last executing test programs: 5m38.718517539s ago: executing program 2 (id=24): socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x800000, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000cc0)=@newqdisc={0x45c, 0x24, 0x800, 0x70bd2c, 0x0, {0x0, 0x0, 0x12, r1, {0x0, 0xfff3}, {0xffff, 0xffff}, {0x4}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_RTAB={0x404, 0x2, [0x3159, 0xfffffffb, 0xd2, 0x4, 0xf03e, 0x401, 0x3, 0x8, 0x0, 0x3, 0xe4, 0x7b, 0x19, 0x400, 0xf82, 0x7c9d, 0x800, 0x10000008, 0xe, 0x5, 0x9, 0x9, 0x40a5a2cc, 0x1a2b, 0x7, 0x9, 0x5, 0x9, 0x0, 0x40, 0xfffffff0, 0x8, 0x8001, 0x0, 0x1c9, 0x5, 0x3, 0x7, 0x3, 0x800, 0xd4, 0x2, 0x8000000, 0xe2, 0x40, 0xd5b, 0xe8, 0x7, 0x6, 0x1, 0x9, 0x6, 0x5, 0xd1b, 0x2, 0x3, 0x8, 0x1000, 0x5, 0x52b3, 0x7, 0xcf9, 0x80000000, 0x0, 0x9, 0x40, 0x9, 0x1, 0x9, 0xfffffffb, 0x6, 0x40000000, 0x3, 0x8, 0x9, 0xff, 0x4b, 0x686b, 0x4, 0x2, 0x8001, 0x2e, 0x8000, 0x0, 0x100, 0xfff, 0x8, 0x2d, 0xd407, 0x5e14c693, 0xffffff67, 0x2000000, 0x9, 0x80000001, 0x2, 0xf02, 0x2, 0x80000001, 0x80000001, 0x7, 0xff, 0x1, 0x101, 0x9e1, 0x0, 0x76, 0x7f, 0x2, 0x6, 0x6866, 0x6, 0x3, 0x3dc9, 0xa, 0x47fa, 0x80, 0x8001, 0xe88, 0x5c, 0x7, 0x2, 0x4, 0x650, 0x3, 0x10, 0x7fffffff, 0x2, 0x8, 0x0, 0x10, 0x1, 0xde5, 0x80000, 0x1, 0x5, 0x5, 0x100, 0x8001, 0x7, 0x5, 0x9, 0x80, 0x8000, 0x1, 0x100, 0x7fff, 0x2cedb46c, 0x5, 0x7, 0x1, 0xf26e, 0x81b, 0x6, 0x7d6, 0x4, 0x2, 0x6, 0x10001, 0x40, 0x1ff, 0x95f, 0x9, 0x2f, 0x200, 0x100, 0x9, 0x1, 0xc4d, 0x8, 0x4, 0x7, 0x1, 0x7, 0x5, 0x3, 0x5, 0xe1, 0x0, 0xf, 0x7, 0x6, 0x9, 0x8, 0x800, 0x10, 0x5, 0x401, 0xe, 0x6, 0x81, 0x4, 0x152, 0x5, 0x6, 0xffff, 0x10, 0x1, 0x8, 0x1, 0x6, 0x2, 0x6, 0x4, 0x5, 0xef, 0x1, 0x6, 0x60000000, 0x9c, 0x5, 0x1, 0x5, 0xffffffff, 0x80000000, 0xc, 0xb, 0x25d, 0x18, 0x7, 0x2f2, 0x0, 0x400, 0xea, 0x2, 0x9, 0x0, 0x1, 0x5, 0x7, 0xab, 0xa, 0xb, 0x1ff, 0x8, 0x5, 0x5, 0x8, 0x6, 0x5, 0x1ff, 0x7, 0x5, 0x57b373bc, 0x4000002b, 0x9, 0x3, 0x7, 0x4, 0x8951, 0x7ff, 0x6, 0x20000000, 0x10, 0x3, 0x3, 0xff]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x1, 0x0, 0x80, 0x101, 0x1, 0x8}, {0x8, 0x0, 0x0, 0x6f, 0xd, 0x803}, 0x4, 0x3, 0x209b}}]}}]}, 0x45c}}, 0x4000840) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000a80)=ANY=[@ANYBLOB="9feb010018000000000000004400000044000000050000000200000000000000e1000000540057010b0000000000000a0100004b250000000000001104000000010000000f0000000000000900000000080000000000000b05000000002e003000ab806090bf84bea67ca0cbcf619977fa72e84525024b150098911cd4afe98d453af7b980b9d624aaf1b69cb8a383988b18b3369dfeffffff385de4086bd998eff9d83e8dfe3fbdcc95ea979e4052f6a01ab2dcc44e1ff4ee4955cf33cbe8f9e97d3f92bc92ecb5faefc17538aa7a525b46f858d7424195a4719158b0e1144cd3e1e74a08a13f07baaed42a41496d8c93d31f8f728460af9db4f1fcffe0e94037317117efdf5c5d62933696caff500bcc710a2d"], &(0x7f0000000740)=""/76, 0x61, 0x4c, 0x0, 0x401, 0x10000}, 0x28) r3 = socket$kcm(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0xa38, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1a, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000400048000000000000000008500000041000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007e00000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @tracing=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) setsockopt$sock_attach_bpf(r3, 0x84, 0x64, &(0x7f0000000000)=r5, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x18, 0x1c, &(0x7f0000000280)=ANY=[@ANYBLOB="60160020f9bd000018280000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000b7080000afb946987b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000183a100001000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000"], &(0x7f0000000440)='GPL\x00', 0x6, 0x56, &(0x7f0000000480)=""/86, 0x41000, 0x2, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000600)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000880)={0x5, 0x10, 0xffff8001, 0x4}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000008c0)=[0xffffffffffffffff, r5], &(0x7f0000000900)=[{0x2, 0x1, 0xe, 0x7}, {0x1, 0x5, 0x10, 0x3}, {0x4, 0x1, 0x6, 0xa}], 0x10, 0x1000}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) bpf$PROG_LOAD(0x5, 0x0, 0x0) r10 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r11 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4, @perf_config_ext={0x625f, 0xec}, 0x0, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffd, 0x0, 0x0, 0x0, 0x20}, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r11, 0x40042408, r12) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x1}, 0x80000, 0xca, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0xe, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r8, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x1c0) write$cgroup_subtree(r13, &(0x7f0000000180)=ANY=[@ANYRES8=r9, @ANYBLOB="3ee901"], 0x9a) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r5) 5m37.410714598s ago: executing program 0 (id=31): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2000000008, 0x830d}, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000012000000000000000000"], &(0x7f0000000c00)='GPL\x00'}, 0x94) r2 = socket$kcm(0x15, 0x5, 0x0) recvmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x12160) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="10000000181401000000000000000000d55e4002b23a8f973c2bb0354808fbc2b567d746bb350e992102000000000000001684a2a8ab6d9e50551058b5b6c66990ba53b12fe43bc845557e36de2dea2c918aa238d61f4082e54ae6e1d4c5bfddb74b346035eb14ca121beae994d888939fa213e330e3046e355072beee485f37c45fe5ceb182180849ca3a06e823a8ecb4ccee8fffefa244734ccd7963f2499b29000000000000d09bb7"], 0x10}}, 0x400c044) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000a00)={{0x14}, [], {0x14}}, 0x28}}, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(r4, 0x0, 0x8001) socket$kcm(0x11, 0xa, 0x300) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) close(r5) socketpair(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, &(0x7f0000000b80)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca^\xf9\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x96\x86\xdb\xa9\xd3\x01\xb2\xc7\xf8G\x069\x90,\xda\xf6\xc5\xcd\xec\xa3B\xc3\"4\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\x7f\xec\xb2\xc5E\x00\xdd\xf2e\xa8\xf1<\xb2\xc82\xbf=o\x00`\xc1A\'\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x92\xbb\xe3Y\x97\xc2') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) ioctl$SIOCSIFHWADDR(r5, 0x8b14, &(0x7f0000000000)={'wlan1\x00', @random="0100ffffffff"}) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (fail_nth: 2) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)}], 0x1}, 0x4004850) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x4, &(0x7f00000000c0)=[{0x30, 0x0, 0x0, 0x6}, {0x46, 0x40}, {0x6, 0x0, 0x0, 0x2}, {0x0, 0x8, 0x7f, 0x7}]}) 5m37.25696506s ago: executing program 2 (id=33): r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x40}, 0xa420, 0x0, 0x3, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r1}, &(0x7f00000000c0), &(0x7f0000000100)=r0}, 0x20) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = socket$kcm(0x1e, 0x1, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000012000000"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x18, 0x24, 0x101, 0x70bd22, 0xfffffffc, {0x8}, [@typed={0x4, 0x1, 0x0, 0x0, @binary}]}, 0x18}}, 0x0) r5 = socket$kcm(0xa, 0x1, 0x106) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(r5, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0xfffffffd, @empty}, 0x80, 0x0}, 0x20000001) sendmsg$sock(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000840), 0x28}, 0x400c0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r5, r3}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETRULE(r6, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8011}, 0x4000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r1}, &(0x7f00000002c0), &(0x7f0000000300)=r0}, 0x20) 5m36.6312774s ago: executing program 2 (id=35): getpid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000001400)) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000480)="5c00000012006bab9a3fe3d86e17aa0b046b876c1d0048380019001931a0e69ee517d34460bc06000000a701251e6182949a3651f60a84c9f4d4938037e70e4509c51c268811000000000000000000002571cd53b9851b30599980bc", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000006c0)=""/182, 0xb6}, {&(0x7f0000003740)=""/4026, 0xfba}, {&(0x7f0000000d40)=""/4102, 0x1006}, {&(0x7f0000000300)=""/99, 0x63}, {&(0x7f0000000380)=""/116, 0x74}, {&(0x7f0000000c40)=""/202, 0xca}, {&(0x7f0000000600)=""/160, 0xa0}], 0x7}, 0x40000000) recvmsg$kcm(r0, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8800000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$sock_attach_bpf(r3, 0x6b, 0x87, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) r4 = socket$kcm(0x25, 0x1, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0xf}, 0x40, 0x2, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="1c00000004060102000000000000000002000002050001000700"], 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000ab4000000060a01040000000000000000020000280900010073797a30000000000900020073797a320000000088000480100001800c000100636f756e7465720014000180090001006d6173710000000004000280600001800a0001006c696d6974000000500002800c000140000000000000000808000440000000010c00014000000000000080010c00024000000000000000090800034000000fba0c00024000000000000000000c000140000000000000000714000000110001"], 0xdc}}, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="140000001000010000000000000000000300000a14000000060a010400000000000000000a0000011400000000000000000200000a00000000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x4008091}, 0x24000000) sendmsg$NFT_MSG_GETRULE(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="44000000190a0102"], 0x44}}, 0x0) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x0, 0x10, &(0x7f0000000ac0)=ANY=[@ANYBLOB="0000000000000000b704000008000000850000007800000095", @ANYRES32=r9, @ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYRES16=r5, @ANYRESDEC=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x6, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r10, 0x5, 0xe, 0x0, &(0x7f0000000440)="469dc2d34ae2b7000017645f7e00", 0x0, 0xcfd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 5m36.513854132s ago: executing program 1 (id=36): socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x54, 0x82240, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={&(0x7f0000001680)=""/4098, 0x1002, 0x0, &(0x7f0000000000)=""/65, 0x41}}, 0x10) r0 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x0, 0xfffff274, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x5, 0x5, &(0x7f0000000340)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000003a80)={&(0x7f00000004c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000003a00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1}}}], 0x20}, 0x4008804) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f00000002c0)=@l2tp={0x2, 0x0, @remote}, 0x80, &(0x7f0000000180)=[{&(0x7f0000002800)="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", 0x305}, {&(0x7f0000002b40)="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", 0x156}], 0x2}, 0x8400) sendmsg$inet(r2, &(0x7f0000000500)={&(0x7f0000000080)={0x2, 0x80, @local}, 0x10, &(0x7f0000000b00)=[{&(0x7f0000000640)="455b1c1e", 0x4}], 0x1}, 0x0) 5m35.964055513s ago: executing program 0 (id=38): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0], 0x0, 0x3e, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x3a, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRES32=0x1, @ANYBLOB, @ANYRES32=r0, @ANYBLOB="05000000020000000200"/28], 0x50) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x60, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x1002, 0x402}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1c00000000040000}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r3 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x9549, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={&(0x7f0000000100), 0xe}, 0x11efa, 0x4, 0x0, 0x0, 0x2, 0xfffff271, 0x400, 0x0, 0x3ff, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1e, 0x5, &(0x7f00000005c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xc, 0xe, &(0x7f0000000500)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r5, 0xffff0000, 0xf0, 0xe200, &(0x7f0000001a40)="2b206d074843b397737ea49da2aa", 0x0, 0xf000, 0x720e, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x10, 0x400000002, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="b800000015001f0f"], 0xb8}, 0x1, 0x0, 0x0, 0x2000c810}, 0x4) recvmsg(r6, &(0x7f0000001840)={0x0, 0x0, 0x0}, 0x40) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[], 0x1c}, 0x1, 0x0, 0x0, 0x100}, 0x4000) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000700)) ioctl$SIOCSIFHWADDR(r7, 0x8b04, &(0x7f0000000040)={'wlan1\x00', @random="8dffffff0600"}) r8 = socket$kcm(0x2, 0x1, 0x0) sendmsg$inet(r8, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000023000701feffffff02000000027c0000040042800c00000000000000000914bb140002"], 0x38}, 0x1, 0x0, 0x0, 0x4048011}, 0xc800) 5m35.960097016s ago: executing program 2 (id=39): socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0xf, 0x3, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, 0x0, &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.current\x00', 0x275a, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000040)=0x3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x55c) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x10}}], 0xc0}, 0x2160) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB="02000000"], 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb9d001800000000000000280600002800000002"], 0x0, 0x42}, 0x28) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3d) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x3, 0xd, &(0x7f0000000140)=@framed={{0x18, 0x2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffe}, [@call={0x85, 0x0, 0x0, 0x87}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f0000000080)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r5, 0x0, 0xe, 0x0, &(0x7f00000003c0)="c274386d178550cb864bd57221bc", 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8946, &(0x7f0000000080)) 5m35.791079338s ago: executing program 1 (id=40): r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r2, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x40000) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x16, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="660a000002000000611191ff000000008500000002000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000003040)={&(0x7f0000002d40), 0x6e, 0x0}, 0x0) socket$kcm(0x10, 0x2, 0x0) syz_clone(0x48400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r4, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x20000800) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newsa={0x158, 0x10, 0x713, 0xfffffffe, 0x25dfdbfc, {{@in=@rand_addr=0x64010101, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xfffd, 0x0, 0x4e21, 0x2, 0xa, 0x0, 0x0, 0x6c, 0x0, 0xee00}, {@in6=@private1, 0xfe, 0x32}, @in6=@rand_addr=' \x01\x00', {0x0, 0x4, 0x0, 0x8, 0x0, 0x7, 0x0, 0x543}, {0x4, 0x7fffffffffffffff}, {0x2}, 0x70bd2c, 0x3500, 0xa, 0x2, 0x0, 0x50}, [@extra_flags={0x8, 0x18, 0x3ff}, @algo_aead={0x60, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0xa0, 0x60, "210466d38547aa140db9a200000000c538c7cb7a"}}]}, 0x158}, 0x1, 0x0, 0x0, 0x880}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000872d5326e36cf848e152e2bb15b82a000c000000030000000000000501040000005f2e5f6100f3890eb37f808faa3457a7847abc30eceb029128aaeb73ce1dd984f3035e159d00000000"], 0x0, 0x2a, 0x0, 0x1, 0xb}, 0x28) 5m35.578450445s ago: executing program 1 (id=41): socket$kcm(0x15, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="2a000000ff00000000000000", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x20) r0 = getpid() perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40000, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x3, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x1000, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x8001}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800f4e64ab64bb87f32000000000000000000000900020073797a31000000000500010007000000"], 0x28}}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x8000) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8923, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x100600, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$inet(r7, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="5c00000013006bcd9e3fe3dc6e48aa310b6b8703360000001f03000000000000040014000d000a000d0000009ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x20004002) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d34, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x5}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000340)="d5", 0x1}], 0x1}, 0x0) 5m35.37001842s ago: executing program 4 (id=43): socket$netlink(0x10, 0x3, 0x15) (async) r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000d00)=@deltaction={0x250, 0x31, 0x610, 0x70bd2a, 0x25dfdbfe, {}, [@TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0xb, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0xc, 0xc, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}]}, @TCA_ACT_TAB={0x6c, 0x1, [{0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}, {0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0xc, 0x17, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1ff}}, {0xc, 0xc, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}]}, @TCA_ACT_TAB={0x80, 0x1, [{0x10, 0x7, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0xb, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}, {0xc, 0x5, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x4, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0x1c, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x5, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}]}, @TCA_ACT_TAB={0x38, 0x1, [{0x10, 0x14, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1c55686e}}, {0xc, 0x7, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x10000000}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}]}, @TCA_ACT_TAB={0x30, 0x1, [{0x10, 0x10, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0xa, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0xc, 0x13, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}]}, @TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x16, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}]}, @TCA_ACT_TAB={0x54, 0x1, [{0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0x16, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0x10, 0x1c, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}, {0xc, 0x1, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}]}, @TCA_ACT_TAB={0x24, 0x1, [{0x10, 0x16, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}]}, @TCA_ACT_TAB={0x20, 0x1, [{0xc, 0xf, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0x2, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}]}, @TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x1f, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x24004090}, 0xdbd5b6c69fc7e6dd) (async) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000d00)=@deltaction={0x250, 0x31, 0x610, 0x70bd2a, 0x25dfdbfe, {}, [@TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0xb, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0xc, 0xc, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}]}, @TCA_ACT_TAB={0x6c, 0x1, [{0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}, {0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0xc, 0x17, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1ff}}, {0xc, 0xc, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}]}, @TCA_ACT_TAB={0x80, 0x1, [{0x10, 0x7, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0xb, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}, {0xc, 0x5, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x4, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0x1c, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x5, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}]}, @TCA_ACT_TAB={0x38, 0x1, [{0x10, 0x14, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0xc, 0x1b, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1c55686e}}, {0xc, 0x7, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x10000000}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}]}, @TCA_ACT_TAB={0x30, 0x1, [{0x10, 0x10, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0xa, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0xc, 0x13, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}]}, @TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x16, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}]}, @TCA_ACT_TAB={0x54, 0x1, [{0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0x16, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'skbmod\x00'}}, {0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0x10, 0x1c, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}, {0xc, 0x1, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}]}, @TCA_ACT_TAB={0x24, 0x1, [{0x10, 0x16, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0x10, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}]}, @TCA_ACT_TAB={0x20, 0x1, [{0xc, 0xf, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0x2, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}]}, @TCA_ACT_TAB={0x10, 0x1, [{0xc, 0x1f, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}]}]}, 0x250}, 0x1, 0x0, 0x0, 0x24004090}, 0xdbd5b6c69fc7e6dd) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@newtaction={0x90, 0x30, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [{0x7c, 0x1, [@m_bpf={0x78, 0x1, 0x0, 0x0, {{0x8}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x8, 0x2, {0x3, 0xef, 0x1, 0x8000, 0x2}}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x1, 0x7, 0x4, 0x6}, {0x30, 0x98, 0x81, 0xfffffff9}, {0xc, 0x90, 0xa, 0x5}, {0xe54, 0x6a, 0x1, 0xfffffff6}, {0xff01, 0x3, 0x81, 0x4}]}]}, {0x4}, {0xc}, {0xc, 0x8, {0x2, 0x2}}}}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x4081}, 0x2400c800) (async) sendmsg$nl_route_sched(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@newtaction={0x90, 0x30, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [{0x7c, 0x1, [@m_bpf={0x78, 0x1, 0x0, 0x0, {{0x8}, {0x50, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x8, 0x2, {0x3, 0xef, 0x1, 0x8000, 0x2}}, @TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x1, 0x7, 0x4, 0x6}, {0x30, 0x98, 0x81, 0xfffffff9}, {0xc, 0x90, 0xa, 0x5}, {0xe54, 0x6a, 0x1, 0xfffffff6}, {0xff01, 0x3, 0x81, 0x4}]}]}, {0x4}, {0xc}, {0xc, 0x8, {0x2, 0x2}}}}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x4081}, 0x2400c800) socket$nl_generic(0x10, 0x3, 0x10) socket$isdn(0x22, 0x3, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80350, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe49, 0x2, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe49, 0x2, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a, 0x10, &(0x7f0000000340), 0xfffffd31, 0x0, 0xffffffffffffffff, 0xffffffffffffff5b}, 0x42) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a, 0x10, &(0x7f0000000340), 0xfffffd31, 0x0, 0xffffffffffffffff, 0xffffffffffffff5b}, 0x42) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) (async) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) r4 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x22, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[], 0x10) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[], 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000ac0)='./file0\x00', 0x18b) mount$bpf(0x20000000f0ff, &(0x7f0000000440)='./file0/../file0\x00', &(0x7f0000000000), 0x40, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffd11}, 0x94) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffeb}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)=@generic={&(0x7f0000000080)='./file0/file0\x00', r6}, 0x18) unlink(&(0x7f0000000140)='./file0/file0\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r2, 0x2000000, 0xfe7f, 0x0, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0x7ffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r2, 0x2000000, 0xfe7f, 0x0, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0x7ffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 5m34.873556651s ago: executing program 0 (id=45): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0}, 0x0, 0x2, 0xfffffffe, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000005940)={0xffffffffffffffff}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x3, 0x2, 0x54, 0x68, 0x0, 0xffffffffffffffff, 0x87002, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x8}, 0x1, 0x8, 0xfffffff5, 0x1, 0x8, 0x7f, 0x7, 0x0, 0x7fffffff, 0x0, 0x2ff}, r1, 0x0, 0xffffffffffffffff, 0x0) sendmsg$sock(r0, &(0x7f0000006e40)={&(0x7f0000005980)=@generic={0x1, "7f2ac0186b32b4c3e37e9db0cc4d174988d2a7485e8abf2e0d364ef46996432a3c1f52de9d37bbd65c4381f1e88065069a4c67aeb01cefdda4f74f30b0d0cc3280305951c1a9f9bd942b1080f8fe1f9709a4e70d778a658977ef70f8aa3d710a5f78e96bb6f5530f87548ac4914e4cb5a19987d62bb82525306ab2479ead"}, 0x80, 0x0}, 0x4004010) 5m34.854623957s ago: executing program 2 (id=46): perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffd, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="89000000120081ae08060cdc030ec0007f03e3f700000001", 0x18}], 0x1}, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001980)={0x1, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000001400)='syzkaller\x00'}, 0x90) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[], 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x4000080) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0x6, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000100000000a500000000000018490000fe"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x19, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xa7e3}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x2e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000, 0x12, 0x0, &(0x7f0000000040)="ded6e0966ec1cf6ba4b897a54e4e062b3114", 0x0, 0x0, 0x3}, 0x50) socket$kcm(0x10, 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newsa={0x144, 0x10, 0x713, 0x70bd26, 0x0, {{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@dev={0xac, 0x14, 0x14, 0x13}, 0x4e22, 0x1, 0x0, 0x3, 0x2, 0x0, 0x0, 0x3a, 0x0, 0xffffffffffffffff}, {@in6=@remote, 0x0, 0x32}, @in6=@local, {0x0, 0x3, 0x8, 0xa, 0x6, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x2, 0xfffffffffffffff8}, {0xc, 0x0, 0x2}, 0x70bd29, 0x0, 0x2, 0x1, 0x0, 0x28}, [@algo_aead={0x4c, 0x12, {{'rfc4543(gcm(aes))\x00'}, 0x0, 0x80}}, @tfcpad={0x8, 0x24, 0x4}]}, 0x144}, 0x1, 0x0, 0x0, 0xc0}, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000002c0)=""/249, 0x101d0}], 0x1}, 0x0) close(r2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xb, &(0x7f00000009c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, [@printk={@p, {0x3, 0x3, 0x3, 0xa, 0x0}, {0x5}, {0x7, 0x0, 0x5}, {}, {}, {0x85, 0x0, 0x0, 0x19}}]}, &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x3, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)=ANY=[@ANYRES32=0x1, @ANYRES32=r4, @ANYBLOB='.'], 0x20) 5m34.818058415s ago: executing program 4 (id=47): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3f, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x23, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls}, 0x94) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0xd, 0x8, 0xb, 0xfb, 0x0, 0x3c, 0x1c144, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x18842, 0x0, 0x7fffffff, 0x7, 0x9, 0x3, 0x7, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x14, 0x4, 0x4, 0x201}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r1, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000080)) 5m34.63738605s ago: executing program 1 (id=48): sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x50) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x24008880) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a6c000000060a0104000000000000000002000000400004803c0001800a0001006d617463680000002c000280140003002024000000000000030007116b61979e0c000100636c75737465720008000240000000000900010073797a30000000000900020073797a32"], 0x94}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x61, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x1002, 0x401}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0x15, 0x5, 0x0) r1 = socket$isdn(0x22, 0x3, 0x22) recvmsg(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 5m34.621970126s ago: executing program 0 (id=49): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x2c, 0x3, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x1, 0x7}, 0x0, 0x94a8, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x410}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x7c}, 0x1, 0x0, 0x0, 