kB low:43304kB high:51964kB reserved_highatomic:0KB active_anon:56452kB inactive_anon:0kB active_file:66756kB inactive_file:159252kB unevictable:1536kB writepending:1544kB present:3129332kB managed:2586956kB mlocked:0kB bounce:0kB free_pcp:25160kB local_pcp:19812kB free_cma:0kB [ 437.433857][T11570] lowmem_reserve[]: 0 0 0 0 0 [ 437.438754][T11570] Node 0 Normal free:0kB boost:0kB min:8kB low:8kB high:8kB reserved_highatomic:0KB active_anon:40kB inactive_anon:0kB active_file:0kB inactive_file:824kB unevictable:0kB writepending:0kB present:1048576kB managed:872kB mlocked:0kB bounce:0kB free_pcp:8kB local_pcp:0kB free_cma:0kB [ 437.465708][T11570] lowmem_reserve[]: 0 0 0 0 0 [ 437.470572][T11570] Node 1 Normal free:3895260kB boost:0kB min:55244kB low:69052kB high:82860kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:200kB unevictable:1536kB writepending:0kB present:4194304kB managed:4117312kB mlocked:0kB bounce:0kB free_pcp:20224kB local_pcp:9504kB free_cma:0kB [ 437.501929][T11570] lowmem_reserve[]: 0 0 0 0 0 [ 437.506768][T11570] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 437.519922][T11570] Node 0 DMA32: 1622*4kB (UME) 1867*8kB (UME) 505*16kB (UM) 824*32kB (UM) 468*64kB (UME) 159*128kB (UME) 75*256kB (UME) 97*512kB (UM) 64*1024kB (UME) 28*2048kB (UM) 273*4096kB (UM) = 1416128kB [ 437.539485][T11570] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 437.551172][T11570] Node 1 Normal: 241*4kB (UME) 51*8kB (UME) 40*16kB (UME) 64*32kB (UME) 20*64kB (UE) 4*128kB (UM) 1*256kB (E) 2*512kB (UM) 1*1024kB (E) 2*2048kB (UE) 948*4096kB (M) = 3895260kB [ 437.569165][T11570] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 437.578997][T11570] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 437.588362][T11570] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 437.597982][T11570] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 437.607408][T11570] 58119 total pagecache pages [ 437.613008][T11570] 0 pages in swap cache [ 437.617301][T11570] Free swap = 124728kB [ 437.621565][T11570] Total swap = 124996kB [ 437.625822][T11570] 2097051 pages RAM [ 437.629687][T11570] 0 pages HighMem/MovableOnly [ 437.634534][T11570] 416926 pages reserved [ 437.638729][T11570] 0 pages cma reserved [ 440.404813][ T1283] ieee802154 phy0 wpan0: encryption failed: -22 [ 440.411185][ T1283] ieee802154 phy1 wpan1: encryption failed: -22 [ 441.681750][ T1090] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge)