last executing test programs: 15m19.442658191s ago: executing program 2 (id=613): r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="5c00000014006b0300000000006c1d0010047e0c8131a6080c000af32c6e020075f800250002000f00e5aa000017d34460bc24eab556a705251e6182949a36c2d13b48dfffa600000000ecb8f6ec63c9f4d4938037e786a6d1bdd700", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 15m19.082785876s ago: executing program 2 (id=615): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x828, 0x7fff, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd634936f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x82, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000002ffffff81"], 0x50) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x12) 15m17.465785357s ago: executing program 2 (id=621): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x6c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @payload={{0xc}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_LEN={0x8}, @NFTA_PAYLOAD_SREG={0x8, 0x5, 0x1, 0x0, 0x4}, @NFTA_PAYLOAD_OFFSET={0x8}, @NFTA_PAYLOAD_BASE={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_USERDATA={0x6, 0x7, 0x1, 0x0, '\x00I'}]}], {0x14}}, 0x94}}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x7, 0xffffffffffffffff}, 0xa38, 0x1, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018de0600000000000c0000000c000000020000000000000000000002020000000000"], 0x0, 0x26}, 0x28) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = getpid() r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0xfcc9}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x8801}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8801}, 0x0) r5 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r5, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, &(0x7f0000001140)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac141411e0000001000000002800000000000000000000000700000094040007441405"], 0x48}, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x40001, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3428, 0xca, 0x0, 0x4, 0x8}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0xa, 0x2, 0x0) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = socket$caif_stream(0x25, 0x1, 0x0) close(r8) setsockopt$sock_attach_bpf(r6, 0x29, 0x48, &(0x7f0000000100)=r7, 0x120) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) 15m15.452427092s ago: executing program 2 (id=624): r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1f, 0xc, &(0x7f00000008c0)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1224, 0x0, 0x0, 0x5, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32, @ANYBLOB="0000000002000000b70500000800000085000000aa00000095"], &(0x7f0000000300)='GPL\x00', 0x2, 0xb, &(0x7f0000001e00)=""/4086}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@fwd={0x2}, @typedef={0x1}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x5, [{0x0, 0x2}]}]}, {0x0, [0x5f, 0x4f]}}, &(0x7f0000000500)=""/4096, 0x4c, 0x1000, 0xa}, 0x28) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="38010000d1000000000000000000000001fc0100000000d9f653d5c200000000000000d39d548e9d9088000000003a00000000145e8c3a92e0302c633a40fb3141f7f8bbd730f3132c31d1a6a307157203a07f5cadba7a7a992cce4988f1879a8047790bc0f1d549dfcb5dea0e0d1a", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa000000000000000000000000000004d46c0000007f000001000000000000000000000000000000000000000092010000000000000600000000000000ffff0000000000001c250800000000000200000000000000f8ffffffffffffff0000000000000000ffffffffffffffff00000000000000001f00000000000000feffffffffffffff02000000fcffffff400000002abd700004350000020001002000000000000000480003006465666c61746500"/240], 0x138}, 0x1, 0x0, 0x0, 0x8801}, 0x0) sendmsg$nl_xfrm(r3, 0x0, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, 0x0, 0x0) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000840)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd0, 0xd0, 0x5, [@int={0xd, 0x0, 0x0, 0x1, 0x0, 0x16, 0x0, 0x11, 0x8}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x9, 0x4}, {0x3, 0x1}, {0xd, 0x4}, {0x2, 0x3}, {0x2, 0x1}, {0x3, 0x5}]}, @ptr={0x5, 0x0, 0x0, 0x2, 0x5}, @volatile={0xe, 0x0, 0x0, 0x9, 0x4}, @struct={0x8, 0x8, 0x0, 0x4, 0x1, 0x7, [{0xf, 0x3, 0x8}, {0xf, 0x3, 0x1faedf51}, {0x10, 0x5, 0xb}, {0x5, 0x5, 0x7fffffff}, {0xb, 0x4, 0x8}, {0xb, 0x5, 0x3}, {0x2, 0x0, 0x7}, {0x5, 0x2, 0x7}]}]}, {0x0, [0x0, 0x2e, 0x5f]}}, &(0x7f0000000940)=""/174, 0xed, 0xae, 0x1, 0x5, 0x10000}, 0x28) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000bc0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x5, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000090000000000000009003c74180100002020642500000000002020207b1af8ff00000000bfa1000000000000070100007906f313b702000008000000b70300000300000085000000060000009500feff00000000"], &(0x7f0000000380)='GPL\x00', 0x7911, 0xba, &(0x7f00000004c0)=""/186, 0x41000, 0xe, '\x00', 0x0, @fallback=0x29, r6, 0x8, &(0x7f0000000580)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x1, 0x10, 0xfff, 0x6}, 0x10, 0xffffffffffffffff, r2, 0x3, &(0x7f0000000a00)=[r7, 0x1], &(0x7f0000000c40)=[{0x1, 0x5, 0xa, 0x7}, {0x0, 0x3, 0xe, 0x5}, {0x4, 0x4, 0x5, 0x6}]}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1e000000000000000100000007"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000ec0)={r9, 0x58, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x6, '\x00', 0x0, 0x0, 0x3, 0x0, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x10, &(0x7f0000000180)=@framed={{0x18, 0x8, 0x0, 0x0, 0x20}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r11}, {}, {}, {0x7, 0x0, 0xb, 0x9}}, @printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x76}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe6a, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000010c0)={{r9, 0xffffffffffffffff}, &(0x7f0000001040), &(0x7f0000001080)=r8}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x11, 0x7, &(0x7f0000000d40)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, r7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @exit], &(0x7f0000000d80)='GPL\x00', 0x74bb1475, 0x41, &(0x7f0000000dc0)=""/65, 0x41000, 0x0, '\x00', r10, 0x0, r4, 0x8, &(0x7f0000000f00)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000f40)={0x3, 0x6, 0xc, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001180)=[r11, r12, 0xffffffffffffffff, 0xffffffffffffffff, r7], &(0x7f00000011c0)=[{0x0, 0x1, 0x5, 0x6}], 0x10, 0x5}, 0x94) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x7, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r13, 0x2000000, 0xe, 0xfc9a, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) socket$nl_netfilter(0x10, 0x3, 0xc) r14 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r14, &(0x7f0000000600)={&(0x7f0000000040)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000080)='U', 0x1}], 0x1}, 0x0) 15m15.296740654s ago: executing program 3 (id=626): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000480)}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000006c0)=""/162, 0xa2}, {&(0x7f0000003940)=""/4041, 0xfc9}, {&(0x7f0000001ec0)=""/4123, 0x101b}, {&(0x7f0000000940)=""/230, 0xe6}, {&(0x7f0000000140)=""/160, 0xa0}], 0x5}, 0x0) 15m14.282817601s ago: executing program 2 (id=628): r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x38, 0x1403, 0x1, 0x70bd2d, 0x25dffbfb, "", [{{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'team_slave_0\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000840}, 0x4000) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)={0x34, 0x40, 0x1, 0x7fffc, 0x4, {0x1}, [@nested={0x4, 0x48}, @nested={0x10, 0x1, 0x0, 0x1, [@nested={0xc, 0x10, 0x0, 0x1, [@nested={0x4, 0xb}, @nested={0x4, 0x7}]}]}, @typed={0xc, 0x2, 0x0, 0x0, @u64}]}, 0x34}, 0x1, 0x0, 0x0, 0x400c801}, 0x4008094) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f0300", 0x4}], 0x1}, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32410, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xe, 0x522}, 0x104141, 0x4, 0x0, 0x7, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1fffffffff}, 0x0, 0x1, 0xffffffffffffffff, 0x3) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) close(0x3) r5 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000003c0)=""/156, 0x9c}, {&(0x7f0000002f00)=""/4055, 0xfd7}, {&(0x7f0000001ec0)=""/4115, 0x1013}, {&(0x7f0000000b40)=""/208, 0xd0}, {&(0x7f0000000a40)=""/249, 0xf9}], 0x5}, 0x40012122) 15m14.113861395s ago: executing program 3 (id=629): r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xfeffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x1c, 0xe, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x10, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000140)=0xec8) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xf, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r7 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r6) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffe, 0x0, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x9cdc2384056b48b8) socket$kcm(0xa, 0x5, 0x0) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, {{}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3, 0x9, 0x0, 0x1, 0x4000}}, [@snprintf={{0x5, 0x0, 0x7, 0x9, 0x0, 0x2, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9, 0xfe00}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x0, 0x5}, {0x3, 0x0, 0x6, 0xa, 0x9, 0xfe04, 0xf1}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x9, 0x2, 0x0, r8}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r5, &(0x7f0000000b80)="b1"}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001000)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x6, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5}, 0x10, 0xffffffffffffffff}, 0x94) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r10, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f0000000800)=ANY=[@ANYBLOB="fc000000190001000000000000000000e0000002000000000000000000000000ac1414aa00000000000000000000000000000000000000000a00000000000000ab9f7d0c3f2b418ee1aaade65745931ed60786e0e316233e9e3197238a854eb80543741666722081d601e33c81d925c8bf7f636d25055c3665b3b17aed57334a1280b8fe03548acdea3b870710c59545a00571914bcd2f7994d5da8f2cd2dbb278f62820fe15dd95c91e337775de7bd18a4fc803", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000a900000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000000000000000000000000000000a000000000000000000000080400002000000000000080000000000000000000100000000000044000500ac1414aa000000000000000000000000000000003c0000000000000000000000000000000000ffffac14141502000000040300"/180], 0xfc}}, 0x0) r11 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r11, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000005c0)=ANY=[], 0x5c}, 0x1, 0x0, 0x0, 0x40180}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r9, 0x1f2f, 0xf, 0x3253, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r0, r3, 0x4, r4}, 0x10) 15m13.87221185s ago: executing program 4 (id=632): sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x3, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="0000000000000000000051229dc9", 0x0, 0x977, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x7b}]}, 0x0}, 0x94) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000000000000000000400000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x13bb711e) 15m6.723751799s ago: executing program 4 (id=634): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x6c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @payload={{0xc}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_LEN={0x8}, @NFTA_PAYLOAD_SREG={0x8, 0x5, 0x1, 0x0, 0x4}, @NFTA_PAYLOAD_OFFSET={0x8}, @NFTA_PAYLOAD_BASE={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_USERDATA={0x6, 0x7, 0x1, 0x0, '\x00I'}]}], {0x14}}, 0x94}}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x7, 0xffffffffffffffff}, 0xa38, 0x1, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018de0600000000000c0000000c000000020000000000000000000002020000000000"], 0x0, 0x26}, 0x28) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = getpid() r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0xfcc9}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x8801}, 0x0) sendmsg$nl_xfrm(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8801}, 0x0) r6 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r6, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, &(0x7f0000001140)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac141411e0000001000000002800000000000000000000000700000094040007441405"], 0x48}, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x40001, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3428, 0xca, 0x0, 0x4, 0x8}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0xa, 0x2, 0x0) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = socket$caif_stream(0x25, 0x1, 0x0) close(r9) setsockopt$sock_attach_bpf(r7, 0x29, 0x48, &(0x7f0000000100)=r8, 0x120) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) 15m6.140343005s ago: executing program 3 (id=635): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1, 0x0, 0x1200}, 0x3) 15m5.90581578s ago: executing program 4 (id=638): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x94) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b9000000190001000000230001000000fe880000000000000000000000000101ac1414bb00000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000200000000000000000000000000000000000000100000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000"], 0xc8}, 0x1, 0x0, 0x0, 0x20004801}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xa}, 0x0, 0x0, 0x0, 0x4, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000900000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ff0f0000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000500008500000017000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x2b000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (fail_nth: 3) 15m5.767192587s ago: executing program 3 (id=639): r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1f, 0xc, &(0x7f00000008c0)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1224, 0x0, 0x0, 0x5, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32, @ANYBLOB="0000000002000000b70500000800000085000000aa00000095"], &(0x7f0000000300)='GPL\x00', 0x2, 0xb, &(0x7f0000001e00)=""/4086}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@fwd={0x2}, @typedef={0x1}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x5, [{0x0, 0x2}]}]}, {0x0, [0x5f, 0x4f]}}, &(0x7f0000000500)=""/4096, 0x4c, 0x1000, 0xa}, 0x28) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="38010000d1000000000000000000000001fc0100000000d9f653d5c200000000000000d39d548e9d9088000000003a00000000145e8c3a92e0302c633a40fb3141f7f8bbd730f3132c31d1a6a307157203a07f5cadba7a7a992cce4988f1879a8047790bc0f1d549dfcb5dea0e0d1a", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa000000000000000000000000000004d46c0000007f000001000000000000000000000000000000000000000092010000000000000600000000000000ffff0000000000001c250800000000000200000000000000f8ffffffffffffff0000000000000000ffffffffffffffff00000000000000001f00000000000000feffffffffffffff02000000fcffffff400000002abd700004350000020001002000000000000000480003006465666c61746500"/240], 0x138}, 0x1, 0x0, 0x0, 0x8801}, 0x0) sendmsg$nl_xfrm(r3, 0x0, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, 0x0, 0x0) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000840)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd0, 0xd0, 0x5, [@int={0xd, 0x0, 0x0, 0x1, 0x0, 0x16, 0x0, 0x11, 0x8}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x9, 0x4}, {0x3, 0x1}, {0xd, 0x4}, {0x2, 0x3}, {0x2, 0x1}, {0x3, 0x5}]}, @ptr={0x5, 0x0, 0x0, 0x2, 0x5}, @volatile={0xe, 0x0, 0x0, 0x9, 0x4}, @struct={0x8, 0x8, 0x0, 0x4, 0x1, 0x7, [{0xf, 0x3, 0x8}, {0xf, 0x3, 0x1faedf51}, {0x10, 0x5, 0xb}, {0x5, 0x5, 0x7fffffff}, {0xb, 0x4, 0x8}, {0xb, 0x5, 0x3}, {0x2, 0x0, 0x7}, {0x5, 0x2, 0x7}]}]}, {0x0, [0x0, 0x2e, 0x5f]}}, &(0x7f0000000940)=""/174, 0xed, 0xae, 0x1, 0x5, 0x10000}, 0x28) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000bc0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x5, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000090000000000000009003c74180100002020642500000000002020207b1af8ff00000000bfa1000000000000070100007906f313b702000008000000b70300000300000085000000060000009500feff00000000"], &(0x7f0000000380)='GPL\x00', 0x7911, 0xba, &(0x7f00000004c0)=""/186, 0x41000, 0xe, '\x00', 0x0, @fallback=0x29, r6, 0x8, &(0x7f0000000580)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x1, 0x10, 0xfff, 0x6}, 0x10, 0xffffffffffffffff, r2, 0x3, &(0x7f0000000a00)=[r7, 0x1], &(0x7f0000000c40)=[{0x1, 0x5, 0xa, 0x7}, {0x0, 0x3, 0xe, 0x5}, {0x4, 0x4, 0x5, 0x6}]}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1e000000000000000100000007"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000ec0)={r9, 0x58, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x6, '\x00', 0x0, 0x0, 0x3, 0x0, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x10, &(0x7f0000000180)=@framed={{0x18, 0x8, 0x0, 0x0, 0x20}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r11}, {}, {}, {0x7, 0x0, 0xb, 0x9}}, @printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x76}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe6a, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000010c0)={{r9, 0xffffffffffffffff}, &(0x7f0000001040), &(0x7f0000001080)=r8}, 0x20) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001140)=@o_path={&(0x7f0000001100)='./file0\x00', 0x0, 0x8, r6}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x11, 0x7, &(0x7f0000000d40)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, r7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @exit], &(0x7f0000000d80)='GPL\x00', 0x74bb1475, 0x41, &(0x7f0000000dc0)=""/65, 0x41000, 0x0, '\x00', r10, 0x0, r4, 0x8, &(0x7f0000000f00)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000f40)={0x3, 0x6, 0xc, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001180)=[r11, r12, 0xffffffffffffffff, r13, r7], &(0x7f00000011c0)=[{0x0, 0x1, 0x5, 0x6}], 0x10, 0x5}, 0x94) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x7, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r14, 0x2000000, 0xe, 0xfc9a, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000040)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000080)='U', 0x1}], 0x1}, 0x0) 15m5.086536394s ago: executing program 4 (id=641): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x8, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x300, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 15m1.775394624s ago: executing program 4 (id=644): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x8, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x66, 0x0, 0x2, 0x0, 0x0, 0x82240, 0x9c947037d6280bed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x9, 0x8, 0x43fe, 0x4, 0x0, 0x0, 0x7, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r1 = socket$qrtr(0x2a, 0x2, 0x0) sendmsg$qrtr(r1, &(0x7f0000000380)={&(0x7f0000000040)={0x2a, 0xffffffffffffffff, 0x7fff}, 0xc, &(0x7f0000000100)=[{&(0x7f0000000080)="a746a80933c51cff22a9a92b7e1b2f39a9593eb381d2a99a8abe2d3a8b5bdd080c9a8dabbe14023f4daaa5d01ea5e7f4cfa8ab7dd58037b0bf20cd64d0a9237522ec59a07ed5502805de6d8dd948f5db1ff4bd3e02fe374ef6f4cc3d73aa9279e001142b25a76b9e", 0x68}], 0x1, &(0x7f0000000300)=[{0x80, 0x112, 0x8, "60c9851b6fa66499bceaee903072d6b9c451e583a9a3349a404e20422973652c68e8083db8a9a0bb3235a6dacbe0cd41587ba028f9a6c843b6b7b624f10361632b9ca564dcdcc42f1636630506ba70ec6c21e89743f0f48dc4d1fc34672b00d48d6bc15a401bbe57725a"}], 0x80, 0xc890}, 0x38) 15m1.742889377s ago: executing program 2 (id=645): r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1f, 0xc, &(0x7f00000008c0)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1224, 0x0, 0x0, 0x5, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32, @ANYBLOB="0000000002000000b70500000800000085000000aa00000095"], &(0x7f0000000300)='GPL\x00', 0x2, 0xb, &(0x7f0000001e00)=""/4086}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@fwd={0x2}, @typedef={0x1}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x5, [{0x0, 0x2}]}]}, {0x0, [0x5f, 0x4f]}}, &(0x7f0000000500)=""/4096, 0x4c, 0x1000, 0xa}, 0x28) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="38010000d1000000000000000000000001fc0100000000d9f653d5c200000000000000d39d548e9d9088000000003a00000000145e8c3a92e0302c633a40fb3141f7f8bbd730f3132c31d1a6a307157203a07f5cadba7a7a992cce4988f1879a8047790bc0f1d549dfcb5dea0e0d1a", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa000000000000000000000000000004d46c0000007f000001000000000000000000000000000000000000000092010000000000000600000000000000ffff0000000000001c250800000000000200000000000000f8ffffffffffffff0000000000000000ffffffffffffffff00000000000000001f00000000000000feffffffffffffff02000000fcffffff400000002abd700004350000020001002000000000000000480003006465666c61746500"/240], 0x138}, 0x1, 0x0, 0x0, 0x8801}, 0x0) sendmsg$nl_xfrm(r3, 0x0, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, 0x0, 0x0) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000840)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd0, 0xd0, 0x5, [@int={0xd, 0x0, 0x0, 0x1, 0x0, 0x16, 0x0, 0x11, 0x8}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x9, 0x4}, {0x3, 0x1}, {0xd, 0x4}, {0x2, 0x3}, {0x2, 0x1}, {0x3, 0x5}]}, @ptr={0x5, 0x0, 0x0, 0x2, 0x5}, @volatile={0xe, 0x0, 0x0, 0x9, 0x4}, @struct={0x8, 0x8, 0x0, 0x4, 0x1, 0x7, [{0xf, 0x3, 0x8}, {0xf, 0x3, 0x1faedf51}, {0x10, 0x5, 0xb}, {0x5, 0x5, 0x7fffffff}, {0xb, 0x4, 0x8}, {0xb, 0x5, 0x3}, {0x2, 0x0, 0x7}, {0x5, 0x2, 0x7}]}]}, {0x0, [0x0, 0x2e, 0x5f]}}, &(0x7f0000000940)=""/174, 0xed, 0xae, 0x1, 0x5, 0x10000}, 0x28) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000bc0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x5, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000090000000000000009003c74180100002020642500000000002020207b1af8ff00000000bfa1000000000000070100007906f313b702000008000000b70300000300000085000000060000009500feff00000000"], &(0x7f0000000380)='GPL\x00', 0x7911, 0xba, &(0x7f00000004c0)=""/186, 0x41000, 0xe, '\x00', 0x0, @fallback=0x29, r6, 0x8, &(0x7f0000000580)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x1, 0x10, 0xfff, 0x6}, 0x10, 0xffffffffffffffff, r2, 0x3, &(0x7f0000000a00)=[r7, 0x1], &(0x7f0000000c40)=[{0x1, 0x5, 0xa, 0x7}, {0x0, 0x3, 0xe, 0x5}, {0x4, 0x4, 0x5, 0x6}]}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1e000000000000000100000007"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000ec0)={r8, 0x58, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x6, '\x00', 0x0, 0x0, 0x3, 0x0, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x10, &(0x7f0000000180)=@framed={{0x18, 0x8, 0x0, 0x0, 0x20}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r10}, {}, {}, {0x7, 0x0, 0xb, 0x9}}, @printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x76}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe6a, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001140)=@o_path={&(0x7f0000001100)='./file0\x00', 0x0, 0x8, r6}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x11, 0x7, &(0x7f0000000d40)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, r7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @exit], &(0x7f0000000d80)='GPL\x00', 0x74bb1475, 0x41, &(0x7f0000000dc0)=""/65, 0x41000, 0x0, '\x00', r9, 0x0, r4, 0x8, &(0x7f0000000f00)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000f40)={0x3, 0x6, 0xc, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001180)=[r10, 0xffffffffffffffff, 0xffffffffffffffff, r11, r7], &(0x7f00000011c0)=[{0x0, 0x1, 0x5, 0x6}], 0x10, 0x5}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x7, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r12, 0x2000000, 0xe, 0xfc9a, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) socket$nl_netfilter(0x10, 0x3, 0xc) r13 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r13, &(0x7f0000000600)={&(0x7f0000000040)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000080)='U', 0x1}], 0x1}, 0x0) 15m1.531162978s ago: executing program 3 (id=646): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b400000000000000691081000000000004000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x12}, 0x28) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, 0x0, &(0x7f0000000e80)='syzkaller\x00'}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000380)={0x50, 0x2, 0x6, 0x801, 0xe4340000, 0x0, {0x0, 0x0, 0x8}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x50}, 0x1, 0x0, 0x0, 0x20044000}, 0x8042) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x80, 0x9, 0x6, 0x3, 0x0, 0x0, {0x5}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_ADT={0x64, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x10}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x64010102}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xa}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz0\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x9}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x8}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x79}}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x1400088b}, 0x8080) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x8, 0x0, 0x480000000000000b, 0x1708, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff274, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x10, 0xffffffffffffffff, 0x2) sendmsg$NFT_MSG_GETSET(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0xa, 0xa, 0x101, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00'}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r2, &(0x7f0000000ec0)="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", 0xfffffffffffffffc, 0x9170b5b397c00a57}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x1e, 0x2, 0x0) recvmsg(r3, 0x0, 0x80) r4 = socket$kcm(0xa, 0x2, 0x88) sendmsg$inet(r4, &(0x7f0000000880)={0x0, 0x0, 0x0}, 0x48890) r5 = socket$kcm(0x10, 0x3, 0x0) write$cgroup_subtree(r5, &(0x7f0000001ec0)=ANY=[@ANYBLOB="13120000120091ef04e9befbbd"], 0xfe33) recvmsg$kcm(r5, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x142) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xffffffffffffffaa, 0x0, 0x0, 0x0, 0x7}, 0x142) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @sched_cls}, 0x48) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000a40)=@newtaction={0x494, 0x30, 0xffff, 0xfffffffe, 0x0, {}, [{0x480, 0x1, [@m_police={0x47c, 0x1, 0x0, 0x0, {{0xb}, {0x450, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x4, 0xa001, 0x0, 0xc267, 0xe3df, 0xc265, 0x2, 0x800, 0x9, 0x0, 0x10, 0x40, 0x3ff, 0xfff, 0x6, 0x4, 0x7f, 0x2, 0x2135, 0xffff8001, 0x0, 0x3, 0x3, 0x8, 0xb, 0x9, 0x9fbd, 0x0, 0x1, 0x40, 0x8, 0xe, 0x7, 0x200, 0x3, 0x8, 0x7a, 0x5, 0x3, 0xd6bc, 0x3, 0x831a, 0x2, 0x9, 0x2, 0x30, 0x5, 0x87fc, 0xfff, 0x6, 0xa7, 0x7, 0xffffffff, 0xff, 0x1400, 0x7, 0x3, 0x4, 0x7fff, 0x4, 0x4, 0xfffff896, 0x2, 0x8, 0x79, 0x0, 0x80, 0x3, 0x57, 0x8, 0x7fff, 0xf, 0x4, 0x8, 0xa0, 0x1, 0x85, 0x3, 0x1ff, 0x3, 0x85bd, 0x4, 0x865, 0x6, 0xa, 0xfffffff8, 0x2, 0xfffffffa, 0xb7f, 0x8b, 0x80000000, 0x80000000, 0x8, 0x100, 0x2, 0x400, 0x2, 0x4, 0x3, 0x400, 0x5, 0x1, 0x101, 0xd4e, 0x65ad, 0x0, 0x5, 0x7, 0x32, 0x5, 0xad8, 0x3, 0x4, 0x8, 0x4, 0x1, 0x6, 0x0, 0x5, 0x0, 0x6, 0xa0, 0x8, 0x6, 0x100, 0x100, 0x200, 0x0, 0x0, 0xffff, 0x3, 0x1, 0x2, 0x3, 0xfff, 0x2, 0x6, 0x200, 0x3, 0x47, 0x0, 0x2, 0xfffffff8, 0x8, 0x7f, 0x87ca, 0x1, 0x80000001, 0x4, 0x8, 0x401, 0xffff0000, 0xed1, 0x9, 0xfffffff8, 0xfffffffb, 0xfffffffb, 0x3, 0x2, 0x0, 0x2, 0x1, 0xffffff89, 0xfff, 0x0, 0x8, 0x7, 0x0, 0x8, 0xfffffffe, 0x0, 0x4, 0x5, 0x44, 0x5, 0x0, 0x8000, 0x2, 0x0, 0x8, 0x3ff, 0x5, 0x6, 0xb, 0xca43, 0x3, 0x3, 0x6, 0x0, 0x9, 0x3, 0x7, 0x8001, 0xf0000000, 0xc, 0x3, 0x3, 0x7, 0x7f, 0x5, 0x4, 0xd, 0xffffffff, 0x2, 0x7f, 0x9, 0x7, 0x8, 0x7, 0xffff, 0x1d, 0xc5, 0x9, 0x0, 0x1, 0x5, 0x9, 0x3, 0x1, 0x5, 0x2, 0x2, 0x9, 0x7, 0x40, 0x3, 0x400, 0x8, 0x2, 0xc, 0x6, 0x9982, 0x8001, 0x1ff, 0x2706, 0x2, 0x8001, 0x0, 0x2, 0x400, 0x7e, 0xc806, 0xb, 0x1, 0x1, 0x7, 0x2, 0x5, 0x8, 0x2, 0x2, 0x3, 0x41, 0x3, 0x200, 0xc8]}, @TCA_POLICE_RATE64={0xc, 0x8, 0xfffffffffffff2a5}, @TCA_POLICE_TBF={0x3c, 0x1, {0x4, 0x2, 0x3, 0x7, 0x40, {0x4, 0x0, 0x3, 0x7, 0x6, 0x9}, {0x40, 0x2, 0x3, 0x435b, 0x5a44}, 0x8c79, 0x5, 0x6}}]]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc}}}]}]}, 0x494}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r7 = socket$kcm(0x23, 0x5, 0x0) setsockopt$sock_attach_bpf(r7, 0x113, 0x3, 0x0, 0x0) 15m0.236217511s ago: executing program 4 (id=650): socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x90102, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_bp={0x0}, 0xa000, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x3, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) close(r0) socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r0, &(0x7f0000000680)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x3406c012) write$cgroup_type(r0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$kcm(0xa, 0x2, 0x73) recvmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x40) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000003500090000005f2503"], 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x4) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, 0x0) r3 = socket$kcm(0x11, 0x200000000000002, 0x300) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0xfca804a0, 0x4, 0x0, &(0x7f00000002c0)="b8000005", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="1400000010003507d25a806f8c", 0xd}], 0x1}, 0x0) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r4, 0x107, 0x12, &(0x7f00000008c0)=r7, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r7}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r8, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) setsockopt$sock_attach_bpf(r3, 0x107, 0x8, &(0x7f0000000000), 0x4) 14m55.095663608s ago: executing program 3 (id=651): r0 = socket$kcm(0x10, 0x2, 0x0) socket$l2tp6(0xa, 0x2, 0x73) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x8, 0x830b}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000039000701fc"], 0x20}, 0x1, 0x0, 0x0, 0x488c0}, 0xc000) r1 = getpid() perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sendmsg$inet(r0, &(0x7f0000000cc0)={&(0x7f0000000280)={0x2, 0x4e21, @private=0xa010102}, 0x10, &(0x7f0000000b00)=[{&(0x7f00000004c0)="4cf08afe61b51ed50f92e27f1bb05fb07391b3517fc6aba440225e4821bc4cfefaa0b8154fd882f810b79cbb33fa1211efba11a39b7670d09a4443a5387e0880e871065dc231f9472f4383155b1fb935d47b58b4a1e3276b12b7e2", 0x5b}, {&(0x7f0000000540)="2cec651d07f8c5af71d3e174c01bdaff6747c3d9bdaaca1b", 0x18}, {&(0x7f0000000580)="729ec0d0c24d6f802cd35cacbf2d09536320ce5c54cf791eb828b3df0d24dca88076c3256b7335331ce7", 0x2a}, {&(0x7f00000005c0)="5d7ce280174025e36f1d89f4c244390542745281f27141340f6c682914b3a213c214aadf57ded95f49fe5bfc60d1f0ba0d5cb6933afa30b7a41f03a80d62b93467779c7d8dae1bec78a8f4abfec58269885e6b627de5749fc9306c3750cbb15ce53637f67d2f715e708415bac105de0896666c003336fcd5dd51dfda56eb5fd47cf5892ce12b6de55b3862e4d255c1c458c18cf3808ce1296c49adeb80196754ba2c62a7348caf7db627714acf5e249f126087d635d2e76aadae3fda538df890ac081b92a9ddb20948a699a87b0464ae9620b12000a24b69c37b6697139ef3d533078f0e169154f4b844a4c5c8011f1e54bec7b48037b1", 0xf7}, {&(0x7f00000006c0)="a7d36e3572bb74e5f0ae5f", 0xb}, {&(0x7f0000000700)="71c28f17810889f081742f498b0a67b61247d2bfca5fe3f257f9f79f3e2199e0fd9034a6b3995ed792d163608a5ea8ec2f4996bf0149e9adab86cbd01f149a0e4192c02b3cebf8bce6d76f22ad4abb212548a382c9f863ee37f9b5c1d734b9c63f24204a18986f004319898de9e9f659d855f7d1eb912ecbd6a579599958e22c8ff230db4c2113d383e7badb5a9abfdadb875bae21014d5026c54ed3a4ed5316ac88cb0eadea664c960bd5ee", 0xac}, {&(0x7f00000007c0)="84d90218fc493014427422f269555082471b203ff22cd253a434ed2a7adbcb9afe08424652becbdce7a7a6d84ddb339d5e7bb336773aae1564a6ce4cd3b44f105c74a0b5ab228a33186684014bcadb576bfb7986ff8710199a26879cd2c01882dc98d7df960f47b7fbc362e8ef656509cffed6209069957a0cb2826b95600fe3e64f7dbd07035f598be0e634842ee7b378654d01bf73e0570e8a54074193447f0d4374aea7092ae25638c8588663d32e2b3faf3d65c703fda6638a7ba7331869c932a84e35febbab3114edf8e06cc2493f57335258a3db4b3b288c38", 0xdc}, {&(0x7f0000001040)="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", 0x1000}, {&(0x7f0000000a40)="6080bab24bff3694f0bd79fa5c599e0ad68be84b6bf5e2e18da65549d13ae91b1faf28a4ca9e186103df4fe50f2a16767f0b97f2dfdbbf3ac423bfaebcd367187ddd176baa8111bf621cf4a798b69d26a1c8741ab55e0cf36f3a7b0cf81f10b9b4881b95043d4d4e5020d7cef5df94a96368819305c5db39e74e55b7e73ced06ba48a034498a619352d32783651cf82e1e", 0x91}, {&(0x7f0000000940)="0620771608a2cb3e67b3", 0xa}], 0xa, &(0x7f0000000bc0)=ANY=[@ANYBLOB="140000000000000100000081ffffff00000000110000000000000000000000010000000300000000000000c8000000070000004424d641ac1414aa00000fffac1414bb00000006ac1e00017fffffffac1414bb000009d7010706540190a286460000000201079bd467c6aa000ca125d5030968069d466c49e7976fff010204081b5f7433c0040509e506cbe66d3a27060cec7bbf2cb09d6d5e5ac9020e2c37d3f47b86445e11abdf170723e1ac1e000100000000000000000a010101e000000264010102ac1414aae000000100441c3c3080000001000000047fffffff00000001000000090000009c4404e0900000000000000000"], 0xf8}, 0x2000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x11, 0x3, &(0x7f0000000240)=ANY=[], 0x0}, 0x94) socketpair(0x2d, 0x2, 0x0, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x18}, 0xc) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4d31, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000008c0), 0x4}, 0x0, 0x2, 0xfffffffe, 0x0, 0x8000000000}, 0x0, 0x9, r4, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r6 = openat$cgroup_devices(r5, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r6, &(0x7f0000000080)=ANY=[@ANYBLOB='c ', @ANYRESOCT], 0xa) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r3, 0x0}, 0x20) openat$cgroup_devices(r2, &(0x7f0000000240)='devices.deny\x00', 0x2, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000600000000000000000000bc31cf0b00"], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x15, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r8, @ANYBLOB="0000000002000000b70500000800000085000000a900000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) sendmsg$NFT_BATCH(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a74000000060a0b0400000000000000000200000048000480440001800a0001006d6174636800000034000280180003004cb4fc4ba7e1bc2c62cdeb7508000240000000000d00010064657667726f7570000000000900010073797a3000e7ff000900020073797a3200000000140000001100010000000000000000000300000a0000000000000000"], 0x9c}}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0xe756}, 0x108b84, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, r1, 0x800000000000001, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400001d008104e00f80ecdb4cb9f207c804a00d000000880802fb0a0002000a0ada1b40d80800c500c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 14m40.973525561s ago: executing program 32 (id=649): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xff00, &(0x7f0000000000)=[{&(0x7f0000000240)="d800000018007bf6e00212ba0d8105040a600000000f040b067c55a1bc0009001e0006990600000015000500fe800000000000000300014002000c0901ac04000bd67f6f94007100a007a288747f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d345ef464095cae8c9010000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3099ad8ffd5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd601edef3d93452a92307f00000e97031e9f05e9f16e9cb5000000000000", 0xd8}], 0x1, 0x0, 0x0, 0x2663}, 0x0) 14m32.853009783s ago: executing program 33 (id=648): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x6c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @payload={{0xc}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_LEN={0x8}, @NFTA_PAYLOAD_SREG={0x8, 0x5, 0x1, 0x0, 0x4}, @NFTA_PAYLOAD_OFFSET={0x8}, @NFTA_PAYLOAD_BASE={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_USERDATA={0x6, 0x7, 0x1, 0x0, '\x00I'}]}], {0x14}}, 0x94}}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x7, 0xffffffffffffffff}, 0xa38, 0x1, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018de0600000000000c0000000c000000020000000000000000000002020000000000"], 0x0, 0x26}, 0x28) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = getpid() r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0xfcc9}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x8801}, 0x0) sendmsg$nl_xfrm(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8801}, 0x0) r6 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r6, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, &(0x7f0000001140)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac141411e0000001000000002800000000000000000000000700000094040007441405"], 0x48}, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x40001, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3428, 0xca, 0x0, 0x4, 0x8}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0xa, 0x2, 0x0) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = socket$caif_stream(0x25, 0x1, 0x0) close(r9) setsockopt$sock_attach_bpf(r7, 0x29, 0x48, &(0x7f0000000100)=r8, 0x120) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) 14m29.862916838s ago: executing program 34 (id=645): r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1f, 0xc, &(0x7f00000008c0)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1224, 0x0, 0x0, 0x5, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32, @ANYBLOB="0000000002000000b70500000800000085000000aa00000095"], &(0x7f0000000300)='GPL\x00', 0x2, 0xb, &(0x7f0000001e00)=""/4086}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@fwd={0x2}, @typedef={0x1}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x5, [{0x0, 0x2}]}]}, {0x0, [0x5f, 0x4f]}}, &(0x7f0000000500)=""/4096, 0x4c, 0x1000, 0xa}, 0x28) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="38010000d1000000000000000000000001fc0100000000d9f653d5c200000000000000d39d548e9d9088000000003a00000000145e8c3a92e0302c633a40fb3141f7f8bbd730f3132c31d1a6a307157203a07f5cadba7a7a992cce4988f1879a8047790bc0f1d549dfcb5dea0e0d1a", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414aa000000000000000000000000000004d46c0000007f000001000000000000000000000000000000000000000092010000000000000600000000000000ffff0000000000001c250800000000000200000000000000f8ffffffffffffff0000000000000000ffffffffffffffff00000000000000001f00000000000000feffffffffffffff02000000fcffffff400000002abd700004350000020001002000000000000000480003006465666c61746500"/240], 0x138}, 0x1, 0x0, 0x0, 0x8801}, 0x0) sendmsg$nl_xfrm(r3, 0x0, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, 0x0, 0x0) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000840)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd0, 0xd0, 0x5, [@int={0xd, 0x0, 0x0, 0x1, 0x0, 0x16, 0x0, 0x11, 0x8}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x9, 0x4}, {0x3, 0x1}, {0xd, 0x4}, {0x2, 0x3}, {0x2, 0x1}, {0x3, 0x5}]}, @ptr={0x5, 0x0, 0x0, 0x2, 0x5}, @volatile={0xe, 0x0, 0x0, 0x9, 0x4}, @struct={0x8, 0x8, 0x0, 0x4, 0x1, 0x7, [{0xf, 0x3, 0x8}, {0xf, 0x3, 0x1faedf51}, {0x10, 0x5, 0xb}, {0x5, 0x5, 0x7fffffff}, {0xb, 0x4, 0x8}, {0xb, 0x5, 0x3}, {0x2, 0x0, 0x7}, {0x5, 0x2, 0x7}]}]}, {0x0, [0x0, 0x2e, 0x5f]}}, &(0x7f0000000940)=""/174, 0xed, 0xae, 0x1, 0x5, 0x10000}, 0x28) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000bc0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x5, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000090000000000000009003c74180100002020642500000000002020207b1af8ff00000000bfa1000000000000070100007906f313b702000008000000b70300000300000085000000060000009500feff00000000"], &(0x7f0000000380)='GPL\x00', 0x7911, 0xba, &(0x7f00000004c0)=""/186, 0x41000, 0xe, '\x00', 0x0, @fallback=0x29, r6, 0x8, &(0x7f0000000580)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x1, 0x10, 0xfff, 0x6}, 0x10, 0xffffffffffffffff, r2, 0x3, &(0x7f0000000a00)=[r7, 0x1], &(0x7f0000000c40)=[{0x1, 0x5, 0xa, 0x7}, {0x0, 0x3, 0xe, 0x5}, {0x4, 0x4, 0x5, 0x6}]}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1e000000000000000100000007"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000ec0)={r8, 0x58, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x6, '\x00', 0x0, 0x0, 0x3, 0x0, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x10, &(0x7f0000000180)=@framed={{0x18, 0x8, 0x0, 0x0, 0x20}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r10}, {}, {}, {0x7, 0x0, 0xb, 0x9}}, @printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x76}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe6a, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001140)=@o_path={&(0x7f0000001100)='./file0\x00', 0x0, 0x8, r6}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x11, 0x7, &(0x7f0000000d40)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, r7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @exit], &(0x7f0000000d80)='GPL\x00', 0x74bb1475, 0x41, &(0x7f0000000dc0)=""/65, 0x41000, 0x0, '\x00', r9, 0x0, r4, 0x8, &(0x7f0000000f00)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000f40)={0x3, 0x6, 0xc, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001180)=[r10, 0xffffffffffffffff, 0xffffffffffffffff, r11, r7], &(0x7f00000011c0)=[{0x0, 0x1, 0x5, 0x6}], 0x10, 0x5}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x7, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r12, 0x2000000, 0xe, 0xfc9a, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) socket$nl_netfilter(0x10, 0x3, 0xc) r13 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r13, &(0x7f0000000600)={&(0x7f0000000040)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000080)='U', 0x1}], 0x1}, 0x0) 14m28.777212994s ago: executing program 35 (id=651): r0 = socket$kcm(0x10, 0x2, 0x0) socket$l2tp6(0xa, 0x2, 0x73) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x8, 0x830b}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000039000701fc"], 0x20}, 0x1, 0x0, 0x0, 0x488c0}, 0xc000) r1 = getpid() perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sendmsg$inet(r0, &(0x7f0000000cc0)={&(0x7f0000000280)={0x2, 0x4e21, @private=0xa010102}, 0x10, &(0x7f0000000b00)=[{&(0x7f00000004c0)="4cf08afe61b51ed50f92e27f1bb05fb07391b3517fc6aba440225e4821bc4cfefaa0b8154fd882f810b79cbb33fa1211efba11a39b7670d09a4443a5387e0880e871065dc231f9472f4383155b1fb935d47b58b4a1e3276b12b7e2", 0x5b}, {&(0x7f0000000540)="2cec651d07f8c5af71d3e174c01bdaff6747c3d9bdaaca1b", 0x18}, {&(0x7f0000000580)="729ec0d0c24d6f802cd35cacbf2d09536320ce5c54cf791eb828b3df0d24dca88076c3256b7335331ce7", 0x2a}, {&(0x7f00000005c0)="5d7ce280174025e36f1d89f4c244390542745281f27141340f6c682914b3a213c214aadf57ded95f49fe5bfc60d1f0ba0d5cb6933afa30b7a41f03a80d62b93467779c7d8dae1bec78a8f4abfec58269885e6b627de5749fc9306c3750cbb15ce53637f67d2f715e708415bac105de0896666c003336fcd5dd51dfda56eb5fd47cf5892ce12b6de55b3862e4d255c1c458c18cf3808ce1296c49adeb80196754ba2c62a7348caf7db627714acf5e249f126087d635d2e76aadae3fda538df890ac081b92a9ddb20948a699a87b0464ae9620b12000a24b69c37b6697139ef3d533078f0e169154f4b844a4c5c8011f1e54bec7b48037b1", 0xf7}, {&(0x7f00000006c0)="a7d36e3572bb74e5f0ae5f", 0xb}, {&(0x7f0000000700)="71c28f17810889f081742f498b0a67b61247d2bfca5fe3f257f9f79f3e2199e0fd9034a6b3995ed792d163608a5ea8ec2f4996bf0149e9adab86cbd01f149a0e4192c02b3cebf8bce6d76f22ad4abb212548a382c9f863ee37f9b5c1d734b9c63f24204a18986f004319898de9e9f659d855f7d1eb912ecbd6a579599958e22c8ff230db4c2113d383e7badb5a9abfdadb875bae21014d5026c54ed3a4ed5316ac88cb0eadea664c960bd5ee", 0xac}, {&(0x7f00000007c0)="84d90218fc493014427422f269555082471b203ff22cd253a434ed2a7adbcb9afe08424652becbdce7a7a6d84ddb339d5e7bb336773aae1564a6ce4cd3b44f105c74a0b5ab228a33186684014bcadb576bfb7986ff8710199a26879cd2c01882dc98d7df960f47b7fbc362e8ef656509cffed6209069957a0cb2826b95600fe3e64f7dbd07035f598be0e634842ee7b378654d01bf73e0570e8a54074193447f0d4374aea7092ae25638c8588663d32e2b3faf3d65c703fda6638a7ba7331869c932a84e35febbab3114edf8e06cc2493f57335258a3db4b3b288c38", 0xdc}, {&(0x7f0000001040)="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", 0x1000}, {&(0x7f0000000a40)="6080bab24bff3694f0bd79fa5c599e0ad68be84b6bf5e2e18da65549d13ae91b1faf28a4ca9e186103df4fe50f2a16767f0b97f2dfdbbf3ac423bfaebcd367187ddd176baa8111bf621cf4a798b69d26a1c8741ab55e0cf36f3a7b0cf81f10b9b4881b95043d4d4e5020d7cef5df94a96368819305c5db39e74e55b7e73ced06ba48a034498a619352d32783651cf82e1e", 0x91}, {&(0x7f0000000940)="0620771608a2cb3e67b3", 0xa}], 0xa, &(0x7f0000000bc0)=ANY=[@ANYBLOB="140000000000000100000081ffffff00000000110000000000000000000000010000000300000000000000c8000000070000004424d641ac1414aa00000fffac1414bb00000006ac1e00017fffffffac1414bb000009d7010706540190a286460000000201079bd467c6aa000ca125d5030968069d466c49e7976fff010204081b5f7433c0040509e506cbe66d3a27060cec7bbf2cb09d6d5e5ac9020e2c37d3f47b86445e11abdf170723e1ac1e000100000000000000000a010101e000000264010102ac1414aae000000100441c3c3080000001000000047fffffff00000001000000090000009c4404e0900000000000000000"], 0xf8}, 0x2000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x11, 0x3, &(0x7f0000000240)=ANY=[], 0x0}, 0x94) socketpair(0x2d, 0x2, 0x0, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x18}, 0xc) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4d31, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000008c0), 0x4}, 0x0, 0x2, 0xfffffffe, 0x0, 0x8000000000}, 0x0, 0x9, r4, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r6 = openat$cgroup_devices(r5, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r6, &(0x7f0000000080)=ANY=[@ANYBLOB='c ', @ANYRESOCT], 0xa) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r3, 0x0}, 0x20) openat$cgroup_devices(r2, &(0x7f0000000240)='devices.deny\x00', 0x2, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000600000000000000000000bc31cf0b00"], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x15, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r8, @ANYBLOB="0000000002000000b70500000800000085000000a900000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) sendmsg$NFT_BATCH(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a74000000060a0b0400000000000000000200000048000480440001800a0001006d6174636800000034000280180003004cb4fc4ba7e1bc2c62cdeb7508000240000000000d00010064657667726f7570000000000900010073797a3000e7ff000900020073797a3200000000140000001100010000000000000000000300000a0000000000000000"], 0x9c}}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0xe756}, 0x108b84, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, r1, 0x800000000000001, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400001d008104e00f80ecdb4cb9f207c804a00d000000880802fb0a0002000a0ada1b40d80800c500c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 14m28.516656393s ago: executing program 36 (id=650): socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x90102, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_bp={0x0}, 0xa000, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x3, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) close(r0) socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r0, &(0x7f0000000680)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x3406c012) write$cgroup_type(r0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$kcm(0xa, 0x2, 0x73) recvmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x40) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000003500090000005f2503"], 