0x4401}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2a}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x64}, 0x1, 0x0, 0x0, 0x200000d1}, 0x24000000) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={0x0}, 0x1, 0x0, 0x0, 0x4044050}, 0x40) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r3, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000001800)={&(0x7f0000001780)=ANY=[@ANYBLOB="1c0004030000000000000011000300000805000100030000ba"], 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x20040800) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[], 0x7c}}, 0x0) r5 = perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) sendmsg$NFNL_MSG_CTHELPER_GET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[], 0x20}, 0x1, 0x0, 0x0, 0x20004851}, 0x20000014) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000002fc0)=ANY=[@ANYBLOB="200000002e00090027bd7000000002000400000004001d000800098004"], 0x20}, 0x1, 0x0, 0x0, 0x42804}, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) 5m34.489653033s ago: executing program 4 (id=50): socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x54, 0x82240, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={&(0x7f0000001680)=""/4098, 0x1002, 0x0, &(0x7f0000000000)=""/65, 0x41}}, 0x10) r0 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x0, 0xfffff274, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x5, 0x5, &(0x7f0000000340)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000003a80)={&(0x7f00000004c0)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000003a00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1}}}], 0x20}, 0x4008804) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f00000002c0)=@l2tp={0x2, 0x0, @remote}, 0x80, &(0x7f0000000180)=[{&(0x7f0000002800)="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", 0x305}, {&(0x7f0000002b40)="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", 0x156}], 0x2}, 0x8400) sendmsg$inet(r2, &(0x7f0000000500)={&(0x7f0000000080)={0x2, 0x80, @local}, 0x10, &(0x7f0000000b00)=[{&(0x7f0000000640)="455b1c1e", 0x4}], 0x1}, 0x0) 5m34.309764158s ago: executing program 1 (id=51): r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x30, 0x8, 0x0, 0xfffff01c}, {0x6, 0x0, 0xc0}]}) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000300)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d004892e822a6abc02ad2602a5ad6f7007ea60864160af365935cfaea3f49d8df1931a0e64ffc4c78029ee517d34460bc06000000938037e70e457ae2bb24ef6697070000000000", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000600)=""/189, 0xbd}, {&(0x7f0000000380)=""/113, 0x71}, {&(0x7f0000000700)=""/223, 0xdf}, {&(0x7f0000000200)=""/101, 0x65}, {&(0x7f0000000900)=""/139, 0x8b}, {&(0x7f00000020c0)=""/4096, 0x1000}, {&(0x7f0000000c00)=""/4096, 0x1022}, {&(0x7f00000000c0)=""/172, 0xac}], 0x8}, 0x40010022) recvmsg$kcm(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x10182) 5m34.173390576s ago: executing program 2 (id=52): r0 = socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x6, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x54, 0x82240, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000004000000000000000000000071a60887d04df8b6009500200000000000"], &(0x7f0000003ff6)='GPL\x00', 0xe, 0xfd90, &(0x7f000000cf3d)=""/195, 0x40f00, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffe40}, 0x48) socket$netlink(0x10, 0x3, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount$bpf(0x200000000000, 0x0, 0x0, 0x989046, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000002dc0)={&(0x7f0000001640)=@l2tp6={0xa, 0x0, 0x7fff, @local, 0x8}, 0x80, &(0x7f0000000340)=[{&(0x7f00000003c0)='`', 0x1}], 0x1}, 0x41) setsockopt$sock_attach_bpf(r1, 0x84, 0x1e, &(0x7f0000000000), 0x4) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x25dfdbfe, {0x6, 0x0, 0x8100, 0x0, {0x0, 0xffff}, {}, {0xe, 0x10}}, [@TCA_RATE={0x6}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x11, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7000003, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=@newtaction={0x14, 0x1d, 0x1, 0x70bd2c, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x2400085d}, 0x24048040) 5m34.051651453s ago: executing program 0 (id=53): sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000500)}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x4000000) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305828, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f0000000e40)={0x5, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x1946}, 0x4016, 0x0, 0xdd8, 0x6, 0x7fff, 0x7ffffffc, 0x97, 0x0, 0xfffffffc, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_audit(0x10, 0x3, 0x9) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d80)=@bpf_ext={0x1c, 0x15, &(0x7f0000000b00)=@raw=[@cb_func={0x18, 0xb}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x10}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x2}, @alu={0x4, 0x0, 0x8, 0xb, 0x4, 0x80, 0xffffffffffffffff}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x21}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0x7}], &(0x7f0000000a00)='syzkaller\x00', 0xc, 0xf2, &(0x7f0000000bc0)=""/242, 0x40f00, 0x40, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000cc0)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000d00)={0x1, 0x10, 0x3, 0x3}, 0x10, 0x109ec, r3, 0x4, 0x0, &(0x7f0000000d40)=[{0x3, 0x2, 0x3, 0x9}, {0x3, 0x2, 0x3, 0x5}, {0x2, 0x1, 0x7, 0xa}, {0x1, 0x2, 0x8, 0x2}], 0x10, 0x81}, 0x94) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_ctinfo={0x58, 0x1, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x3f00}, @TCA_CTINFO_ACT={0x14, 0x3, {0x0, 0x1, 0x4}}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x6}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}}, 0x0) r5 = socket(0x11, 0x80802, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={0x0, 0xfffffffffffffd3f, 0x0}, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x1f00c00e}, 0x48054) r6 = socket$qrtr(0x2a, 0x2, 0x0) sendmsg$qrtr(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000300)="6949bebc89a40d41d0707d1eed8e5f7b7d729bd434010a60337d477c770093ed5eaa4c53e0b55444c846cbcea37f685170625da657064ee9df6420b6bb4fa64ba11e65cfdd57ed1a96d7c66dfe8d9a593850fda3efec39a7bb7105bd136dbb0958dab4fc1066625269a14cd3a8e9d0c6d067194517857ab56b9cbcab8212da69570b738a8f0ac7291552f8c1c9037078399d22a43225e67aed8c3afa96dc178faefea3a25052a6ac9edbe5b8d125c9d3fa6340b668ddb2af23390130b5c39bcb3cd1841373383141d9f0d04c43cafc62c677d1276e0c534c5ccefdda7e285f355163eddac166f2ef486fc05a44509fa4fcf5c7e2af15777e00c562", 0xfb}], 0x2, &(0x7f0000000100), 0x0, 0xc010}, 0x38) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x80000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x11d105, 0x4, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x1, 0xffffffffffffffff, 0x8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000811}, 0x4000) perf_event_open$cgroup(&(0x7f0000000440)={0x3, 0x80, 0x11, 0x9, 0x3, 0xf, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x629, 0x1, @perf_bp={&(0x7f0000000240)}, 0x12, 0x5, 0x4, 0x3, 0x2, 0x8, 0xb11, 0x0, 0x94, 0x0, 0xec0}, r0, 0xb, r0, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000004c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000500)=[0x0], &(0x7f0000000540)=[0x0], 0x0, 0xe5, &(0x7f0000000580)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x87, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) sendmsg$TCPDIAG_GETSOCK(r5, &(0x7f00000009c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000980)={&(0x7f0000000800)={0x148, 0x12, 0x4, 0x70bd2d, 0x25dfdbfb, {0x6, 0xe, 0x80, 0xff, {0x4e21, 0x4e24, [0x6, 0x1, 0x4, 0x1], [0x40, 0x80, 0x9, 0x9], r8, [0xffffffff, 0xc]}, 0x9, 0x4}, [@INET_DIAG_REQ_BYTECODE={0xfa, 0x1, "18cc88b6be304737a9de69bc45ca6413ff2b71d1712fa2bdea26808b88eded82d89ed77713fe4d3507fab551b522e216094e0a8ea6a60a0261a8bced30f27f9e0c859fe6c66af586786f2adc538a13b2262af7de87c2bc82c6c7b28a2e5e8199903fc1a9687cada644f0a7b740c0987c8bb685b642acc9650e4a8814adce314cf6d204688b7dbcda5e19b8a0760ac943a4cf74da0951c5468aff1cf45fc6af71826adc3da6b4af3b26505332cabae50f70fbae2543e78abf4d1b626b1e4f82b90f71914687d9feb352dcad84e127b744a15585f423c5dc57c6985fbea1955dfc06b2a20152282f673a68baa884271ae0e32413a6029a"}]}, 0x148}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$NFT_MSG_GETGEN(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x10, 0xa, 0x801, 0x0, 0x0, {0x7, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x2808c844) 5m34.003972168s ago: executing program 4 (id=54): socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x6, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_xfrm(0x10, 0x3, 0x6) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) socket$netlink(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0xedf0e51957efc755, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000240), &(0x7f0000000380)=r1}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000280)="b9ff03076804268c989e14f088a8", 0x0, 0x500, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 5m33.849627994s ago: executing program 1 (id=55): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xa}, 0x0, 0x0, 0x0, 0x4, 0x2, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_bp={0x0, 0xf}, 0x400, 0x5, 0xfffffffe, 0x0, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x1f, 0x2, &(0x7f0000001c40)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x13}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="2000ff"], 0x50) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000014c0)={0x2, 0x0, &(0x7f0000000140)={0x0, 0xa0}}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="120000000c000000040000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200000000000000000000000000000000b3a1767d8dcae2d02d00"/37], 0x50) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r2, &(0x7f0000000040)}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1100000004000000040000000010"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0c000000040000000400000009"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000024c0), &(0x7f0000001280), 0xffffffff, r3}, 0x38) r4 = socket$kcm(0xa, 0x5, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b19, &(0x7f0000000000)={'gretap0\x00', @random="000000001300"}) r5 = socket$kcm(0xa, 0x5, 0x0) r6 = socket$kcm(0x23, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89ee, &(0x7f0000000000)={r6}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x8916, &(0x7f0000000000)={r5}) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x21, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1af06, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540), 0x10, 0x8}, 0x94) r7 = socket$kcm(0xa, 0x1, 0x106) sendmsg$kcm(r7, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0xfffffffd, @empty}, 0x80, 0x0}, 0x20000001) socket$kcm(0x1e, 0x4, 0x0) sendmsg$sock(r7, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000840), 0x28}, 0x400c0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x8936, &(0x7f0000000000)={r5}) sendmsg$AUDIT_TRIM(r8, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x3f6, 0x800, 0x70bd2c, 0x25dfdbfb, "", ["", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8040}, 0x4000) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0xd, 0xb, &(0x7f0000000200)=ANY=[@ANYRES8=r7], &(0x7f0000000040)='syzkaller\x00', 0xe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) 5m33.807298404s ago: executing program 4 (id=56): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) r1 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f00000008c0), 0x43) close(0xffffffffffffffff) r2 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f00000008c0), 0x43) sendmsg$kcm(r2, &(0x7f0000000100)={&(0x7f0000001540)=@tipc, 0x80, 0x0}, 0xf5ffffffffffffff) 5m33.694540267s ago: executing program 0 (id=57): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x5, 0x0, 0x2, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x2, 0x5, 0x0, 0x8, 0x43fe, 0x7ffffffd, 0x0, 0x0, 0x10, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2040, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1942}, 0x2, 0x0, 0x0, 0x8, 0x5, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[], 0x50) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffe, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x1c, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000002100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000090a010400000000000000000a0000040900010073797a310000000008000540000000040900020073797a310000000008000a40fffffffc200011800e000100636f6e6e6c696d69740000000c00028008000140fffff27414000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7902009875f37538e486dd6317ce62667f2c"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200"], 0xcfa4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 5m33.577515022s ago: executing program 4 (id=58): socket$kcm(0x15, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="2a000000ff00000000000000", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x20) r0 = getpid() perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40000, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x3, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x1000, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x8001}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800f4e64ab64bb87f32000000000000000000000900020073797a31000000000500010007000000"], 0x28}}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x8000) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8923, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x100600, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$inet(r7, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="5c00000013006bcd9e3fe3dc6e48aa310b6b8703360000001f03000000000000040014000d000a000d0000009ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x20004002) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d34, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x5}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000340)="d5", 0x1}], 0x1}, 0x0) 5m18.681968846s ago: executing program 32 (id=55): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xa}, 0x0, 0x0, 0x0, 0x4, 0x2, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_bp={0x0, 0xf}, 0x400, 0x5, 0xfffffffe, 0x0, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x1f, 0x2, &(0x7f0000001c40)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x13}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="2000ff"], 0x50) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000014c0)={0x2, 0x0, &(0x7f0000000140)={0x0, 0xa0}}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="120000000c000000040000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0200000000000000000000000000000000b3a1767d8dcae2d02d00"/37], 0x50) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r2, &(0x7f0000000040)}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1100000004000000040000000010"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0c000000040000000400000009"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000024c0), &(0x7f0000001280), 0xffffffff, r3}, 0x38) r4 = socket$kcm(0xa, 0x5, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b19, &(0x7f0000000000)={'gretap0\x00', @random="000000001300"}) r5 = socket$kcm(0xa, 0x5, 0x0) r6 = socket$kcm(0x23, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89ee, &(0x7f0000000000)={r6}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x8916, &(0x7f0000000000)={r5}) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x21, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1af06, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540), 0x10, 0x8}, 0x94) r7 = socket$kcm(0xa, 0x1, 0x106) sendmsg$kcm(r7, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0xfffffffd, @empty}, 0x80, 0x0}, 0x20000001) socket$kcm(0x1e, 0x4, 0x0) sendmsg$sock(r7, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000840), 0x28}, 0x400c0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x8936, &(0x7f0000000000)={r5}) sendmsg$AUDIT_TRIM(r8, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x3f6, 0x800, 0x70bd2c, 0x25dfdbfb, "", ["", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8040}, 0x4000) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0xd, 0xb, &(0x7f0000000200)=ANY=[@ANYRES8=r7], &(0x7f0000000040)='syzkaller\x00', 0xe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) 5m18.559313321s ago: executing program 33 (id=52): r0 = socket$nl_route(0x10, 0x3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x6, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x54, 0x82240, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000004000000000000000000000071a60887d04df8b6009500200000000000"], &(0x7f0000003ff6)='GPL\x00', 0xe, 0xfd90, &(0x7f000000cf3d)=""/195, 0x40f00, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffe40}, 0x48) socket$netlink(0x10, 0x3, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mount$bpf(0x200000000000, 0x0, 0x0, 0x989046, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000002dc0)={&(0x7f0000001640)=@l2tp6={0xa, 0x0, 0x7fff, @local, 0x8}, 0x80, &(0x7f0000000340)=[{&(0x7f00000003c0)='`', 0x1}], 0x1}, 0x41) setsockopt$sock_attach_bpf(r1, 0x84, 0x1e, &(0x7f0000000000), 0x4) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x25dfdbfe, {0x6, 0x0, 0x8100, 0x0, {0x0, 0xffff}, {}, {0xe, 0x10}}, [@TCA_RATE={0x6}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x11, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7000003, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=@newtaction={0x14, 0x1d, 0x1, 0x70bd2c, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x2400085d}, 0x24048040) 5m17.404260175s ago: executing program 34 (id=57): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x5, 0x0, 0x2, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x2, 0x5, 0x0, 0x8, 0x43fe, 0x7ffffffd, 0x0, 0x0, 0x10, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2040, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1942}, 0x2, 0x0, 0x0, 0x8, 0x5, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x9, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[], 0x50) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffe, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x1c, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000002100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000090a010400000000000000000a0000040900010073797a310000000008000540000000040900020073797a310000000008000a40fffffffc200011800e000100636f6e6e6c696d69740000000c00028008000140fffff27414000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7902009875f37538e486dd6317ce62667f2c"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200"], 0xcfa4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 5m17.172554202s ago: executing program 35 (id=58): socket$kcm(0x15, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="2a000000ff00000000000000", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x20) r0 = getpid() perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40000, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x3, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x1000, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x8001}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800f4e64ab64bb87f32000000000000000000000900020073797a31000000000500010007000000"], 0x28}}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x8000) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8923, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x100600, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$inet(r7, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="5c00000013006bcd9e3fe3dc6e48aa310b6b8703360000001f03000000000000040014000d000a000d0000009ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x20004002) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d34, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x5}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000340)="d5", 0x1}], 0x1}, 0x0) 4.355881619s ago: executing program 7 (id=2203): r0 = getpid() perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0xd9b, 0x0, 0x1, 0x7fff, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000300), 0x1}, 0xd281, 0x8, 0x200, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) r1 = socket$igmp(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000001ec0)={&(0x7f0000000c00)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000001d40)=[{&(0x7f0000000c40)="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", 0xffc3}], 0x1, &(0x7f0000001dc0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0xf}, @loopback}}}, @ip_retopts={{0x38, 0x0, 0x7, {[@end, @generic={0x82, 0x10, "66581ddb34253c0556c786172934"}, @timestamp_prespec={0x44, 0x14, 0x67, 0x3, 0x7, [{@dev={0xac, 0x14, 0x14, 0x30}, 0x2cb5}, {@rand_addr=0x64010102, 0x5e}]}]}}}], 0x58}, 0x4) r2 = getpid() r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x101, 0x0, 0x0, {0x1, 0x0, 0xfffc}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}, @NFT_MSG_NEWRULE={0x48, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x20, 0x4, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0xf}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0xbc}}, 0x10) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x42000) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = socket$kcm(0x25, 0x5, 0x0) sendmsg$kcm(r6, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x4000880) socketpair$unix(0x1, 0x3, 0x0, 0x0) r7 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r7, 0x29, 0x4c, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) 4.169706896s ago: executing program 8 (id=2204): r0 = socket$kcm(0x10, 0x400000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x5, 0x5, 0x0, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x7, 0x3d, 0x7, 0x0, 0x0, 0xd299, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x4}, 0x100882, 0x7ff, 0x6, 0x0, 0xb, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) socket$netlink(0x10, 0x3, 0x0) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0007000042009103"], 0xfe33) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0xffff}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x4}, [@NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0x4}]}, @NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0x3}}, @NFT_MSG_NEWTABLE={0x128, 0x0, 0xa, 0x301, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_TABLE_USERDATA={0xfc, 0x6, "2d3a113429199f3ca21164590a8087616819f69ed192485a675f17682aad23a6ea4c842b2862a28b9120c658fe1b5c4c77a187fb10d2dfa86bbab179b3c028fd7d2f9d50cf8629fa5e671c12499ea6396735dc9af93198e0e09ac09d56b8048a390a221ed24f6d46a4515d5c597ee9b21168d2ee8da68fe69a6f0efc0a23652b37b308f301f79ae851803dafb88e8b66c26c27ecdb86eb6f0455d135e8f6ac2ed3de6ad514ee1ac9ef99b9387c89127cbff35f3e396707f570a01b7c9be72b735c16134d4fddd4cc2e0cab30999c99bf0f893581e90b68057971fa816e6b8bc45d45ce0bafba17bdfce64fcea88a70a7a5ad286b84cf92a6"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELCHAIN={0x60, 0x5, 0xa, 0x801, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFTA_CHAIN_ID={0x8, 0xb, 0x1, 0x0, 0x4}, @NFTA_CHAIN_COUNTERS={0x28, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x619}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0xfffffffffffffff8}]}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0xffffffffffffffa8}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x4}]}]}, @NFT_MSG_DELOBJ={0x190, 0x14, 0xa, 0x401, 0x0, 0x0, {0x7, 0x0, 0x2}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_HANDLE={0xffffffffffffffa3, 0x6, 0x1, 0x0, 0x3}, @NFTA_OBJ_USERDATA={0x67, 0x8, "6619349ecaf0bd209aa3d8353dd1fe8bc3b5b0d550014280c39cec1724a5d34c4b3832bc01179d4a544526d0daeb0bdb5d011f521ed4f9d2de2872e5c269ef069a2b1fde950831ef7b328c121011fd35a98b31c4a22caad9547e5ef5b02f5958e06dc4"}, @NFTA_OBJ_USERDATA={0xfc, 0x8, "db74c46a19acceec05b7c898afbb8430bb325983eb9fbc44f71648962b4c439a4054eb0f214370f08bf68284fda8e19bc6738adb0f2edd17f3dfca56f7de0366e727843c870e179467ce91c2ac24b6eec9857982c6f5678633d419e4394985418f92894aeebbc72968aa2ee9f1833d01bc75ba93488a26e141c7d4b546435721780f5a8fcdefd5cbe307e3c66e2bf8d7fa50fcf794d54887cbc0b2cf1e479d776f893667098c8a21cbad518a18bb9ec9412905c4fbf9e92ad1c31fefa77be8f8798711563eb32ce5f9d013ba1b28835e6844a22958527fae5f7bac9cbdabe447fb617368f9d5a10a391be9b96e5c262e3a801307abe6872a"}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x301, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELOBJ={0x28, 0x14, 0xa, 0x5, 0x0, 0x0, {0x2, 0x0, 0x3}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}]}, @NFT_MSG_NEWSETELEM={0x34, 0xc, 0xa, 0x301, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x20, 0x3, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}]}]}]}], {0x14}}, 0x460}}, 0x200000d4) sendmsg$NFT_BATCH(r3, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000580)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x3}}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x3}]}}}]}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x2}}}, 0x78}, 0x1, 0x0, 0x0, 0x4008091}, 0x24000000) 3.867419353s ago: executing program 3 (id=2206): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x8001}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e502000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = socket$kcm(0x2d, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000340)={r3}) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x11, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000ffffffff000000000000000085000000a8000000b7080000000000007b8af8ff00000000b7080000000000007b8a", @ANYRES32=r4, @ANYBLOB="0000000000000000b705000000000000850000006d000000"], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000070000"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000580)="d8001c00180081064e81f782db44fd56170d12a0b9b545c7", 0x18}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e3, &(0x7f0000000180)={r3, r5}) 3.825474238s ago: executing program 8 (id=2207): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0xa2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x830d}, 0x100b2, 0x2, 0x60000000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1e, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="18080000281c0040000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf0900000000000035090100000000009500000000070000b7020000000000007b9a00fe00000000b6090000002000a80700000050000058bf8600000000000027080000f8ffffffbfa400000000000007040000f0ffffff550000000800000018220000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7050000080000004608f0ff760000005d9800000000de4556000000a80000008500000007000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x11, 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r3, 0x0, 0x20040004) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000039000101"], 0x14}, 0x1, 0x0, 0x0, 0x400c801}, 0x4008094) 3.779338164s ago: executing program 7 (id=2208): socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0xf, 0x3, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, 0x0, &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.current\x00', 0x275a, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000040)=0x3) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)}, 0x2160) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX], 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[], 0x0, 0x42}, 0x28) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x3, 0xd, &(0x7f0000000140)=@framed={{0x18, 0x2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffe}, [@call={0x85, 0x0, 0x0, 0x87}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f0000000080)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r5, 0x0, 0xe, 0x0, &(0x7f00000003c0)="c274386d178550cb864bd57221bc", 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8946, &(0x7f0000000080)) 3.745650773s ago: executing program 6 (id=2209): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x3, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x1000, 0xfffff2f1, 0xfffc, 0x0, 0x0, 0x0, 0x8001}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socket$kcm(0x2, 0x3, 0x2) mount$bpf(0x0, &(0x7f0000000100)='.\x00', &(0x7f00000006c0), 0x400008, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x78}, 0x1, 0x0, 0x0, 0x8d1}, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r5) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8, 0x830b}, 0x8024, 0x2, 0xfffffffe, 0x1, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4010}, 0x8040) socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20001850) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='freezer.self_freezing\x00', 0x26e1, 0x0) ioctl$SIOCSIFHWADDR(r9, 0xc0045878, 0x0) openat$cgroup_ro(r9, &(0x7f0000000040)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00\v'], 0x48) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) 3.541877444s ago: executing program 5 (id=2210): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r0, 0x0, 0x400c044) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="d800000018008103e00312ba0d8105040a600300ff0f040b067c55a1bc000900b80006990700000015000500fef32702d3001500030001400200000901ac040098007f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04000000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b66bce0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f00000e970300"/216, 0xd8}], 0x1}, 0xc8d2) (fail_nth: 6) 3.015448947s ago: executing program 3 (id=2211): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(0xffffffffffffffff, 0x0, 0x48014) r1 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)={0x18, 0x38, 0x107, 0x70bd2c, 0x25dfdbfe, {0x5, 0x7c}, [@nested={0x4, 0x1}]}, 0x18}, 0x1, 0x0, 0x0, 0x4048011}, 0x8010) 2.997919411s ago: executing program 8 (id=2212): r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x80044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x4, @perf_config_ext={0xffffffffffffffff, 0x2}, 0x0, 0x2, 0xfffffffe, 0x7, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r2, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f0000000700)=r3, 0x4) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x541b, 0x0) sendmsg$kcm(r2, &(0x7f00000002c0)={&(0x7f0000000080)=@x25, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="03a6e941a1ac2814c013f6c8675093f7719c156945c243715067f3bb957c0e065b03bfdca405b5b19e54e9145bcb86", 0x2f}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x7c, 0x4}, 0x2, 0x800, 0x0, 0x8, 0x3fe, 0x6995, 0x0, 0x0, 0x0, 0x0, 0xa00000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r1}, 0x0, &(0x7f0000000200)=r4}, 0x20) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x448d3}, 0x4000004) mkdir(0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000100)=r1, 0x4) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0x2ee0}], 0x13, 0x0, 0x0, 0x10000000}, 0x12cd) write$cgroup_devices(r0, &(0x7f0000000240)={'a', ' *:* ', 'rm\x00'}, 0x9) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYRES32=r5], 0x64}, 0x1, 0x0, 0x0, 0x4008010}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[], 0x80}, 0x1, 0x0, 0x0, 0x20004808}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x42}, 0x94) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="020000000400000008"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r7}, 0x4) 2.841637555s ago: executing program 6 (id=2213): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$sock_attach_bpf(r2, 0x1, 0x3c, &(0x7f0000000040), 0x4) 2.829900203s ago: executing program 7 (id=2214): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000007"], 0x48) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x3a) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000100), 0x4) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000800)=@in6={0xa, 0xfffe, 0x0, @mcast2, 0x1a}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000500)="80005b020eaa4da2", 0x8}], 0x1, 0x0, 0x0, 0x900}, 0x0) recvmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x100) r1 = socket$kcm(0xa, 0x3, 0x3a) close(r1) socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x0, 0x485, 0x0, 0xe) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x17, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000f324000000000018434790482f513df1fecc55eadc8a5d150000", @ANYRES64=0x0], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0xffffffffffffffff, 0xcc03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r2}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000080)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7ad4b54c, 0x0, 0x0, 0x0, 0xfffffff7}, @generic={0x66}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8}, @exit, @alu={0x6, 0x0, 0xc, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0xa}, 0x94) socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = getpid() r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x3000, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x4}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000002000000ebf00b4680310c5c2ee9ef63c8c9cf01"], 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000001e40)=ANY=[@ANYBLOB="18000000004d4b000000000010000000181100002732dcc5ad04b6b633a26bf55c407a24195be263f6a7c11dae30b0a22ef26ea06688b450e5c839ba566c", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x1005, &(0x7f0000000e00)=""/4101, 0x0, 0xc}, 0x22) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x28, 0x200408cc}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 2.750641878s ago: executing program 5 (id=2215): r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="89000000120081ae08060cdc030000007f03e3f70000feff6ee2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec0012100001400d0c0c00bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x40000) 2.630248862s ago: executing program 5 (id=2216): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)={0x9, 0x4, 0x4, 0x2, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0xd, 0x4, 0x4, 0xa8, 0x0, r1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x50) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x5, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x48, 0x1, 0x0, 0x8, 0x0, 0x0, 0x80102, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9, 0x4, @perf_bp={0x0}, 0x900, 0x0, 0x20, 0x1, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x6000fdff}, 0x2c) 2.629725362s ago: executing program 6 (id=2217): r0 = socket$kcm(0x10, 0x400000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x5, 0x5, 0x0, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x7, 0x3d, 0x7, 0x0, 0x0, 0xd299, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x4}, 0x100882, 0x7ff, 0x6, 0x0, 0xb, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) socket$netlink(0x10, 0x3, 0x0) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0007000042009103"], 0xfe33) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0xffff}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x4}, [@NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0x4}]}, @NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0x3}}, @NFT_MSG_NEWTABLE={0x128, 0x0, 0xa, 0x301, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_TABLE_USERDATA={0xfc, 0x6, "2d3a113429199f3ca21164590a8087616819f69ed192485a675f17682aad23a6ea4c842b2862a28b9120c658fe1b5c4c77a187fb10d2dfa86bbab179b3c028fd7d2f9d50cf8629fa5e671c12499ea6396735dc9af93198e0e09ac09d56b8048a390a221ed24f6d46a4515d5c597ee9b21168d2ee8da68fe69a6f0efc0a23652b37b308f301f79ae851803dafb88e8b66c26c27ecdb86eb6f0455d135e8f6ac2ed3de6ad514ee1ac9ef99b9387c89127cbff35f3e396707f570a01b7c9be72b735c16134d4fddd4cc2e0cab30999c99bf0f893581e90b68057971fa816e6b8bc45d45ce0bafba17bdfce64fcea88a70a7a5ad286b84cf92a6"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELCHAIN={0x60, 0x5, 0xa, 0x801, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFTA_CHAIN_ID={0x8, 0xb, 0x1, 0x0, 0x4}, @NFTA_CHAIN_COUNTERS={0x28, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x619}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0xfffffffffffffff8}]}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0xffffffffffffffa8}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x4}]}]}, @NFT_MSG_DELOBJ={0x190, 0x14, 0xa, 0x401, 0x0, 0x0, {0x7, 0x0, 0x2}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_HANDLE={0xffffffffffffffa3, 0x6, 0x1, 0x0, 0x3}, @NFTA_OBJ_USERDATA={0x67, 0x8, "6619349ecaf0bd209aa3d8353dd1fe8bc3b5b0d550014280c39cec1724a5d34c4b3832bc01179d4a544526d0daeb0bdb5d011f521ed4f9d2de2872e5c269ef069a2b1fde950831ef7b328c121011fd35a98b31c4a22caad9547e5ef5b02f5958e06dc4"}, @NFTA_OBJ_USERDATA={0xfc, 0x8, "db74c46a19acceec05b7c898afbb8430bb325983eb9fbc44f71648962b4c439a4054eb0f214370f08bf68284fda8e19bc6738adb0f2edd17f3dfca56f7de0366e727843c870e179467ce91c2ac24b6eec9857982c6f5678633d419e4394985418f92894aeebbc72968aa2ee9f1833d01bc75ba93488a26e141c7d4b546435721780f5a8fcdefd5cbe307e3c66e2bf8d7fa50fcf794d54887cbc0b2cf1e479d776f893667098c8a21cbad518a18bb9ec9412905c4fbf9e92ad1c31fefa77be8f8798711563eb32ce5f9d013ba1b28835e6844a22958527fae5f7bac9cbdabe447fb617368f9d5a10a391be9b96e5c262e3a801307abe6872a"}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x301, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELOBJ={0x28, 0x14, 0xa, 0x5, 0x0, 0x0, {0x2, 0x0, 0x3}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}]}, @NFT_MSG_NEWSETELEM={0x34, 0xc, 0xa, 0x301, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x20, 0x3, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}]}]}]}], {0x14}}, 0x460}}, 0x200000d4) sendmsg$NFT_BATCH(r3, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000580)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x3}}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x3}]}}}]}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x2}}}, 0x78}, 0x1, 0x0, 0x0, 0x4008091}, 0x24000000) 2.49012124s ago: executing program 6 (id=2218): r0 = socket$kcm(0x29, 0x7, 0x0) r1 = socket$igmp6(0xa, 0x3, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r1}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f0000000040)='./file0\x00', 0x0, 0x4000, r1}, 0x18) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) r5 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000180)={r4, 0x0, 0x25, 0x0, @val=@uprobe_multi={&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=[0x4874, 0xffffffffffffff00, 0x9, 0x3, 0x0, 0x3, 0x4f7], 0x0, 0x4, 0x7, 0x1, 0xffffffffffffffff}}, 0x40) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000001c0)={r5, r4, 0x0, r4}, 0x10) sendmsg$sock(r3, &(0x7f0000000980)={&(0x7f0000000200)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e20, 0x3}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000280)="98195b43bb4605c95151c669d23cc817118f63b65e590fb2abb12be1c7d9ed40fc2c9fe86e37477547af70ba827fb7c50a4b5e522b3dbc0798100673030a357373f853b2e1418b0767011c", 0x4b}, {&(0x7f0000000300)="1d551c0279f8dfe097727afa9329ba031439db4888a2348198504f63b0943d5db4c391df11853dcdcf2c3f39eb897434b19256838471ac15fe6286106837aeb5213dc75e133b9f8d150a7418f638d3f542c24cd0f0117bcdb00a13f91c9cd642b3196dda4bd86dbe251dc3d112c51f13da895a64170f000b465bbfe82536b375471efed1c25f686e80759774788606750a00b7bc95250be5f1d552b9481fd05421af13c3e5a12d4559", 0xa9}, {&(0x7f00000003c0)="6b87c493c2d3e8aae12ebfe6dac9c4e98612d263cc082f0bb7a7a64dc60e6c772423fda8019d2e9a98ddf396c5c09935150954a70107bb732781dfb7cec4e9435eceb2a6a886db5c12c384a623b879b5326469469335ea2b08e5ab2a431ccf615ed6f5f1c0b5874c85ef76a7a6749629d420ad28ca4aad55a8b667b23007370455213df4c9db828ff0652a3402718de05e433c365a315816ed4ee197", 0x9c}, {&(0x7f0000000480)="5243eac9f03230abbe9b2563aaea9d57418a587d475fe6142fc49c51f962d34ce76eec9e86badeb05ecc6352ffb3a7170497c1872afe5f495746ea098e06e2d68e7b8034a96a4a393f304580c6306357a851cd5ca58976165e860a39ca8077f3781fa3652a3a5074a5d5da3dc5e7ae5d4d24315aec2f40801362eee95f09cba315077474521e67db264a2f3209eb1c949d72a539dbb15b134533a72b50db7a42006aeefcd2cb28117f1e8225a7bfabc01de97ac7d4f4ca6c4ada65644496e4bbba47b990a5922c4f466fc42cb1f3946e95cb3113be09d144ea02e4498659", 0xde}, {&(0x7f0000000580)="0a9bfa9b68c7774c3d17eeaf2777b7a8bfd8a0f5bad426e0e21ba3e63b9b819454614e71a9cd29acc9cf8f6d9ff601fa537393e7464f3325b67b06fa1d6497ea6b445c91803b2e9dd2f81ee94ab237fd7bab4a534a4cbdc1e40930212cf3e1028d0cf638bd55e3cdc8f30008f08df33fc5293555e731a84d7ad0d296d0a47c4ee125c29f67d647076f02d8ead593701014f6e61844a82bc07e439862e3aa806f12434435768aa4972362f930bac8b4c84bbbeabc701d399d86b29db37e82900d2478", 0xc2}, {&(0x7f0000000680)="6918a96a3e8c1c262e338a203b431d81deecf7204bc87eec82482ba4ad0e8aa7dd754d79994b3e0e5bce41cd191d5cadc13806ee1511f3bf600c92b8c8d9145b376cddc7f67a0e46f3873bcc5f42fba3243a9ece1dcebd7311bb1576727e487b963038a466c2c79fb551b4f8bda8e1a793f8329174fad3896e5760d14965539cce9bb9142c22ac6fb48e6c0b196c27dc2e90d7533aaa4ff181b68c1eb9a0142eccdcae270e3e3392b9d43f46c9425069156bd11caa8a8e08cfdf36298f19688692ef4372de7abd3328e606a75e6d21857c060ba4c0fb3abe217bde", 0xdb}, {&(0x7f0000000780)="a1f7f406f723d0434c0afaaf17319a6e4395bfe1eb822cf1001291562f487f645506aa5c69e30779ce17d62be2da801da4baf2c79eb4a4090c9419a6532e85667d6ef584c1d15e10b02c4acf6c5dff993ecb27f0d73c63f9540ab171d6b5416c3bc489e88235201efc0f53fd7e37f1a38b706f7d9f84f347558889f3f2", 0x7d}], 0x7, &(0x7f0000000880)=[@timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0xffffffffffffffbb}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0xffff}}, @mark={{0x14, 0x1, 0x24, 0x124b}}, @txtime={{0x18}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x7fffffff}}], 0xd8}, 0x40000) sendmsg$NFT_MSG_GETRULE(r2, &(0x7f0000001140)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001100)={&(0x7f0000000a00)={0x6f0, 0x7, 0xa, 0x101, 0x0, 0x0, {0x3}, [@NFTA_RULE_EXPRESSIONS={0x5c, 0x4, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @numgen={{0xb}, @void}}, {0x48, 0x1, 0x0, 0x1, @connlimit={{0xe}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_CONNLIMIT_FLAGS={0x8}, @NFTA_CONNLIMIT_COUNT={0x8}, @NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0xd}, @NFTA_CONNLIMIT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_CONNLIMIT_FLAGS={0x8}]}}}]}, @NFTA_RULE_COMPAT={0x1c, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_RULE_COMPAT_PROTO_IPV4={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_RULE_COMPAT_PROTO_IPV4={0x8, 0x1, 0x1, 0x0, 0xb7}]}, @NFTA_RULE_CHAIN_ID={0x8, 0xb, 0x1, 0x0, 0x1}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_RULE_USERDATA={0xb8, 0x7, 0x1, 0x0, "bc91a0fedd59fd266f34d3d49d7fa06122f652357ff48818e8de100f6d84bc14132d6ce6b4ed0fabc4a4e972b110b060d2519ec8ee5088355aa5e947b9b47a9b3db28ae511fc46fdc87d07b1e44d748abcea6cf863a592bd8095176dfa6e86d043f94b0057f929f149ebbdff5ce382bea0e9e30729f1198d52258c91942f20c847e54976e27e16c553a99a7fa197db6a9c7c0f11132e5373ccd3e025484bb0371e6bb72bcd1ced8a6d12af129bc7a3823db02b5b"}, @NFTA_RULE_EXPRESSIONS={0x58c, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @xfrm={{0x9}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_XFRM_KEY={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_XFRM_DIR={0x5, 0x3, 0x1}, @NFTA_XFRM_SPNUM={0x8, 0x4, 0x1, 0x0, 0x2}]}}}, {0x10, 0x1, 0x0, 0x1, @inner={{0xa}, @void}}, {0x10, 0x1, 0x0, 0x1, @limit={{0xa}, @void}}, {0x340, 0x1, 0x0, 0x1, @immediate={{0xe}, @val={0x32c, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DATA={0x228, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x49, 0x1, "73eec33cf6f50487b5670a76ada1eb74ab833ca314f6f072bc26cc8ce71da4872a0f439993ea54aa71d17d22b49a9efbdf1cbdd2ebdc9415405f71be9f3e526b2550517f1f"}, @NFTA_DATA_VALUE={0x36, 0x1, "e99c04c0384bf2c2ae8ef768d223314274dc6df5836278f90c2b59240c9c81123daf4b689011264ede2f561a11d2252b5bd0"}, @NFTA_DATA_VALUE={0x39, 0x1, "d0498385d9597ebb11cf88e7999bfefd81847e37f3e7f2102a865c24ddc24a3f241f8c192097bb79affb81d944f11ae7fb5e874488"}, @NFTA_DATA_VERDICT={0x4c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x3}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x3}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0xb7, 0x1, "7f8ca1c015f7157f99b88cd9c39971f26cf2c7591bc5bda9b1e55958383e0fee6073d5e8e2a8f54cb6c1cd6008fba504d55499a751535c11e5e2e2f17dfc1ea6c154fd05bd3984619a6ee914e40eecf1eb0b1052834af1b19876a666f3df4634b86026fcaf615c19f0e478eda71da6a2472dca15a3899ab78bdd6cbfb55a7fcbd721fcc2c2b3d65b2457e9697ae823c9b16887289780cbaaad06438b2577864312e1a636af58645b039103ca0288785d1694ae"}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x3}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x4}]}]}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x16}, @NFTA_IMMEDIATE_DATA={0xf8, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x7ffffffffffffff8}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}]}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x2}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}]}, @NFTA_DATA_VALUE={0x68, 0x1, "ca3b33e701b9eb6a54f5f4c007dc5d8b855ff46494090b98c783ec214ee6067761e2bb47faf3dc63968d032d22a7136fe44a8422c5241e568217e97682516f33201c9a4b8241ef7e9f7673892f968f6b98d4ff292c5068b20cbca7c46faf99a2740028e9"}, @NFTA_DATA_VALUE={0x30, 0x1, "b55b9115c93628154a18c45c3868434d819b72ac5720210e3065f8ddd9ff8b09e15749ac08919f225a8ebd76"}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}]}]}}}, {0x10, 0x1, 0x0, 0x1, @queue={{0xa}, @void}}, {0x190, 0x1, 0x0, 0x1, @range={{0xa}, @val={0x180, 0x2, 0x0, 0x1, [@NFTA_RANGE_TO_DATA={0x11c, 0x4, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x3}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x3}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x3}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0xcd, 0x1, "d24be4879038fbea854dd4a6520b4660ae883f9ba3c80e064e2b7f3c83eb20cdb7de30da5afa3e1651c7bfe1794d579208392efe669c5645c618a0d64a28132a66e218cb1b5919138a98c9da516ac125f6b9d66361d5a0eeaeae585df96a93e7c1a8a9842c75765aa99a6b46faa7971283747f42166cc158b66fcfefe5a0fb31205bdcac54f0c792918eb80b1900ead6aa3b115a96319a31abe7bda33dbad5e1c8f02b713fad96116fd325ca6363e41952b4a444b296494217c148a22f4839b2bd93d28ec09802139e"}, @NFTA_DATA_VALUE={0xa, 0x1, "c0c70e2b43ad"}]}, @NFTA_RANGE_FROM_DATA={0x58, 0x3, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x4}]}]}, @NFTA_RANGE_SREG={0x8, 0x1, 0x1, 0x0, 0x11}]}}}, {0x20, 0x1, 0x0, 0x1, @fwd={{0x8}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_FWD_SREG_ADDR={0x8, 0x2, 0x1, 0x0, 0x15}, @NFTA_FWD_SREG_ADDR={0x8, 0x2, 0x1, 0x0, 0x15}]}}}, {0x14, 0x1, 0x0, 0x1, @notrack={{0xc}, @val={0x4, 0x2, 0x0, 0x1, ["", "", "", ""]}}}, {0x14, 0x1, 0x0, 0x1, @connlimit={{0xe}, @void}}, {0x14, 0x1, 0x0, 0x1, @notrack={{0xc}, @val={0x4, 0x2, 0x0, 0x1, ["", "", ""]}}}]}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}]}, 0x6f0}, 0x1, 0x0, 0x0, 0x4000000}, 0x44000) sendmsg(r1, &(0x7f0000001340)={&(0x7f0000001180)=@llc={0x1a, 0x17, 0xa4, 0x9, 0xa6, 0xa, @multicast}, 0x80, &(0x7f0000001300)=[{&(0x7f0000001200)="67f25aa31debf83188eec8897ccc55769cd3a66cc62419a7535f36fedc34dfda06de4f6ef3de19930fdac40c64e1749cc8623a0e77cc8384f492ca719fc1e45903a71caafc7bbe85c20f60906c4942b629176997d1bf78918eeb5cfba2745c8fd79c20aa9faf80aa6f35c7ef1f932593da959fad0c56c7caec33d0158d7ce0f2968ac1197b93b0b76f5508a3e679f42f84792615b2f95e36245f3be07b2e70b7f6654b2fea9e72cd8ce3245378baeb07923ba574011dd55c94c90666cb6d92d9c3f877114e16719f54fa", 0xca}], 0x1}, 0x8000) socket$inet_smc(0x2b, 0x1, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001480)={@ifindex=0x0, 0x3, 0x1, 0x5, &(0x7f0000001380)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001400)=[0x0, 0x0, 0x0], &(0x7f0000001440)=[0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000017c0)={r4, 0xe0, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000001500)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000001540)=[0x0, 0x0, 0x0], &(0x7f0000001580)=[0x0], 0x0, 0x17, &(0x7f00000015c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001600), &(0x7f0000001640), 0x8, 0xa1, 0x8, 0x8, &(0x7f0000001680)}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000014c0)={@ifindex=r8, r4, 0x23, 0x8, 0x0, @void, @value=r4, @void, @void, r7}, 0x20) r9 = socket(0x29, 0x5, 0x6) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001800)=r4, 0x4) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001840)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', r6, 0xffffffffffffffff, 0x2, 0x1, 0x3}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001940)={{r10, 0xffffffffffffffff}, &(0x7f00000018c0), &(0x7f0000001900)}, 0x20) sendmsg$nl_route_sched_retired(r2, &(0x7f0000001a80)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001a40)={&(0x7f00000019c0)=@newqdisc={0x58, 0x24, 0x800, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r6, {0xe, 0x4}, {0xd, 0xd}, {0x1ffc7, 0x10}}, [@q_dsmark={{0xb}, {0xc, 0x2, [@TCA_DSMARK_DEFAULT_INDEX={0x6, 0x2, 0x9}]}}, @q_dsmark={{0xb}, {0x10, 0x2, [@TCA_DSMARK_INDICES={0x6, 0x1, 0x9}, @TCA_DSMARK_SET_TC_INDEX={0x4}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000015}, 0xc040) mkdirat$cgroup(r1, &(0x7f0000001ac0)='syz0\x00', 0x1ff) r12 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001d00)={&(0x7f0000001b00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0x6, [@volatile={0x7, 0x0, 0x0, 0x9, 0x5}, @enum64={0x2, 0x1, 0x0, 0x13, 0x1, 0x4, [{0x9, 0x0, 0x5}]}, @volatile={0xc, 0x0, 0x0, 0x9, 0x5}, @enum64={0xe, 0x5, 0x0, 0x13, 0x1, 0x5, [{0x2, 0x2, 0xe7a}, {0x10, 0x1}, {0x8, 0x2, 0x9}, {0xb, 0x0, 0x4ba}, {0x2, 0x1, 0xff62}]}, @ptr={0x2, 0x0, 0x0, 0x2, 0x4}, @enum64={0x7, 0x4, 0x0, 0x13, 0x1, 0x0, [{0x1, 0x2, 0x7ff}, {0x9, 0x938, 0x40}, {0x6, 0x1, 0xef02}, {0x5, 0x9, 0x200}]}, @struct={0xb, 0x4, 0x0, 0x4, 0x0, 0x8, [{0x9, 0x5, 0x8}, {0x7, 0x2, 0x7fff}, {0x1, 0x2}, {0xa, 0x5, 0xc018}]}, @ptr={0x10}, @func={0x3, 0x0, 0x0, 0xc, 0x1}, @const={0x0, 0x0, 0x0, 0xa, 0x3}]}, {0x0, [0x30, 0x5f, 0x5f, 0x61]}}, &(0x7f0000001c40)=""/159, 0x13e, 0x9f, 0x1, 0x1, 0x10000}, 0x28) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001d40)={0x3, 0x4, 0x4, 0xa, 0x0, r11, 0xff, '\x00', 0x0, r12, 0x0, 0x5, 0x3}, 0x50) r13 = perf_event_open$cgroup(&(0x7f0000001dc0)={0x1, 0x80, 0x5, 0x40, 0x4e, 0x7, 0x0, 0x10, 0x820c0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x3c30574f, 0x5}, 0x4, 0x2, 0xe, 0x8, 0x6, 0xb, 0xa8ef, 0x0, 0x80000001, 0x0, 0x1000000000000000}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x2400, 0x2) socket$kcm(0x29, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) syz_clone(0x811900, &(0x7f0000001e40)="cbe906794f414959e345224a8cee29582485700180489b4808e7508bbaaee1331f596ee5c4656c2e1a3869b4fb155b3926d2152bcb4aefeacb127de90dadd427236ec5aeb22ecd2226adf9f0441cc33fceeb0f294d6728c22c44b6489ae170def0a5bba5", 0x64, &(0x7f0000001ec0), &(0x7f0000001f00), &(0x7f0000001f40)="6ec2f98a4e26b7f3e8d1cfd0dafe") socket$nl_generic(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r9, &(0x7f0000002040)={&(0x7f0000001f80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000002000)={&(0x7f0000001fc0)={0x20, 0x1411, 0x200, 0x70bd26, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_STAT_RES={0x8, 0x4b, 0x13}]}, 0x20}, 0x1, 0x0, 0x0, 0x240000d2}, 0x40000) 2.469290917s ago: executing program 5 (id=2219): socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x3, 0x800}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="3800000040000701feffffff00000000017c0000040042801c00018006002000800a0000100004002524298d275c232f262d2b00040002"], 0x38}, 0x1, 0x0, 0x0, 0x48815}, 0xc000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x164}, 0x1, 0x0, 0x0, 0x8801}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r4, &(0x7f00000000c0)=0x5f6, 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x40010) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r7, &(0x7f0000000180), 0x40010) 2.365049991s ago: executing program 6 (id=2220): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="1400000010003507d25a806f8c6394f90324fc60", 0x14}], 0x1}, 0x40810) recvmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000027c0)=[{&(0x7f0000000500)=""/4082, 0xff2}], 0x1}, 0x10100) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0xee2138f8045c8f5f) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) getpid() r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f00000026c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) bpf$BPF_PROG_DETACH(0x1c, &(0x7f0000000a40)={@fallback=r2, r3, 0x2f}, 0x20) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, 0x40891) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xb}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[], 0x18}, 0x1, 0x0, 0x0, 0x240080d1}, 0x8010) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socket$kcm(0x2, 0x5, 0x84) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=ANY=[@ANYBLOB="4c000000020603000000000000000000000000001400078008001240000000000500150002000000050001000600000005000500020000000500040000000000090002"], 0x4c}}, 0x0) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2010871, &(0x7f0000000bc0)={[], [{@obj_type={'obj_type', 0x3d, '//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'}}]}) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$NFT_BATCH(r7, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000050000080900010073797a30000000005c000000030a03000000000000000000050000000900010073797a30000000000900030073797a300000000008000c40000000032800048008000240000000120800014000000000140004"], 0xa4}}, 0x0) 2.331672832s ago: executing program 5 (id=2221): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1d, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$kcm(0x11, 0x3, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000003c0)}, 0x0) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_icmp(0xa, 0x2, 0x3a) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1f000000040000010000000000000000850000005000000085000000230000009500000000000000"], &(0x7f0000001640)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$kcm(0xa, 0x3, 0x73) setsockopt$sock_attach_bpf(r4, 0x29, 0x21, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef8}, 0x11efa, 0x4, 0x98, 0x2, 0x2, 0xfffff271, 0xfffd, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) r8 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)={0x34, 0x40, 0x1, 0x70bd2a, 0x4, {0x1}, [@nested={0x4, 0x44}, @nested={0x14, 0x1, 0x0, 0x1, [@nested={0x10, 0x10, 0x0, 0x1, [@typed={0x6, 0xa, 0x0, 0x0, @str=':\x00'}, @generic="e145d279"]}]}, @typed={0x8, 0x2, 0x0, 0x0, @fd=r8}]}, 0x34}, 0x1, 0x0, 0x0, 0x400c801}, 0x4008094) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001ec0)=ANY=[@ANYBLOB="340000003e0007012bbd700000000000010100080400fc800c00018008000600", @ANYRES32=0x0, @ANYBLOB="080002800400338008000900", @ANYRES32=r5], 0x34}, 0x1, 0x0, 0x0, 0xc000}, 0x4040) sendmsg$inet6(r3, &(0x7f0000000880)={&(0x7f0000000080)={0xa, 0x4e21, 0x2, @private2, 0x49}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000040)="8000e8beec9dbc13", 0x8}], 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000029000000040000003a0000000000000010000000000000002900000004"], 0x30}, 0x4004000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b40)={0x3, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@generic={0x71, 0x0, 0x1, 0xa9}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0xd}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r9, &(0x7f00000000c0)=ANY=[@ANYRES8=r9, @ANYRES16=r9, @ANYRES32], 0xffdd) r10 = socket$kcm(0x10, 0x100000000002, 0x4) sendmsg$kcm(r10, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="39000000140081ae00002c000500015601618575e285af0180000000171300883795c04a31ba377a1b2cc32b38d3740000ffffffffffffffff", 0x39}], 0x1, 0x0, 0x0, 0xc00e}, 0x0) 2.190696205s ago: executing program 6 (id=2222): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0xa2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x830d}, 0x100b2, 0x2, 0x60000000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1e, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="18080000281c0040000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf0900000000000035090100000000009500000000070000b7020000000000007b9a00fe00000000b6090000002000a80700000050000058bf8600000000000027080000f8ffffffbfa400000000000007040000f0ffffff550000000800000018220000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7050000080000004608f0ff760000005d9800000000de4556000000a80000008500000007000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x11, 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r3, 0x0, 0x20040004) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000039000101"], 0x14}, 0x1, 0x0, 0x0, 0x400c801}, 0x4008094) 1.979747285s ago: executing program 3 (id=2223): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x3, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x1000, 0xfffff2f1, 0xfffc, 0x0, 0x0, 0x0, 0x8001}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socket$kcm(0x2, 0x3, 0x2) mount$bpf(0x0, &(0x7f0000000100)='.