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x4) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, 0x0) r3 = socket$kcm(0x11, 0x200000000000002, 0x300) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0xfca804a0, 0x4, 0x0, &(0x7f00000002c0)="b8000005", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="1400000010003507d25a806f8c", 0xd}], 0x1}, 0x0) r4 = socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r4, 0x107, 0x12, &(0x7f00000008c0)=r7, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r7}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r8, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) setsockopt$sock_attach_bpf(r3, 0x107, 0x8, &(0x7f0000000000), 0x4) 10m30.709172477s ago: executing program 9 (id=1853): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0xa, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r0, 0x8, 0x0, 0x0, 0x18, &(0x7f0000000200), 0x1, 0x0, 0xffffffffffffffff, 0x1c}, 0x6d) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x10000, 0x1}, 0x828, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x20000000000a, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0xffff0000, 0xe, 0x0, &(0x7f0000000040)="2b206d074843b397737ea49da2aa", 0x0, 0xf000, 0x720e, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = getpid() r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xa}, 0x0, 0x0, 0x0, 0x4, 0x2, 0x7fffffff}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0xa0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x400000000008, 0x8000008}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000040900010073797a300000000048000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000210c0009800800014000000005600000000c0a010300000000000000000700fffe0900020073797a31000000000900010073797a300000000034000380"], 0xf0}}, 0x42000) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f000000b200)={&(0x7f000000af40)=@in={0x2, 0x4e21, @local}, 0x10, &(0x7f000000b180)=[{&(0x7f000000af80)="ef", 0x1}], 0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000846133fc7d000000000000000600070000040700"], 0x18}, 0x844) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) sendmsg$IPSET_CMD_ADD(r5, &(0x7f0000000600)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000580)={&(0x7f0000000480)={0xcc, 0x9, 0x6, 0x5, 0x0, 0x0, {0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_ADT={0x2c, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK={0x8}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2_TO={0xc, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}}]}, @IPSET_ATTR_ADT={0x64, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR={0x5}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x1}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @empty}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAME={0x9, 0x12, 'syz1\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}}]}]}, 0xcc}}, 0x4004000) syz_clone(0xa49a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 10m29.916749314s ago: executing program 9 (id=1858): r0 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r0, &(0x7f0000002700)={&(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000180)="90", 0x1}], 0x1}, 0x8040) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x88c2) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000000000000100000000000200000a140000001100010009"], 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x4004) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="20000000160073f50000000000feffdf157c00000c00018008"], 0x20}, 0x1, 0x0, 0x0, 0x40051}, 0x20048010) 10m29.6445116s ago: executing program 9 (id=1861): r0 = socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x8, 0x2004}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) recvmsg(r0, &(0x7f0000001540)={&(0x7f0000000cc0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000d40)=""/70, 0x46}, {0x0}, {&(0x7f0000000e00)=""/251, 0xfb}, {&(0x7f0000001040)=""/193, 0xc1}, {&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000000f00)=""/77, 0x4d}, {&(0x7f0000001140)=""/209, 0xd1}, {&(0x7f0000001240)=""/145, 0x91}, {&(0x7f0000001300)=""/117, 0x75}], 0x9, &(0x7f0000001440)=""/196, 0xc4}, 0x40000020) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x8, 0x830b}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) unlink(&(0x7f0000000080)='./cgroup/cgroup.procs\x00') perf_event_open(&(0x7f0000000840)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e502000000"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xbf, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e14f0080048e0050000000000008877fbac141516e0000001440404feb180008903040000845013f2325f003901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0103461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014c0000c0adc043084617d7ecf41effff38cae870b9a1df48b238190da45029", 0x0, 0x14, 0x60000000}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1, 0x10, &(0x7f0000000400)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@call={0x85, 0x0, 0x0, 0xf}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41000, 0xa, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 10m26.448273476s ago: executing program 9 (id=1866): r0 = getpid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x5, 0x830e}, 0x0, 0x2, 0xfffffffe, 0x0, 0x6, 0x3, 0x0, 0x0, 0x993, 0x0, 0x1004000000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x1, 0x6}, 0x4000, 0x0, 0x0, 0x0, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$kcm(0x10, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuset.memory_pressure\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x41100, 0x70, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r1, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x9}, 0x94) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r3, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000d80)=@newtaction={0x68, 0x30, 0xffff, 0x4000, 0x10000000, {0x0, 0x0, 0x1300}, [{0x54, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x7f, 0x0, 0xc0000000, 0x3, 0x7}, 0x3, r4}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x2404c080}, 0x0) 10m25.909300785s ago: executing program 9 (id=1870): mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2050061, &(0x7f0000000bc0)={[], [{@obj_type={'obj_type', 0x3d, '//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'}}]}) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x0, 0xf0, 0x0, 0x80, 0x0, 0x0, 0x24400, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x6, @perf_bp={0x0, 0xa}, 0x482, 0x81, 0x4, 0x0, 0x0, 0x7, 0x7fff, 0x0, 0x2, 0x0, 0x9}, 0x0, 0xa, 0xffffffffffffffff, 0xb) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="2c0000003f00019f2cbd700000000000037c00000400428006000a"], 0x2c}, 0x1, 0x0, 0x0, 0x4048011}, 0xc000) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xb, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, [@generic={0x81, 0x1, 0x1, 0x74}]}, &(0x7f0000000c40)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="180000ffffffffffffffff000000000085070000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0xdc, 0x0, 0x3, 0x3, 0x0, 0x4, 0x80000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x5, 0x1}, 0x610, 0x6, 0x100, 0x1, 0x9, 0x2, 0x6, 0x0, 0x9, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x6) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r1, 0x18000000000002a0, 0x12, 0x0, &(0x7f00000002c0)="d2ff03076003008cb89e08f088a8", 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 10m25.696527014s ago: executing program 9 (id=1873): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x8}, 0x6018, 0x0, 0x2, 0x6, 0x3fe, 0x7ffffffc, 0x400, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0xa) (async) sendmsg$IPCTNL_MSG_CT_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000680)={0xfc, 0x1, 0x1, 0x101, 0x0, 0x0, {0x0, 0x0, 0x8}, [@CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_STATUS_MASK={0x8, 0x1a, 0x1, 0x0, 0x101}, @CTA_FILTER={0x24, 0x19, 0x0, 0x1, [@CTA_FILTER_REPLY_FLAGS={0x8, 0x2, 0x510}, @CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x42}, @CTA_FILTER_REPLY_FLAGS={0x8, 0x2, 0x400}, @CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x15}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @rand_addr=0x64010101}}}]}, @CTA_NAT_DST={0x20, 0xd, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @broadcast}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast2}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x2}, @CTA_SEQ_ADJ_REPLY={0x54, 0x10, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x57}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0xafb0}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x4}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x8}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x5}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x4}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x1}]}, @CTA_NAT_DST={0x4}]}, 0xfc}, 0x1, 0x0, 0x0, 0x40001}, 0x440d4) (async) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x17d4}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3800000040000100fcff06ee04000000010000000400488014000180100010800c00008008001e80040001800c0002"], 0x38}, 0x1, 0x0, 0x0, 0x400c801}, 0x4008094) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000002000000000000000000082295"], &(0x7f0000000040)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x1f4, 0x14, 0x0, &(0x7f00000002c0)="ff412f66b083dcc1010b3efc8864229a5588dce5", 0x0, 0x300, 0x300, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe, 0x4}, 0x50) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="4801000042000100fffffffffddbdf250200000004003880100001800c00c8000200000000000000200104801c01"], 0x148}, 0x1, 0x0, 0x0, 0x8800}, 0x4040) (async) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xa}, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) (async) socket$kcm(0x10, 0x2, 0x0) (async) r3 = socket$kcm(0xa, 0x1, 0x0) (async) r4 = socket$kcm(0x10, 0x2, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000003080)=ANY=[@ANYBLOB="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"/3584], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x103a, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2a3}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x3a, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef2408322900119386dd6a00000000072feb311ccd3ec8a755c1e1380081ffad008036e8d50000ff010000001400000500243209880bd320d98a61a90057e9bf", 0x0, 0x6, 0x0, 0x327, 0xa6, &(0x7f00000011c0)="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", &(0x7f00000004c0)="b33620dad49cc786c86a5c5444e76c2a1ef9224fb91083d2ba4368e98a14467703e9ee585196fa95320bd53c6a76ad443b81dc833b22016aeaafb4597c06919ecf7e5ea4d0a8995feaaf9a9feb0c4b5277398049a2f5475f6ceb26bd128189f4b1b3c662d3d1630717791de0cdac3ce6e01c5719b670da5ded7dfa9dda53f04ad151cb952d708eaa69e983dcfab36b2dac3f3fe85e1d86b3d73d4879fb11cfac51f3cb669a50", 0x1, 0xfffffffd}, 0x23) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x31, &(0x7f0000000780)=[{}, {}], 0x10, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0x63, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000b00)=r6, 0x4) sendmsg$inet(r4, &(0x7f0000000000)={0x0, 0x9, &(0x7f0000000100)=[{&(0x7f0000000040)="1800000072006bcd9e3fe3dc6e080000070900000ec00000", 0x18}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) (async) setsockopt$sock_attach_bpf(r3, 0x29, 0x12, 0x0, 0x0) (async) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc00000019000100000000000000000020010000000000000000000000000000ac1414aa00000000000000000000000000000000000080010a00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000a90000000000000000000000000000000000000000000000f100000000000000ffffffffffffffff000000000000000000000000000000000000000000000000000a000000000000000000000080400000000900000000080000000000000000000000000000000044000500ac1414aa000000000000000000000000000000003c"], 0xfc}}, 0x0) (async) sendmsg$nl_xfrm(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000008c0)=ANY=[@ANYBLOB="84010000210001000000000000000000fc020000000000000000000000000000fe80000000000000000000000000003500000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000034011100ac14140c000000000000000000000000fc000000000000000000000000000001fc020000000000000000000000000000fe8000000000000000000000000000aa6c01a8000200000002000a00ac1414aa000000000000000000000000fe8000000000000000000000000000aa00000000000000000000000000000000ff020000000000000000000000000001ff020000003500000a000800ac1414bb000000000000000000000000fc02000000000000000000000000000064010102000000000000000000000000fe8000000000000000000000000000323c"], 0x184}, 0x1, 0x0, 0x0, 0x10000}, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000500)=ANY=[@ANYBLOB="050000000000000071110900000000008510000002000000850000003400000095000000000000009500a505000000005253c3c28e2c374041a6975ae3b5722913f93d4a772c9422bd55d83190ab144f4ae493e92271f06e32de2442263616038f770320c26ab27b4874ccbecf4adf8370228d32028ee472ac9e2ee50ccb6d930b6e40c77cf349e699fd37ddb02c5f7133b5cda82f68f442699c1be8e2c6ad39236f28d53a642caa4f8874dd"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x70) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="450a000000000000611114000000000018000000000000000000000500000000950000000000000001a1a90d316b78622ff8dbdff2457ac35c224128db1ef4e57486b4c8bc4dddfdadd87eb8ecb865df3b40f0940e70975e8f460f0ec9984986638ee36c85b6c1bf65f98e95c11282e5389c0a34acbab57ce6e3c016ee66b58ca0ae5d83a184e9179b6e5cadb671351d"], &(0x7f0000000000)='GPL\x00'}, 0x94) 10m10.371827429s ago: executing program 37 (id=1873): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x8}, 0x6018, 0x0, 0x2, 0x6, 0x3fe, 0x7ffffffc, 0x400, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0xa) (async) sendmsg$IPCTNL_MSG_CT_GET(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000680)={0xfc, 0x1, 0x1, 0x101, 0x0, 0x0, {0x0, 0x0, 0x8}, [@CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_STATUS_MASK={0x8, 0x1a, 0x1, 0x0, 0x101}, @CTA_FILTER={0x24, 0x19, 0x0, 0x1, [@CTA_FILTER_REPLY_FLAGS={0x8, 0x2, 0x510}, @CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x42}, @CTA_FILTER_REPLY_FLAGS={0x8, 0x2, 0x400}, @CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x15}]}, @CTA_TUPLE_ORIG={0x34, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @rand_addr=0x64010101}}}]}, @CTA_NAT_DST={0x20, 0xd, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @broadcast}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast2}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x2}, @CTA_SEQ_ADJ_REPLY={0x54, 0x10, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x57}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0xafb0}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x4}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x8}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x5}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x4}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x1}]}, @CTA_NAT_DST={0x4}]}, 0xfc}, 0x1, 0x0, 0x0, 0x40001}, 0x440d4) (async) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x17d4}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3800000040000100fcff06ee04000000010000000400488014000180100010800c00008008001e80040001800c0002"], 0x38}, 0x1, 0x0, 0x0, 0x400c801}, 0x4008094) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000002000000000000000000082295"], &(0x7f0000000040)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x1f4, 0x14, 0x0, &(0x7f00000002c0)="ff412f66b083dcc1010b3efc8864229a5588dce5", 0x0, 0x300, 0x300, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe, 0x4}, 0x50) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="4801000042000100fffffffffddbdf250200000004003880100001800c00c8000200000000000000200104801c01"], 