\x00', &(0x7f00000006c0), 0x400008, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x78}, 0x1, 0x0, 0x0, 0x8d1}, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r5) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8, 0x830b}, 0x8024, 0x2, 0xfffffffe, 0x1, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4010}, 0x8040) socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20001850) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='freezer.self_freezing\x00', 0x26e1, 0x0) ioctl$SIOCSIFHWADDR(r9, 0xc0045878, 0x0) openat$cgroup_ro(r9, &(0x7f0000000040)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00\v'], 0x48) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) 1.828096393s ago: executing program 8 (id=2224): socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0xf, 0x3, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, 0x0, &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.current\x00', 0x275a, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000040)=0x3) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)}, 0x2160) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX], 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[], 0x0, 0x42}, 0x28) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f00000003c0)="c274386d178550cb864bd57221bc", 0x0, 0x1200000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) 1.585396943s ago: executing program 7 (id=2225): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x2, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000001fc0)=ANY=[@ANYBLOB="18000000000000000000000000000400711236000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x8, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000040000000c"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f00000002c0), &(0x7f0000000240)=r2}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x18000000000002a0, 0xd50, 0x0, &(0x7f0000000580)="b9ff03076804268c989e14f088a8", 0x0, 0x500, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 595.403947ms ago: executing program 7 (id=2226): bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1d, 0x200000000000021b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x24}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00', 0x800}) socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x104000, 0x2, 0xfffffffe, 0x6, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0x21, 0x3, 0x2) mount$bpf(0x0, 0x0, 0x0, 0x1080860, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$xdp(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)="9ae5df6c9522ea43351cd91cf6ff33e82d30dc8e5d6f06b4881bc46b05d6b95270ac26f1cd1ce893d76283fb482a41ac0db200250ea38bdd6c200da272acdc905ab5f5bd9e03a6803207d5019d47d91a4e9e97", 0x53}, {&(0x7f0000000040)="5538be4431a534faaf881cf6f9cdd3237e", 0x11}], 0x2, 0x0, 0x0, 0x4000}, 0x8000) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x4a) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x1f2f, 0xf, 0x3253, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000011008188040f46ecdb4cb9cca7480ef42100fffee3bd6efb440013030e001b000d000008ba8000001201", 0x2e}], 0x1}, 0x0) 543.075376ms ago: executing program 8 (id=2227): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$sock_attach_bpf(r2, 0x1, 0x3c, &(0x7f0000000040), 0x4) 542.086976ms ago: executing program 3 (id=2228): r0 = socket$kcm(0x10, 0x400000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x5, 0x5, 0x0, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x7, 0x3d, 0x7, 0x0, 0x0, 0xd299, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x4}, 0x100882, 0x7ff, 0x6, 0x0, 0xb, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) socket$netlink(0x10, 0x3, 0x0) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0007000042009103"], 0xfe33) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000400)}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0xffff}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x5}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELCHAIN={0x30, 0x5, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x4}, [@NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0x4}]}, @NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0x3}}, @NFT_MSG_NEWTABLE={0x128, 0x0, 0xa, 0x301, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_TABLE_USERDATA={0xfc, 0x6, "2d3a113429199f3ca21164590a8087616819f69ed192485a675f17682aad23a6ea4c842b2862a28b9120c658fe1b5c4c77a187fb10d2dfa86bbab179b3c028fd7d2f9d50cf8629fa5e671c12499ea6396735dc9af93198e0e09ac09d56b8048a390a221ed24f6d46a4515d5c597ee9b21168d2ee8da68fe69a6f0efc0a23652b37b308f301f79ae851803dafb88e8b66c26c27ecdb86eb6f0455d135e8f6ac2ed3de6ad514ee1ac9ef99b9387c89127cbff35f3e396707f570a01b7c9be72b735c16134d4fddd4cc2e0cab30999c99bf0f893581e90b68057971fa816e6b8bc45d45ce0bafba17bdfce64fcea88a70a7a5ad286b84cf92a6"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELCHAIN={0x60, 0x5, 0xa, 0x801, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFTA_CHAIN_ID={0x8, 0xb, 0x1, 0x0, 0x4}, @NFTA_CHAIN_COUNTERS={0x28, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x619}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0xfffffffffffffff8}]}, @NFTA_CHAIN_COUNTERS={0x1c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0xffffffffffffffa8}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x4}]}]}, @NFT_MSG_DELOBJ={0x190, 0x14, 0xa, 0x401, 0x0, 0x0, {0x7, 0x0, 0x2}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_HANDLE={0xffffffffffffffa3, 0x6, 0x1, 0x0, 0x3}, @NFTA_OBJ_USERDATA={0x67, 0x8, "6619349ecaf0bd209aa3d8353dd1fe8bc3b5b0d550014280c39cec1724a5d34c4b3832bc01179d4a544526d0daeb0bdb5d011f521ed4f9d2de2872e5c269ef069a2b1fde950831ef7b328c121011fd35a98b31c4a22caad9547e5ef5b02f5958e06dc4"}, @NFTA_OBJ_USERDATA={0xfc, 0x8, "db74c46a19acceec05b7c898afbb8430bb325983eb9fbc44f71648962b4c439a4054eb0f214370f08bf68284fda8e19bc6738adb0f2edd17f3dfca56f7de0366e727843c870e179467ce91c2ac24b6eec9857982c6f5678633d419e4394985418f92894aeebbc72968aa2ee9f1833d01bc75ba93488a26e141c7d4b546435721780f5a8fcdefd5cbe307e3c66e2bf8d7fa50fcf794d54887cbc0b2cf1e479d776f893667098c8a21cbad518a18bb9ec9412905c4fbf9e92ad1c31fefa77be8f8798711563eb32ce5f9d013ba1b28835e6844a22958527fae5f7bac9cbdabe447fb617368f9d5a10a391be9b96e5c262e3a801307abe6872a"}]}, @NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x301, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELOBJ={0x28, 0x14, 0xa, 0x5, 0x0, 0x0, {0x2, 0x0, 0x3}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}]}, @NFT_MSG_NEWSETELEM={0x34, 0xc, 0xa, 0x301, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x20, 0x3, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}]}]}]}], {0x14}}, 0x460}}, 0x200000d4) sendmsg$NFT_BATCH(r3, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000580)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x3}}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x3}]}}}]}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x2}}}, 0x78}, 0x1, 0x0, 0x0, 0x4008091}, 0x24000000) 455.101744ms ago: executing program 5 (id=2229): r0 = syz_clone(0x40400, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r2, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r2, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000005c0)=@newqdisc={0x24, 0x24, 0xf0b, 0x70bd2e, 0x0, {0x0, 0x0, 0x12, r4, {0x5}, {0xffff, 0xffff}, {0xa}}}, 0x24}, 0x1, 0x0, 0x0, 0x8004001}, 0x0) r5 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x480000000000000e, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x4}, 0x11efa, 0x4, 0x98, 0x0, 0x7, 0xfffff271, 0xfffd, 0x0, 0x0, 0x0, 0x24}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) recvmsg(0xffffffffffffffff, 0x0, 0x10100) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r7) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x42, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39a0, 0x0, @perf_config_ext={0x0, 0xa}, 0x0, 0x0, 0x0, 0x4, 0x2, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0xa0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x400000000008, 0x8000008}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000700)={@ifindex=r3, 0x26, 0x1, 0x8c, &(0x7f0000000140)=[0x0], 0x1, 0x0, &(0x7f0000000200)=[0x0], &(0x7f0000000380)=[0x0], &(0x7f00000006c0)=[0x0]}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x42}, {{0x18, 0x1, 0x1, 0x0, r10}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x203f}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x6, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc, 0x7}, {0x18, 0x2, 0x2, 0x0, r10}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)={0x64, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}, @IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x2}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x64}}, 0x0) socket$kcm(0x2, 0x2, 0x73) 247.057732ms ago: executing program 8 (id=2230): r0 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x88, 0x68, &(0x7f0000000080), 0x4) socket(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000002d80)={0x0, 0x0, &(0x7f0000002d40)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000000203010200000000000000000000000009000200000000470200000008000340000000000800010001"], 0x30}}, 0x0) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x1c, 0x2, 0x3, 0x5, 0x0, 0x0, {0x2}, [@NFQA_CFG_CMD={0x8, 0x1, {0x2, 0x0, 0x1d}}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40049d1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x2, {0x2, 0x0, @empty}}, 0x80, 0x0, 0x0, &(0x7f0000000180)=ANY=[], 0x18, 0x68000000}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20000011) r4 = socket(0xa, 0x5, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000001380), 0x2c002, 0x0) sendmsg$inet_sctp(r4, &(0x7f00000000c0)={&(0x7f0000000000)=@in6={0xa, 0x4e24, 0xff, @loopback, 0x9}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000080)="1b", 0x1}], 0x1, &(0x7f0000000040)=[@init={0x18, 0x84, 0x0, {0x800, 0x7f, 0x3, 0x3b45}}, @dstaddrv4={0x18, 0x84, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x30, 0x4855}, 0x24000052) r5 = socket$kcm(0xa, 0x5, 0x0) close(0x3) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d00000000000057"], 0x0, 0x34}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000"], 0x48) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r6) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0xfcc9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41000}, 0x94) socket(0xf, 0x4, 0xc) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000002280)=ANY=[], &(0x7f00000013c0)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x40f00, 0x0, '\x00', 0x0, @xdp}, 0x94) setsockopt$sock_attach_bpf(r5, 0x29, 0x22, &(0x7f0000000100)=r7, 0x18) close(r0) 242.865773ms ago: executing program 3 (id=2231): socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x3, 0x800}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="3800000040000701feffffff00000000017c0000040042801c00018006002000800a0000100004002524298d275c232f262d2b00040002"], 0x38}, 0x1, 0x0, 0x0, 0x48815}, 0xc000) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x164}, 0x1, 0x0, 0x0, 0x8801}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r4, &(0x7f00000000c0)=0x5f6, 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x40010) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r7, &(0x7f0000000180), 0x40010) 91.916922ms ago: executing program 7 (id=2232): socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x8}, 0xc02, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0xfcc9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x40) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x3, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, 0x0, 0x0}, 0x94) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0xc010) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xcfa4) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x600, &(0x7f0000000080)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x6, 0x0, 0x8100, 0x0, {}, {}, {0xe, 0x10}}, [@TCA_RATE={0x4}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x11, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001b00)=ANY=[@ANYBLOB="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"], 0x114}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000b80)) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000080)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x3e}, 0x94) openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001a00)={r5, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x60000009, 0x0, 0x0, 0x0, 0x0}, 0x50) 0s ago: executing program 3 (id=2233): getpid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000001400)) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000480)="5c00000012006bab9a3fe3d86e17aa0b046b876c1d0048380019001931a0e69ee517d34460bc06000000a701251e6182949a3651f60a84c9f4d4938037e70e4509c51c268811000000000000000000002571cd53b9851b30599980bc", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000006c0)=""/182, 0xb6}, {&(0x7f0000003740)=""/4026, 0xfba}, {&(0x7f0000000d40)=""/4102, 0x1006}, {&(0x7f0000000500)=""/211, 0xd3}, {&(0x7f0000000300)=""/99, 0x63}, {&(0x7f0000000380)=""/116, 0x74}, {&(0x7f0000000c40)=""/202, 0xca}, {&(0x7f0000000600)=""/160, 0xa0}], 0x8}, 0x40000000) recvmsg$kcm(r0, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8800000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$sock_attach_bpf(r3, 0x6b, 0x87, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) r4 = socket$kcm(0x25, 0x1, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0xf}, 0x40, 0x2, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="1c00000004060102000000000000000002000002050001000700"], 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000ab4000000060a01040000000000000000020000280900010073797a30000000000900020073797a320000000088000480100001800c000100636f756e7465720014000180090001006d6173710000000004000280600001800a0001006c696d6974000000500002800c000140000000000000000808000440000000010c00014000000000000080010c00024000000000000000090800034000000fba0c00024000000000000000000c000140000000000000000714000000110001"], 0xdc}}, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000a80)=ANY=[@ANYBLOB="140000001000010000000000000000000300000a14000000060a010400000000000000000a0000011400000000000000000200000a00000000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x4008091}, 0x24000000) sendmsg$NFT_MSG_GETRULE(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="44000000190a0102"], 0x44}}, 0x0) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x0, 0x10, &(0x7f0000000ac0)=ANY=[@ANYBLOB="0000000000000000b704000008000000850000007800000095", @ANYRES32=r9, @ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYRES16=r5, @ANYRESDEC=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x6, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r10, 0x5, 0xe, 0x0, &(0x7f0000000440)="469dc2d34ae2b7000017645f7e00", 0x0, 0xcfd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) kernel console output (not intermixed with test programs): 81777][ T8403] ? __alloc_skb+0x193/0x390 [ 199.981789][ T8403] ? __alloc_skb+0x1d7/0x390 [ 199.981799][ T8403] ? __local_bh_enable_ip+0xd0/0x130 [ 199.981809][ T8403] ? __alloc_skb+0x193/0x390 [ 199.981821][ T8403] __alloc_skb+0x1d7/0x390 [ 199.981834][ T8403] netlink_ack+0x146/0xa50 [ 199.981844][ T8403] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 199.981855][ T8403] ? ref_tracker_free+0x693/0x840 [ 199.981876][ T8403] netlink_rcv_skb+0x2b6/0x4b0 [ 199.981887][ T8403] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 199.981899][ T8403] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 199.981920][ T8403] netlink_unicast+0x80f/0x9b0 [ 199.981934][ T8403] ? __pfx_netlink_unicast+0x10/0x10 [ 199.981949][ T8403] ? __alloc_skb+0x193/0x390 [ 199.981961][ T8403] ? netlink_sendmsg+0x650/0xb40 [ 199.981970][ T8403] ? skb_put+0x11b/0x210 [ 199.981984][ T8403] netlink_sendmsg+0x813/0xb40 [ 199.981995][ T8403] ? irqentry_exit+0x59c/0x620 [ 199.982009][ T8403] ? __pfx_netlink_sendmsg+0x10/0x10 [ 199.982026][ T8403] ? __pfx_netlink_sendmsg+0x10/0x10 [ 199.982036][ T8403] ____sys_sendmsg+0xa68/0xad0 [ 199.982049][ T8403] ? __might_fault+0xaf/0x130 [ 199.982062][ T8403] ? __pfx_____sys_sendmsg+0x10/0x10 [ 199.982079][ T8403] ? import_iovec+0x73/0xa0 [ 199.982091][ T8403] ___sys_sendmsg+0x2a5/0x360 [ 199.982103][ T8403] ? __lock_acquire+0x6b5/0x2cf0 [ 199.982119][ T8403] ? __pfx____sys_sendmsg+0x10/0x10 [ 199.982150][ T8403] ? __fget_files+0x2a/0x420 [ 199.982161][ T8403] ? __fget_files+0x3a0/0x420 [ 199.982178][ T8403] __x64_sys_sendmsg+0x1bd/0x2a0 [ 199.982192][ T8403] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 199.982210][ T8403] ? __pfx_ksys_write+0x10/0x10 [ 199.982226][ T8403] do_syscall_64+0xe2/0xf80 [ 199.982236][ T8403] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 199.982245][ T8403] ? clear_bhb_loop+0x60/0xb0 [ 199.982257][ T8403] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 199.982266][ T8403] RIP: 0033:0x7ff11d79aeb9 [ 199.982276][ T8403] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 199.982284][ T8403] RSP: 002b:00007ff11e643028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 199.982295][ T8403] RAX: ffffffffffffffda RBX: 00007ff11da15fa0 RCX: 00007ff11d79aeb9 [ 199.982302][ T8403] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000008 [ 199.982308][ T8403] RBP: 00007ff11e643090 R08: 0000000000000000 R09: 0000000000000000 [ 199.982314][ T8403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 199.982319][ T8403] R13: 00007ff11da16038 R14: 00007ff11da15fa0 R15: 00007ffc7108b418 [ 199.982335][ T8403] [ 199.998144][ T8406] netlink: 8 bytes leftover after parsing attributes in process `syz.8.572'. [ 200.487286][ T8415] netlink: 'syz.5.575': attribute type 10 has an invalid length. [ 200.533599][ T8415] veth0_vlan: left promiscuous mode [ 200.568056][ T8415] veth0_vlan: entered promiscuous mode [ 200.592641][ T8415] team0: Device veth0_vlan failed to register rx_handler [ 201.097428][ T8442] netlink: 8 bytes leftover after parsing attributes in process `syz.3.586'. [ 201.189980][ T8443] netlink: 'syz.6.585': attribute type 4 has an invalid length. [ 201.198701][ T8443] netlink: 'syz.6.585': attribute type 3 has an invalid length. [ 201.210365][ T8443] netlink: 132 bytes leftover after parsing attributes in process `syz.6.585'. [ 201.399716][ T8451] netlink: 28 bytes leftover after parsing attributes in process `syz.3.589'. [ 201.421078][ T8454] netlink: 368 bytes leftover after parsing attributes in process `syz.8.590'. [ 201.650256][ T8464] netlink: 60 bytes leftover after parsing attributes in process `syz.3.594'. [ 201.983636][ T8462] net_ratelimit: 60 callbacks suppressed [ 201.983676][ T8462] openvswitch: netlink: IP tunnel attribute has 4 unknown bytes. [ 202.876924][ T8488] netlink: 'syz.5.602': attribute type 39 has an invalid length. [ 202.980279][ T8491] IPv6: Can't replace route, no match found [ 203.281305][ T8508] IPv6: NLM_F_CREATE should be specified when creating new route [ 203.303835][ T8511] netlink: 'syz.5.612': attribute type 16 has an invalid length. [ 203.317126][ T8511] netlink: 'syz.5.612': attribute type 17 has an invalid length. [ 203.362568][ T8508] IPv6: NLM_F_REPLACE set, but no existing node found! [ 203.447834][ T8513] netlink: 'syz.7.610': attribute type 3 has an invalid length. [ 203.500456][ T8512] FAULT_INJECTION: forcing a failure. [ 203.500456][ T8512] name failslab, interval 1, probability 0, space 0, times 0 [ 203.592187][ T8512] CPU: 1 UID: 0 PID: 8512 Comm: syz.6.611 Not tainted syzkaller #0 PREEMPT(full) [ 203.592212][ T8512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 203.592222][ T8512] Call Trace: [ 203.592230][ T8512] [ 203.592238][ T8512] dump_stack_lvl+0xe8/0x150 [ 203.592267][ T8512] should_fail_ex+0x412/0x560 [ 203.592297][ T8512] should_failslab+0xa8/0x100 [ 203.592321][ T8512] kmem_cache_alloc_node_noprof+0x8b/0x6f0 [ 203.592342][ T8512] ? __alloc_skb+0x1d7/0x390 [ 203.592359][ T8512] ? __local_bh_enable_ip+0xd0/0x130 [ 203.592377][ T8512] ? __alloc_skb+0x193/0x390 [ 203.592399][ T8512] __alloc_skb+0x1d7/0x390 [ 203.592424][ T8512] netlink_dump+0x1ef/0xe80 [ 203.592451][ T8512] ? __netlink_lookup+0xc6/0x8b0 [ 203.592476][ T8512] ? __pfx_netlink_dump+0x10/0x10 [ 203.592492][ T8512] ? __netlink_lookup+0x7e4/0x8b0 [ 203.592531][ T8512] ? netlink_lookup+0x30/0x200 [ 203.592548][ T8512] ? netlink_lookup+0x30/0x200 [ 203.592564][ T8512] ? netlink_lookup+0x30/0x200 [ 203.592589][ T8512] __netlink_dump_start+0x5cb/0x7e0 [ 203.592619][ T8512] rdma_nl_rcv+0x78b/0xa10 [ 203.592664][ T8512] ? __pfx_rdma_nl_rcv+0x10/0x10 [ 203.592684][ T8512] ? __pfx_nldev_port_get_dumpit+0x10/0x10 [ 203.592708][ T8512] ? netlink_deliver_tap+0x2e/0x1b0 [ 203.592726][ T8512] ? netlink_deliver_tap+0x2e/0x1b0 [ 203.592760][ T8512] ? netlink_deliver_tap+0x2e/0x1b0 [ 203.592789][ T8512] netlink_unicast+0x80f/0x9b0 [ 203.592818][ T8512] ? __pfx_netlink_unicast+0x10/0x10 [ 203.592835][ T8512] ? __alloc_skb+0x193/0x390 [ 203.592857][ T8512] ? netlink_sendmsg+0x650/0xb40 [ 203.592882][ T8512] netlink_sendmsg+0x813/0xb40 [ 203.592914][ T8512] ? __pfx_netlink_sendmsg+0x10/0x10 [ 203.592939][ T8512] ? aa_sock_msg_perm+0xf1/0x1b0 [ 203.592964][ T8512] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 203.592988][ T8512] ? __pfx_netlink_sendmsg+0x10/0x10 [ 203.593006][ T8512] ____sys_sendmsg+0xa68/0xad0 [ 203.593041][ T8512] ? __pfx_____sys_sendmsg+0x10/0x10 [ 203.593077][ T8512] ? import_iovec+0x73/0xa0 [ 203.593100][ T8512] ___sys_sendmsg+0x2a5/0x360 [ 203.593122][ T8512] ? __lock_acquire+0x6b5/0x2cf0 [ 203.593152][ T8512] ? __pfx____sys_sendmsg+0x10/0x10 [ 203.593183][ T8512] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 203.593238][ T8512] ? __fget_files+0x2a/0x420 [ 203.593258][ T8512] ? __fget_files+0x3a0/0x420 [ 203.593293][ T8512] __x64_sys_sendmsg+0x1bd/0x2a0 [ 203.593320][ T8512] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 203.593375][ T8512] do_syscall_64+0xe2/0xf80 [ 203.593394][ T8512] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 203.593411][ T8512] ? clear_bhb_loop+0x60/0xb0 [ 203.593434][ T8512] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 203.593451][ T8512] RIP: 0033:0x7fd12eb9aeb9 [ 203.593468][ T8512] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 203.593482][ T8512] RSP: 002b:00007fd12f9dd028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 203.593501][ T8512] RAX: ffffffffffffffda RBX: 00007fd12ee15fa0 RCX: 00007fd12eb9aeb9 [ 203.593513][ T8512] RDX: 0000000020000004 RSI: 0000200000000440 RDI: 000000000000000a [ 203.593525][ T8512] RBP: 00007fd12f9dd090 R08: 0000000000000000 R09: 0000000000000000 [ 203.593535][ T8512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 203.593545][ T8512] R13: 00007fd12ee16038 R14: 00007fd12ee15fa0 R15: 00007ffec21365f8 [ 203.593580][ T8512] [ 203.926653][ T8517] sch_tbf: burst 0 is lower than device veth0_to_bridge mtu (1514) ! [ 204.457750][ T8547] __nla_validate_parse: 4 callbacks suppressed [ 204.457792][ T8547] netlink: 104 bytes leftover after parsing attributes in process `syz.8.627'. [ 205.003233][ T8567] netlink: 2 bytes leftover after parsing attributes in process `syz.5.634'. [ 205.025198][ T8567] batadv_slave_1: entered promiscuous mode [ 205.502768][ T8575] netlink: 60 bytes leftover after parsing attributes in process `syz.6.636'. [ 205.512891][ T8575] netlink: 60 bytes leftover after parsing attributes in process `syz.6.636'. [ 205.522686][ T8575] netlink: 60 bytes leftover after parsing attributes in process `syz.6.636'. [ 206.196857][ T8594] netlink: 60 bytes leftover after parsing attributes in process `syz.7.646'. [ 206.210509][ T8594] netlink: 60 bytes leftover after parsing attributes in process `syz.7.646'. [ 206.240665][ T8594] netlink: 60 bytes leftover after parsing attributes in process `syz.7.646'. [ 206.342298][ T8605] netlink: 'syz.3.648': attribute type 322 has an invalid length. [ 206.486505][ T8612] netlink: 60 bytes leftover after parsing attributes in process `syz.7.650'. [ 206.515804][ T8612] netlink: 60 bytes leftover after parsing attributes in process `syz.7.650'. [ 207.321735][ T8630] netlink: 'syz.7.659': attribute type 1 has an invalid length. [ 207.854886][ T8660] openvswitch: netlink: IP tunnel attribute has 4 unknown bytes. [ 208.043320][ T8673] tc_dump_action: action bad kind [ 208.270829][ T8673] lo speed is unknown, defaulting to 1000 [ 210.036927][ T8720] openvswitch: netlink: IP tunnel attribute has 4 unknown bytes. [ 211.627843][ T8723] : entered promiscuous mode [ 211.735918][ T8726] __nla_validate_parse: 7 callbacks suppressed [ 211.735937][ T8726] netlink: 770 bytes leftover after parsing attributes in process `syz.8.692'. [ 211.968185][ T8729] netlink: 60 bytes leftover after parsing attributes in process `syz.6.693'. [ 211.996704][ T8729] netlink: 60 bytes leftover after parsing attributes in process `syz.6.693'. [ 212.024957][ T8729] netlink: 60 bytes leftover after parsing attributes in process `syz.6.693'. [ 212.182125][ T8729] netlink: 48 bytes leftover after parsing attributes in process `syz.6.693'. [ 212.337040][ T8736] netlink: 'syz.7.695': attribute type 39 has an invalid length. [ 212.434285][ T8743] netlink: 16 bytes leftover after parsing attributes in process `syz.3.696'. [ 213.019600][ T8747] netlink: 'syz.5.697': attribute type 27 has an invalid length. [ 214.386468][ T8761] openvswitch: netlink: IP tunnel attribute has 4 unknown bytes. [ 214.670128][ T8758] openvswitch: : Dropping previously announced user features [ 215.884354][ T8793] netlink: 'syz.3.711': attribute type 27 has an invalid length. [ 216.428031][ T8823] openvswitch: netlink: IP tunnel attribute has 4 unknown bytes. [ 216.524888][ T8821] netlink: 'syz.6.719': attribute type 10 has an invalid length. [ 216.617069][ T8824] netlink: 12 bytes leftover after parsing attributes in process `syz.6.719'. [ 216.687818][ T8821] team0: Port device syz_tun added [ 217.091695][ T8840] netlink: 64 bytes leftover after parsing attributes in process `syz.8.725'. [ 217.671406][ T8857] option changes via remount are deprecated (pid=8856 comm=syz.8.732) [ 217.886492][ T8872] virt_wifi0 speed is unknown, defaulting to 1000 [ 217.893545][ T8872] virt_wifi0 speed is unknown, defaulting to 1000 [ 217.904464][ T8872] virt_wifi0 speed is unknown, defaulting to 1000 [ 217.931353][ T8872] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 218.020389][ T8872] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 218.216114][ T8872] virt_wifi0 speed is unknown, defaulting to 1000 [ 218.249280][ T8872] virt_wifi0 speed is unknown, defaulting to 1000 [ 218.300829][ T8872] virt_wifi0 speed is unknown, defaulting to 1000 [ 218.300986][ T8885] netlink: 60 bytes leftover after parsing attributes in process `syz.6.741'. [ 218.336303][ T8872] virt_wifi0 speed is unknown, defaulting to 1000 [ 218.354334][ T8885] netlink: 60 bytes leftover after parsing attributes in process `syz.6.741'. [ 218.376606][ T8885] netlink: 60 bytes leftover after parsing attributes in process `syz.6.741'. [ 218.546022][ T8885] netlink: 48 bytes leftover after parsing attributes in process `syz.6.741'. [ 219.261516][ T8872] virt_wifi0 speed is unknown, defaulting to 1000 [ 219.800673][ T8901] tmpfs: Bad value for 'uid' [ 219.809759][ T8901] tmpfs: Bad value for 'uid' [ 222.072715][ T8945] netlink: 36 bytes leftover after parsing attributes in process `syz.5.760'. [ 222.097218][ T8946] netlink: 'syz.3.759': attribute type 75 has an invalid length. [ 222.143536][ T8945] netlink: 36 bytes leftover after parsing attributes in process `syz.5.760'. [ 222.248097][ T8945] netlink: 204 bytes leftover after parsing attributes in process `syz.5.760'. [ 222.571359][ T8966] netlink: 28 bytes leftover after parsing attributes in process `syz.3.766'. [ 222.581771][ T8966] netlink: 28 bytes leftover after parsing attributes in process `syz.3.766'. [ 222.636092][ T8964] mac80211_hwsim hwsim14 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 222.761210][ T8973] netlink: 368 bytes leftover after parsing attributes in process `syz.7.768'. [ 222.783582][ T8964] netlink: 'syz.8.764': attribute type 2 has an invalid length. [ 222.985947][ T8977] netlink: 128 bytes leftover after parsing attributes in process `syz.6.770'. [ 223.169845][ T8977] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 223.586042][ T9002] netlink: 104 bytes leftover after parsing attributes in process `syz.6.775'. [ 223.668532][ T9002] netlink: 'syz.6.775': attribute type 10 has an invalid length. [ 223.722657][ T9002] netlink: 40 bytes leftover after parsing attributes in process `syz.6.775'. [ 223.828866][ T9002] batman_adv: batadv0: Adding interface: virt_wifi0 [ 223.837595][ T9002] batman_adv: batadv0: The MTU of interface virt_wifi0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 223.871975][ T9002] batman_adv: batadv0: Interface activated: virt_wifi0 [ 224.776268][ T9026] netlink: 28 bytes leftover after parsing attributes in process `syz.3.782'. [ 225.143658][ T9035] netlink: 128 bytes leftover after parsing attributes in process `syz.6.786'. [ 225.162761][ T9035] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 225.944054][ T9049] netlink: 'syz.3.789': attribute type 2 has an invalid length. [ 227.249541][ T5830] Bluetooth: hci7: command 0x0406 tx timeout [ 227.255743][ T5838] Bluetooth: hci6: command 0x0406 tx timeout [ 227.261971][ T5844] Bluetooth: hci5: command 0x0406 tx timeout [ 227.268272][ T5151] Bluetooth: hci8: command 0x0406 tx timeout [ 229.481707][ T9075] FAULT_INJECTION: forcing a failure. [ 229.481707][ T9075] name failslab, interval 1, probability 0, space 0, times 0 [ 229.513369][ T9075] CPU: 0 UID: 0 PID: 9075 Comm: syz.8.796 Not tainted syzkaller #0 PREEMPT(full) [ 229.513395][ T9075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 229.513408][ T9075] Call Trace: [ 229.513419][ T9075] [ 229.513430][ T9075] dump_stack_lvl+0xe8/0x150 [ 229.513486][ T9075] should_fail_ex+0x412/0x560 [ 229.513541][ T9075] should_failslab+0xa8/0x100 [ 229.513577][ T9075] kmem_cache_alloc_noprof+0x87/0x6e0 [ 229.513606][ T9075] ? skb_clone+0x212/0x3a0 [ 229.513628][ T9075] ? __pfx_perf_trace_lock+0x10/0x10 [ 229.513685][ T9075] skb_clone+0x212/0x3a0 [ 229.513733][ T9075] __netlink_deliver_tap+0x404/0x850 [ 229.513815][ T9075] ? netlink_deliver_tap+0x2e/0x1b0 [ 229.513850][ T9075] netlink_deliver_tap+0x19c/0x1b0 [ 229.513884][ T9075] netlink_unicast+0x7e3/0x9b0 [ 229.513949][ T9075] ? __pfx_netlink_unicast+0x10/0x10 [ 229.513972][ T9075] ? __alloc_skb+0x193/0x390 [ 229.514001][ T9075] ? netlink_sendmsg+0x650/0xb40 [ 229.514018][ T9075] ? skb_put+0x11b/0x210 [ 229.514066][ T9075] netlink_sendmsg+0x813/0xb40 [ 229.514136][ T9075] ? __pfx_netlink_sendmsg+0x10/0x10 [ 229.514178][ T9075] ? aa_sock_msg_perm+0xf1/0x1b0 [ 229.514217][ T9075] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 229.514251][ T9075] ? __pfx_netlink_sendmsg+0x10/0x10 [ 229.514271][ T9075] ____sys_sendmsg+0xa68/0xad0 [ 229.514302][ T9075] ? __pfx_perf_trace_lock+0x10/0x10 [ 229.514352][ T9075] ? __pfx_____sys_sendmsg+0x10/0x10 [ 229.514428][ T9075] ? import_iovec+0x73/0xa0 [ 229.514473][ T9075] ___sys_sendmsg+0x2a5/0x360 [ 229.514532][ T9075] ? __pfx____sys_sendmsg+0x10/0x10 [ 229.514645][ T9075] ? __fget_files+0x2a/0x420 [ 229.514733][ T9075] ? __fget_files+0x2a/0x420 [ 229.514755][ T9075] ? __fget_files+0x3a0/0x420 [ 229.514831][ T9075] __x64_sys_sendmsg+0x1bd/0x2a0 [ 229.514872][ T9075] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 229.514938][ T9075] ? __pfx_ksys_write+0x10/0x10 [ 229.515015][ T9075] do_syscall_64+0xe2/0xf80 [ 229.515037][ T9075] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 229.515056][ T9075] ? clear_bhb_loop+0x60/0xb0 [ 229.515091][ T9075] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 229.515109][ T9075] RIP: 0033:0x7ff65299aeb9 [ 229.515130][ T9075] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 229.515145][ T9075] RSP: 002b:00007ff65389f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 229.515163][ T9075] RAX: ffffffffffffffda RBX: 00007ff652c15fa0 RCX: 00007ff65299aeb9 [ 229.515176][ T9075] RDX: 0000000000008016 RSI: 0000200000000040 RDI: 0000000000000007 [ 229.515188][ T9075] RBP: 00007ff65389f090 R08: 0000000000000000 R09: 0000000000000000 [ 229.515199][ T9075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 229.515210][ T9075] R13: 00007ff652c16038 R14: 00007ff652c15fa0 R15: 00007ffd2a12d6f8 [ 229.515297][ T9075] [ 229.808704][ T9075] __nla_validate_parse: 2 callbacks suppressed [ 229.808877][ T9075] netlink: 56 bytes leftover after parsing attributes in process `syz.8.796'. [ 230.222054][ T9083] netlink: 64691 bytes leftover after parsing attributes in process `syz.7.797'. [ 230.656831][ T9088] netlink: 128 bytes leftover after parsing attributes in process `syz.8.800'. [ 230.692017][ T9088] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 230.754247][ T9090] netlink: 128 bytes leftover after parsing attributes in process `syz.6.801'. [ 230.783068][ T9090] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 230.868759][ T9093] netlink: 16 bytes leftover after parsing attributes in process `syz.7.802'. [ 233.377278][ T9108] netlink: 'syz.5.804': attribute type 1 has an invalid length. [ 233.738453][ T9108] netlink: 'syz.5.804': attribute type 46 has an invalid length. [ 233.851255][ T9108] netlink: 55 bytes leftover after parsing attributes in process `syz.5.804'. [ 234.675175][ T9135] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 234.733312][ T9136] netlink: 'syz.7.813': attribute type 1 has an invalid length. [ 236.116656][ T9155] netlink: 'syz.7.820': attribute type 4 has an invalid length. [ 236.139787][ T9155] netlink: 'syz.7.820': attribute type 3 has an invalid length. [ 236.171890][ T9155] netlink: 132 bytes leftover after parsing attributes in process `syz.7.820'. [ 236.451268][ T9154] netlink: 368 bytes leftover after parsing attributes in process `syz.6.821'. [ 236.739213][ T9164] netlink: 'syz.5.822': attribute type 27 has an invalid length. [ 237.016974][ T9170] netlink: 'syz.8.824': attribute type 39 has an invalid length. [ 237.063139][ T9168] option changes via remount are deprecated (pid=9167 comm=syz.7.823) [ 239.064488][ T9191] netlink: 16 bytes leftover after parsing attributes in process `syz.8.830'. [ 239.720887][ T9197] FAULT_INJECTION: forcing a failure. [ 239.720887][ T9197] name failslab, interval 1, probability 0, space 0, times 0 [ 239.778386][ T9197] CPU: 0 UID: 0 PID: 9197 Comm: syz.5.832 Not tainted syzkaller #0 PREEMPT(full) [ 239.778416][ T9197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 239.778428][ T9197] Call Trace: [ 239.778443][ T9197] [ 239.778543][ T9197] dump_stack_lvl+0xe8/0x150 [ 239.778591][ T9197] should_fail_ex+0x412/0x560 [ 239.778651][ T9197] should_failslab+0xa8/0x100 [ 239.778689][ T9197] kmem_cache_alloc_node_noprof+0x8b/0x6f0 [ 239.778712][ T9197] ? __alloc_skb+0x193/0x390 [ 239.778735][ T9197] ? __alloc_skb+0x1d7/0x390 [ 239.778753][ T9197] ? __local_bh_enable_ip+0xd0/0x130 [ 239.778780][ T9197] ? __alloc_skb+0x193/0x390 [ 239.778814][ T9197] __alloc_skb+0x1d7/0x390 [ 239.778868][ T9197] netlink_sendmsg+0x5d4/0xb40 [ 239.778944][ T9197] ? __pfx_netlink_sendmsg+0x10/0x10 [ 239.778990][ T9197] ? aa_sock_msg_perm+0xf1/0x1b0 [ 239.779030][ T9197] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 239.779065][ T9197] ? __pfx_netlink_sendmsg+0x10/0x10 [ 239.779086][ T9197] ____sys_sendmsg+0xa68/0xad0 [ 239.779118][ T9197] ? __pfx_perf_trace_lock+0x10/0x10 [ 239.779177][ T9197] ? __pfx_____sys_sendmsg+0x10/0x10 [ 239.779266][ T9197] ? import_iovec+0x73/0xa0 [ 239.779321][ T9197] ___sys_sendmsg+0x2a5/0x360 [ 239.779384][ T9197] ? __pfx____sys_sendmsg+0x10/0x10 [ 239.779530][ T9197] ? __fget_files+0x2a/0x420 [ 239.779621][ T9197] ? __fget_files+0x2a/0x420 [ 239.779643][ T9197] ? __fget_files+0x3a0/0x420 [ 239.779726][ T9197] __x64_sys_sendmsg+0x1bd/0x2a0 [ 239.779771][ T9197] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 239.779792][ T9197] ? perf_trace_preemptirq_template+0xab/0x340 [ 239.779866][ T9197] ? __pfx_ksys_write+0x10/0x10 [ 239.779950][ T9197] do_syscall_64+0xe2/0xf80 [ 239.779974][ T9197] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 239.779992][ T9197] ? trace_irq_disable+0x37/0x100 [ 239.780008][ T9197] ? clear_bhb_loop+0x60/0xb0 [ 239.780049][ T9197] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 239.780068][ T9197] RIP: 0033:0x7f870819aeb9 [ 239.780092][ T9197] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 239.780108][ T9197] RSP: 002b:00007f8708fb5028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 239.780128][ T9197] RAX: ffffffffffffffda RBX: 00007f8708415fa0 RCX: 00007f870819aeb9 [ 239.780141][ T9197] RDX: 0000000000000000 RSI: 0000200000000100 RDI: 0000000000000003 [ 239.780152][ T9197] RBP: 00007f8708fb5090 R08: 0000000000000000 R09: 0000000000000000 [ 239.780163][ T9197] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 239.780174][ T9197] R13: 00007f8708416038 R14: 00007f8708415fa0 R15: 00007ffc475c4f88 [ 239.780278][ T9197] [ 240.403934][ T9205] netlink: 'syz.7.833': attribute type 4 has an invalid length. [ 240.437806][ T9205] netlink: 'syz.7.833': attribute type 3 has an invalid length. [ 240.473556][ T9205] netlink: 132 bytes leftover after parsing attributes in process `syz.7.833'. [ 240.654645][ T9218] netlink: 28 bytes leftover after parsing attributes in process `syz.5.839'. [ 240.697799][ T9216] netlink: 'syz.3.837': attribute type 27 has an invalid length. [ 240.701875][ T9218] netlink: 28 bytes leftover after parsing attributes in process `syz.5.839'. [ 241.027079][ T9235] netlink: 'syz.3.844': attribute type 10 has an invalid length. [ 241.049927][ T9235] netlink: 65015 bytes leftover after parsing attributes in process `syz.3.844'. [ 241.080062][ T9240] netlink: 20 bytes leftover after parsing attributes in process `syz.3.844'. [ 241.095817][ T9240] openvswitch: netlink: Flow actions attr not present in new flow. [ 241.575982][ T9257] nft_compat: unsupported protocol 9 [ 241.749559][ T9260] netlink: 60 bytes leftover after parsing attributes in process `syz.7.851'. [ 241.779880][ T9260] netlink: 60 bytes leftover after parsing attributes in process `syz.7.851'. [ 241.844264][ T9262] netlink: 'syz.8.850': attribute type 4 has an invalid length. [ 241.870258][ T9262] netlink: 'syz.8.850': attribute type 3 has an invalid length. [ 241.889294][ T9262] netlink: 132 bytes leftover after parsing attributes in process `syz.8.850'. [ 242.008544][ T9270] netlink: 'syz.7.854': attribute type 27 has an invalid length. [ 242.056616][ T9272] netlink: 8 bytes leftover after parsing attributes in process `syz.5.853'. [ 242.510247][ T9287] netlink: 'syz.3.860': attribute type 10 has an invalid length. [ 242.522534][ T9287] netlink: 2 bytes leftover after parsing attributes in process `syz.3.860'. [ 242.676373][ T9302] netlink: 'syz.7.864': attribute type 6 has an invalid length. [ 244.262247][ T9332] netlink: 20 bytes leftover after parsing attributes in process `syz.5.872'. [ 244.337924][ T9335] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 244.369913][ T9335] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 244.666760][ T9338] netlink: 'syz.6.874': attribute type 10 has an invalid length. [ 244.698326][ T9338] hsr0: left allmulticast mode [ 244.703766][ T9338] hsr_slave_0: left allmulticast mode [ 244.712927][ T9338] hsr_slave_1: left allmulticast mode [ 244.719469][ T9338] hsr0: left promiscuous mode [ 244.741627][ T9338] bridge0: port 3(hsr0) entered disabled state [ 244.974816][ T9349] veth0_vlan: left promiscuous mode [ 245.011266][ T9349] veth0_vlan: entered promiscuous mode [ 245.061713][ T9349] team0: Device veth0_vlan failed to register rx_handler [ 245.603588][ T9356] netlink: 60 bytes leftover after parsing attributes in process `syz.8.882'. [ 245.685166][ T9359] netlink: 60 bytes leftover after parsing attributes in process `syz.8.882'. [ 245.821329][ T9364] validate_nla: 1 callbacks suppressed [ 245.821348][ T9364] netlink: 'syz.3.883': attribute type 16 has an invalid length. [ 245.836369][ T9364] netlink: 'syz.3.883': attribute type 17 has an invalid length. [ 245.839495][ T9368] netlink: 'syz.7.884': attribute type 13 has an invalid length. [ 245.904347][ T9369] netlink: 'syz.7.884': attribute type 89 has an invalid length. [ 245.928593][ T6018] lo speed is unknown, defaulting to 1000 [ 245.931580][ T9368] gretap0: refused to change device tx_queue_len [ 245.990862][ T9368] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 246.007561][ T9371] netlink: 'syz.8.886': attribute type 27 has an invalid length. [ 246.395236][ T9382] mac80211_hwsim hwsim20 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 246.496902][ T9382] netlink: 'syz.7.890': attribute type 2 has an invalid length. [ 246.643004][ T9394] netlink: 'syz.3.891': attribute type 1 has an invalid length. [ 246.659289][ T9394] netlink: 'syz.3.891': attribute type 46 has an invalid length. [ 246.667850][ T9394] netlink: 55 bytes leftover after parsing attributes in process `syz.3.891'. [ 247.004177][ T9402] netlink: 'syz.7.896': attribute type 16 has an invalid length. [ 247.013100][ T9402] netlink: 'syz.7.896': attribute type 17 has an invalid length. [ 247.168805][ T9408] netlink: 12 bytes leftover after parsing attributes in process `syz.7.898'. [ 247.195176][ T9408] netlink: 20 bytes leftover after parsing attributes in process `syz.7.898'. [ 247.225905][ T9407] netlink: 128 bytes leftover after parsing attributes in process `syz.8.897'. [ 247.248246][ T9407] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 247.618144][ T9428] team0: Port device dummy0 added [ 247.734122][ T9435] netlink: 212360 bytes leftover after parsing attributes in process `syz.6.904'. [ 249.231776][ T9447] netlink: 368 bytes leftover after parsing attributes in process `syz.8.911'. [ 250.043434][ T9472] netlink: 272 bytes leftover after parsing attributes in process `syz.7.915'. [ 250.452943][ T9491] netlink: 16 bytes leftover after parsing attributes in process `syz.3.922'. [ 250.461881][ T9485] netlink: 1420 bytes leftover after parsing attributes in process `syz.7.921'. [ 250.766955][ T9506] netlink: 20 bytes leftover after parsing attributes in process `syz.3.928'. [ 250.824181][ T9506] netlink: 8 bytes leftover after parsing attributes in process `syz.3.928'. [ 250.862956][ T9506] validate_nla: 1 callbacks suppressed [ 250.862988][ T9506] netlink: 'syz.3.928': attribute type 10 has an invalid length. [ 251.104389][ T9506] macvlan1: entered allmulticast mode [ 251.128013][ T9506] veth1_vlan: entered allmulticast mode [ 251.146778][ T9506] team0: Port device macvlan1 added [ 251.800518][ T9533] option changes via remount are deprecated (pid=9528 comm=syz.8.937) [ 254.031020][ T9544] __nla_validate_parse: 2 callbacks suppressed [ 254.031039][ T9544] netlink: 48 bytes leftover after parsing attributes in process `syz.5.940'. [ 254.695882][ T9548] mac80211_hwsim hwsim18 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 254.716670][ T9555] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 254.732344][ T9548] netlink: 'syz.6.942': attribute type 2 has an invalid length. [ 254.816672][ T9550] tmpfs: Bad value for 'gid' [ 254.825517][ T9554] FAULT_INJECTION: forcing a failure. [ 254.825517][ T9554] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 254.831873][ T9550] tmpfs: Bad value for 'gid' [ 254.858634][ T9554] CPU: 1 UID: 0 PID: 9554 Comm: syz.8.945 Not tainted syzkaller #0 PREEMPT(full) [ 254.858660][ T9554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 254.858670][ T9554] Call Trace: [ 254.858678][ T9554] [ 254.858685][ T9554] dump_stack_lvl+0xe8/0x150 [ 254.858714][ T9554] should_fail_ex+0x412/0x560 [ 254.858740][ T9554] _copy_to_user+0x31/0xb0 [ 254.858759][ T9554] simple_read_from_buffer+0xe1/0x170 [ 254.858782][ T9554] proc_fail_nth_read+0x1bb/0x230 [ 254.858804][ T9554] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 254.858826][ T9554] ? rw_verify_area+0x2a6/0x4d0 [ 254.858843][ T9554] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 254.858861][ T9554] vfs_read+0x20c/0xa70 [ 254.858876][ T9554] ? fdget_pos+0x246/0x320 [ 254.858900][ T9554] ? __pfx___mutex_lock+0x10/0x10 [ 254.858931][ T9554] ? __pfx_vfs_read+0x10/0x10 [ 254.858949][ T9554] ? __fget_files+0x2a/0x420 [ 254.858974][ T9554] ? __fget_files+0x3a0/0x420 [ 254.858993][ T9554] ? __fget_files+0x2a/0x420 [ 254.859023][ T9554] ksys_read+0x150/0x270 [ 254.859042][ T9554] ? __pfx_ksys_read+0x10/0x10 [ 254.859071][ T9554] do_syscall_64+0xe2/0xf80 [ 254.859089][ T9554] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 254.859106][ T9554] ? trace_irq_disable+0x37/0x100 [ 254.859123][ T9554] ? clear_bhb_loop+0x60/0xb0 [ 254.859146][ T9554] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 254.859162][ T9554] RIP: 0033:0x7ff65295b78e [ 254.859179][ T9554] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 254.859194][ T9554] RSP: 002b:00007ff65389efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 254.859213][ T9554] RAX: ffffffffffffffda RBX: 00007ff65389f6c0 RCX: 00007ff65295b78e [ 254.859224][ T9554] RDX: 000000000000000f RSI: 00007ff65389f0a0 RDI: 0000000000000008 [ 254.859235][ T9554] RBP: 00007ff65389f090 R08: 0000000000000000 R09: 0000000000000000 [ 254.859244][ T9554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 254.859254][ T9554] R13: 00007ff652c16038 R14: 00007ff652c15fa0 R15: 00007ffd2a12d6f8 [ 254.859282][ T9554] [ 255.096799][ T9563] netlink: 16 bytes leftover after parsing attributes in process `syz.5.946'. [ 255.203144][ T9566] netlink: 'syz.7.947': attribute type 1 has an invalid length. [ 255.320843][ T9574] netlink: 84 bytes leftover after parsing attributes in process `syz.5.951'. [ 255.489563][ T9583] netlink: 36 bytes leftover after parsing attributes in process `syz.7.952'. [ 255.527030][ T9585] netlink: 'syz.8.954': attribute type 39 has an invalid length. [ 255.672286][ T9582] netlink: 104 bytes leftover after parsing attributes in process `syz.6.953'. [ 255.744082][ T1303] ieee802154 phy0 wpan0: encryption failed: -22 [ 255.750496][ T1303] ieee802154 phy1 wpan1: encryption failed: -22 [ 255.769361][ T9587] netlink: 16098 bytes leftover after parsing attributes in process `syz.6.953'. [ 255.878401][ T9582] netlink: 'syz.6.953': attribute type 10 has an invalid length. [ 255.932052][ T9582] netlink: 2 bytes leftover after parsing attributes in process `syz.6.953'. [ 255.986018][ T9582] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 256.030367][ T9582] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 256.058173][ T9582] hsr0: entered promiscuous mode [ 256.116081][ T9582] bridge0: port 3(hsr0) entered blocking state [ 256.123198][ T9582] bridge0: port 3(hsr0) entered disabled state [ 256.153023][ T9582] hsr0: entered allmulticast mode [ 256.220147][ T9582] hsr_slave_0: entered allmulticast mode [ 256.250696][ T9582] hsr_slave_1: entered allmulticast mode [ 256.361191][ T9601] netlink: 'syz.8.960': attribute type 10 has an invalid length. [ 256.729205][ T9614] netlink: 'syz.7.966': attribute type 1 has an invalid length. [ 256.771752][ T9614] netlink: 'syz.7.966': attribute type 46 has an invalid length. [ 256.780146][ T9614] netlink: 55 bytes leftover after parsing attributes in process `syz.7.966'. [ 256.869823][ T9628] netlink: 'syz.8.969': attribute type 13 has an invalid length. [ 257.009870][ T9628] gretap0: refused to change device tx_queue_len [ 257.050382][ T9628] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 257.409877][ T9648] netlink: 'syz.6.977': attribute type 16 has an invalid length. [ 257.432086][ T9648] netlink: 'syz.6.977': attribute type 17 has an invalid length. [ 257.626709][ T9660] IPv6: Can't replace route, no match found [ 257.844163][ T9668] netlink: 368 bytes leftover after parsing attributes in process `syz.5.984'. [ 258.416859][ T9684] netlink: 'syz.5.989': attribute type 10 has an invalid length. [ 259.022133][ T9700] netlink: 'syz.6.992': attribute type 39 has an invalid length. [ 260.030690][ T9711] netlink: 16 bytes leftover after parsing attributes in process `syz.7.996'. [ 260.315591][ T9720] netlink: 'syz.6.1001': attribute type 2 has an invalid length. [ 260.384001][ T9722] netlink: 368 bytes leftover after parsing attributes in process `syz.5.999'. [ 260.415054][ T9720] ‚#{6c: entered promiscuous mode [ 260.437809][ T9720] ‚#{6c: left promiscuous mode [ 260.549217][ T9718] netlink: 55 bytes leftover after parsing attributes in process `syz.8.1000'. [ 260.655597][ T9731] netlink: 44 bytes leftover after parsing attributes in process `syz.3.1002'. [ 262.618260][ T9774] netlink: 212408 bytes leftover after parsing attributes in process `syz.5.1016'. [ 262.767689][ T9771] netlink: 28 bytes leftover after parsing attributes in process `syz.5.1016'. [ 262.780191][ T9771] netlink: 28 bytes leftover after parsing attributes in process `syz.5.1016'. [ 262.872046][ T9773] netlink: 16 bytes leftover after parsing attributes in process `syz.7.1015'. [ 265.969464][ T9792] validate_nla: 3 callbacks suppressed [ 265.969483][ T9792] netlink: 'syz.7.1020': attribute type 29 has an invalid length. [ 266.002707][ T9807] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1023'. [ 266.224819][ T9824] netlink: 16 bytes leftover after parsing attributes in process `syz.8.1030'. [ 266.745902][ T9836] openvswitch: netlink: IP tunnel attribute has 4 unknown bytes. [ 266.806141][ T9829] netlink: 16 bytes leftover after parsing attributes in process `syz.8.1031'. [ 267.367391][ T9852] netlink: 128 bytes leftover after parsing attributes in process `syz.5.1036'. [ 267.432703][ T9852] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 267.991016][ T9864] netlink: 16 bytes leftover after parsing attributes in process `syz.3.1041'. [ 268.052744][ T9859] netlink: 20 bytes leftover after parsing attributes in process `syz.7.1039'. [ 268.071860][ T9866] netlink: 16 bytes leftover after parsing attributes in process `syz.3.1041'. [ 268.496246][ T9870] netlink: 248 bytes leftover after parsing attributes in process `syz.8.1042'. [ 268.571216][ T9870] netlink: 200 bytes leftover after parsing attributes in process `syz.8.1042'. [ 268.595862][ T9870] netlink: 200 bytes leftover after parsing attributes in process `syz.8.1042'. [ 269.550292][ T30] audit: type=1107 audit(1770061576.348:2): pid=9900 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 270.385667][ T9921] openvswitch: : Dropping previously announced user features [ 270.762022][ T9924] netlink: 'syz.3.1062': attribute type 13 has an invalid length. [ 270.985246][ T9924] gretap0: refused to change device tx_queue_len [ 271.004801][ T9924] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 271.149787][ T9935] __nla_validate_parse: 3 callbacks suppressed [ 271.149807][ T9935] netlink: 16 bytes leftover after parsing attributes in process `syz.8.1066'. [ 271.239627][ T9935] netlink: 16 bytes leftover after parsing attributes in process `syz.8.1066'. [ 271.719522][ T9953] netlink: 'syz.3.1073': attribute type 2 has an invalid length. [ 271.733361][ T9956] netlink: 368 bytes leftover after parsing attributes in process `syz.8.1074'. [ 271.760659][ T9953] netlink: 'syz.3.1073': attribute type 1 has an invalid length. [ 271.770983][ T9953] netlink: 152 bytes leftover after parsing attributes in process `syz.3.1073'. [ 271.962730][ T9967] netlink: 'syz.3.1078': attribute type 13 has an invalid length. [ 271.977941][ T9965] netlink: 212408 bytes leftover after parsing attributes in process `syz.8.1077'. [ 271.987763][ T9967] gretap0: refused to change device tx_queue_len [ 272.016053][ T9967] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 272.048935][ T9965] netlink: 28 bytes leftover after parsing attributes in process `syz.8.1077'. [ 272.065703][ T9965] netlink: 28 bytes leftover after parsing attributes in process `syz.8.1077'. [ 272.126762][ T9972] netlink: 'syz.7.1079': attribute type 13 has an invalid length. [ 272.136319][ T9972] gretap0: refused to change device tx_queue_len [ 272.144153][ T9972] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 272.666773][ T9995] netlink: 368 bytes leftover after parsing attributes in process `syz.6.1087'. [ 272.933261][T10005] netlink: 'syz.5.1091': attribute type 13 has an invalid length. [ 273.019389][T10005] gretap0: refused to change device tx_queue_len [ 273.034295][T10005] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 273.712954][T10022] netlink: 'syz.3.1094': attribute type 2 has an invalid length. [ 273.720725][T10022] netlink: 164 bytes leftover after parsing attributes in process `syz.3.1094'. [ 276.798282][T10054] netlink: 'syz.6.1106': attribute type 13 has an invalid length. [ 276.833483][T10054] gretap0: refused to change device tx_queue_len [ 276.840997][T10054] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 276.938127][T10061] netlink: 212336 bytes leftover after parsing attributes in process `syz.3.1109'. [ 277.097938][T10068] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 277.456998][T10088] FAULT_INJECTION: forcing a failure. [ 277.456998][T10088] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 277.470675][T10088] CPU: 0 UID: 0 PID: 10088 Comm: syz.6.1119 Not tainted syzkaller #0 PREEMPT(full) [ 277.470699][T10088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 277.470710][T10088] Call Trace: [ 277.470718][T10088] [ 277.470726][T10088] dump_stack_lvl+0xe8/0x150 [ 277.470755][T10088] should_fail_ex+0x412/0x560 [ 277.470793][T10088] _copy_from_user+0x2d/0xb0 [ 277.470813][T10088] ___sys_sendmsg+0x1c6/0x360 [ 277.470837][T10088] ? __lock_acquire+0x6b5/0x2cf0 [ 277.470867][T10088] ? __pfx____sys_sendmsg+0x10/0x10 [ 277.470916][T10088] ? __fget_files+0x2a/0x420 [ 277.470953][T10088] ? __fget_files+0x2a/0x420 [ 277.470973][T10088] ? __fget_files+0x3a0/0x420 [ 277.471007][T10088] __x64_sys_sendmsg+0x1bd/0x2a0 [ 277.471034][T10088] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 277.471056][T10088] ? perf_trace_preemptirq_template+0xab/0x340 [ 277.471087][T10088] ? __pfx_ksys_write+0x10/0x10 [ 277.471120][T10088] do_syscall_64+0xe2/0xf80 [ 277.471139][T10088] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 277.471156][T10088] ? trace_irq_disable+0x37/0x100 [ 277.471172][T10088] ? clear_bhb_loop+0x60/0xb0 [ 277.471195][T10088] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 277.471212][T10088] RIP: 0033:0x7fd12eb9aeb9 [ 277.471229][T10088] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 277.471244][T10088] RSP: 002b:00007fd12f9dd028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 277.471264][T10088] RAX: ffffffffffffffda RBX: 00007fd12ee15fa0 RCX: 00007fd12eb9aeb9 [ 277.471277][T10088] RDX: 0000000000000004 RSI: 00002000000001c0 RDI: 0000000000000003 [ 277.471288][T10088] RBP: 00007fd12f9dd090 R08: 0000000000000000 R09: 0000000000000000 [ 277.471299][T10088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 277.471309][T10088] R13: 00007fd12ee16038 R14: 00007fd12ee15fa0 R15: 00007ffec21365f8 [ 277.471344][T10088] [ 277.851106][T10092] netlink: 'syz.3.1121': attribute type 13 has an invalid length. [ 277.872755][T10092] gretap0: refused to change device tx_queue_len [ 277.880652][T10092] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 277.965197][T10095] netlink: 'syz.6.1122': attribute type 27 has an invalid length. [ 278.006082][T10101] netlink: 'syz.8.1125': attribute type 10 has an invalid length. [ 278.061154][T10103] netlink: 'syz.7.1126': attribute type 27 has an invalid length. [ 278.171244][T10101] bond0: (slave wlan1): Enslaving as an active interface with an up link [ 278.192862][T10108] netlink: 'syz.6.1127': attribute type 7 has an invalid length. [ 278.241705][T10108] netlink: 'syz.6.1127': attribute type 8 has an invalid length. [ 278.271458][T10108] netlink: 'syz.6.1127': attribute type 15 has an invalid length. [ 278.310105][T10114] netlink: 'syz.7.1130': attribute type 39 has an invalid length. [ 278.566382][T10106] syz.3.1128 (10106) used greatest stack depth: 15056 bytes left [ 278.942217][T10135] netlink: 'syz.8.1138': attribute type 13 has an invalid length. [ 279.077259][T10135] gretap0: refused to change device tx_queue_len [ 279.109052][T10135] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 279.340897][T10159] sch_tbf: burst 0 is lower than device veth0_to_bridge mtu (1514) ! [ 279.821860][T10165] netlink: 55 bytes leftover after parsing attributes in process `syz.6.1148'. [ 279.876866][T10166] netlink: 55 bytes leftover after parsing attributes in process `syz.5.1149'. [ 280.010975][T10179] netlink: 14 bytes leftover after parsing attributes in process `syz.3.1151'. [ 281.085641][T10215] @0Ù: renamed from bond_slave_1 (while UP) [ 281.409889][T10212] netlink: 55 bytes leftover after parsing attributes in process `syz.6.1163'. [ 281.912898][T10232] netlink: 60 bytes leftover after parsing attributes in process `syz.8.1168'. [ 282.393730][T10238] netlink: 8 bytes leftover after parsing attributes in process `syz.5.1172'. [ 282.410393][T10234] netlink: 36 bytes leftover after parsing attributes in process `syz.3.1171'. [ 282.462530][T10238] netlink: 312 bytes leftover after parsing attributes in process `syz.5.1172'. [ 282.491382][T10236] netlink: 20 bytes leftover after parsing attributes in process `syz.6.1169'. [ 282.507723][ T5835] Bluetooth: hci6: ACL packet for unknown connection handle 0 [ 282.756788][T10245] validate_nla: 8 callbacks suppressed [ 282.756808][T10245] netlink: 'syz.7.1173': attribute type 1 has an invalid length. [ 282.783081][T10245] netlink: 128 bytes leftover after parsing attributes in process `syz.7.1173'. [ 282.806306][T10245] netlink: 'syz.7.1173': attribute type 76 has an invalid length. [ 282.831854][T10250] netlink: 'syz.5.1175': attribute type 10 has an invalid length. [ 283.001809][T10255] netlink: 60 bytes leftover after parsing attributes in process `syz.6.1177'. [ 283.041682][T10255] netlink: 60 bytes leftover after parsing attributes in process `syz.6.1177'. [ 283.077268][T10255] netlink: 60 bytes leftover after parsing attributes in process `syz.6.1177'. [ 283.266888][T10265] netlink: 48 bytes leftover after parsing attributes in process `syz.6.1177'. [ 283.267455][T10264] netlink: 'syz.5.1180': attribute type 12 has an invalid length. [ 283.293110][T10264] netlink: 14585 bytes leftover after parsing attributes in process `syz.5.1180'. [ 284.031279][T10307] netlink: 'syz.3.1192': attribute type 1 has an invalid length. [ 284.058073][T10302] netlink: 'syz.3.1192': attribute type 46 has an invalid length. [ 284.250324][T10315] netlink: 'syz.6.1195': attribute type 11 has an invalid length. [ 284.462389][T10335] netlink: 'syz.3.1200': attribute type 10 has an invalid length. [ 285.389451][T10349] syzkaller1: tun_chr_ioctl cmd 1074025677 [ 285.395737][T10349] syzkaller1: linktype set to 23 [ 285.401413][T10350] syzkaller1: tun_chr_ioctl cmd 2147767511 [ 285.689963][T10355] netlink: 