0x148}, 0x1, 0x0, 0x0, 0x8800}, 0x4040) (async) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xa}, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) (async) socket$kcm(0x10, 0x2, 0x0) (async) r3 = socket$kcm(0xa, 0x1, 0x0) (async) r4 = socket$kcm(0x10, 0x2, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000003080)=ANY=[@ANYBLOB="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"/3584], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x103a, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2a3}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x3a, 0x44, 0x0, &(0x7f0000000200)="e460cdfbef2408322900119386dd6a00000000072feb311ccd3ec8a755c1e1380081ffad008036e8d50000ff010000001400000500243209880bd320d98a61a90057e9bf", 0x0, 0x6, 0x0, 0x327, 0xa6, &(0x7f00000011c0)="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", &(0x7f00000004c0)="b33620dad49cc786c86a5c5444e76c2a1ef9224fb91083d2ba4368e98a14467703e9ee585196fa95320bd53c6a76ad443b81dc833b22016aeaafb4597c06919ecf7e5ea4d0a8995feaaf9a9feb0c4b5277398049a2f5475f6ceb26bd128189f4b1b3c662d3d1630717791de0cdac3ce6e01c5719b670da5ded7dfa9dda53f04ad151cb952d708eaa69e983dcfab36b2dac3f3fe85e1d86b3d73d4879fb11cfac51f3cb669a50", 0x1, 0xfffffffd}, 0x23) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x31, &(0x7f0000000780)=[{}, {}], 0x10, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0x63, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000b00)=r6, 0x4) sendmsg$inet(r4, &(0x7f0000000000)={0x0, 0x9, &(0x7f0000000100)=[{&(0x7f0000000040)="1800000072006bcd9e3fe3dc6e080000070900000ec00000", 0x18}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) (async) setsockopt$sock_attach_bpf(r3, 0x29, 0x12, 0x0, 0x0) (async) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc00000019000100000000000000000020010000000000000000000000000000ac1414aa00000000000000000000000000000000000080010a00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000a90000000000000000000000000000000000000000000000f100000000000000ffffffffffffffff000000000000000000000000000000000000000000000000000a000000000000000000000080400000000900000000080000000000000000000000000000000044000500ac1414aa000000000000000000000000000000003c"], 0xfc}}, 0x0) (async) sendmsg$nl_xfrm(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000008c0)=ANY=[@ANYBLOB="84010000210001000000000000000000fc020000000000000000000000000000fe80000000000000000000000000003500000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000034011100ac14140c000000000000000000000000fc000000000000000000000000000001fc020000000000000000000000000000fe8000000000000000000000000000aa6c01a8000200000002000a00ac1414aa000000000000000000000000fe8000000000000000000000000000aa00000000000000000000000000000000ff020000000000000000000000000001ff020000003500000a000800ac1414bb000000000000000000000000fc02000000000000000000000000000064010102000000000000000000000000fe8000000000000000000000000000323c"], 0x184}, 0x1, 0x0, 0x0, 0x10000}, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000500)=ANY=[@ANYBLOB="050000000000000071110900000000008510000002000000850000003400000095000000000000009500a505000000005253c3c28e2c374041a6975ae3b5722913f93d4a772c9422bd55d83190ab144f4ae493e92271f06e32de2442263616038f770320c26ab27b4874ccbecf4adf8370228d32028ee472ac9e2ee50ccb6d930b6e40c77cf349e699fd37ddb02c5f7133b5cda82f68f442699c1be8e2c6ad39236f28d53a642caa4f8874dd"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x70) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="450a000000000000611114000000000018000000000000000000000500000000950000000000000001a1a90d316b78622ff8dbdff2457ac35c224128db1ef4e57486b4c8bc4dddfdadd87eb8ecb865df3b40f0940e70975e8f460f0ec9984986638ee36c85b6c1bf65f98e95c11282e5389c0a34acbab57ce6e3c016ee66b58ca0ae5d83a184e9179b6e5cadb671351d"], &(0x7f0000000000)='GPL\x00'}, 0x94) 4m42.457514712s ago: executing program 8 (id=3806): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r0, r1, 0x5}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x2}, {0x0, 0x3000000}]}]}, {0x0, [0x30, 0x5f, 0x1e]}}, 0x0, 0x39, 0x0, 0x1}, 0x28) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000000)={0x5c, 0x2, 0x1, 0x3, 0x0, 0x0, {0x2, 0x0, 0x1}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @local}}}]}, @CTA_TUPLE_ORIG={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}}}}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x10050}, 0x4) 4m42.142727808s ago: executing program 8 (id=3809): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000039000701fcfffffffbdbdf65017c00000c00018006"], 0x20}, 0x1, 0x0, 0x0, 0x488c0}, 0xc000) 4m41.804668335s ago: executing program 8 (id=3810): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, @perf_bp={0x0, 0x9}, 0x6018, 0x0, 0x2, 0x0, 0x3fe, 0x7ffffffc, 0x7, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x1, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x4004000) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000013c0)={{r0, 0xffffffffffffffff}, &(0x7f0000001340), 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000002680), &(0x7f0000002780), 0x3, r1}, 0x38) 4m41.247634038s ago: executing program 8 (id=3811): r0 = getpid() r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000001c0)='!pu~\'\'\t|\t') r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1b00"/13], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x7, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0x10, 0x38, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x2, 0x7e, 0x7fffffff}, r0, 0xffffffffffffffff, r1, 0xa) r5 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x25, 0x6, @val=@target_btf_id=0xffffffffffffffff}, 0x14) bpf$LINK_DETACH(0x22, &(0x7f0000000080)=r5, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r6) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x1, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xf}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x9549, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, @perf_config_ext={0x76, 0x1ef5}, 0x11efa, 0x4, 0x0, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r7, 0xffffffffffffffff, r4, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f00000000c0)={0x3, 0x80, 0x7c, 0x5, 0x9, 0x8, 0x0, 0x8, 0x2000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0xa, 0x7}, 0x8421, 0x3ce, 0x7, 0x9, 0x2, 0x2, 0x6, 0x0, 0x1, 0x0, 0xfffffffffffffffd}) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r5}, 0x8) ioctl$SIOCSIFHWADDR(r10, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r11, 0x18000000000002a0, 0x6a, 0x0, &(0x7f00000002c0)="d2ff03076003008cb89e08f086dd", 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r12 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r12, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000300)="d8000000180081034e81f783db4cb9040a1d020006007c09e8fc55a10a0015000300142603600e120800060000000441a800080004001040040000000c5c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb71b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad9e3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd4e1ffffffffc1c9b6278754ca397c388b0dd6e4edef3d9300"/213, 0xd5}, {&(0x7f0000000200)='sb#', 0x3}], 0x2}, 0x0) 4m37.285771722s ago: executing program 8 (id=3818): r0 = getpid() r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000001c0)='!pu~\'\'\t|\t') r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1b00"/13], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x7, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0x10, 0x38, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x2, 0x7e, 0x7fffffff}, r0, 0xffffffffffffffff, r1, 0xa) r5 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x25, 0x6, @val=@target_btf_id=0xffffffffffffffff}, 0x14) bpf$LINK_DETACH(0x22, &(0x7f0000000080)=r5, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r6) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x1, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xf}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x9549, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, @perf_config_ext={0x76, 0x1ef5}, 0x11efa, 0x4, 0x0, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r7, 0xffffffffffffffff, r4, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f00000000c0)={0x3, 0x80, 0x7c, 0x5, 0x9, 0x8, 0x0, 0x8, 0x2000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0xa, 0x7}, 0x8421, 0x3ce, 0x7, 0x9, 0x2, 0x2, 0x6, 0x0, 0x1, 0x0, 0xfffffffffffffffd}) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r5}, 0x8) ioctl$SIOCSIFHWADDR(r10, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r11, 0x18000000000002a0, 0x6a, 0x0, &(0x7f00000002c0)="d2ff03076003008cb89e08f086dd", 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r12 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r12, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000300)="d8000000180081034e81f783db4cb9040a1d020006007c09e8fc55a10a0015000300142603600e120800060000000441a800080004001040040000000c5c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb71b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad9e3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd4e1ffffffffc1c9b6278754ca397c388b0dd6e4edef3d9300"/213, 0xd5}, {&(0x7f0000000200)='sb#', 0x3}], 0x2}, 0x0) 4m32.073159861s ago: executing program 8 (id=3824): socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xa}, 0x16482, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xf0}}, 0x0) r0 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f00000008c0), 0x43) r1 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f00000008c0), 0x43) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfdef) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r2, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) close(r1) socket$nl_xfrm(0x10, 0x3, 0x6) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000de94000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3}, &(0x7f0000000580), &(0x7f00000005c0), 0x18}, 0x20) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x4, 0x2}, 0x9088, 0x7f, 0x0, 0x7, 0x3fe, 0x7ffffffc, 0x7ff}, 0x0, 0xffffffffffffffff, r3, 0x2) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x4000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x4a, 0x9d, 0x0, 0x4, 0x0, 0x0, 0x17a84, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, @perf_bp={0x0}, 0x1800, 0x2, 0x7, 0x5, 0x3fe, 0x7ffffffb, 0x1d8, 0x0, 0x800000, 0x0, 0x2000c92}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair(0x10, 0x4, 0x40, &(0x7f0000000340)) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a40)=ANY=[@ANYBLOB="4400000001060102000000000000000007000008050001000700000005000100000000000500010007000000050001000700000005000100070000000500010007000000"], 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x20044000) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000280), 0xc}, 0x100, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x404c8c5}, 0x4081) getpid() syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) 4m16.889096397s ago: executing program 38 (id=3824): socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xa}, 0x16482, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xf0}}, 0x0) r0 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f00000008c0), 0x43) r1 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f00000008c0), 0x43) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfdef) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r2, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) close(r1) socket$nl_xfrm(0x10, 0x3, 0x6) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000de94000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3}, &(0x7f0000000580), &(0x7f00000005c0), 0x18}, 0x20) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x4, 0x2}, 0x9088, 0x7f, 0x0, 0x7, 0x3fe, 0x7ffffffc, 0x7ff}, 0x0, 0xffffffffffffffff, r3, 0x2) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x4000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x4a, 0x9d, 0x0, 0x4, 0x0, 0x0, 0x17a84, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, @perf_bp={0x0}, 0x1800, 0x2, 0x7, 0x5, 0x3fe, 0x7ffffffb, 0x1d8, 0x0, 0x800000, 0x0, 0x2000c92}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair(0x10, 0x4, 0x40, &(0x7f0000000340)) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a40)=ANY=[@ANYBLOB="4400000001060102000000000000000007000008050001000700000005000100000000000500010007000000050001000700000005000100070000000500010007000000"], 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x20044000) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000280), 0xc}, 0x100, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x404c8c5}, 0x4081) getpid() syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) 1m34.096461425s ago: executing program 1 (id=4347): r0 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="100000002d000b02d25a806f8c6394f9101a04000a7401", 0x17}], 0x1}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x2c, 0xf, 0x6, 0x401, 0x0, 0x0, {0xa, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0xffffffffffffffff}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x404c850}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_xfrm(r4, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000006c0)=@polexpire={0xc0, 0x1b, 0x10, 0x70bd25, 0x25dfdbfd, {{{@in6=@remote, @in6=@private2, 0x4e20, 0x4, 0x4e22, 0x0, 0xa, 0x0, 0x0, 0x16}, {0x7, 0xa8c, 0x200, 0x3, 0x7, 0x3, 0x4, 0x136c}, {0xc8, 0x7, 0x5, 0xffffffffffffff58}, 0xcc, 0x6e6bbf, 0x2, 0x0, 0x3, 0x1}, 0x6}}, 0xc0}, 0x1, 0x0, 0x0, 0x4044851}, 0x20000011) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000400)={@map, 0xffffffffffffffff, 0x24, 0x2002}, 0x20) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x8}, 0x6218, 0x0, 0x2, 0x6, 0x3fe, 0x7ffffffc, 0x400, 0x0, 0x0, 0x0, 0x300000}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000a8000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0xfffffffd}, 0x39) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) close(0xffffffffffffffff) r6 = socket$kcm(0x2, 0x2, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x68, 0x9, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_EXPR={0x2c, 0x11, 0x0, 0x1, @target={{0xb}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_TARGET_INFO={0x4}, @NFTA_TARGET_REV={0x8}, @NFTA_TARGET_NAME={0xa, 0x1, 'AUDIT\x00'}]}}}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}}, 0xb0}}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r8}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) recvmsg(r6, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x10140) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$OSF_MSG_REMOVE(r3, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000780)={0x1508, 0x1, 0x5, 0x801, 0x0, 0x0, {0x5, 0x0, 0x3}, [{{0x254, 0x1, {{0x0, 0xfff}, 0x6, 0x4, 0x4, 0x0, 0x1b, 'syz1\x00', "8698c77b77996c997eb04c762f305bea3edf457861883c0f7c6b32f528801f72", "057e43b0bd2fee0f2c45275667c8243e2b2a8effcab0cf1e3dba02112c41e2ff", [{0x8001, 0x2, {0x0, 0x3}}, {0x1, 0x7, {0x3, 0x9}}, {0x7, 0x101, {0x1, 0x7fff}}, {0x401, 0x0, {0x0, 0x9}}, {0x0, 0x7, {0x1, 0x8}}, {0xfff8, 0x7, {0x1, 0x1}}, {0x8001, 0xf7, {0x2, 0x320c}}, {0x7f, 0x1ff, {0x1, 0x3}}, {0x8, 0x9, {0x3, 0x1950}}, {0x6b7d, 0xf, {0x2, 0x8}}, {0x2, 0xd2, {0x1}}, {0x85, 0xf06d, {0x0, 0x2}}, {0x3, 0x5, {0x1, 0x34866c83}}, {0x5, 0x4, {0x0, 0xffff}}, {0xfae, 0x7, {0x0, 0x400}}, {0x3, 0x9ea8, {0x1, 0x5}}, {0x0, 0x9, {0x2, 0xe}}, {0x7ff, 0x8, {0x0, 0x4}}, {0x6, 0x4, {0x0, 0x6}}, {0x5, 0x66, {0x1, 0x6}}, {0x1306, 0x8f7, {0x2}}, {0x9, 0x4, {0x1, 0x3}}, {0x7ff, 0x3, {0x0, 0x2}}, {0x800, 0x6, {0x1}}, {0x1, 0x0, {0x2, 0x80}}, {0x4, 0x4, {0x1, 0x7}}, {0x2, 0x0, {0x0, 0x8000}}, {0x26, 0x5, {0x2, 0x6}}, {0x80, 0x2000, {0x0, 0x401}}, {0x3, 0x3ff, {0x3, 0x8}}, {0x59d9, 