'syz.6.1207': attribute type 1 has an invalid length. [ 285.709750][T10355] netlink: 'syz.6.1207': attribute type 46 has an invalid length. [ 285.894228][T10375] netlink: 'syz.7.1213': attribute type 16 has an invalid length. [ 286.592889][T10412] FAULT_INJECTION: forcing a failure. [ 286.592889][T10412] name failslab, interval 1, probability 0, space 0, times 0 [ 286.607978][T10412] CPU: 0 UID: 0 PID: 10412 Comm: syz.8.1225 Not tainted syzkaller #0 PREEMPT(full) [ 286.608003][T10412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 286.608014][T10412] Call Trace: [ 286.608021][T10412] [ 286.608029][T10412] dump_stack_lvl+0xe8/0x150 [ 286.608058][T10412] should_fail_ex+0x412/0x560 [ 286.608087][T10412] should_failslab+0xa8/0x100 [ 286.608110][T10412] __kmalloc_cache_noprof+0x83/0x6e0 [ 286.608131][T10412] ? sctp_add_bind_addr+0x8c/0x370 [ 286.608157][T10412] sctp_add_bind_addr+0x8c/0x370 [ 286.608181][T10412] sctp_copy_local_addr_list+0x314/0x4f0 [ 286.608204][T10412] ? sctp_copy_local_addr_list+0xa4/0x4f0 [ 286.608224][T10412] ? __pfx_sctp_copy_local_addr_list+0x10/0x10 [ 286.608248][T10412] ? sctp_v4_is_any+0x35/0x60 [ 286.608266][T10412] ? sctp_copy_one_addr+0x93/0x360 [ 286.608289][T10412] sctp_bind_addr_copy+0xb3/0x3c0 [ 286.608309][T10412] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 286.608338][T10412] sctp_connect_new_asoc+0x2ff/0x6b0 [ 286.608364][T10412] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 286.608388][T10412] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 286.608410][T10412] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 286.608431][T10412] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 286.608453][T10412] ? bpf_lsm_sctp_bind_connect+0x9/0x20 [ 286.608474][T10412] ? security_sctp_bind_connect+0x7e/0x2c0 [ 286.608496][T10412] sctp_sendmsg+0x1528/0x2c10 [ 286.608516][T10412] ? unwind_next_frame+0xa5/0x23c0 [ 286.608551][T10412] ? __pfx_sctp_sendmsg+0x10/0x10 [ 286.608578][T10412] ? aa_sk_perm+0x15a/0x960 [ 286.608602][T10412] ? aa_sk_perm+0x82d/0x960 [ 286.608621][T10412] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 286.608649][T10412] ? __pfx_aa_sk_perm+0x10/0x10 [ 286.608673][T10412] ? sock_rps_record_flow+0x19/0x400 [ 286.608700][T10412] ? inet_sendmsg+0x2f4/0x370 [ 286.608722][T10412] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 286.608745][T10412] ____sys_sendmsg+0x894/0xad0 [ 286.608779][T10412] ? __pfx_____sys_sendmsg+0x10/0x10 [ 286.608812][T10412] ? import_iovec+0x73/0xa0 [ 286.608834][T10412] ___sys_sendmsg+0x2a5/0x360 [ 286.608855][T10412] ? __lock_acquire+0x6b5/0x2cf0 [ 286.608883][T10412] ? __pfx____sys_sendmsg+0x10/0x10 [ 286.608943][T10412] ? __fget_files+0x2a/0x420 [ 286.608963][T10412] ? __fget_files+0x3a0/0x420 [ 286.608994][T10412] __x64_sys_sendmsg+0x1bd/0x2a0 [ 286.609021][T10412] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 286.609042][T10412] ? perf_trace_preemptirq_template+0xab/0x340 [ 286.609071][T10412] ? __pfx_ksys_write+0x10/0x10 [ 286.609101][T10412] do_syscall_64+0xe2/0xf80 [ 286.609121][T10412] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 286.609138][T10412] ? trace_irq_disable+0x37/0x100 [ 286.609154][T10412] ? clear_bhb_loop+0x60/0xb0 [ 286.609176][T10412] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 286.609193][T10412] RIP: 0033:0x7ff65299aeb9 [ 286.609210][T10412] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 286.609224][T10412] RSP: 002b:00007ff65389f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 286.609243][T10412] RAX: ffffffffffffffda RBX: 00007ff652c15fa0 RCX: 00007ff65299aeb9 [ 286.609256][T10412] RDX: 0000000000004000 RSI: 0000200000000200 RDI: 0000000000000003 [ 286.609268][T10412] RBP: 00007ff65389f090 R08: 0000000000000000 R09: 0000000000000000 [ 286.609279][T10412] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 286.609289][T10412] R13: 00007ff652c16038 R14: 00007ff652c15fa0 R15: 00007ffd2a12d6f8 [ 286.609321][T10412] [ 287.419124][T10433] __nla_validate_parse: 6 callbacks suppressed [ 287.419143][T10433] netlink: 60 bytes leftover after parsing attributes in process `syz.8.1234'. [ 287.510884][T10433] netlink: 60 bytes leftover after parsing attributes in process `syz.8.1234'. [ 287.541274][T10433] netlink: 60 bytes leftover after parsing attributes in process `syz.8.1234'. [ 288.037172][T10463] validate_nla: 3 callbacks suppressed [ 288.037189][T10463] netlink: 'syz.7.1244': attribute type 10 has an invalid length. [ 288.061349][T10461] netlink: 'syz.8.1245': attribute type 10 has an invalid length. [ 288.181054][T10461] veth0_vlan: left promiscuous mode [ 288.202862][T10461] veth0_vlan: entered promiscuous mode [ 288.250602][T10461] team0: Device veth0_vlan failed to register rx_handler [ 289.306409][T10490] netlink: 212408 bytes leftover after parsing attributes in process `syz.8.1251'. [ 289.365022][T10492] FAULT_INJECTION: forcing a failure. [ 289.365022][T10492] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 289.409533][T10492] CPU: 1 UID: 0 PID: 10492 Comm: syz.5.1252 Not tainted syzkaller #0 PREEMPT(full) [ 289.409556][T10492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 289.409566][T10492] Call Trace: [ 289.409573][T10492] [ 289.409581][T10492] dump_stack_lvl+0xe8/0x150 [ 289.409608][T10492] should_fail_ex+0x412/0x560 [ 289.409634][T10492] _copy_to_user+0x31/0xb0 [ 289.409655][T10492] bpf_test_finish+0x22c/0x6b0 [ 289.409681][T10492] ? __pfx_bpf_test_finish+0x10/0x10 [ 289.409706][T10492] ? bpf_prog_test_run_skb+0xa0b/0x1d50 [ 289.409728][T10492] bpf_prog_test_run_skb+0x114f/0x1d50 [ 289.409758][T10492] ? __fget_files+0x2a/0x420 [ 289.409778][T10492] ? __fget_files+0x3a0/0x420 [ 289.409797][T10492] ? __fget_files+0x2a/0x420 [ 289.409820][T10492] ? __pfx_bpf_prog_test_run_skb+0x10/0x10 [ 289.409836][T10492] bpf_prog_test_run+0x2c7/0x340 [ 289.409858][T10492] __sys_bpf+0x643/0x950 [ 289.409877][T10492] ? __pfx___sys_bpf+0x10/0x10 [ 289.409908][T10492] ? do_syscall_64+0x9f/0xf80 [ 289.409928][T10492] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 289.409948][T10492] ? __pfx_sched_clock_cpu+0x10/0x10 [ 289.409979][T10492] __x64_sys_bpf+0x7c/0x90 [ 289.410003][T10492] do_syscall_64+0xe2/0xf80 [ 289.410020][T10492] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 289.410037][T10492] ? clear_bhb_loop+0x60/0xb0 [ 289.410057][T10492] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 289.410072][T10492] RIP: 0033:0x7f870819aeb9 [ 289.410088][T10492] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 289.410103][T10492] RSP: 002b:00007f8708fb5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 289.410123][T10492] RAX: ffffffffffffffda RBX: 00007f8708415fa0 RCX: 00007f870819aeb9 [ 289.410136][T10492] RDX: 0000000000000048 RSI: 00002000000002c0 RDI: 000000000000000a [ 289.410147][T10492] RBP: 00007f8708fb5090 R08: 0000000000000000 R09: 0000000000000000 [ 289.410157][T10492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 289.410168][T10492] R13: 00007f8708416038 R14: 00007f8708415fa0 R15: 00007ffc475c4f88 [ 289.410196][T10492] [ 289.662509][T10490] netlink: 28 bytes leftover after parsing attributes in process `syz.8.1251'. [ 289.671721][T10490] netlink: 28 bytes leftover after parsing attributes in process `syz.8.1251'. [ 289.835374][T10511] netlink: 'syz.6.1258': attribute type 39 has an invalid length. [ 293.589204][T10605] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1291'. [ 293.618718][T10605] netlink: 40 bytes leftover after parsing attributes in process `syz.3.1291'. [ 293.890048][T10618] syz2: rxe_newlink: already configured on lo [ 293.916426][T10618] netlink: 'syz.3.1294': attribute type 2 has an invalid length. [ 293.937626][T10618] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1294'. [ 294.199810][T10632] netlink: 'syz.6.1300': attribute type 39 has an invalid length. [ 294.217977][T10634] FAULT_INJECTION: forcing a failure. [ 294.217977][T10634] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 294.231608][T10634] CPU: 0 UID: 0 PID: 10634 Comm: syz.3.1301 Not tainted syzkaller #0 PREEMPT(full) [ 294.231632][T10634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 294.231642][T10634] Call Trace: [ 294.231650][T10634] [ 294.231657][T10634] dump_stack_lvl+0xe8/0x150 [ 294.231690][T10634] should_fail_ex+0x412/0x560 [ 294.231723][T10634] _copy_from_user+0x2d/0xb0 [ 294.231742][T10634] bpf_test_init+0xd8/0x150 [ 294.231762][T10634] bpf_prog_test_run_xdp+0x529/0x1160 [ 294.231793][T10634] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 294.231815][T10634] ? __fget_files+0x2a/0x420 [ 294.231843][T10634] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 294.231862][T10634] bpf_prog_test_run+0x2c7/0x340 [ 294.231902][T10634] __sys_bpf+0x643/0x950 [ 294.231921][T10634] ? __pfx___sys_bpf+0x10/0x10 [ 294.231967][T10634] __x64_sys_bpf+0x7c/0x90 [ 294.231992][T10634] do_syscall_64+0xe2/0xf80 [ 294.232010][T10634] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 294.232026][T10634] ? clear_bhb_loop+0x60/0xb0 [ 294.232046][T10634] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 294.232063][T10634] RIP: 0033:0x7ff11d79aeb9 [ 294.232079][T10634] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 294.232093][T10634] RSP: 002b:00007ff11e643028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 294.232111][T10634] RAX: ffffffffffffffda RBX: 00007ff11da15fa0 RCX: 00007ff11d79aeb9 [ 294.232123][T10634] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 294.232133][T10634] RBP: 00007ff11e643090 R08: 0000000000000000 R09: 0000000000000000 [ 294.232142][T10634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 294.232152][T10634] R13: 00007ff11da16038 R14: 00007ff11da15fa0 R15: 00007ffc7108b418 [ 294.232180][T10634] [ 294.616341][T10643] openvswitch: netlink: IP tunnel attribute has 4 unknown bytes. [ 294.809914][T10645] openvswitch: netlink: IP tunnel attribute has 4 unknown bytes. [ 295.063631][T10656] lo: entered allmulticast mode [ 295.781914][T10688] netlink: 212408 bytes leftover after parsing attributes in process `syz.7.1317'. [ 295.800855][T10690] netlink: 'syz.6.1320': attribute type 1 has an invalid length. [ 295.830158][T10680] netlink: 28 bytes leftover after parsing attributes in process `syz.7.1317'. [ 295.851515][T10680] netlink: 28 bytes leftover after parsing attributes in process `syz.7.1317'. [ 295.868033][T10687] netlink: 'syz.8.1319': attribute type 1 has an invalid length. [ 295.881959][T10687] netlink: 'syz.8.1319': attribute type 46 has an invalid length. [ 295.890225][T10687] netlink: 55 bytes leftover after parsing attributes in process `syz.8.1319'. [ 295.905216][ T30] audit: type=1107 audit(1770061602.708:3): pid=10694 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='f?' [ 296.451651][T10720] netlink: 8 bytes leftover after parsing attributes in process `syz.8.1329'. [ 296.561524][T10726] netlink: 368 bytes leftover after parsing attributes in process `syz.3.1332'. [ 296.985954][T10743] netlink: 'syz.6.1336': attribute type 13 has an invalid length. [ 296.997643][T10743] netlink: 4 bytes leftover after parsing attributes in process `syz.6.1336'. [ 297.028685][T10745] netlink: 'syz.7.1333': attribute type 1 has an invalid length. [ 297.074574][T10745] netlink: 'syz.7.1333': attribute type 46 has an invalid length. [ 297.592222][T10772] netlink: 'syz.7.1349': attribute type 16 has an invalid length. [ 297.600691][T10772] netlink: 'syz.7.1349': attribute type 17 has an invalid length. [ 297.919795][T10788] lo speed is unknown, defaulting to 1000 [ 298.564534][T10802] gretap0: refused to change device tx_queue_len [ 298.578815][T10802] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 298.727024][T10812] __nla_validate_parse: 3 callbacks suppressed [ 298.727043][T10812] netlink: 14556 bytes leftover after parsing attributes in process `syz.3.1363'. [ 298.881166][T10823] netlink: 272 bytes leftover after parsing attributes in process `syz.6.1369'. [ 299.320756][T10838] netlink: 52 bytes leftover after parsing attributes in process `syz.7.1374'. [ 299.548487][T10847] validate_nla: 2 callbacks suppressed [ 299.548523][T10847] netlink: 'syz.8.1376': attribute type 13 has an invalid length. [ 299.631037][T10847] gretap0: refused to change device tx_queue_len [ 299.645426][T10847] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 299.795828][T10857] netlink: 272 bytes leftover after parsing attributes in process `syz.3.1380'. [ 299.917609][T10866] Dead loop on virtual device ip6_vti0, fix it urgently! [ 300.227860][T10862] openvswitch: netlink: IP tunnel attribute has 4 unknown bytes. [ 301.184118][T10898] netlink: 272 bytes leftover after parsing attributes in process `syz.8.1394'. [ 301.207150][T10901] netlink: 'syz.7.1395': attribute type 13 has an invalid length. [ 301.241363][T10901] gretap0: refused to change device tx_queue_len [ 301.258872][T10901] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 301.322082][T10903] mac80211_hwsim hwsim18 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 301.419414][T10911] netlink: 'syz.6.1396': attribute type 2 has an invalid length. [ 301.873534][T10934] netlink: 'syz.5.1405': attribute type 3 has an invalid length. [ 302.445237][T10941] netlink: 24 bytes leftover after parsing attributes in process `syz.8.1407'. [ 302.536534][T10946] netlink: 272 bytes leftover after parsing attributes in process `syz.6.1409'. [ 302.821078][T10960] openvswitch: netlink: IP tunnel attribute has 4 unknown bytes. [ 303.386322][T10966] netlink: 'syz.8.1416': attribute type 27 has an invalid length. [ 303.394785][T10966] netlink: 116 bytes leftover after parsing attributes in process `syz.8.1416'. [ 303.793714][T10985] netlink: 272 bytes leftover after parsing attributes in process `syz.7.1423'. [ 304.266775][T11002] netlink: 'syz.7.1429': attribute type 13 has an invalid length. [ 304.304697][T11002] gretap0: refused to change device tx_queue_len [ 304.311421][T11002] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 304.326930][T11006] netlink: 'syz.8.1431': attribute type 10 has an invalid length. [ 304.433122][T11006] geneve0: entered promiscuous mode [ 304.571290][T11006] bond0: (slave geneve0): Enslaving as an active interface with an up link [ 305.199716][T11023] netlink: 'syz.7.1436': attribute type 1 has an invalid length. [ 305.231097][T11023] netlink: 'syz.7.1436': attribute type 46 has an invalid length. [ 305.264759][T11023] netlink: 55 bytes leftover after parsing attributes in process `syz.7.1436'. [ 305.325826][T11039] netlink: 44 bytes leftover after parsing attributes in process `syz.5.1442'. [ 307.146964][T11112] netlink: 64 bytes leftover after parsing attributes in process `syz.3.1468'. [ 307.375985][T11123] netlink: 132 bytes leftover after parsing attributes in process `syz.6.1470'. [ 308.110945][T11152] netlink: 60 bytes leftover after parsing attributes in process `syz.8.1484'. [ 308.121729][T11152] netlink: 60 bytes leftover after parsing attributes in process `syz.8.1484'. [ 308.131911][T11152] netlink: 60 bytes leftover after parsing attributes in process `syz.8.1484'. [ 308.378285][T11165] netlink: 60 bytes leftover after parsing attributes in process `syz.7.1490'. [ 308.389037][T11165] netlink: 60 bytes leftover after parsing attributes in process `syz.7.1490'. [ 309.095330][T11178] netlink: 'syz.5.1494': attribute type 1 has an invalid length. [ 310.331642][T11189] netlink: 272 bytes leftover after parsing attributes in process `syz.8.1497'. [ 310.393000][T11188] netlink: 'syz.6.1496': attribute type 27 has an invalid length. [ 311.668146][T11205] netlink: 12 bytes leftover after parsing attributes in process `syz.6.1501'. [ 311.850227][T11209] FAULT_INJECTION: forcing a failure. [ 311.850227][T11209] name failslab, interval 1, probability 0, space 0, times 0 [ 311.863308][T11209] CPU: 0 UID: 0 PID: 11209 Comm: syz.8.1503 Not tainted syzkaller #0 PREEMPT(full) [ 311.863332][T11209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 311.863352][T11209] Call Trace: [ 311.863364][T11209] [ 311.863376][T11209] dump_stack_lvl+0xe8/0x150 [ 311.863420][T11209] should_fail_ex+0x412/0x560 [ 311.863485][T11209] should_failslab+0xa8/0x100 [ 311.863525][T11209] kmem_cache_alloc_noprof+0x87/0x6e0 [ 311.863544][T11209] ? __pfx_find_exception+0x10/0x10 [ 311.863573][T11209] ? dst_alloc+0x105/0x170 [ 311.863587][T11209] ? fib_lookup+0x76/0x440 [ 311.863636][T11209] dst_alloc+0x105/0x170 [ 311.863687][T11209] ip_route_output_key_hash_rcu+0x14d0/0x25d0 [ 311.863769][T11209] ? ip_route_output_key_hash+0xd8/0x2a0 [ 311.863812][T11209] ip_route_output_key_hash+0x18d/0x2a0 [ 311.863862][T11209] ? __pfx_ip_route_output_key_hash+0x10/0x10 [ 311.863953][T11209] ? __asan_memset+0x22/0x50 [ 311.864016][T11209] ip_route_output_flow+0x2a/0x150 [ 311.864068][T11209] ip_tunnel_xmit+0x9b3/0x2730 [ 311.864139][T11209] ? ip_tunnel_xmit+0x160/0x2730 [ 311.864244][T11209] ? __pfx_ip_tunnel_xmit+0x10/0x10 [ 311.864278][T11209] ? tracing_gen_ctx_irq_test+0xc6/0x160 [ 311.864366][T11209] ? iptunnel_handle_offloads+0x2fd/0x630 [ 311.864435][T11209] sit_tunnel_xmit+0x637/0x1bc0 [ 311.864526][T11209] ? netif_skb_features+0xa64/0x1540 [ 311.864576][T11209] ? __pfx_sit_tunnel_xmit+0x10/0x10 [ 311.864606][T11209] ? trace_call_bpf+0xc2/0xb70 [ 311.864660][T11209] ? __pfx_netif_skb_features+0x10/0x10 [ 311.864755][T11209] dev_hard_start_xmit+0x2cd/0x7f0 [ 311.864896][T11209] __dev_queue_xmit+0x169c/0x3820 [ 311.865013][T11209] ? __dev_queue_xmit+0x27a/0x3820 [ 311.865041][T11209] ? perf_trace_preemptirq_template+0x268/0x340 [ 311.865077][T11209] ? read_seqbegin+0xac/0x180 [ 311.865108][T11209] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 311.865139][T11209] ? __pfx___dev_queue_xmit+0x10/0x10 [ 311.865161][T11209] ? neigh_connected_output+0x1ea/0x460 [ 311.865244][T11209] ? read_seqbegin+0xac/0x180 [ 311.865261][T11209] ? neigh_connected_output+0x1ea/0x460 [ 311.865283][T11209] ? lockdep_hardirqs_on+0x7a/0x110 [ 311.865311][T11209] ? read_seqbegin+0x123/0x180 [ 311.865351][T11209] ? neigh_connected_output+0x3b6/0x460 [ 311.865475][T11209] ip_finish_output2+0xbb6/0xff0 [ 311.865503][T11209] ? ip_skb_dst_mtu+0x80b/0xa50 [ 311.865544][T11209] ? ip_finish_output2+0x3d0/0xff0 [ 311.865569][T11209] ? ip_finish_output+0x33a/0x3f0 [ 311.865618][T11209] ip_push_pending_frames+0xbe/0x150 [ 311.865664][T11209] raw_sendmsg+0x15d7/0x1b60 [ 311.865783][T11209] ? __pfx_raw_sendmsg+0x10/0x10 [ 311.865916][T11209] ? aa_sk_perm+0x82d/0x960 [ 311.865997][T11209] ? __pfx_aa_sk_perm+0x10/0x10 [ 311.866020][T11209] ? tomoyo_socket_sendmsg_permission+0x215/0x300 [ 311.866071][T11209] ? sock_rps_record_flow+0x19/0x400 [ 311.866119][T11209] ? inet_sendmsg+0x2f4/0x370 [ 311.866145][T11209] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 311.866191][T11209] ____sys_sendmsg+0x894/0xad0 [ 311.866277][T11209] ? __pfx_____sys_sendmsg+0x10/0x10 [ 311.866366][T11209] ? import_iovec+0x73/0xa0 [ 311.866418][T11209] ___sys_sendmsg+0x2a5/0x360 [ 311.866450][T11209] ? perf_trace_run_bpf_submit+0xee/0x170 [ 311.866498][T11209] ? __pfx____sys_sendmsg+0x10/0x10 [ 311.866652][T11209] ? __fget_files+0x2a/0x420 [ 311.866751][T11209] ? __fget_files+0x2a/0x420 [ 311.866774][T11209] ? __fget_files+0x3a0/0x420 [ 311.866862][T11209] __x64_sys_sendmsg+0x1bd/0x2a0 [ 311.866920][T11209] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 311.867008][T11209] ? __pfx_ksys_write+0x10/0x10 [ 311.867102][T11209] do_syscall_64+0xe2/0xf80 [ 311.867128][T11209] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 311.867144][T11209] ? trace_irq_disable+0x37/0x100 [ 311.867160][T11209] ? clear_bhb_loop+0x60/0xb0 [ 311.867203][T11209] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 311.867222][T11209] RIP: 0033:0x7ff65299aeb9 [ 311.867248][T11209] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 311.867263][T11209] RSP: 002b:00007ff65389f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 311.867281][T11209] RAX: ffffffffffffffda RBX: 00007ff652c15fa0 RCX: 00007ff65299aeb9 [ 311.867294][T11209] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000007 [ 311.867305][T11209] RBP: 00007ff65389f090 R08: 0000000000000000 R09: 0000000000000000 [ 311.867316][T11209] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 311.867326][T11209] R13: 00007ff652c16038 R14: 00007ff652c15fa0 R15: 00007ffd2a12d6f8 [ 311.867445][T11209] [ 316.855309][T11239] lo speed is unknown, defaulting to 1000 [ 317.166958][ T1303] ieee802154 phy0 wpan0: encryption failed: -22 [ 317.173860][ T1303] ieee802154 phy1 wpan1: encryption failed: -22 [ 317.282831][T11259] netlink: 'syz.6.1521': attribute type 1 has an invalid length. [ 317.315082][T11265] netlink: 272 bytes leftover after parsing attributes in process `syz.7.1522'. [ 317.358260][T11264] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 317.414001][T11264] batman_adv: batadv0: adding TT local entry 66:ff:f2:fc:ff:ff to non-existent VLAN 815 [ 319.166155][T11267] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1523'. [ 320.634908][T11290] netlink: 'syz.3.1530': attribute type 10 has an invalid length. [ 320.712823][T11290] netlink: 40 bytes leftover after parsing attributes in process `syz.3.1530'. [ 320.767378][T11290] net veth1_virt_wifi virt_wifi0: entered promiscuous mode [ 320.836057][T11290] net veth1_virt_wifi virt_wifi0: entered allmulticast mode [ 320.859182][T11290] A link change request failed with some changes committed already. Interface virt_wifi0 may have been left with an inconsistent configuration, please check. [ 320.932683][ T5911] virt_wifi0 speed is unknown, defaulting to 1000 [ 321.027557][T11239] virt_wifi0 speed is unknown, defaulting to 1000 [ 321.591589][T11301] netlink: 272 bytes leftover after parsing attributes in process `syz.8.1534'. [ 322.031554][T11303] netlink: 4 bytes leftover after parsing attributes in process `syz.7.1537'. [ 325.124485][T11332] netlink: 272 bytes leftover after parsing attributes in process `syz.3.1545'. [ 325.658995][T11354] openvswitch: netlink: IP tunnel attribute has 4 unknown bytes. [ 325.822221][T11359] netlink: 212408 bytes leftover after parsing attributes in process `syz.5.1550'. [ 325.920185][T11365] netlink: 28 bytes leftover after parsing attributes in process `syz.5.1550'. [ 325.929978][T11365] netlink: 28 bytes leftover after parsing attributes in process `syz.5.1550'. [ 325.994622][T11353] syzkaller0: entered promiscuous mode [ 326.037137][T11361] netlink: 'syz.6.1551': attribute type 1 has an invalid length. [ 326.048817][T11361] netlink: 'syz.6.1551': attribute type 46 has an invalid length. [ 326.069151][T11361] netlink: 55 bytes leftover after parsing attributes in process `syz.6.1551'. [ 326.458581][T11386] netlink: 272 bytes leftover after parsing attributes in process `syz.8.1558'. [ 327.254960][T11410] netlink: 1735 bytes leftover after parsing attributes in process `syz.7.1568'. [ 327.371139][T11416] netlink: 'syz.6.1569': attribute type 13 has an invalid length. [ 327.387843][T11416] gretap0: refused to change device tx_queue_len [ 327.395941][T11416] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 327.828483][T11434] FAULT_INJECTION: forcing a failure. [ 327.828483][T11434] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 327.858369][T11434] CPU: 0 UID: 0 PID: 11434 Comm: syz.5.1578 Not tainted syzkaller #0 PREEMPT(full) [ 327.858395][T11434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 327.858405][T11434] Call Trace: [ 327.858413][T11434] [ 327.858421][T11434] dump_stack_lvl+0xe8/0x150 [ 327.858450][T11434] should_fail_ex+0x412/0x560 [ 327.858487][T11434] _copy_from_user+0x2d/0xb0 [ 327.858507][T11434] ___sys_sendmsg+0x1c6/0x360 [ 327.858530][T11434] ? __lock_acquire+0x6b5/0x2cf0 [ 327.858559][T11434] ? __pfx____sys_sendmsg+0x10/0x10 [ 327.858627][T11434] ? __fget_files+0x2a/0x420 [ 327.858648][T11434] ? __fget_files+0x3a0/0x420 [ 327.858682][T11434] __x64_sys_sendmsg+0x1bd/0x2a0 [ 327.858709][T11434] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 327.858763][T11434] do_syscall_64+0xe2/0xf80 [ 327.858782][T11434] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 327.858799][T11434] ? clear_bhb_loop+0x60/0xb0 [ 327.858821][T11434] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 327.858838][T11434] RIP: 0033:0x7f870819aeb9 [ 327.858855][T11434] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 327.858870][T11434] RSP: 002b:00007f8708fb5028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 327.858889][T11434] RAX: ffffffffffffffda RBX: 00007f8708415fa0 RCX: 00007f870819aeb9 [ 327.858902][T11434] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000008 [ 327.858913][T11434] RBP: 00007f8708fb5090 R08: 0000000000000000 R09: 0000000000000000 [ 327.858924][T11434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 327.858934][T11434] R13: 00007f8708416038 R14: 00007f8708415fa0 R15: 00007ffc475c4f88 [ 327.858970][T11434] [ 328.109154][T11440] netlink: 60 bytes leftover after parsing attributes in process `syz.6.1579'. [ 328.119846][T11440] netlink: 60 bytes leftover after parsing attributes in process `syz.6.1579'. [ 328.222230][T11441] netlink: 60 bytes leftover after parsing attributes in process `syz.6.1579'. [ 328.803193][T11456] netlink: 'syz.7.1585': attribute type 27 has an invalid length. [ 329.285670][T11483] netlink: 'syz.7.1595': attribute type 10 has an invalid length. [ 329.392009][T11483] batman_adv: batadv0: Adding interface: veth1_virt_wifi [ 329.432485][T11483] batman_adv: batadv0: The MTU of interface veth1_virt_wifi is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 329.494373][T11483] batman_adv: batadv0: Interface activated: veth1_virt_wifi [ 329.564400][T11479] netlink: 'syz.3.1594': attribute type 10 has an invalid length. [ 329.579225][T11479] batadv_slave_1: entered promiscuous mode [ 329.771145][T11479] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 329.781952][T11479] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 330.085319][T11502] mac80211_hwsim hwsim16 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 330.113370][T11496] netlink: 'syz.5.1600': attribute type 2 has an invalid length. [ 330.395291][T11524] __nla_validate_parse: 4 callbacks suppressed [ 330.395310][T11524] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1608'. [ 330.455081][T11528] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1608'. [ 330.596672][T11536] netlink: 4 bytes leftover after parsing attributes in process `syz.8.1612'. [ 330.617841][T11538] netlink: 16 bytes leftover after parsing attributes in process `syz.7.1613'. [ 330.686621][T11541] netlink: 16 bytes leftover after parsing attributes in process `syz.5.1614'. [ 330.705239][T11538] netlink: 16 bytes leftover after parsing attributes in process `syz.7.1613'. [ 330.734403][T11541] netlink: 16 bytes leftover after parsing attributes in process `syz.5.1614'. [ 331.113056][ T5835] Bluetooth: hci4: unexpected subevent 0x05 length: 150 > 12 [ 331.506322][T11571] FAULT_INJECTION: forcing a failure. [ 331.506322][T11571] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 331.542881][T11571] CPU: 1 UID: 0 PID: 11571 Comm: syz.6.1625 Not tainted syzkaller #0 PREEMPT(full) [ 331.542921][T11571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 331.542933][T11571] Call Trace: [ 331.542941][T11571] [ 331.542954][T11571] dump_stack_lvl+0xe8/0x150 [ 331.542986][T11571] should_fail_ex+0x412/0x560 [ 331.543027][T11571] _copy_from_user+0x2d/0xb0 [ 331.543051][T11571] __sys_bpf+0x229/0x950 [ 331.543082][T11571] ? __pfx___sys_bpf+0x10/0x10 [ 331.543147][T11571] ? do_syscall_64+0x9f/0xf80 [ 331.543172][T11571] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 331.543197][T11571] ? __pfx_ksys_write+0x10/0x10 [ 331.543242][T11571] __x64_sys_bpf+0x7c/0x90 [ 331.543275][T11571] do_syscall_64+0xe2/0xf80 [ 331.543296][T11571] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 331.543312][T11571] ? trace_irq_disable+0x37/0x100 [ 331.543328][T11571] ? clear_bhb_loop+0x60/0xb0 [ 331.543357][T11571] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 331.543374][T11571] RIP: 0033:0x7fd12eb9aeb9 [ 331.543394][T11571] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 331.543409][T11571] RSP: 002b:00007fd12f9bc028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 331.543427][T11571] RAX: ffffffffffffffda RBX: 00007fd12ee16090 RCX: 00007fd12eb9aeb9 [ 331.543441][T11571] RDX: 0000000000000094 RSI: 0000200000000080 RDI: 0000000000000005 [ 331.543452][T11571] RBP: 00007fd12f9bc090 R08: 0000000000000000 R09: 0000000000000000 [ 331.543463][T11571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 331.543474][T11571] R13: 00007fd12ee16128 R14: 00007fd12ee16090 R15: 00007ffec21365f8 [ 331.543536][T11571] [ 332.731902][T11582] netlink: 16 bytes leftover after parsing attributes in process `syz.8.1629'. [ 332.776612][T11582] netlink: 16 bytes leftover after parsing attributes in process `syz.8.1629'. [ 332.961562][T11589] netlink: 