0xb81, {0x2, 0x1ff}}, {0x800, 0x38, {0x3, 0x9}}, {0x7, 0x6, {0x2, 0x1}}, {0x4, 0x910, {0x2, 0x7}}, {0x6, 0x5, {0x1, 0xff}}, {0x1, 0x9, {0x2, 0x2}}, {0x100, 0x7ff, {0x0, 0x893a}}, {0x4, 0xe, {0x1, 0xeec}}, {0x0, 0xe9c9, {0x0, 0x7}}, {0x3, 0x9, {0x0, 0x5}}]}}}, {{0x254, 0x1, {{0x3, 0xfffffff5}, 0x4, 0x2, 0x8000, 0x0, 0x16, 'syz0\x00', "85b961c04c0c7a3d2618a54692788cde5caeffd095797fe50c0fc4af5db74a72", "4754bdd6d3ef0997fe6f943634b0e14b2258d41a6de3463c7b5d8ba9e8cf9afe", [{0x0, 0x9, {0x0, 0x68}}, {0x4, 0x401, {0x2, 0xfffff9e5}}, {0x401, 0x9, {0x2, 0x8c97}}, {0x0, 0x8, {0x3, 0x9}}, {0x6, 0x10, {0x3, 0x8}}, {0x6, 0x5, {0x0, 0x6}}, {0xf8a3, 0xc, {0x1, 0x7}}, {0x7f, 0x10, {0x3, 0xaa0}}, {0x7, 0x8, {0x3, 0x4}}, {0x4, 0x5, {0x3, 0x8000}}, {0xa6, 0x1, {0x0, 0x7ff}}, {0x5, 0x8001, {0x0, 0x7}}, {0x7fff, 0xffff, {0x2, 0x2}}, {0xd, 0x800, {0x1}}, {0xff, 0x737, {0x2, 0xffffff23}}, {0x200, 0x2, {0x1, 0x400}}, {0x20, 0x3, {0x2, 0x4}}, {0x2, 0xfff, {0x2, 0x7}}, {0x5ae9, 0x5, {0x1, 0x80000001}}, {0x80, 0x9, {0x2, 0x9aa}}, {0x204, 0x8, {0x0, 0x2}}, {0x1, 0x6, {0x3, 0x5}}, {0x38b, 0xff, {0x2, 0x7}}, {0x46, 0x8000, {0x3}}, {0x8, 0x0, {0x2, 0x6}}, {0x7, 0x5aaf, {0x3, 0xd3}}, {0x9, 0xfa8c, {0x0, 0x1}}, {0x3, 0x2, {0x3, 0x3}}, {0x1, 0xfff2, {0x2, 0x8}}, {0x4, 0xf, {0x1, 0x7}}, {0xff, 0x400, {0x1, 0xd}}, {0x8, 0x81, {0x2}}, {0x7, 0x6, {0x1, 0x9af7}}, {0x9ecd, 0xa1a6, {0x0, 0x5db}}, {0xc, 0x5, {0x2, 0x6}}, {0x7ff, 0x1, {0x3, 0x7}}, {0x1ff, 0x9c, {0x2, 0x6}}, {0x1, 0x5, {0x0, 0x2}}, {0x7f, 0xf4, {0x2, 0x2}}, {0x8, 0x9, {0x0, 0x80000001}}]}}}, {{0x254, 0x1, {{0x1, 0x5}, 0x1, 0x5, 0x8001, 0x7, 0x11, 'syz1\x00', "feeabc8c2c2b988fa0e519a6d9d43929bc585fbb27d356891ecde6a2a234f400", "d8e9ee3b4c25cc1786c9c3e2448cb8b709d76661e01bdad8388592a1d53e14f5", [{0xd, 0x4, {0x0, 0x8}}, {0x7fff, 0x200, {0x1, 0x9447}}, {0xe2, 0x7fff, {0x3, 0xdc4}}, {0x9, 0x2, {0x3, 0x9a}}, {0x1, 0x1, {0x2, 0x5}}, {0x80, 0x241}, {0x8, 0x6, {0x0, 0xec}}, {0x39, 0x5d, {0x3, 0xfe}}, {0xb0, 0xbed0, {0x1, 0xa00b}}, {0xff80, 0xd, {0x0, 0xa}}, {0x6, 0x13a2, {0x2, 0x7}}, {0x4, 0xffff, {0x3, 0x6}}, {0xffff, 0x40, {0x2, 0x7}}, {0x3, 0x9, {0x2, 0x7fff}}, {0x0, 0xc76e, {0x2, 0x9}}, {0x2e, 0x0, {0x3, 0x5}}, {0x0, 0x9, {0x0, 0x4}}, {0x9, 0x3, {0x3, 0x5}}, {0x6, 0x4, {0xeaa4c486600c10bc, 0xffff91f3}}, {0x5, 0x400, {0x2, 0x100}}, {0x4af1, 0xc5b5}, {0x0, 0x1, {0x2, 0x800}}, {0x1, 0x55b3, {0x1, 0x1}}, {0x81, 0x2, {0x0, 0xff}}, {0x9, 0x6, {0x1, 0x6}}, {0x400, 0x6, {0x3, 0x5}}, {0xf572, 0x61d4, {0x2, 0x8}}, {0x3, 0x2, {0x2, 0x9}}, {0x5, 0xf, {0x3, 0x200}}, {0xd, 0x4, {0x0, 0x800}}, {0xfc01, 0x1, {0x1, 0x1}}, {0xfff7, 0x54, {0x0, 0xc}}, {0x2, 0x8, {0x0, 0x3}}, {0x81, 0x298e, {0x2}}, {0x7, 0x9, {0x3, 0x5}}, {0x2, 0x401, {0x2, 0x3d}}, {0x401, 0x7ff, {0x0, 0x8}}, {0x5b9f, 0x9, {0x1, 0x5}}, {0xff81, 0x7, {0x2, 0x8}}, {0x4, 0x1000, {0x2, 0x1}}]}}}, {{0x254, 0x1, {{0x2, 0x400}, 0x6, 0xa, 0x7, 0x101, 0x20, 'syz1\x00', "9b5fb81c4d7c5218ac2fe55dca3558260d136953abb9a8fcfbb69afad7af625d", "2515fec5307ab75a0c4a2aec167895af5c050a33a7d1e44718671f5fdb067222", [{0x8000, 0x2, {0x1, 0x9}}, {0x8f5, 0x50e4, {0x0, 0x6}}, {0x8, 0xe, {0x1, 0x1ff}}, {0x6, 0x1, {0x1, 0x1ff}}, {0x7, 0x0, {0x1}}, {0x100, 0x4, {0x3, 0x5e}}, {0xc7, 0xd5, {0x3, 0x3}}, {0x3ff, 0x7ff, {0x0, 0x2}}, {0x6, 0x4, {0x3, 0xb}}, {0x0, 0x7, {0x0, 0x2}}, {0x6, 0xc221, {0x0, 0x905}}, {0xca, 0x7fff, {0x3, 0x7908}}, {0x9, 0x77, {0x0, 0x9}}, {0x0, 0x2, {0x1, 0x3}}, {0x8001, 0x1, {0x3, 0x89da7cc}}, {0x4c8, 0xfc85}, {0x0, 0xd2de, {0x3, 0x7}}, {0x9, 0x5, {0x1, 0xa}}, {0x0, 0x7, {0x1, 0xffff}}, {0x9, 0x1ff, {0x2, 0xfffffffd}}, {0x0, 0x4, {0x3, 0x5}}, {0x5, 0x0, {0x1, 0xa}}, {0x9, 0x3, {0x0, 0x9}}, {0xb48, 0x200, {0x2, 0x3}}, {0x19, 0x8, {0x0, 0x26e}}, {0x8001, 0x7, {0x0, 0x4}}, {0x4, 0x7, {0x1, 0xc}}, {0xfff7, 0x897, {0x2, 0xb0d1}}, {0x8, 0x2, {0x2, 0xfffffff8}}, {0x7, 0x2, {0x1, 0x3}}, {0x674, 0xe, {0x3, 0xa}}, {0x1, 0x0, {0x1, 0x3}}, {0x7, 0x6, {0x0, 0x7}}, {0xd0, 0x9, {0x2, 0x553}}, {0x1, 0x375, {0x1, 0x7}}, {0x1, 0x7, {0x2, 0x2}}, {0x6, 0xd2c, {0x2}}, {0xe, 0x4, {0x0, 0xfff}}, {0x64, 0x3, {0x0, 0x2}}, {0x9, 0x8001, {0x0, 0x8000}}]}}}, {{0x254, 0x1, {{0x2, 0xff}, 0x6, 0x6, 0x9, 0x8, 0x1e, 'syz1\x00', "22d679ab9a44ce8ab4c6a18a1a2873c16bcf26d6d14ac768845d7e6255f04a37", "025be3e8445d7f442513c31f9f072eaeab7731b60c07d5abf104bbe92eb3b197", [{0x2, 0x8, {0x1, 0x7fff}}, {0xbb80, 0x2, {0x2, 0x1}}, {0x7, 0xd1, {0x2, 0x4}}, {0x0, 0x4, {0x2, 0x7}}, {0x2, 0x2, {0x2, 0x4}}, {0xfff, 0x1, {0x1, 0x10000}}, {0x6, 0x6, {0x3, 0x6fed5113}}, {0x4, 0x8, {0x3, 0x5}}, {0x2, 0x10, {0x0, 0x8001}}, {0x3, 0x943, {0x3, 0x4c83}}, {0x2, 0xd, {0x3, 0x1}}, {0x0, 0x0, {0x2, 0x8}}, {0x71c, 0x469d, {0x2, 0x9}}, {0x6, 0x7, {0x1, 0x1}}, {0x8, 0x6, {0x3, 0x4}}, {0xfffb, 0x2, {0x3, 0xfffffff8}}, {0x40, 0x5, {0x1, 0x8}}, {0x15, 0x0, {0x3, 0xf4}}, {0x5c9a, 0x5, {0x2, 0x4}}, {0xfffb, 0x3, {0x3, 0x7fffffff}}, {0x1, 0x3, {0x0, 0x30e834b1}}, {0x4, 0x4c, {0x1, 0x8000}}, {0x9d92, 0x7, {0x0, 0xffffffff}}, {0x4, 0x3, {0x0, 0x13}}, {0x4d, 0xb, {0x3}}, {0x101, 0x5, {0x2, 0x9}}, {0x2, 0x3, {0x74a5db8ababca04, 0x401}}, {0x8, 0x10, {0x3, 0x60}}, {0xf093, 0x2, {0x1, 0x4}}, {0x0, 0x4, {0x0, 0x7}}, {0x1, 0x3, {0x0, 0xffffffff}}, {0x3, 0x6, {0x0, 0xfffff801}}, {0x8000, 0x4, {0x1, 0x3}}, {0x5, 0xa, {0x3, 0x3b3d}}, {0x71, 0x8, {0x1, 0x8}}, {0x8001, 0xfff8}, {0x7, 0x7fff, {0x0, 0x1}}, {0x4, 0x1, {0x1, 0x9}}, {0x8, 0x6, {0x0, 0x7}}, {0x0, 0x36}]}}}, {{0x254, 0x1, {{0x2, 0x7}, 0x9, 0x80, 0x8001, 0x7, 0x8, 'syz1\x00', "17cd9053f7567da5f1dc5ba6efa0596328ded5cf99d8195e006e88bff0bf57bc", "ae688d89209a873a7513095e93b8f12cbca46769033efe90d47bfc86c18c7b75", [{0xfffd, 0x8}, {0x6ed5, 0x5, {0x3, 0x674}}, {0x5, 0x3, {0x2, 0xa}}, {0x1000, 0x5, {0x2, 0x1}}, {0xfff, 0x9, {0x0, 0x3}}, {0x4, 0x8, {0x1, 0x1}}, {0x1, 0xdb2b, {0x0, 0x7}}, {0x30, 0x3, {0x2, 0x7}}, {0xffeb, 0x0, {0x1, 0x9}}, {0x8, 0x7, {0x3, 0x7f}}, {0xfc10, 0x4, {0x2, 0x6}}, {0x9, 0xcf0, {0x1, 0x80000001}}, {0x7, 0x800, {0x2, 0x9}}, {0xe252, 0x7, {0x2, 0x82}}, {0x5, 0xd, {0x3, 0x1}}, {0x3, 0xda, {0x1, 0x87d8b77c}}, {0x6a, 0x9, {0x3, 0x8}}, {0x6, 0x5, {0x3, 0xf}}, {0x5, 0x320, {0x0, 0xa}}, {0x4fe, 0x6, {0x2, 0x9}}, {0x8, 0x7, {0x2, 0xf}}, {0x4, 0x0, {0x0, 0x7}}, {0x8729, 0x8, {0x1, 0x6}}, {0x1, 0x353, {0x1, 0x1}}, {0x6, 0x5, {0x0, 0x2}}, {0x9, 0x8, {0x0, 0x4}}, {0x80, 0xdab4, {0x1, 0x3}}, {0x0, 0xd20, {0x1, 0x296}}, {0x1, 0x0, {0x3, 0x100}}, {0x101, 0xfffd, {0x2, 0x8}}, {0x9, 0x4, {0x1}}, {0x0, 0x5, {0x0, 0x4}}, {0x8, 0x5, {0x0, 0x4}}, {0x8, 0x1, {0x0, 0x7}}, {0x101, 0x8001, {0x2, 0xd}}, {0x6, 0xa, {0x1, 0xffff}}, {0xfff7, 0x9, {0x0, 0x5}}, {0xae3, 0xaf, {0x3, 0x52e493a6}}, {0xe, 0xa866, {0x3, 0x10}}, {0x3, 0x5, {0x1, 0x3}}]}}}, {{0x254, 0x1, {{0x2, 0x7fff}, 0x7d, 0x5, 0x4f80, 0x9, 0x7, 'syz1\x00', "cbfa56df3093a6e8588fd26a0d3e7b9064dc0a29454d375a7cfc0f6278597ff7", "2230765eb1963bc615333c5607aa90756252ccb79c937960103922f33f8f5ceb", [{0x7, 0x8, {0x3, 0xfc9}}, {0x2, 0x25, {0x2, 0x1}}, {0x2, 0xd, {0x1, 0x54}}, {0x80, 0x7f, {0x2, 0x7}}, {0x0, 0x7fff, {0x3, 0x6}}, {0x7f, 0x9, {0x0, 0x4}}, {0x3, 0x4, {0x2, 0x8231}}, {0xfffd, 0x9, {0x0, 0x5}}, {0xa4c8, 0x7, {0x0, 0x9}}, {0x4bf1, 0x8000, {0x1, 0x81}}, {0x3, 0x6, {0x0, 0x2}}, {0x1, 0xd, {0x2, 0xe995bde}}, {0xfffb, 0x44e, {0x0, 0x52}}, {0x1, 0xf, {0x0, 0xf63}}, {0x7fff, 0x4, {0x2, 0x4513}}, {0x1e0, 0x2, {0x0, 0x19a}}, {0x0, 0x9, {0x3, 0xb15}}, {0x2, 0x0, {0x3, 0x6}}, {0x2, 0xfffb, {0x1, 0x2a8f}}, {0x6, 0x33, {0x4, 0xe98}}, {0xa, 0x4, {0x2}}, {0x28, 0x81, {0x3, 0xffffffc0}}, {0x1, 0x9, {0x2, 0x7}}, {0x5, 0x1, {0x3, 0xffffff7f}}, {0x2, 0x4, {0x2, 0x9}}, {0x5, 0x8000, {0x0, 0x84}}, {0x1, 0x8, {0x3, 0x401}}, {0x931, 0x9, {0x0, 0x7fff}}, {0x7, 0x3, {0x3, 0x7}}, {0x200, 0x5, {0x1, 0x3}}, {0x9, 0x5, {0x1, 0x2}}, {0x0, 0xb748, {0x2, 0x1}}, {0x0, 0x1ff, {0x3, 0x3}}, {0x81, 0x4, {0x3, 0x85}}, {0x4, 0x4d45, {0x1, 0x7fff}}, {0x7, 0x206, {0x1, 0xd}}, {0x1, 0xf33, {0x3, 0xb5f}}, {0x40, 0x9cc4, {0x3, 0x5}}, {0x1, 0x401, {0x0, 0x9}}, {0x6, 0x9, {0x1, 0x4}}]}}}, {{0x254, 0x1, {{0x2, 0x4}, 0x9, 0xc8, 0x7d, 0x9, 0x1, 'syz1\x00', "8aecb5c753e9f405fa83a03c7cc8480ac91d14220bebf6d42cddfced9c8d9b7b", "56ae5739841e17d0274be8c372c30d9c1a16aef79b666b19793e1727216fd8a4", [{0x0, 0xf, {0x0, 0x5}}, {0xfffd, 0x4, {0x0, 0x30e}}, {0x1000, 0x1, {0x0, 0xfffffff9}}, {0x6, 0x0, {0x1, 0x100}}, {0x80, 0x6000, {0x2, 0x800}}, {0x9, 0x1, {0x2, 0x2}}, {0xe462, 0x5, {0x2, 0x1000}}, {0x3, 0xa, {0x1, 0x5}}, {0xfff7, 0xffff}, {0x8, 0x4, {0x1, 0xc}}, {0x9, 0x8, {0x6, 0xbbe2}}, {0xb7, 0x19fc, {0x3, 0xfffffffe}}, {0x2, 0x9, {0x2, 0x8}}, {0x8, 0x0, {0x1, 0x7}}, {0x7, 0x95ad, {0x1, 0x5}}, {0x4, 0x9, {0x0, 0xf}}, {0x3, 0x0, {0x1, 0x9}}, {0x8, 0x86c9, {0x3, 0xc}}, {0x411c, 0x2000, {0x1, 0x7}}, {0x3, 0x7ff, {0x1, 0xa}}, {0x81, 0x6, {0x2, 0x507}}, {0x2, 0x101, {0x2, 0x6}}, {0x7fff, 0x5, {0x3, 0xc2a8}}, {0x9, 0x77, {0x1, 0x100}}, {0xff, 0x7ff, {0x3, 0x81}}, {0x8000, 0x9, {0x3, 0xbfd}}, {0x8, 0x1, {0x3, 0xd}}, {0x3, 0x888a, {0x2, 0x2}}, {0x5, 0x8, {0x0, 0x40}}, {0x35c7, 0x0, {0x0, 0x6b}}, {0x7, 0x1, {0x0, 0x2}}, {0x7, 0x3ff, {0x1, 0x7fff}}, {0x4, 0xa3f, {0x0, 0xffff}}, {0xd, 0x3, {0x0, 0x2}}, {0x5, 0x4, {0x1, 0x401}}, {0x0, 0xc10, {0x3, 0x14}}, {0x2, 0xe5, {0x0, 0x4}}, {0x6d, 0x2, {0x1, 0x8b}}, {0x0, 0x6b, {0x2, 0x39f5cebf}}, {0x0, 0x62de, {0x1}}]}}}, {{0x254, 0x1, {{0x1, 0xffffff00}, 0x6, 0xae, 0xf2c, 0x0, 0x1e, 'syz1\x00', "0580554a00052067579a4ae1410590e9a4d329b3a1405f9474751267903d115f", "8b7ed9b634ee52f4e833f8bbfc1588ad06632962c1f87daf8ecc1b4afdf35df6", [{0x101, 0xd4aa, {0x3, 0x9}}, {0x4, 0x4, {0x0, 0x8}}, {0x3ff, 0x100, {0x0, 0x1}}, {0x5, 0x3ff, {0x0, 0x9}}, {0x101, 0x8, {0x3}}, {0x8, 0x8000, {0x1, 0x4}}, {0xd55, 0xfff8, {0x1, 0x2}}, {0x8, 0x7, {0x1, 0x101}}, {0x2, 0x1, {0x2, 0x80000001}}, {0xd08e, 0x401, {0x0, 0x5}}, {0x4, 0x1, {0x2, 0x7ff}}, {0x46f3, 0x4fb, {0x0, 0x6}}, {0x3, 0xd, {0x1}}, {0xb8a0, 0x1, {0x0, 0x9}}, {0x1af, 0x4, {0x1, 0x1000}}, {0x9, 0x2, {0x0, 0x9}}, {0x2, 0x7, {0x2, 0x5}}, {0xb5, 0x100, {0x3}}, {0xfffa, 0x1, {0x3}}, {0x538d, 0x1e8c, {0x1, 0xfffffffd}}, {0x200, 0xb3cb, {0x1, 0x9}}, {0x4, 0x0, {0x1, 0x7}}, {0x401, 0x0, {0x3, 0x7f}}, {0x2c3a, 0x4, {0x0, 0x1}}, {0x2, 0x6, {0x0, 0x4}}, {0x9, 0x48, {0x1, 0x9}}, {0x1, 0x7, {0x3, 0x8}}, {0x0, 0x1, {0x0, 0x80000001}}, {0x3, 0x17, {0x1}}, {0x4, 0x400, {0x1, 0x7fffffff}}, {0xc84, 0x6, {0x0, 0x5}}, {0x9782, 0x9, {0x1, 0xff}}, {0x5, 0xb, {0x3, 0x6}}, {0x56, 0x6, {0x0, 0xd1}}, {0x7, 0x6}, {0xe, 0x1f, {0x2, 0x8}}, {0x0, 0xfffd, {0x2}}, {0x1, 0x5, {0x3, 0x101}}, {0x9, 0x84, {0x0, 0x9546}}, {0x1, 0x5, {0x2, 0x6}}]}}}]}, 0x1508}, 0x1, 0x0, 0x0, 0x84}, 0x40040) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_HEADER(r9, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x14, 0xc, 0x6, 0x101, 0x0, 0x0, {0x7, 0x0, 0x5}}, 0x14}, 0x1, 0x0, 0x0, 0x200080b7}, 0x40000) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="93430000520033d087277b9b108b4ab51c", @ANYRES32, @ANYRES8=r0], 0xfe33) 1m33.10038318s ago: executing program 1 (id=4353): r0 = getpid() r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000001c0)='!pu~\'\'\t|\t') r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1b00"/13], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x7, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x2, 0x7e, 0x7fffffff}, r0, 0xffffffffffffffff, r1, 0xa) r5 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x25, 0x6, @val=@target_btf_id=0xffffffffffffffff}, 0x14) bpf$LINK_DETACH(0x22, &(0x7f0000000080)=r5, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r6) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x1, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xf}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x9549, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, @perf_config_ext={0x76, 0x1ef5}, 0x11efa, 0x4, 0x0, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r7, 0xffffffffffffffff, r4, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f00000000c0)={0x3, 0x80, 0x7c, 0x5, 0x9, 0x8, 0x0, 0x8, 0x2000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0xa, 0x7}, 0x8421, 0x3ce, 0x7, 0x9, 0x2, 0x2, 0x6, 0x0, 0x1, 0x0, 0xfffffffffffffffd}) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r5}, 0x8) ioctl$SIOCSIFHWADDR(r10, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r11, 0x18000000000002a0, 0x6a, 0x0, &(0x7f00000002c0)="d2ff03076003008cb89e08f086dd", 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r12 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r12, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000300)="d8000000180081034e81f783db4cb9040a1d020006007c09e8fc55a10a0015000300142603600e120800060000000441a800080004001040040000000c5c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb71b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad9e3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd4e1ffffffffc1c9b6278754ca397c388b0dd6e4edef3d9300"/213, 0xd5}, {&(0x7f0000000200)='sb#', 0x3}], 0x2}, 0x0) 1m32.678478306s ago: executing program 6 (id=4354): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x15, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) close(r0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000040)=r0, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000005000000080000000f"], 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000038000000380000000300000000000000000000030000000003000000020000000200000000000000000000010500000010000000010000000000001101000000000000000061"], 0x0, 0x53}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x2, 0x14, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c210000000000202020cc439620a84237617b1af8ff00000000bfa100000000000007010000f8f9ffffb702000008000000b703000000000000850000", @ANYRES64=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x65, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000840)={r2}, 0xc) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[], 0x50) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x3, 0x9008, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x7, 0x1, 0x9, 0x3fe, 0x7fffffff, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x2c}, 0x1, 0x0, 0x0, 0x20000054}, 0x20040004) r4 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x58, 0x24, 0xf0b, 0x70bd2e, 0x0, {0x0, 0x0, 0x12, r5, {}, {0xffff, 0xffff}, {0x2}}, [@qdisc_kind_options=@q_fq_pie={{0xb}, {0x4}}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x2, 0x9, 0x5, 0x9, 0x1, 0xffffffff, 0x2}}, {0x4}}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x8004001}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x608c1}, 0x20000004) sendmsg$inet(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="5c00000012006bab9a1fe3d86e17aa0a076b876c1d0048007ea60864160afb650400bd1d38001d009580472760bc06000000a705251e6182949a36510a84c9fa896e0a374841e1028b8f0b79c139977394e70e4509c5bb000011d600", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x0, 0x4, 0x0, 0x0) socket$kcm(0xa, 0x3, 0x73) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4f, 0xd, 0x0, 0x0, 0x0, 0x2, 0x201, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext={0x9, 0x1944}, 0x0, 0x0, 0x0, 0x0, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0xdee}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0xa) r8 = socket$kcm(0x2d, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f00000003c0)={&(0x7f0000000000)=@pptp={0x2d, 0x2, {0x0, @loopback}}, 0x80, 0x0}, 0x1) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r9, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="4400000002060108000034e40000000005000000050001000600000005000400000000000900020073797a3100000000050005000a0000000c000300686173683a6970000cfa10ac1bd5d3975c05560636db65a3cbee9b8c20abe60f50fd1cc6e0b5beabdc6069d3fcd4ad1a74097d7312d360496d960b0e3255f4634c60df4e"], 0x44}}, 0x2) ioctl$SIOCSIFHWADDR(r7, 0x8b06, &(0x7f0000000080)={'wlan1\x00', @random="02000000000a"}) 1m31.917146667s ago: executing program 0 (id=4356): bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x4, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1802000000000000000000000000e8ff840000007c0000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000001ac0)={&(0x7f0000000180)={0x14, 0x2c, 0x1, 0x70bd26, 0x25dfdbfc, {0x5}}, 0x14}, 0x1, 0x0, 0x0, 0x4000d}, 0x20000000) r1 = socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d34, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_config_ext={0x2000000008, 0x800}, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000006007ace7748ff040000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r3, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="180000001f002d708300000000000006000000186500000900000000000000000000950000000000000000"], &(0x7f0000000240)='syzkaller\x00', 0x8, 0x35, &(0x7f0000000280)=""/53, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffff800}, 0x94) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r4, 0x0, 0x4000044) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0xb8}}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x4000010) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)=0x6c0000000000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000640)=ANY=[@ANYRESHEX=r2, @ANYRESHEX=r5], 0x0, 0xfffffffe, 0x0, 0x0, 0x727c45cd4283345, 0x8, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002080)=ANY=[], &(0x7f0000000540)='syzkaller\x00'}, 0x94) sendmsg$inet(r9, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000003c0)="2677bd3f39", 0x5}], 0x1, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x40}, @dev={0xac, 0x14, 0x14, 0x2f}}}}], 0x20}, 0x40) sendmsg$nl_route_sched(r8, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000880)=@newtaction={0x78, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x64, 0x1, [@m_ctinfo={0x60, 0x1, 0x0, 0x0, {{0xb}, {0x34, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x18, 0x3, {0x0, 0x0, 0xffffffffffffffff}}, @TCA_CTINFO_ACT={0x18, 0x3, {0x7fffffff, 0x0, 0xffffffffffffffff, 0xf01a, 0x404}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x10004}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="25390000290003"], 0x33fe0) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newtaction={0x138, 0x30, 0x1, 0x0, 0x0, {}, [{0x124, 0x1, [@m_skbmod={0xec, 0x1d, 0x0, 0x0, {{0xb}, {0x4c, 0x2, 0x0, 0x1, [@TCA_SKBMOD_SMAC={0xa, 0x4, @random="e0bc59662d9c"}, @TCA_SKBMOD_DMAC={0xa, 0x3, @multicast}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x7}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x10}, @TCA_SKBMOD_SMAC={0xa, 0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x9}, @TCA_SKBMOD_SMAC={0xa, 0x4, @multicast}]}, {0x76, 0x6, "7214a7c93372ca07e4dd5bee82d1d3e307e9757901a82ef062e2660c306c39b60021d37395cb66e78984a940964f87a22c915791fec9b5d0a3ca7d49ee2f61c9140b40da8a8b5671e8edc39f3b9f8c65276351760ac3ed5a22f357539c6f404b30c64a6d06a41b2dbf78d1d56c3db0a1fc0b"}, {0xc}, {0xc, 0x8, {0x3, 0x2}}}}, @m_ife={0x34, 0x1, 0x0, 0x0, {{0x8}, {0xc, 0x2, 0x0, 0x1, [@TCA_IFE_TYPE={0x6, 0x5, 0xffff}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x138}}, 0x0) 1m25.152003042s ago: executing program 6 (id=4358): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000ffffffff000000000000000085000000a8000000b7080000000000007b8af8ff00", @ANYRES32=r0, @ANYRES16=0x0, @ANYRES64=r0, @ANYRES8=r0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x50) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socket$packet(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x41, &(0x7f00000001c0), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r1, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x43, &(0x7f0000000440), 0x0, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0xbc, 0x8, 0x0, 0x0}}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x41, &(0x7f00000001c0)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x11, &(0x7f0000000580)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x400000}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="9feb01041800"], 0x0, 0x5a, 0x0, 0x3}, 0x28) openat$cgroup_int(r3, &(0x7f0000000080)='blkio.throttle.write_iops_device\x00', 0x2, 0x0) r4 = getpid() r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x42000) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) sendmsg$NFT_BATCH(r1, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)={{0x14}, [@NFT_MSG_DELOBJ={0x64, 0x14, 0xa, 0x201, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x1}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x4}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x1}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x8}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x8c}, 0x1, 0x0, 0x0, 0x4000091}, 0x4000080) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xf}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000003000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20000000}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, &(0x7f0000000040)="cd56d4869885350e3ae2c7c207728963a0a3e5612721beff191f727f0a96c232c679dea608e68e577511d575c06105f569a805131e4914c00cacb91800cdc33e356260330a653b50a216cc7b0bb57a", 0x0}, 0x63) bpf$MAP_CREATE(0x0, 0x0, 0x48) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r8, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000005c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x10}]}, @NFT_MSG_NEWSETELEM={0x40, 0xc, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0xc, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x6, 0x1, "d103"}]}]}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0xac}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r9, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001f80)=ANY=[@ANYBLOB="2c0000000d0a010300000000000000000a0000010900020073797a31000000000900010073797a31"], 0x2c}, 0x1, 0x0, 0x0, 0x24008801}, 0x8000) 1m25.07733949s ago: executing program 5 (id=4359): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="9feb01001800000000000000"], 0x0, 0x26, 0x0, 0x1, 0x4}, 0x28) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f0000000100)='devices.allow\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[], &(0x7f00000001c0)=""/257, 0x2a, 0x101, 0x6}, 0x28) r1 = getpid() perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x4, 0x80180, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x40, 0x9, 0x8000, 0x8, 0x101, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x15, 0x5, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x100600, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0xa, 0x2, 0x88) r2 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r2, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @loopback={0xffffffffffff0000, 0xac14140c}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x900}, 0x60) 1m24.960743574s ago: executing program 0 (id=4360): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x4}, 0x4000, 0x0, 0x0, 0x0, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x8, &(0x7f00000000c0), 0x8) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe, 0x66c}, 0x104101, 0x4, 0x0, 0x5, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r2, 0x0, 0x2b, 0x0, 0x0) r3 = bpf$TOKEN_CREATE(0x24, 0x0, 0x618da19402b50e3e) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="2c0000003e00070127bd700000000000017c00000400fc800c000180e6ffeeff", @ANYRES32=0x0, @ANYBLOB="080002", @ANYRES64=r3, @ANYRES64=0x0], 0x2c}, 0x1, 0x0, 0x0, 0xc000}, 0x4040) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xa}, 0x21, 0x0, 0x0, 0x4, 0x2, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0xa, &(0x7f0000000680)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000002c0000000000000018000000000000000000000000000000950000000000000095"], &(0x7f0000000000)='GPL\x00', 0x4}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={r6, 0xe0, &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x8, &(0x7f0000001380)}}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r8 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000040)={r8}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_attach_bpf(r5, 0x88, 0x67, &(0x7f0000000580)=r7, 0x4) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$inet(r5, &(0x7f0000000380)={&(0x7f0000000080)={0x2, 0x4e24, @local}, 0x66, &(0x7f0000000300)=[{&(0x7f00000003c0)="7f50f1625cfeca4f2bf5c6c8d40f7ade5d2b5b4d9dbae36ef60000000004b9f01c3a00a9a91a", 0x26}], 0x1, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @rand_addr=0x64010100}}}], 0x20}, 0x4880) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000140)={'ipvlan0\x00', 0x1000}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 1m24.893199765s ago: executing program 1 (id=4361): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x20, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10a1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xbfffffff}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0100000021000000050000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000fc063864c734f3d73e2c637bf4366cbe00000000000000000000000000006c8f94fe00000080686171bc6b15daff3e5f06eeefad64b17a7bd10a79cf053d11228cb2108c4561cbadacf2deb4ee03a7308c5eb61a3f7dcb59ae8e56090762675de3c5e3d281db5786685c482b6a590667184b6b3264e7d7eda87bd0"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) socket$inet6_sctp(0xa, 0x5, 0x84) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000006911b900000000008510000002000000850000008800000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x70) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7ffffffe, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001b00)={0x14, 0x1e, 0x301, 0x20000002, 0x0, {0x1}}, 0x14}, 0x1, 0x0, 0x0, 0x81}, 0x4004000) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r2, &(0x7f0000000080), &(0x7f0000000000)=""/3, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r2, &(0x7f0000000140), &(0x7f0000000000)=""/6, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r2, &(0x7f0000000100), &(0x7f0000000000), 0x2}, 0x20) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="50000000090601020000000000000000020000840900020073797a31000000000500010007000000280007800c00018008000140fffffff70500070088000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x10000082}, 0x90) 1m24.538012161s ago: executing program 5 (id=4363): socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000840)={0x180, 0x1, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0x7}, [@NFTA_TABLE_USERDATA={0xa7, 0x6, "93637d3c4bbda4f8ec4a7d9cf68c6f36ceb2ba538ef57edc41ad187ba013a3bfc7b7b66b1fe3dea540e2ed29f86774208753c2bab8f88d67fabcebb14cc11a9d7f435d446ab14d1c4203f8358cfacef70ee0720452a0b616e5d13ce6117d0c28ed6fca8e1ce0f41112a375dc18ea111626275908f693f3f96d7716be3e4b933962c34315ce5bc52ddfeb2fcfd33601eb3fecec7e82ec6f42254237e1d42e68da127f0d"}, @NFTA_TABLE_USERDATA={0x73, 0x6, "9aaea2585f4ff57483d48e664ace645e2e0c6c9550c28307205c8691fa94378cb8c5f08d4336a8f595757ebe42fb20418a2a4766ffb6c5bc20fdf14367d12928226897fcfe13f27243c12f2ec5856d2813200aeb13314395a87193dc72c57c8913fa6155f50970eb5ea42602770070"}, @NFTA_TABLE_FLAGS={0x3, 0x2, 0x1, 0x0, 0x2}, @NFTA_TABLE_USERDATA={0xc, 0x6, "6ab06797f3d9d960"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_USERDATA={0xc, 0x6, "86ca4545081a37ad"}]}, 0x180}, 0x1, 0x0, 0x0, 0x2400c0c4}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1, 0x830d}, 0x10100, 0x2, 0xfffffffe, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="05000000050000000100000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x16, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c00000015000103000000000000000001"], 0x1c}, 0x1, 0x0, 0x0, 0xc000}, 0x4000000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000001f00)="de4dc043102f0e202515a02eac23", 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)=@o_path={0x0, 0xffffffffffffffff, 0x4000, r2}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8800000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d2d, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x1, 0xfffffffe, 0x0, 0x800, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1000000f3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001b40)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, 0x0, 0x0) 1m24.353385598s ago: executing program 0 (id=4364): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0xa, 0x2, 0x3a) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x2, @perf_config_ext={0x4, 0x7}, 0x0, 0x0, 0x0, 0x1, 0x43fe, 0x7fffffff, 0xfffc, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) sendmsg$kcm(r0, 0x0, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x90ff}, {}, {0x7, 0x0, 0xb, 0x7}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, 0x8, 0x0, 0x0}}, 0x10) socket$kcm(0x10, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000002fc0)=ANY=[@ANYBLOB="200000002e00090027bd7000000000000400000004001d000800098004"], 0x20}, 0x1, 0x0, 0x0, 0x42804}, 0x0) 1m24.285415282s ago: executing program 6 (id=4365): socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000340), 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={@cgroup=r0, 0x11, 0x1, 0x3, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000480)=[0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0]}, 0x40) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000300)) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r3 = socket$kcm(0x15, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000006000000aa"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0xa7c, r4}, 0x38) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x54, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}, @NFTA_SET_EXPR={0x18, 0x11, 0x0, 0x1, @connlimit={{0xe}, @val={0x4}}}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0x7c}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r6) close(r5) socketpair(0x1, 0x801, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x5452, &(0x7f0000000b80)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca^\xf9\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x96\x86\xdb\xa9\xd3\x01\xb2\xc7\xf8G\x069\x90,\xda\xf6\xc5\xcd\xec\xa3B\xc3\"4\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\x7f\xec\xb2\xc5E\x00\xdd\xf2e\xa8\xf1<\xb2\xc82\xbf=o\x00`\xc1A\'\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x92\xbb\xe3Y\x97\xc2') write$cgroup_type(r6, &(0x7f0000000080), 0x11ffffce1) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="130000204f00010000000000ffdbdf2502"], 0x14}}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd63"], 0xcfa4) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a20000000000a01080000000000000000010000090900010073797a3100000000d0000000030a030000060000000000000100000a0900010073797a31000000000900030073797a3000000000a4000300627269646765b8bdbb"], 0x118}, 0x1, 0x0, 0x0, 0x24000144}, 0x240408d0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r9, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 1m24.112139822s ago: executing program 1 (id=4366): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000ffffffff000000000000000085000000a8000000b7080000000000007b8af8ff00", @ANYRES32=r0, @ANYRES16=0x0, @ANYRES64=r0, @ANYRES8=r0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x50) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socket$packet(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x41, &(0x7f00000001c0), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r1, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x43, &(0x7f0000000440), 0x0, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0xbc, 0x8, 0x0, 0x0}}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x41, &(0x7f00000001c0)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x11, &(0x7f0000000580)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x400000}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="9feb01041800"], 