'syz.7.1632': attribute type 13 has an invalid length. [ 333.003013][T11589] gretap0: refused to change device tx_queue_len [ 333.019459][T11589] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 333.143885][ T5835] Bluetooth: hci4: command 0x0406 tx timeout [ 333.248964][T11602] netlink: 'syz.3.1635': attribute type 4 has an invalid length. [ 333.479361][T11616] netlink: 16 bytes leftover after parsing attributes in process `syz.7.1641'. [ 336.641183][T11632] netlink: 16 bytes leftover after parsing attributes in process `syz.6.1646'. [ 336.657950][T11632] netlink: 16 bytes leftover after parsing attributes in process `syz.6.1646'. [ 337.634910][T11656] netlink: 4 bytes leftover after parsing attributes in process `syz.7.1653'. [ 337.655913][T11656] openvswitch: netlink: nsh attr 8 is out of range max 3 [ 340.787475][T11681] netlink: 16 bytes leftover after parsing attributes in process `syz.7.1659'. [ 340.817874][T11681] netlink: 16 bytes leftover after parsing attributes in process `syz.7.1659'. [ 341.484190][T11714] openvswitch: netlink: IP tunnel attribute has 4 unknown bytes. [ 341.516197][T11714] openvswitch: : Dropping previously announced user features [ 341.654192][T11723] netlink: 24 bytes leftover after parsing attributes in process `syz.7.1670'. [ 342.490675][T11749] netlink: 'syz.8.1681': attribute type 1 has an invalid length. [ 342.600076][T11753] FAULT_INJECTION: forcing a failure. [ 342.600076][T11753] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 342.613922][T11753] CPU: 1 UID: 0 PID: 11753 Comm: syz.6.1682 Not tainted syzkaller #0 PREEMPT(full) [ 342.613945][T11753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 342.613956][T11753] Call Trace: [ 342.613962][T11753] [ 342.613970][T11753] dump_stack_lvl+0xe8/0x150 [ 342.613998][T11753] should_fail_ex+0x412/0x560 [ 342.614027][T11753] _copy_from_user+0x2d/0xb0 [ 342.614046][T11753] ___sys_sendmsg+0x1c6/0x360 [ 342.614069][T11753] ? __lock_acquire+0x6b5/0x2cf0 [ 342.614097][T11753] ? __pfx____sys_sendmsg+0x10/0x10 [ 342.614139][T11753] ? __fget_files+0x2a/0x420 [ 342.614172][T11753] ? __fget_files+0x2a/0x420 [ 342.614189][T11753] ? __fget_files+0x3a0/0x420 [ 342.614220][T11753] __x64_sys_sendmsg+0x1bd/0x2a0 [ 342.614246][T11753] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 342.614265][T11753] ? perf_trace_preemptirq_template+0xab/0x340 [ 342.614294][T11753] ? __pfx_ksys_write+0x10/0x10 [ 342.614323][T11753] do_syscall_64+0xe2/0xf80 [ 342.614342][T11753] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 342.614357][T11753] ? trace_irq_disable+0x37/0x100 [ 342.614372][T11753] ? clear_bhb_loop+0x60/0xb0 [ 342.614394][T11753] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 342.614409][T11753] RIP: 0033:0x7fd12eb9aeb9 [ 342.614425][T11753] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 342.614449][T11753] RSP: 002b:00007fd12f9bc028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 342.614467][T11753] RAX: ffffffffffffffda RBX: 00007fd12ee16090 RCX: 00007fd12eb9aeb9 [ 342.614479][T11753] RDX: 000000000000c8d2 RSI: 0000200000000000 RDI: 0000000000000005 [ 342.614490][T11753] RBP: 00007fd12f9bc090 R08: 0000000000000000 R09: 0000000000000000 [ 342.614500][T11753] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 342.614510][T11753] R13: 00007fd12ee16128 R14: 00007fd12ee16090 R15: 00007ffec21365f8 [ 342.614542][T11753] [ 343.098055][T11761] netlink: 'syz.6.1686': attribute type 21 has an invalid length. [ 343.107008][T11761] netlink: 128 bytes leftover after parsing attributes in process `syz.6.1686'. [ 343.141942][T11761] netlink: 'syz.6.1686': attribute type 5 has an invalid length. [ 343.202455][T11761] netlink: 3 bytes leftover after parsing attributes in process `syz.6.1686'. [ 343.539130][T11775] netlink: 'syz.3.1690': attribute type 3 has an invalid length. [ 343.566528][T11775] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1690'. [ 343.990436][T11790] netlink: 20 bytes leftover after parsing attributes in process `syz.6.1694'. [ 344.088618][T11793] netlink: 'syz.5.1695': attribute type 153 has an invalid length. [ 344.327119][T11798] netlink: 56 bytes leftover after parsing attributes in process `syz.6.1694'. [ 344.810686][T11801] netlink: 368 bytes leftover after parsing attributes in process `syz.8.1698'. [ 346.247839][T11824] netlink: 12 bytes leftover after parsing attributes in process `syz.8.1702'. [ 346.391494][T11823] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1703'. [ 346.488278][T11834] netlink: 'syz.5.1705': attribute type 1 has an invalid length. [ 346.959356][T11856] netlink: 16 bytes leftover after parsing attributes in process `syz.6.1712'. [ 346.996093][T11856] netlink: 16 bytes leftover after parsing attributes in process `syz.6.1712'. [ 347.123330][T11859] netlink: 8 bytes leftover after parsing attributes in process `syz.7.1713'. [ 348.132992][T11859] netlink: 14 bytes leftover after parsing attributes in process `syz.7.1713'. [ 348.205700][T11871] netlink: 8 bytes leftover after parsing attributes in process `syz.6.1717'. [ 348.231010][T11875] netlink: 272 bytes leftover after parsing attributes in process `syz.5.1714'. [ 348.254688][T11859] hsr_slave_0: left promiscuous mode [ 348.521308][T11859] hsr_slave_1: left promiscuous mode [ 348.616150][T11880] netlink: 'syz.8.1718': attribute type 7 has an invalid length. [ 349.077472][T11891] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1720'. [ 349.885879][T11899] netlink: 20 bytes leftover after parsing attributes in process `syz.7.1724'. [ 349.959983][T11905] netlink: 16 bytes leftover after parsing attributes in process `syz.8.1726'. [ 349.984947][T11905] netlink: 16 bytes leftover after parsing attributes in process `syz.8.1726'. [ 352.091212][T11970] openvswitch: : Dropping previously announced user features [ 352.253847][T11977] __nla_validate_parse: 5 callbacks suppressed [ 352.253865][T11977] netlink: 60 bytes leftover after parsing attributes in process `syz.5.1751'. [ 352.271169][T11977] unsupported nlmsg_type 40 [ 352.939495][T12006] netlink: 64 bytes leftover after parsing attributes in process `syz.8.1762'. [ 353.215534][T12019] netlink: 'syz.8.1767': attribute type 21 has an invalid length. [ 353.233297][T12019] netlink: 144 bytes leftover after parsing attributes in process `syz.8.1767'. [ 353.282657][T12019] netlink: 132 bytes leftover after parsing attributes in process `syz.8.1767'. [ 353.310973][T12019] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 353.322213][T12019] netlink: 'syz.8.1767': attribute type 10 has an invalid length. [ 353.597356][T12019] bond0: (slave bond_slave_0): Releasing backup interface [ 353.638902][T12027] netlink: 209852 bytes leftover after parsing attributes in process `syz.5.1770'. [ 353.915862][T12039] netlink: 'syz.8.1774': attribute type 9 has an invalid length. [ 353.930030][T12039] netlink: 'syz.8.1774': attribute type 11 has an invalid length. [ 353.941067][T12039] netlink: 'syz.8.1774': attribute type 12 has an invalid length. [ 353.960455][T12039] netlink: 211616 bytes leftover after parsing attributes in process `syz.8.1774'. [ 354.714310][T12060] netlink: 4 bytes leftover after parsing attributes in process `syz.8.1781'. [ 354.774433][T12065] netlink: 65039 bytes leftover after parsing attributes in process `syz.7.1783'. [ 354.807031][T12067] netlink: 368 bytes leftover after parsing attributes in process `syz.6.1784'. [ 354.850202][T12065] netlink: 32 bytes leftover after parsing attributes in process `syz.7.1783'. [ 355.030721][T12076] netlink: 'syz.5.1787': attribute type 7 has an invalid length. [ 355.538062][T12091] openvswitch: netlink: VXLAN extension message has 228 unknown bytes. [ 355.619545][T12100] netlink: 'syz.8.1799': attribute type 7 has an invalid length. [ 355.850276][T12111] netlink: 'syz.7.1798': attribute type 7 has an invalid length. [ 355.868812][T12112] netlink: 'syz.8.1801': attribute type 10 has an invalid length. [ 355.921408][T12112] veth0_vlan: left promiscuous mode [ 355.936327][T12112] veth0_vlan: entered promiscuous mode [ 355.983363][T12112] team0: Device veth0_vlan failed to register rx_handler [ 356.554037][T12137] netlink: 'syz.7.1809': attribute type 10 has an invalid length. [ 357.079311][T12158] netlink: 'syz.5.1817': attribute type 21 has an invalid length. [ 357.102457][T12158] IPv6: NLM_F_CREATE should be specified when creating new route [ 357.335798][T12163] FAULT_INJECTION: forcing a failure. [ 357.335798][T12163] name failslab, interval 1, probability 0, space 0, times 0 [ 357.371131][T12159] __nla_validate_parse: 15 callbacks suppressed [ 357.371242][T12159] netlink: 48 bytes leftover after parsing attributes in process `syz.3.1819'. [ 357.410084][T12163] CPU: 0 UID: 0 PID: 12163 Comm: syz.6.1820 Not tainted syzkaller #0 PREEMPT(full) [ 357.410111][T12163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 357.410123][T12163] Call Trace: [ 357.410129][T12163] [ 357.410138][T12163] dump_stack_lvl+0xe8/0x150 [ 357.410176][T12163] should_fail_ex+0x412/0x560 [ 357.410206][T12163] should_failslab+0xa8/0x100 [ 357.410231][T12163] kmem_cache_alloc_node_noprof+0x8b/0x6f0 [ 357.410251][T12163] ? __alloc_skb+0x193/0x390 [ 357.410274][T12163] ? __alloc_skb+0x1d7/0x390 [ 357.410293][T12163] ? __local_bh_enable_ip+0xd0/0x130 [ 357.410312][T12163] ? __alloc_skb+0x193/0x390 [ 357.410335][T12163] __alloc_skb+0x1d7/0x390 [ 357.410361][T12163] netlink_sendmsg+0x5d4/0xb40 [ 357.410393][T12163] ? __pfx_netlink_sendmsg+0x10/0x10 [ 357.410417][T12163] ? aa_sock_msg_perm+0xf1/0x1b0 [ 357.410444][T12163] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 357.410466][T12163] ? __pfx_netlink_sendmsg+0x10/0x10 [ 357.410486][T12163] ____sys_sendmsg+0xa68/0xad0 [ 357.410510][T12163] ? __might_fault+0xaf/0x130 [ 357.410535][T12163] ? __pfx_____sys_sendmsg+0x10/0x10 [ 357.410568][T12163] ? import_iovec+0x73/0xa0 [ 357.410590][T12163] ___sys_sendmsg+0x2a5/0x360 [ 357.410613][T12163] ? __lock_acquire+0x6b5/0x2cf0 [ 357.410642][T12163] ? __pfx____sys_sendmsg+0x10/0x10 [ 357.410702][T12163] ? __fget_files+0x2a/0x420 [ 357.410724][T12163] ? __fget_files+0x3a0/0x420 [ 357.410756][T12163] __x64_sys_sendmsg+0x1bd/0x2a0 [ 357.410783][T12163] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 357.410805][T12163] ? perf_trace_preemptirq_template+0xab/0x340 [ 357.410836][T12163] ? __pfx_ksys_write+0x10/0x10 [ 357.410867][T12163] do_syscall_64+0xe2/0xf80 [ 357.410887][T12163] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 357.410905][T12163] ? trace_irq_disable+0x37/0x100 [ 357.410922][T12163] ? clear_bhb_loop+0x60/0xb0 [ 357.410945][T12163] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 357.410963][T12163] RIP: 0033:0x7fd12eb9aeb9 [ 357.410979][T12163] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 357.410998][T12163] RSP: 002b:00007fd12f9dd028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 357.411018][T12163] RAX: ffffffffffffffda RBX: 00007fd12ee15fa0 RCX: 00007fd12eb9aeb9 [ 357.411031][T12163] RDX: 000000000000c8d2 RSI: 0000200000000000 RDI: 0000000000000005 [ 357.411040][T12163] RBP: 00007fd12f9dd090 R08: 0000000000000000 R09: 0000000000000000 [ 357.411049][T12163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 357.411058][T12163] R13: 00007fd12ee16038 R14: 00007fd12ee15fa0 R15: 00007ffec21365f8 [ 357.411085][T12163] [ 357.909324][T12169] mac80211_hwsim hwsim18 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 358.090588][T12179] netlink: 16 bytes leftover after parsing attributes in process `syz.3.1827'. [ 358.164580][T12185] netlink: 12 bytes leftover after parsing attributes in process `syz.8.1828'. [ 358.423987][T12189] netlink: 774 bytes leftover after parsing attributes in process `syz.5.1830'. [ 358.449835][T12193] netlink: 'syz.6.1832': attribute type 12 has an invalid length. [ 358.512982][T12193] netlink: 14585 bytes leftover after parsing attributes in process `syz.6.1832'. [ 358.552806][T12199] netlink: 4 bytes leftover after parsing attributes in process `syz.6.1832'. [ 358.632429][T12204] netlink: 8 bytes leftover after parsing attributes in process `syz.8.1835'. [ 358.735379][T12202] netlink: 56 bytes leftover after parsing attributes in process `syz.3.1834'. [ 361.970234][T12234] validate_nla: 1 callbacks suppressed [ 361.970255][T12234] netlink: 'syz.8.1840': attribute type 21 has an invalid length. [ 361.999877][T12234] netlink: 156 bytes leftover after parsing attributes in process `syz.8.1840'. [ 362.076441][T12245] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1843'. [ 362.409415][T12248] __nla_validate_parse: 2 callbacks suppressed [ 362.409436][T12248] netlink: 140 bytes leftover after parsing attributes in process `syz.5.1845'. [ 362.900435][T12257] netlink: 12 bytes leftover after parsing attributes in process `syz.8.1846'. [ 363.236008][T12265] FAULT_INJECTION: forcing a failure. [ 363.236008][T12265] name failslab, interval 1, probability 0, space 0, times 0 [ 363.249236][T12265] CPU: 1 UID: 0 PID: 12265 Comm: syz.6.1851 Not tainted syzkaller #0 PREEMPT(full) [ 363.249261][T12265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 363.249272][T12265] Call Trace: [ 363.249279][T12265] [ 363.249287][T12265] dump_stack_lvl+0xe8/0x150 [ 363.249314][T12265] should_fail_ex+0x412/0x560 [ 363.249342][T12265] should_failslab+0xa8/0x100 [ 363.249364][T12265] kmem_cache_alloc_node_noprof+0x8b/0x6f0 [ 363.249382][T12265] ? __alloc_skb+0x193/0x390 [ 363.249403][T12265] ? __alloc_skb+0x1d7/0x390 [ 363.249421][T12265] ? __local_bh_enable_ip+0xd0/0x130 [ 363.249439][T12265] ? __alloc_skb+0x193/0x390 [ 363.249460][T12265] __alloc_skb+0x1d7/0x390 [ 363.249485][T12265] netlink_sendmsg+0x5d4/0xb40 [ 363.249515][T12265] ? __pfx_netlink_sendmsg+0x10/0x10 [ 363.249538][T12265] ? aa_sock_msg_perm+0xf1/0x1b0 [ 363.249562][T12265] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 363.249584][T12265] ? __pfx_netlink_sendmsg+0x10/0x10 [ 363.249602][T12265] ____sys_sendmsg+0xa68/0xad0 [ 363.249625][T12265] ? __might_fault+0xaf/0x130 [ 363.249649][T12265] ? __pfx_____sys_sendmsg+0x10/0x10 [ 363.249682][T12265] ? import_iovec+0x73/0xa0 [ 363.249704][T12265] ___sys_sendmsg+0x2a5/0x360 [ 363.249725][T12265] ? __lock_acquire+0x6b5/0x2cf0 [ 363.249753][T12265] ? __pfx____sys_sendmsg+0x10/0x10 [ 363.249819][T12265] ? __fget_files+0x2a/0x420 [ 363.249839][T12265] ? __fget_files+0x3a0/0x420 [ 363.249871][T12265] __x64_sys_sendmsg+0x1bd/0x2a0 [ 363.249893][T12265] ? irqentry_exit+0x59c/0x620 [ 363.249916][T12265] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 363.249965][T12265] do_syscall_64+0xe2/0xf80 [ 363.249984][T12265] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 363.250002][T12265] ? clear_bhb_loop+0x60/0xb0 [ 363.250025][T12265] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 363.250041][T12265] RIP: 0033:0x7fd12eb9aeb9 [ 363.250058][T12265] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 363.250073][T12265] RSP: 002b:00007fd12f9dd028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 363.250092][T12265] RAX: ffffffffffffffda RBX: 00007fd12ee15fa0 RCX: 00007fd12eb9aeb9 [ 363.250104][T12265] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000008 [ 363.250116][T12265] RBP: 00007fd12f9dd090 R08: 0000000000000000 R09: 0000000000000000 [ 363.250127][T12265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 363.250138][T12265] R13: 00007fd12ee16038 R14: 00007fd12ee15fa0 R15: 00007ffec21365f8 [ 363.250169][T12265] [ 365.519402][T12298] netlink: 'syz.7.1858': attribute type 10 has an invalid length. [ 367.144720][T12323] ref_ctr_offset mismatch. inode: 0x721 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x20 [ 367.321681][T12334] netlink: 4 bytes leftover after parsing attributes in process `syz.6.1872'. [ 368.285136][T12335] openvswitch: netlink: Message has 8 unknown bytes. [ 368.385669][T12348] netlink: 'syz.3.1876': attribute type 23 has an invalid length. [ 369.884902][T12398] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1892'. [ 370.163742][T12406] openvswitch: netlink: IP tunnel attribute has 4 unknown bytes. [ 371.280104][T12412] netlink: 60 bytes leftover after parsing attributes in process `syz.7.1897'. [ 372.582100][T12413] netlink: 60 bytes leftover after parsing attributes in process `syz.7.1897'. [ 372.591732][T12419] netlink: 'syz.8.1899': attribute type 8 has an invalid length. [ 372.601245][T12414] netlink: 60 bytes leftover after parsing attributes in process `syz.7.1897'. [ 372.865738][T12447] netlink: 368 bytes leftover after parsing attributes in process `syz.3.1904'. [ 373.802196][T12463] netlink: 'syz.8.1910': attribute type 7 has an invalid length. [ 373.936552][T12469] netlink: 'syz.3.1913': attribute type 10 has an invalid length. [ 373.973085][T12469] team0: Device veth1_vlan is already a lower device of the team interface [ 374.124896][T12472] netlink: zone id is out of range [ 374.130420][T12473] netlink: zone id is out of range [ 374.136626][T12473] netlink: zone id is out of range [ 374.162204][T12472] netlink: zone id is out of range [ 374.188409][T12473] netlink: zone id is out of range [ 374.196906][T12472] netlink: zone id is out of range [ 374.205281][T12473] netlink: get zone limit has 8 unknown bytes [ 374.228225][T12472] netlink: get zone limit has 8 unknown bytes [ 374.253805][T12483] openvswitch: netlink: IP tunnel attribute has 4 unknown bytes. [ 374.968496][T12508] netlink: 368 bytes leftover after parsing attributes in process `syz.5.1921'. [ 375.016934][T12509] netlink: 'syz.8.1924': attribute type 7 has an invalid length. [ 375.841092][T12515] netlink: 'syz.6.1926': attribute type 4 has an invalid length. [ 375.865793][T12515] netlink: 'syz.6.1926': attribute type 17 has an invalid length. [ 376.868804][T12535] openvswitch: netlink: IP tunnel attribute has 4 unknown bytes. [ 376.928001][T12540] openvswitch: : Dropping previously announced user features [ 377.193285][T12543] netlink: 4 bytes leftover after parsing attributes in process `syz.8.1936'. [ 377.462843][T12543] netlink: 100 bytes leftover after parsing attributes in process `syz.8.1936'. [ 377.488447][T12548] netlink: 'syz.6.1937': attribute type 7 has an invalid length. [ 377.671552][T12541] netlink: 'syz.3.1935': attribute type 1 has an invalid length. [ 377.710635][T12541] netlink: 'syz.3.1935': attribute type 46 has an invalid length. [ 377.728632][T12541] netlink: 55 bytes leftover after parsing attributes in process `syz.3.1935'. [ 377.761838][T12556] netlink: 'syz.5.1941': attribute type 4 has an invalid length. [ 377.780583][T12556] netlink: 'syz.5.1941': attribute type 17 has an invalid length. [ 379.129794][ T1303] ieee802154 phy0 wpan0: encryption failed: -22 [ 379.137018][ T1303] ieee802154 phy1 wpan1: encryption failed: -22 [ 379.445161][T12569] Can't find ip_set type hash:n [ 379.720328][T12579] validate_nla: 2 callbacks suppressed [ 379.720359][T12579] netlink: 'syz.7.1949': attribute type 7 has an invalid length. [ 379.947480][T12594] FAULT_INJECTION: forcing a failure. [ 379.947480][T12594] name failslab, interval 1, probability 0, space 0, times 0 [ 379.978454][T12594] CPU: 1 UID: 0 PID: 12594 Comm: syz.8.1953 Not tainted syzkaller #0 PREEMPT(full) [ 379.978479][T12594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 379.978490][T12594] Call Trace: [ 379.978497][T12594] [ 379.978504][T12594] dump_stack_lvl+0xe8/0x150 [ 379.978533][T12594] should_fail_ex+0x412/0x560 [ 379.978561][T12594] should_failslab+0xa8/0x100 [ 379.978584][T12594] kmem_cache_alloc_node_noprof+0x8b/0x6f0 [ 379.978603][T12594] ? __alloc_skb+0x193/0x390 [ 379.978623][T12594] ? __alloc_skb+0x1d7/0x390 [ 379.978641][T12594] ? __local_bh_enable_ip+0xd0/0x130 [ 379.978659][T12594] ? __alloc_skb+0x193/0x390 [ 379.978680][T12594] __alloc_skb+0x1d7/0x390 [ 379.978705][T12594] netlink_sendmsg+0x5d4/0xb40 [ 379.978732][T12594] ? __pfx_netlink_sendmsg+0x10/0x10 [ 379.978755][T12594] ? aa_sock_msg_perm+0xf1/0x1b0 [ 379.978787][T12594] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 379.978809][T12594] ? __pfx_netlink_sendmsg+0x10/0x10 [ 379.978827][T12594] ____sys_sendmsg+0xa68/0xad0 [ 379.978851][T12594] ? __might_fault+0xaf/0x130 [ 379.978875][T12594] ? __pfx_____sys_sendmsg+0x10/0x10 [ 379.978908][T12594] ? import_iovec+0x73/0xa0 [ 379.978929][T12594] ___sys_sendmsg+0x2a5/0x360 [ 379.978950][T12594] ? __lock_acquire+0x6b5/0x2cf0 [ 379.978978][T12594] ? __pfx____sys_sendmsg+0x10/0x10 [ 379.979036][T12594] ? __fget_files+0x2a/0x420 [ 379.979055][T12594] ? __fget_files+0x3a0/0x420 [ 379.979086][T12594] __x64_sys_sendmsg+0x1bd/0x2a0 [ 379.979112][T12594] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 379.979145][T12594] ? __pfx_ksys_write+0x10/0x10 [ 379.979175][T12594] do_syscall_64+0xe2/0xf80 [ 379.979194][T12594] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 379.979210][T12594] ? trace_irq_disable+0x37/0x100 [ 379.979227][T12594] ? clear_bhb_loop+0x60/0xb0 [ 379.979249][T12594] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 379.979266][T12594] RIP: 0033:0x7ff65299aeb9 [ 379.979282][T12594] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 379.979297][T12594] RSP: 002b:00007ff65389f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 379.979315][T12594] RAX: ffffffffffffffda RBX: 00007ff652c15fa0 RCX: 00007ff65299aeb9 [ 379.979328][T12594] RDX: 0000000000004000 RSI: 0000200000000480 RDI: 0000000000000003 [ 379.979339][T12594] RBP: 00007ff65389f090 R08: 0000000000000000 R09: 0000000000000000 [ 379.979350][T12594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 379.979361][T12594] R13: 00007ff652c16038 R14: 00007ff652c15fa0 R15: 00007ffd2a12d6f8 [ 379.979392][T12594] [ 380.298340][T12598] netlink: 'syz.3.1956': attribute type 4 has an invalid length. [ 380.310581][T12598] netlink: 'syz.3.1956': attribute type 17 has an invalid length. [ 380.918428][T12611] netlink: 'syz.3.1962': attribute type 7 has an invalid length. [ 380.949520][ T5835] Bluetooth: hci8: unexpected subevent 0x04 length: 150 > 11 [ 381.109663][ T5835] Bluetooth: hci6: ISO packet for unknown connection handle 2 [ 381.128295][T12619] netlink: 12 bytes leftover after parsing attributes in process `syz.6.1963'. [ 381.436815][T12635] netlink: 'syz.7.1970': attribute type 4 has an invalid length. [ 381.460441][T12635] netlink: 'syz.7.1970': attribute type 17 has an invalid length. [ 381.523212][T12636] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1971'. [ 382.623995][T12660] netlink: 763 bytes leftover after parsing attributes in process `syz.7.1978'. [ 382.781965][T12678] netlink: 'syz.8.1984': attribute type 4 has an invalid length. [ 382.790895][T12678] netlink: 'syz.8.1984': attribute type 17 has an invalid length. [ 382.934392][T12684] netlink: 32 bytes leftover after parsing attributes in process `syz.8.1988'. [ 383.868833][T12706] netlink: 32 bytes leftover after parsing attributes in process `syz.6.1997'. [ 383.881988][T12706] netlink: 32 bytes leftover after parsing attributes in process `syz.6.1997'. [ 384.040162][T12723] netlink: 368 bytes leftover after parsing attributes in process `syz.8.2001'. [ 384.120237][T12728] FAULT_INJECTION: forcing a failure. [ 384.120237][T12728] name failslab, interval 1, probability 0, space 0, times 0 [ 384.133043][T12728] CPU: 1 UID: 0 PID: 12728 Comm: syz.3.2004 Not tainted syzkaller #0 PREEMPT(full) [ 384.133068][T12728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 384.133079][T12728] Call Trace: [ 384.133086][T12728] [ 384.133094][T12728] dump_stack_lvl+0xe8/0x150 [ 384.133122][T12728] should_fail_ex+0x412/0x560 [ 384.133151][T12728] should_failslab+0xa8/0x100 [ 384.133175][T12728] kmem_cache_alloc_noprof+0x87/0x6e0 [ 384.133194][T12728] ? skb_clone+0x212/0x3a0 [ 384.133223][T12728] skb_clone+0x212/0x3a0 [ 384.133251][T12728] bpf_clone_redirect+0x16a/0x4b0 [ 384.133281][T12728] ? bpf_test_run+0x1d1/0x830 [ 384.133300][T12728] bpf_prog_170f4aa34f32f3f3+0x5f/0x68 [ 384.133321][T12728] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 384.133344][T12728] ? arch_stack_walk+0xfb/0x150 [ 384.133373][T12728] ? ktime_get+0x45/0x200 [ 384.133397][T12728] ? perf_trace_preemptirq_template+0xab/0x340 [ 384.133417][T12728] ? __local_bh_enable_ip+0x71/0x130 [ 384.133435][T12728] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 384.133457][T12728] ? seqcount_lockdep_reader_access+0xa9/0x100 [ 384.133479][T12728] ? lockdep_hardirqs_on+0x7a/0x110 [ 384.133498][T12728] ? seqcount_lockdep_reader_access+0xea/0x100 [ 384.133525][T12728] ? bpf_test_timer_continue+0x10c/0x320 [ 384.133548][T12728] bpf_test_run+0x354/0x830 [ 384.133589][T12728] ? __pfx_bpf_test_run+0x10/0x10 [ 384.133631][T12728] ? __kasan_krealloc+0xeb/0x110 [ 384.133651][T12728] ? eth_type_trans+0x35e/0x6d0 [ 384.133679][T12728] ? convert___skb_to_skb+0x3d/0x5b0 [ 384.133700][T12728] bpf_prog_test_run_skb+0xd66/0x1d50 [ 384.133731][T12728] ? __fget_files+0x2a/0x420 [ 384.133750][T12728] ? __fget_files+0x3a0/0x420 [ 384.133769][T12728] ? __fget_files+0x2a/0x420 [ 384.133791][T12728] ? __pfx_bpf_prog_test_run_skb+0x10/0x10 [ 384.133807][T12728] bpf_prog_test_run+0x2c7/0x340 [ 384.133826][T12728] __sys_bpf+0x643/0x950 [ 384.133844][T12728] ? __pfx___sys_bpf+0x10/0x10 [ 384.133874][T12728] ? do_syscall_64+0x9f/0xf80 [ 384.133893][T12728] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 384.133913][T12728] ? __pfx_ksys_write+0x10/0x10 [ 384.133937][T12728] __x64_sys_bpf+0x7c/0x90 [ 384.133961][T12728] do_syscall_64+0xe2/0xf80 [ 384.133980][T12728] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 384.133997][T12728] ? trace_irq_disable+0x37/0x100 [ 384.134013][T12728] ? clear_bhb_loop+0x60/0xb0 [ 384.134036][T12728] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 384.134053][T12728] RIP: 0033:0x7ff11d79aeb9 [ 384.134070][T12728] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 384.134085][T12728] RSP: 002b:00007ff11e622028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 384.134104][T12728] RAX: ffffffffffffffda RBX: 00007ff11da16090 RCX: 00007ff11d79aeb9 [ 384.134117][T12728] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 384.134128][T12728] RBP: 00007ff11e622090 R08: 0000000000000000 R09: 0000000000000000 [ 384.134139][T12728] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 384.134150][T12728] R13: 00007ff11da16128 R14: 00007ff11da16090 R15: 00007ffc7108b418 [ 384.134181][T12728] [ 385.311073][T12746] FAULT_INJECTION: forcing a failure. [ 385.311073][T12746] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 385.330890][T12746] CPU: 1 UID: 0 PID: 12746 Comm: syz.8.2012 Not tainted syzkaller #0 PREEMPT(full) [ 385.330913][T12746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 385.330923][T12746] Call Trace: [ 385.330930][T12746] [ 385.330937][T12746] dump_stack_lvl+0xe8/0x150 [ 385.330961][T12746] should_fail_ex+0x412/0x560 [ 385.330983][T12746] _copy_from_user+0x2d/0xb0 [ 385.330998][T12746] ____sys_sendmsg+0x334/0xad0 [ 385.331023][T12746] ? __pfx_____sys_sendmsg+0x10/0x10 [ 385.331048][T12746] ? import_iovec+0x73/0xa0 [ 385.331064][T12746] ___sys_sendmsg+0x2a5/0x360 [ 385.331082][T12746] ? __lock_acquire+0x6b5/0x2cf0 [ 385.331105][T12746] ? __pfx____sys_sendmsg+0x10/0x10 [ 385.331152][T12746] ? __fget_files+0x2a/0x420 [ 385.331170][T12746] ? __fget_files+0x3a0/0x420 [ 385.331193][T12746] __x64_sys_sendmsg+0x1bd/0x2a0 [ 385.331213][T12746] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 385.331247][T12746] ? __pfx_ksys_write+0x10/0x10 [ 385.331269][T12746] do_syscall_64+0xe2/0xf80 [ 385.331284][T12746] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 385.331296][T12746] ? trace_irq_disable+0x37/0x100 [ 385.331309][T12746] ? clear_bhb_loop+0x60/0xb0 [ 385.331326][T12746] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 385.331339][T12746] RIP: 0033:0x7ff65299aeb9 [ 385.331352][T12746] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 385.331363][T12746] RSP: 002b:00007ff65389f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 385.331379][T12746] RAX: ffffffffffffffda RBX: 00007ff652c15fa0 RCX: 00007ff65299aeb9 [ 385.331389][T12746] RDX: 000000000000c800 RSI: 0000200000000900 RDI: 0000000000000003 [ 385.331398][T12746] RBP: 00007ff65389f090 R08: 0000000000000000 R09: 0000000000000000 [ 385.331406][T12746] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 385.331414][T12746] R13: 00007ff652c16038 R14: 00007ff652c15fa0 R15: 00007ffd2a12d6f8 [ 385.331437][T12746] [ 385.830565][T12763] netlink: 368 bytes leftover after parsing attributes in process `syz.5.2016'. [ 385.919386][T12769] netlink: 68 bytes leftover after parsing attributes in process `syz.3.2020'. [ 385.983707][T12767] mac80211_hwsim hwsim20 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 386.041471][T12767] netlink: 'syz.7.2019': attribute type 2 has an invalid length. [ 386.785634][T12801] netlink: 36 bytes leftover after parsing attributes in process `syz.5.2026'. [ 388.370996][T12811] netlink: 200 bytes leftover after parsing attributes in process `syz.8.2027'. [ 388.381549][T12811] netlink: 200 bytes leftover after parsing attributes in process `syz.8.2027'. [ 388.392708][T12819] netlink: 28 bytes leftover after parsing attributes in process `syz.3.2031'. [ 388.447019][T12819] netlink: 28 bytes leftover after parsing attributes in process `syz.3.2031'. [ 388.521021][T12824] netlink: 'syz.7.2034': attribute type 4 has an invalid length. [ 388.547807][T12821] netlink: 368 bytes leftover after parsing attributes in process `syz.8.2033'. [ 388.548851][T12824] netlink: 'syz.7.2034': attribute type 17 has an invalid length. [ 388.625249][T12827] IPv6: Can't replace route, no match found [ 388.697318][T12829] netlink: 'syz.6.2036': attribute type 7 has an invalid length. [ 388.747290][T12835] netlink: 'syz.7.2038': attribute type 10 has an invalid length. [ 388.757329][T12835] netlink: 2 bytes leftover after parsing attributes in process `syz.7.2038'. [ 388.927274][T12840] netlink: 60 bytes leftover after parsing attributes in process `syz.6.2042'. [ 388.944181][T12834] FAULT_INJECTION: forcing a failure. [ 388.944181][T12834] name failslab, interval 1, probability 0, space 0, times 0 [ 388.976269][T12840] netlink: 60 bytes leftover after parsing attributes in process `syz.6.2042'. [ 389.002658][T12834] CPU: 1 UID: 0 PID: 12834 Comm: syz.5.2039 Not tainted syzkaller #0 PREEMPT(full) [ 389.002685][T12834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 389.002697][T12834] Call Trace: [ 389.002705][T12834] [ 389.002713][T12834] dump_stack_lvl+0xe8/0x150 [ 389.002742][T12834] should_fail_ex+0x412/0x560 [ 389.002773][T12834] should_failslab+0xa8/0x100 [ 389.002798][T12834] __kmalloc_cache_noprof+0x83/0x6e0 [ 389.002819][T12834] ? sctp_add_bind_addr+0x8c/0x370 [ 389.002846][T12834] sctp_add_bind_addr+0x8c/0x370 [ 389.002878][T12834] sctp_copy_local_addr_list+0x314/0x4f0 [ 389.002903][T12834] ? sctp_copy_local_addr_list+0xa4/0x4f0 [ 389.002924][T12834] ? __pfx_sctp_copy_local_addr_list+0x10/0x10 [ 389.002949][T12834] ? sctp_v4_is_any+0x35/0x60 [ 389.002968][T12834] ? sctp_copy_one_addr+0x93/0x360 [ 389.002992][T12834] sctp_bind_addr_copy+0xb3/0x3c0 [ 389.003013][T12834] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 389.003042][T12834] sctp_connect_new_asoc+0x2ff/0x6b0 [ 389.003067][T12834] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 389.003091][T12834] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 389.003113][T12834] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 389.003133][T12834] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 389.003157][T12834] ? bpf_lsm_sctp_bind_connect+0x9/0x20 [ 389.003178][T12834] ? security_sctp_bind_connect+0x7e/0x2c0 [ 389.003203][T12834] sctp_sendmsg+0x1528/0x2c10 [ 389.003246][T12834] ? __pfx_sctp_sendmsg+0x10/0x10 [ 389.003266][T12834] ? aa_sk_perm+0x15a/0x960 [ 389.003292][T12834] ? aa_sk_perm+0x82d/0x960 [ 389.003324][T12834] ? __pfx_aa_sk_perm+0x10/0x10 [ 389.003351][T12834] ? sock_rps_record_flow+0x19/0x400 [ 389.003379][T12834] ? inet_sendmsg+0x2f4/0x370 [ 389.003401][T12834] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 389.003426][T12834] ____sys_sendmsg+0x894/0xad0 [ 389.003464][T12834] ? __pfx_____sys_sendmsg+0x10/0x10 [ 389.003500][T12834] ? import_iovec+0x73/0xa0 [ 389.003524][T12834] ___sys_sendmsg+0x2a5/0x360 [ 389.003547][T12834] ? __lock_acquire+0x6b5/0x2cf0 [ 389.003576][T12834] ? __pfx____sys_sendmsg+0x10/0x10 [ 389.003648][T12834] ? __fget_files+0x2a/0x420 [ 389.003668][T12834] ? __fget_files+0x3a0/0x420 [ 389.003703][T12834] __x64_sys_sendmsg+0x1bd/0x2a0 [ 389.003732][T12834] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 389.003769][T12834] ? __pfx_ksys_write+0x10/0x10 [ 389.003803][T12834] do_syscall_64+0xe2/0xf80 [ 389.003823][T12834] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 389.003840][T12834] ? trace_irq_disable+0x37/0x100 [ 389.003866][T12834] ? clear_bhb_loop+0x60/0xb0 [ 389.003890][T12834] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 389.003908][T12834] RIP: 0033:0x7f870819aeb9 [ 389.003924][T12834] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 389.003940][T12834] RSP: 002b:00007f8708fb5028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 389.003959][T12834] RAX: ffffffffffffffda RBX: 00007f8708415fa0 RCX: 00007f870819aeb9 [ 389.003972][T12834] RDX: 0000000000004000 RSI: 0000200000000200 RDI: 0000000000000003 [ 389.003983][T12834] RBP: 00007f8708fb5090 R08: 0000000000000000 R09: 0000000000000000 [ 389.003994][T12834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 389.004004][T12834] R13: 00007f8708416038 R14: 00007f8708415fa0 R15: 00007ffc475c4f88 [ 389.004040][T12834] [ 389.360955][T12846] netlink: 60 bytes leftover after parsing attributes in process `syz.6.2042'. [ 390.160236][T12855] netlink: 'syz.5.2043': attribute type 16 has an invalid length. [ 390.224155][T12855] netlink: 'syz.5.2043': attribute type 17 has an invalid length. [ 392.793339][T12905] netlink: 'syz.7.2056': attribute type 4 has an invalid length. [ 392.801097][T12905] netlink: 'syz.7.2056': attribute type 3 has an invalid length. [ 392.808855][T12905] __nla_validate_parse: 3 callbacks suppressed [ 392.808868][T12905] netlink: 132 bytes leftover after parsing attributes in process `syz.7.2056'. [ 392.825252][T12905] FAULT_INJECTION: forcing a failure. [ 392.825252][T12905] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 392.839847][T12905] CPU: 0 UID: 0 PID: 12905 Comm: syz.7.2056 Not tainted syzkaller #0 PREEMPT(full) [ 392.839871][T12905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 392.839882][T12905] Call Trace: [ 392.839889][T12905] [ 392.839897][T12905] dump_stack_lvl+0xe8/0x150 [ 392.839924][T12905] should_fail_ex+0x412/0x560 [ 392.839954][T12905] _copy_from_user+0x2d/0xb0 [ 392.839973][T12905] kstrtouint_from_user+0xd6/0x180 [ 392.840000][T12905] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 392.840042][T12905] proc_fail_nth_write+0x8e/0x210 [ 392.840061][T12905] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 392.840086][T12905] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 392.840106][T12905] vfs_write+0x29a/0xb90 [ 392.840134][T12905] ? __pfx_vfs_write+0x10/0x10 [ 392.840154][T12905] ? __fget_files+0x2a/0x420 [ 392.840180][T12905] ? __fget_files+0x3a0/0x420 [ 392.840199][T12905] ? __fget_files+0x2a/0x420 [ 392.840230][T12905] ksys_write+0x150/0x270 [ 392.840251][T12905] ? __pfx_ksys_write+0x10/0x10 [ 392.840282][T12905] do_syscall_64+0xe2/0xf80 [ 392.840302][T12905] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 392.840319][T12905] ? trace_irq_disable+0x37/0x100 [ 392.840336][T12905] ? clear_bhb_loop+0x60/0xb0 [ 392.840358][T12905] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 392.840375][T12905] RIP: 0033:0x7fe79775b78e [ 392.840392][T12905] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 392.840407][T12905] RSP: 002b:00007fe7986effe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 392.840434][T12905] RAX: ffffffffffffffda RBX: 00007fe7986f06c0 RCX: 00007fe79775b78e [ 392.840448][T12905] RDX: 0000000000000001 RSI: 00007fe7986f00a0 RDI: 0000000000000007 [ 392.840458][T12905] RBP: 00007fe7986f0090 R08: 0000000000000000 R09: 0000000000000000 [ 392.840470][T12905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 392.840481][T12905] R13: 00007fe797a16128 R14: 00007fe797a16090 R15: 00007ffc18b40048 [ 392.840515][T12905] [ 397.445677][T12958] FAULT_INJECTION: forcing a failure. [ 397.445677][T12958] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 397.459443][T12958] CPU: 1 UID: 0 PID: 12958 Comm: syz.6.2073 Not tainted syzkaller #0 PREEMPT(full) [ 397.459466][T12958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 397.459477][T12958] Call Trace: [ 397.459484][T12958] [ 397.459492][T12958] dump_stack_lvl+0xe8/0x150 [ 397.459521][T12958] should_fail_ex+0x412/0x560 [ 397.459550][T12958] _copy_from_iter+0x1d3/0x1670 [ 397.459582][T12958] ? trace_kmem_cache_alloc+0x1f/0xb0 [ 397.459605][T12958] ? __pfx__copy_from_iter+0x10/0x10 [ 397.459631][T12958] ? __build_skb_around+0x22d/0x3c0 [ 397.459656][T12958] ? __alloc_skb+0x193/0x390 [ 397.459677][T12958] ? netlink_sendmsg+0x650/0xb40 [ 397.459695][T12958] ? skb_put+0x11b/0x210 [ 397.459721][T12958] netlink_sendmsg+0x6c0/0xb40 [ 397.459753][T12958] ? __pfx_netlink_sendmsg+0x10/0x10 [ 397.459777][T12958] ? aa_sock_msg_perm+0xf1/0x1b0 [ 397.459802][T12958] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 397.459826][T12958] ? __pfx_netlink_sendmsg+0x10/0x10 [ 397.459844][T12958] ____sys_sendmsg+0xa68/0xad0 [ 397.459868][T12958] ? __might_fault+0xaf/0x130 [ 397.459893][T12958] ? __pfx_____sys_sendmsg+0x10/0x10 [ 397.459927][T12958] ? import_iovec+0x73/0xa0 [ 397.459950][T12958] ___sys_sendmsg+0x2a5/0x360 [ 397.459972][T12958] ? __lock_acquire+0x6b5/0x2cf0 [ 397.460001][T12958] ? __pfx____sys_sendmsg+0x10/0x10 [ 397.460070][T12958] ? __fget_files+0x2a/0x420 [ 397.460090][T12958] ? __fget_files+0x3a0/0x420 [ 397.460124][T12958] __x64_sys_sendmsg+0x1bd/0x2a0 [ 397.460151][T12958] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 397.460195][T12958] ? __pfx_ksys_write+0x10/0x10 [ 397.460228][T12958] do_syscall_64+0xe2/0xf80 [ 397.460248][T12958] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 397.460264][T12958] ? trace_irq_disable+0x37/0x100 [ 397.460282][T12958] ? clear_bhb_loop+0x60/0xb0 [ 397.460304][T12958] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 397.460321][T12958] RIP: 0033:0x7fd12eb9aeb9 [ 397.460338][T12958] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 397.460352][T12958] RSP: 002b:00007fd12f9dd028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 397.460371][T12958] RAX: ffffffffffffffda RBX: 00007fd12ee15fa0 RCX: 00007fd12eb9aeb9 [ 397.460381][T12958] RDX: 0000000000004000 RSI: 0000200000000480 RDI: 0000000000000003 [ 397.460393][T12958] RBP: 00007fd12f9dd090 R08: 0000000000000000 R09: 0000000000000000 [ 397.460404][T12958] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 397.460414][T12958] R13: 00007fd12ee16038 R14: 00007fd12ee15fa0 R15: 00007ffec21365f8 [ 397.460449][T12958] [ 398.627085][T12991] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2080'. [ 399.101714][T12997] FAULT_INJECTION: forcing a failure. [ 399.101714][T12997] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 399.132369][T12997] CPU: 1 UID: 0 PID: 12997 Comm: syz.7.2082 Not tainted syzkaller #0 PREEMPT(full) [ 399.132395][T12997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 399.132406][T12997] Call Trace: [ 399.132417][T12997] [ 399.132427][T12997] dump_stack_lvl+0xe8/0x150 [ 399.132469][T12997] should_fail_ex+0x412/0x560 [ 399.132524][T12997] _copy_from_user+0x2d/0xb0 [ 399.132554][T12997] ___sys_sendmsg+0x1c6/0x360 [ 399.132582][T12997] ? __lock_acquire+0x6b5/0x2cf0 [ 399.132632][T12997] ? __pfx____sys_sendmsg+0x10/0x10 [ 399.132822][T12997] ? __fget_files+0x2a/0x420 [ 399.132846][T12997] ? __fget_files+0x3a0/0x420 [ 399.132925][T12997] __x64_sys_sendmsg+0x1bd/0x2a0 [ 399.132969][T12997] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 399.133049][T12997] ? __pfx_ksys_write+0x10/0x10 [ 399.133129][T12997] do_syscall_64+0xe2/0xf80 [ 399.133153][T12997] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 399.133169][T12997] ? trace_irq_disable+0x37/0x100 [ 399.133187][T12997] ? clear_bhb_loop+0x60/0xb0 [ 399.133226][T12997] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 399.133245][T12997] RIP: 0033:0x7fe79779aeb9 [ 399.133268][T12997] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 399.133283][T12997] RSP: 002b:00007fe7986f0028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 399.133302][T12997] RAX: ffffffffffffffda RBX: 00007fe797a16090 RCX: 00007fe79779aeb9 [ 399.133315][T12997] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000005 [ 399.133326][T12997] RBP: 00007fe7986f0090 R08: 0000000000000000 R09: 0000000000000000 [ 399.133337][T12997] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 399.133348][T12997] R13: 00007fe797a16128 R14: 00007fe797a16090 R15: 00007ffc18b40048 [ 399.133442][T12997] [ 400.475962][T13024] netlink: 'syz.3.2089': attribute type 12 has an invalid length. [ 400.498795][T13024] netlink: 14585 bytes leftover after parsing attributes in process `syz.3.2089'. [ 400.521543][T13024] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2089'. [ 400.808345][T13035] netlink: 200 bytes leftover after parsing attributes in process `syz.5.2092'. [ 400.818289][T13035] netlink: 200 bytes leftover after parsing attributes in process `syz.5.2092'. [ 400.833956][T13035] netlink: 12 bytes leftover after parsing attributes in process `syz.5.2092'. [ 401.264216][T13049] netlink: 'syz.8.2096': attribute type 21 has an invalid length. [ 401.272096][T13049] IPv6: NLM_F_CREATE should be specified when creating new route [ 401.875163][T13074] netlink: 272 bytes leftover after parsing attributes in process `syz.8.2104'. [ 402.741588][T13093] netlink: 'syz.5.2109': attribute type 10 has an invalid length. [ 402.777737][T13093] netlink: 2 bytes leftover after parsing attributes in process `syz.5.2109'. [ 403.136113][T13105] net_ratelimit: 2 callbacks suppressed [ 403.136149][T13105] openvswitch: netlink: Duplicate or invalid key (type 0). [ 403.154725][T13105] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 403.269933][T13109] netlink: 272 bytes leftover after parsing attributes in process `syz.8.2115'. [ 403.548980][T13131] netlink: 60 bytes leftover after parsing attributes in process `syz.7.2121'. [ 403.731354][T13132] openvswitch: netlink: IP tunnel attribute has 4 unknown bytes. [ 403.775655][T13132] openvswitch: : Dropping previously announced user features [ 404.073906][T13151] __nla_validate_parse: 1 callbacks suppressed [ 404.073925][T13151] netlink: 272 bytes leftover after parsing attributes in process `syz.7.2128'. [ 404.465159][T13167] netlink: 'syz.3.2135': attribute type 16 has an invalid length. [ 404.473299][T13167] netlink: 152 bytes leftover after parsing attributes in process `syz.3.2135'. [ 404.677644][T13182] netlink: 272 bytes leftover after parsing attributes in process `syz.7.2141'. [ 406.371450][T13248] netlink: 368 bytes leftover after parsing attributes in process `syz.5.2162'. [ 407.717366][T13270] netlink: 'syz.5.2169': attribute type 9 has an invalid length. [ 408.112089][T13290] netlink: 368 bytes leftover after parsing attributes in process `syz.8.2177'. [ 409.612800][T13314] netlink: 24 bytes leftover after parsing attributes in process `syz.5.2184'. [ 412.706205][T13327] netlink: 368 bytes leftover after parsing attributes in process `syz.6.2189'. [ 414.934003][T13379] netlink: 368 bytes leftover after parsing attributes in process `syz.8.2204'. [ 415.375034][T13401] FAULT_INJECTION: forcing a failure. [ 415.375034][T13401] name failslab, interval 1, probability 0, space 0, times 0 [ 415.392361][T13401] CPU: 0 UID: 0 PID: 13401 Comm: syz.5.2210 Not tainted syzkaller #0 PREEMPT(full) [ 415.392388][T13401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 415.392400][T13401] Call Trace: [ 415.392408][T13401] [ 415.392417][T13401] dump_stack_lvl+0xe8/0x150 [ 415.392448][T13401] should_fail_ex+0x412/0x560 [ 415.392478][T13401] should_failslab+0xa8/0x100 [ 415.392502][T13401] __kmalloc_noprof+0xde/0x7e0 [ 415.392522][T13401] ? fib6_info_alloc+0x30/0xf0 [ 415.392548][T13401] fib6_info_alloc+0x30/0xf0 [ 415.392569][T13401] ip6_route_info_create+0x142/0x860 [ 415.392592][T13401] ? nla_find+0x138/0x150 [ 415.392624][T13401] inet6_rtm_newroute+0x55b/0x19e0 [ 415.392653][T13401] ? kasan_quarantine_put+0xbb/0x1f0 [ 415.392672][T13401] ? lockdep_hardirqs_on+0x7a/0x110 [ 415.392696][T13401] ? __pfx_inet6_rtm_newroute+0x10/0x10 [ 415.392712][T13401] ? perf_trace_lock+0xf8/0x3f0 [ 415.392729][T13401] ? nlmon_xmit+0xb0/0x100 [ 415.392774][T13401] ? perf_trace_lock+0xf8/0x3f0 [ 415.392832][T13401] ? __pfx_inet6_rtm_newroute+0x10/0x10 [ 415.392851][T13401] rtnetlink_rcv_msg+0x7d5/0xbe0 [ 415.392877][T13401] ? rtnetlink_rcv_msg+0x1b9/0xbe0 [ 415.392897][T13401] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 415.392916][T13401] ? ref_tracker_free+0x693/0x840 [ 415.392938][T13401] ? __copy_skb_header+0xa3/0x4a0 [ 415.392969][T13401] ? __pfx_ref_tracker_free+0x10/0x10 [ 415.392990][T13401] ? __skb_clone+0x63/0x7a0 [ 415.393026][T13401] netlink_rcv_skb+0x232/0x4b0 [ 415.393055][T13401] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 415.393079][T13401] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 415.393114][T13401] ? netlink_deliver_tap+0x2e/0x1b0 [ 415.393144][T13401] netlink_unicast+0x80f/0x9b0 [ 415.393173][T13401] ? __pfx_netlink_unicast+0x10/0x10 [ 415.393190][T13401] ? __alloc_skb+0x193/0x390 [ 415.393212][T13401] ? netlink_sendmsg+0x650/0xb40 [ 415.393229][T13401] ? skb_put+0x11b/0x210 [ 415.393256][T13401] netlink_sendmsg+0x813/0xb40 [ 415.393288][T13401] ? __pfx_netlink_sendmsg+0x10/0x10 [ 415.393313][T13401] ? aa_sock_msg_perm+0xf1/0x1b0 [ 415.393338][T13401] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 415.393361][T13401] ? __pfx_netlink_sendmsg+0x10/0x10 [ 415.393380][T13401] ____sys_sendmsg+0xa68/0xad0 [ 415.393404][T13401] ? __pfx_perf_trace_lock+0x10/0x10 [ 415.393429][T13401] ? __pfx_____sys_sendmsg+0x10/0x10 [ 415.393465][T13401] ? import_iovec+0x73/0xa0 [ 415.393488][T13401] ___sys_sendmsg+0x2a5/0x360 [ 415.393511][T13401] ? __lock_acquire+0x6b5/0x2cf0 [ 415.393540][T13401] ? __pfx____sys_sendmsg+0x10/0x10 [ 415.393591][T13401] ? __fget_files+0x2a/0x420 [ 415.393628][T13401] ? __fget_files+0x2a/0x420 [ 415.393648][T13401] ? __fget_files+0x3a0/0x420 [ 415.393683][T13401] __x64_sys_sendmsg+0x1bd/0x2a0 [ 415.393710][T13401] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 415.393747][T13401] ? __pfx_ksys_write+0x10/0x10 [ 415.393781][T13401] do_syscall_64+0xe2/0xf80 [ 415.393801][T13401] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 415.393817][T13401] ? trace_irq_disable+0x37/0x100 [ 415.393834][T13401] ? clear_bhb_loop+0x60/0xb0 [ 415.393857][T13401] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 415.393885][T13401] RIP: 0033:0x7f870819aeb9 [ 415.393903][T13401] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 415.393918][T13401] RSP: 002b:00007f8708f94028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 415.393937][T13401] RAX: ffffffffffffffda RBX: 00007f8708416090 RCX: 00007f870819aeb9 [ 415.393950][T13401] RDX: 000000000000c8d2 RSI: 0000200000000000 RDI: 0000000000000005 [ 415.393962][T13401] RBP: 00007f8708f94090 R08: 0000000000000000 R09: 0000000000000000 [ 415.393972][T13401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 415.393983][T13401] R13: 00007f8708416128 R14: 00007f8708416090 R15: 00007ffc475c4f88 [ 415.394018][T13401] [ 416.306046][T13421] netlink: 368 bytes leftover after parsing attributes in process `syz.6.2217'. [ 416.558004][T13428] sysfs: Unknown parameter 'obj_type' [ 416.843673][T13432] openvswitch: netlink: IP tunnel attribute has 4 unknown bytes. [ 416.980623][T13431] openvswitch: : Dropping previously announced user features [ 418.407777][T13449] netlink: 'syz.7.2226': attribute type 27 has an invalid length. [ 418.487123][T13453] netlink: 368 bytes leftover after parsing attributes in process `syz.3.2228'. [ 418.913082][T13466] netlink: 'syz.7.2232': attribute type 16 has an invalid length. [ 418.921302][T13466] netlink: 'syz.7.2232': attribute type 17 has an invalid length. [ 419.049455][T13467] netlink: 4 bytes leftover after parsing attributes in process `syz.7.2232'. [ 419.442476][T13460] ------------[ cut here ]------------ [ 419.448821][T13460] refcount_t: addition on 0; use-after-free. [ 419.460662][T13460] WARNING: lib/refcount.c:25 at refcount_warn_saturate+0x9f/0x110, CPU#1: syz.8.2230/13460 [ 419.465631][T13469] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2233'. [ 419.526877][T13460] Modules linked in: [ 419.574537][T13460] CPU: 1 UID: 0 PID: 13460 Comm: syz.8.2230 Not tainted syzkaller #0 PREEMPT(full) [ 419.584014][T13460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 419.592784][T13469] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2233'. [ 419.594131][T13460] RIP: 0010:refcount_warn_saturate+0x9f/0x110 [ 419.594164][T13460] Code: eb 66 85 db 74 3e 83 fb 01 75 4c e8 2b 5b 23 fd 48 8d 3d 04 7d 58 0b 67 48 0f b9 3a eb 4a e8 18 5b 23 fd 48 8d 3d 01 7d 58 0b <67> 48 0f b9 3a eb 37 e8 05 5b 23 fd 48 8d 3d fe 7c 58 0b 67 48 0f [ 419.630279][T13460] RSP: 0018:ffffc900046ef380 EFLAGS: 00010283 [ 419.636642][T13460] RAX: ffffffff84a11b58 RBX: 0000000000000002 RCX: 0000000000080000 [ 419.644663][T13460] RDX: ffffc900200fa000 RSI: 000000000001a372 RDI: ffffffff8ff99860 [ 419.653140][T13460] RBP: 0000000000000000 R08: ffff888079a40000 R09: 0000000000000005 [ 419.661508][T13460] R10: 0000000000000004 R11: 0000000000000002 R12: ffff88807c9d8854 [ 419.669607][T13460] R13: 1ffff9200094ca0c R14: ffff88807afb0a58 R15: ffff88807afb0a00 [ 419.677641][T13460] FS: 00007ff65389f6c0(0000) GS:ffff8881257f8000(0000) knlGS:0000000000000000 [ 419.686926][T13460] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 419.693580][T13460] CR2: 00007ff6529e8600 CR3: 000000003201c000 CR4: 00000000003526f0 [ 419.701576][T13460] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 419.710034][T13460] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 419.718322][T13460] Call Trace: [ 419.721622][T13460] [ 419.724614][T13460] __add_used_btf+0x152/0x2e0 [ 419.729320][T13460] check_pseudo_btf_id+0x764/0xbb0 [ 419.734533][T13460] ? lockdep_hardirqs_on+0x7a/0x110 [ 419.739766][T13460] ? __pfx_check_pseudo_btf_id+0x10/0x10 [ 419.745775][T13460] ? bpf_prog_calc_tag+0x315/0x370 [ 419.750926][T13460] resolve_pseudo_ldimm64+0x3f4/0xc90 [ 419.756467][T13460] ? __pfx_resolve_pseudo_ldimm64+0x10/0x10 [ 419.762454][T13460] bpf_check+0x1d82/0x1ce00 [ 419.763844][T13469] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2233'. [ 419.766975][T13460] ? tracing_gen_ctx_irq_test+0xc6/0x160 [ 419.767015][T13460] ? perf_tp_event+0x6e9/0x29b0 [ 419.786862][T13460] ? __pfx_perf_tp_event+0x10/0x10 [ 419.792225][T13460] ? __pfx_css_rstat_updated+0x10/0x10 [ 419.797770][T13460] ? perf_trace_run_bpf_submit+0xee/0x170 [ 419.803648][T13460] ? __pfx_bpf_check+0x10/0x10 [ 419.808443][T13460] ? perf_trace_preemptirq_template+0xab/0x340 [ 419.815177][T13460] ? seqcount_lockdep_reader_access+0xa9/0x100 [ 419.821365][T13460] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 419.828039][T13460] ? ktime_get_with_offset+0x93/0x2a0 [ 419.833486][T13460] ? __asan_memset+0x22/0x50 [ 419.838115][T13460] ? bpf_lsm_bpf_prog_load+0x9/0x20 [ 419.843703][T13460] ? security_bpf_prog_load+0x125/0x3c0 [ 419.849301][T13460] bpf_prog_load+0x1484/0x1ae0 [ 419.854153][T13460] ? __pfx_bpf_prog_load+0x10/0x10 [ 419.859289][T13460] ? __might_fault+0xaf/0x130 [ 419.864193][T13460] ? bpf_lsm_bpf+0x9/0x20 [ 419.868548][T13460] ? security_bpf+0x7e/0x2d0 [ 419.873486][T13460] __sys_bpf+0x618/0x950 [ 419.877929][T13460] ? __pfx___sys_bpf+0x10/0x10 [ 419.882776][T13460] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 419.889405][T13460] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 419.896083][T13460] ? __pfx_sched_clock_cpu+0x10/0x10 [ 419.901396][T13460] __x64_sys_bpf+0x7c/0x90 [ 419.906314][T13460] do_syscall_64+0xe2/0xf80 [ 419.910844][T13460] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 419.917224][T13460] ? clear_bhb_loop+0x60/0xb0 [ 419.921931][T13460] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 419.927926][T13460] RIP: 0033:0x7ff65299aeb9 [ 419.932638][T13460] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 419.952341][T13460] RSP: 002b:00007ff65389f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 419.960770][T13460] RAX: ffffffffffffffda RBX: 00007ff652c15fa0 RCX: 00007ff65299aeb9 [ 419.969071][T13460] RDX: 0000000000000094 RSI: 0000200000000180 RDI: 0000000000000005 [ 419.977137][T13460] RBP: 00007ff652a08c1f R08: 0000000000000000 R09: 0000000000000000 [ 419.985181][T13460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 419.993495][T13460] R13: 00007ff652c16038 R14: 00007ff652c15fa0 R15: 00007ffd2a12d6f8 [ 419.995937][T13473] netlink: 48 bytes leftover after parsing attributes in process `syz.3.2233'. [ 420.001582][T13460] [ 420.013730][T13460] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 420.021016][T13460] CPU: 1 UID: 0 PID: 13460 Comm: syz.8.2230 Not tainted syzkaller #0 PREEMPT(full) [ 420.030390][T13460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 420.040875][T13460] Call Trace: [ 420.044256][T13460] [ 420.047204][T13460] vpanic+0x1e0/0x670 [ 420.051196][T13460] panic+0xc5/0xd0 [ 420.055000][T13460] ? __pfx_panic+0x10/0x10 [ 420.059860][T13460] __warn+0x315/0x4a0 [ 420.063836][T13460] ? refcount_warn_saturate+0x9f/0x110 [ 420.069286][T13460] ? refcount_warn_saturate+0x9f/0x110 [ 420.074814][T13460] __report_bug+0x29a/0x540 [ 420.079402][T13460] ? refcount_warn_saturate+0x9f/0x110 [ 420.084848][T13460] ? __pfx___report_bug+0x10/0x10 [ 420.089877][T13460] report_bug_entry+0x19a/0x290 [ 420.094733][T13460] ? refcount_warn_saturate+0x9f/0x110 [ 420.100204][T13460] ? refcount_warn_saturate+0xa4/0x110 [ 420.105668][T13460] handle_bug+0xca/0x200 [ 420.110013][T13460] exc_invalid_op+0x1a/0x50 [ 420.114536][T13460] asm_exc_invalid_op+0x1a/0x20 [ 420.119603][T13460] RIP: 0010:refcount_warn_saturate+0x9f/0x110 [ 420.125725][T13460] Code: eb 66 85 db 74 3e 83 fb 01 75 4c e8 2b 5b 23 fd 48 8d 3d 04 7d 58 0b 67 48 0f b9 3a eb 4a e8 18 5b 23 fd 48 8d 3d 01 7d 58 0b <67> 48 0f b9 3a eb 37 e8 05 5b 23 fd 48 8d 3d fe 7c 58 0b 67 48 0f [ 420.145343][T13460] RSP: 0018:ffffc900046ef380 EFLAGS: 00010283 [ 420.151516][T13460] RAX: ffffffff84a11b58 RBX: 0000000000000002 RCX: 0000000000080000 [ 420.159501][T13460] RDX: ffffc900200fa000 RSI: 000000000001a372 RDI: ffffffff8ff99860 [ 420.167515][T13460] RBP: 0000000000000000 R08: ffff888079a40000 R09: 0000000000000005 [ 420.175502][T13460] R10: 0000000000000004 R11: 0000000000000002 R12: ffff88807c9d8854 [ 420.183479][T13460] R13: 1ffff9200094ca0c R14: ffff88807afb0a58 R15: ffff88807afb0a00 [ 420.191477][T13460] ? refcount_warn_saturate+0x98/0x110 [ 420.197072][T13460] __add_used_btf+0x152/0x2e0 [ 420.201795][T13460] check_pseudo_btf_id+0x764/0xbb0 [ 420.207051][T13460] ? lockdep_hardirqs_on+0x7a/0x110 [ 420.212287][T13460] ? __pfx_check_pseudo_btf_id+0x10/0x10 [ 420.218045][T13460] ? bpf_prog_calc_tag+0x315/0x370 [ 420.223178][T13460] resolve_pseudo_ldimm64+0x3f4/0xc90 [ 420.228568][T13460] ? __pfx_resolve_pseudo_ldimm64+0x10/0x10 [ 420.234501][T13460] bpf_check+0x1d82/0x1ce00 [ 420.239037][T13460] ? tracing_gen_ctx_irq_test+0xc6/0x160 [ 420.244778][T13460] ? perf_tp_event+0x6e9/0x29b0 [ 420.249636][T13460] ? __pfx_perf_tp_event+0x10/0x10 [ 420.254763][T13460] ? __pfx_css_rstat_updated+0x10/0x10 [ 420.260235][T13460] ? perf_trace_run_bpf_submit+0xee/0x170 [ 420.266120][T13460] ? __pfx_bpf_check+0x10/0x10 [ 420.270876][T13460] ? perf_trace_preemptirq_template+0xab/0x340 [ 420.277023][T13460] ? seqcount_lockdep_reader_access+0xa9/0x100 [ 420.283173][T13460] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 420.289760][T13460] ? ktime_get_with_offset+0x93/0x2a0 [ 420.295136][T13460] ? __asan_memset+0x22/0x50 [ 420.299728][T13460] ? bpf_lsm_bpf_prog_load+0x9/0x20 [ 420.304928][T13460] ? security_bpf_prog_load+0x125/0x3c0 [ 420.310493][T13460] bpf_prog_load+0x1484/0x1ae0 [ 420.315362][T13460] ? __pfx_bpf_prog_load+0x10/0x10 [ 420.320487][T13460] ? __might_fault+0xaf/0x130 [ 420.325185][T13460] ? bpf_lsm_bpf+0x9/0x20 [ 420.329516][T13460] ? security_bpf+0x7e/0x2d0 [ 420.334112][T13460] __sys_bpf+0x618/0x950 [ 420.338353][T13460] ? __pfx___sys_bpf+0x10/0x10 [ 420.343198][T13460] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 420.349798][T13460] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 420.356438][T13460] ? __pfx_sched_clock_cpu+0x10/0x10 [ 420.361759][T13460] __x64_sys_bpf+0x7c/0x90 [ 420.366183][T13460] do_syscall_64+0xe2/0xf80 [ 420.370781][T13460] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 420.376846][T13460] ? clear_bhb_loop+0x60/0xb0 [ 420.381522][T13460] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 420.387417][T13460] RIP: 0033:0x7ff65299aeb9 [ 420.391962][T13460] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 420.411577][T13460] RSP: 002b:00007ff65389f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 420.419998][T13460] RAX: ffffffffffffffda RBX: 00007ff652c15fa0 RCX: 00007ff65299aeb9 [ 420.428050][T13460] RDX: 0000000000000094 RSI: 0000200000000180 RDI: 0000000000000005 [ 420.436101][T13460] RBP: 00007ff652a08c1f R08: 0000000000000000 R09: 0000000000000000 [ 420.444080][T13460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 420.452064][T13460] R13: 00007ff652c16038 R14: 00007ff652c15fa0 R15: 00007ffd2a12d6f8 [ 420.460064][T13460] [ 420.463602][T13460] Kernel Offset: disabled [ 420.467919][T13460] Rebooting in 86400 seconds..