0x0, 0x5a, 0x0, 0x3}, 0x28) openat$cgroup_int(r3, &(0x7f0000000080)='blkio.throttle.write_iops_device\x00', 0x2, 0x0) r4 = getpid() r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x42000) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) sendmsg$NFT_BATCH(r1, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)={{0x14}, [@NFT_MSG_DELOBJ={0x64, 0x14, 0xa, 0x201, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x1}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x4}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x1}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x8}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x8c}, 0x1, 0x0, 0x0, 0x4000091}, 0x4000080) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xf}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000003000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20000000}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, &(0x7f0000000040)="cd56d4869885350e3ae2c7c207728963a0a3e5612721beff191f727f0a96c232c679dea608e68e577511d575c06105f569a805131e4914c00cacb91800cdc33e356260330a653b50a216cc7b0bb57a", 0x0}, 0x63) bpf$MAP_CREATE(0x0, 0x0, 0x48) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r8, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000005c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x10}]}, @NFT_MSG_NEWSETELEM={0x40, 0xc, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0xc, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x6, 0x1, "d103"}]}]}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0xac}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmsg(r9, &(0x7f0000001ec0)={0x0, 0x0, 0x0}, 0x40000102) 1m23.849749256s ago: executing program 7 (id=4367): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x15, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) close(r0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000000040)=r0, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000005000000080000000f"], 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000038000000380000000300000000000000000000030000000003000000020000000200000000000000000000010500000010000000010000000000001101000000000000000061"], 0x0, 0x53}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x2, 0x14, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c210000000000202020cc439620a84237617b1af8ff00000000bfa100000000000007010000f8f9ffffb702000008000000b703000000000000850000", @ANYRES64=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x65, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000840)={r2}, 0xc) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[], 0x50) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x3, 0x9008, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x7, 0x1, 0x9, 0x3fe, 0x7fffffff, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x2c}, 0x1, 0x0, 0x0, 0x20000054}, 0x20040004) r4 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x58, 0x24, 0xf0b, 0x70bd2e, 0x0, {0x0, 0x0, 0x12, r5, {}, {0xffff, 0xffff}, {0x2}}, [@qdisc_kind_options=@q_fq_pie={{0xb}, {0x4}}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x2, 0x9, 0x5, 0x9, 0x1, 0xffffffff, 0x2}}, {0x4}}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x8004001}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)=@getchain={0x24, 0x66, 0x200, 0x70bd26, 0x25dfdbff, {0x0, 0x0, 0x0, r5, {0x4, 0xc}, {0x1}, {0x4, 0x1}}}, 0x24}, 0x1, 0x0, 0x0, 0x608c1}, 0x20000004) sendmsg$inet(r4, 0x0, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x0, 0x4, 0x0, 0x0) socket$kcm(0xa, 0x3, 0x73) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4f, 0xd, 0x0, 0x0, 0x0, 0x2, 0x201, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext={0x9, 0x1944}, 0x0, 0x0, 0x0, 0x0, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0xdee}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0xa) r8 = socket$kcm(0x2d, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f00000003c0)={&(0x7f0000000000)=@pptp={0x2d, 0x2, {0x0, @loopback}}, 0x80, 0x0}, 0x1) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r9, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="4400000002060108000034e40000000005000000050001000600000005000400000000000900020073797a3100000000050005000a0000000c000300686173683a6970000cfa10ac1bd5d3975c05560636db65a3cbee9b8c20abe60f50fd1cc6e0b5beabdc6069d3fcd4ad1a74097d7312d360496d960b0e3255f4634c60df4e"], 0x44}}, 0x2) ioctl$SIOCSIFHWADDR(r7, 0x8b06, &(0x7f0000000080)={'wlan1\x00', @random="02000000000a"}) 1m21.464168198s ago: executing program 0 (id=4368): socket$kcm(0x10, 0x2, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$kcm(0x10, 0x2, 0x4) close(r2) socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000640)="1800000068006b0041000000000000000200000000000000", 0x18}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x48010) unlink(0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000780)={0x24, 0x38, 0x825, 0x70bd25, 0x25dfdbf9, {0xf}, [@nested={0x10, 0x7, 0x0, 0x1, [@nested={0xc, 0x2, 0x0, 0x1, [@typed={0x8, 0x134, 0x0, 0x0, @ipv4=@rand_addr=0x64010100}]}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x4050}, 0x804c050) 1m20.685118412s ago: executing program 1 (id=4369): sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x4, &(0x7f0000000440)=ANY=[@ANYRESOCT=r0], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x200000, 0x1}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0x2, 0x5, 0x84) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000004000000030000002300000000000000", @ANYRES32=0x1, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000386531400"/33], 0x50) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="7c0000000206010100000000000000000000000a050001000700000016000300686173683a6e65742c706f72742c6e576c4749504bf3a8e044a6696574000000140007800500150007000000050003000200000024000780060004404e20000005001500040000000500030004000000060004404e21000015000500020000000500040000000000"], 0x7c}}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4080, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffe, 0x1, @perf_config_ext={0x31}, 0x14030, 0x4, 0x0, 0x5, 0x0, 0x0, 0x1, 0x0, 0x3}, 0x0, 0x3, 0xffffffffffffffff, 0xa) socket$kcm(0x10, 0x2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x1f, 0x15, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000fcffffff000000000900000018010000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000006d00000018110000", @ANYRES8=r3, @ANYBLOB="0000000000000000b7080000ff7f00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000080)=r2, 0x4) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x3c1e41, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x15, 0xa, 0x9, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r8, &(0x7f0000000100)=ANY=[], 0x66) 1m20.677013498s ago: executing program 6 (id=4370): r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0xfffffcf4}, {0x0}], 0x2, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x106) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff00, 0x2}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) r4 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80, 0x1000000}, 0x0) r8 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x890b, 0x0) sendmsg$nl_generic(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4044840}, 0x4000041) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r9, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000700)=ANY=[@ANYBLOB="14000000d3cfcbc6477a18a4fcdbdf3a120000006e046b0d563ed3d0cf884cd2a393d25540"], 0x14}, 0x1, 0x0, 0x0, 0x400c801}, 0x4000000) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=""/23, 0x17}, 0x2) r10 = socket(0x2a, 0x4, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000240)=[0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0], 0x0, 0x25, &(0x7f00000002c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x74, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) sendmsg$nl_route_sched(r10, &(0x7f0000000640)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000600)={&(0x7f0000000400)=@getqdisc={0x40, 0x26, 0x800, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, r11, {0x8, 0xfff1}, {0x5, 0x9}, {0xffe0}}, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x24000190}, 0x11) r12 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x49, 0x1, 0x0, 0x1, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x200000000000, 0x0, 0x1, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r13 = socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000740)={0x5, 0x80, 0x9, 0x4, 0xf7, 0xf2, 0x0, 0xc610, 0x20002, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xffff, 0x2, @perf_config_ext={0x9, 0x1}, 0x114d0, 0x0, 0x1000, 0x6, 0x5, 0x2, 0x81, 0x0, 0xab9e, 0x0, 0x4}, 0xffffffffffffffff, 0xd, r4, 0x9) socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$sock_attach_bpf(r13, 0x84, 0x24, &(0x7f0000000000), 0x4) sendmsg$NFT_BATCH(r12, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a20000000000a01040000000000000000070000000900010073797a300000000070000000090a010400000000000000000700000008000a40000000000900020073797a310000000009001300"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x20040084) 1m20.650004544s ago: executing program 7 (id=4371): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x4, 0x1, 0x101, 0x0, 0x0, {0x7, 0x0, 0x7}}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20000800) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0xa0}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x38}], {0x95, 0x0, 0x9}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x85}, 0x52) recvmsg(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x1100) bpf$MAP_CREATE(0x0, &(0x7f00000015c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) 1m20.572532626s ago: executing program 5 (id=4372): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)=ANY=[@ANYBLOB="380000004200010025bd7000fddbdf25020000000800388004000680100001800c00c80002000000000000000900048056b5bfa75b000000dbc0b6d941e861f7a1887e0000000053db9cd170a84369d892916e861f52e7db7863e776c6674c4b5e46f5281ca6f535bca9b6fd9e697ebb08ad669ae7abed0d3eda7e38939c204a7ab63b0bfae6910eb3f19942f6e28ecc01c5c4f30d3d93f5508b44989b2a02632500256f000000"], 0x38}, 0x1, 0x0, 0x0, 0x8800}, 0x4040) 1m20.304040496s ago: executing program 7 (id=4373): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000"], 0x7c}, 0x1, 0x0, 0x0, 0x8080}, 0x20004450) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_bp={0x0, 0xa}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = getpid() r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1f, 0x11, &(0x7f00000009c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007000000b7080000000000007baaf8ff00000000b5080000040000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa40000000000000704", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000b300000095000000000000005b3871b8844ec4d356a4e36091f191d930a1a6d90d3921d2185e065dfb6803e0b057dfabed5a25a9af0c973761c7b62ae6f94a95f70d2489f1365f857e8e1c289fa2957cbd2146321044babe041c29f2e4e11266174cf5520dfc353994dc93b9582a8ff5c382613890e414f46459469b597d6988f65989b94f26254dbb645e7b342a412fabed69f9e737d05b2be46318a7fc458d805325deafef363fdd6b74ae2a9d3d821264c0453daf83"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x38, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r4}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000180)=@framed={{}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x6a}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r1, 0xffffffffffffffff}, &(0x7f0000000800), &(0x7f0000000840)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x1b, 0xc, &(0x7f0000000480)=@raw=[@alu={0x4, 0x0, 0xd, 0x5, 0x5, 0xffffffffffffffde, 0x10}, @map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffff7}, @ldst={0x2, 0x3, 0x0, 0x3, 0x7, 0x0, 0x4}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, @map_idx={0x18, 0x5, 0x5, 0x0, 0x8}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x8}], &(0x7f0000000500)='syzkaller\x00', 0x24ac, 0xf7, &(0x7f0000000700)=""/247, 0x40f00, 0x19, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x2, 0x7, 0x5}, 0x10, 0x0, r4, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, r5], 0x0, 0x10, 0x7}, 0x94) r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f00000002c0)=0x81) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="2000000000000000180a02000000000000000000000000009500000000bb0000", @ANYRES64], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x41}, 0x94) r9 = openat$cgroup_devices(r8, 0x0, 0x2, 0x0) write$cgroup_devices(r9, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) r10 = socket(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000013c0)={{0x14, 0x453, 0x1, 0x0, 0x0, {0x2}}, [], {0x14, 0x3f6}}, 0x28}, 0x1, 0x0, 0x0, 0x24041}, 0x40000) r11 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r11, r6, 0x0, 0x1, &(0x7f00000000c0)='\x00'}, 0x30) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x24000840) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000250007002cbd7000000000007e"], 0x14}, 0x1, 0x0, 0x0, 0x24048851}, 0xc000) 1m20.241669816s ago: executing program 5 (id=4374): socket$kcm(0x11, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000004c0)="2e00000010008188e6b62aa73772cc9f13a1f848060000005e140002000000000e000a001000000002900000121f", 0x2e}], 0x1}, 0x4004) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0xd2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xffffffffffff0ef4, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x100}, 0x94) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, 0x0, &(0x7f00000002c0)='syzkaller\x00'}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0x1, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x9}, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="340000004700070127bd700000000000017c00000400fc800c00018008000600", @ANYRES32=0x0, @ANYBLOB="08000280725eb862080007"], 0x34}, 0x1, 0x0, 0x0, 0xc000}, 0x4040) r5 = socket$kcm(0x1e, 0x1, 0x0) sendmsg$kcm(r5, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000039000701fcfffffffbdbdf65017c00000c00018006"], 0x20}, 0x1, 0x0, 0x0, 0x488c0}, 0xc000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000100001000000000000dfff000000000a20000000000a01020000000000000000010000000900010073797a30000000006c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a30000000004000038008000140000000002c0003801400010067656e65766530000000000000000000140001006c6f0000000000000000000000000000080002"], 0xb4}}, 0x0) 1m20.147461066s ago: executing program 0 (id=4375): r0 = getpid() r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000001c0)='!pu~\'\'\t|\t') r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1b00"/13], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x7, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r3, 0x0, 0x4, 0x8, &(0x7f00000006c0)='\x00\x00\x00\x00', &(0x7f0000000700)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x2, 0x7e, 0x7fffffff}, r0, 0xffffffffffffffff, r1, 0xa) r5 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x25, 0x6, @val=@target_btf_id=0xffffffffffffffff}, 0x14) bpf$LINK_DETACH(0x22, &(0x7f0000000080)=r5, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r6) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x1, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xf}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x9549, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, @perf_config_ext={0x76, 0x1ef5}, 0x11efa, 0x4, 0x0, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r7, 0xffffffffffffffff, r4, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f00000000c0)={0x3, 0x80, 0x7c, 0x5, 0x9, 0x8, 0x0, 0x8, 0x2000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0xa, 0x7}, 0x8421, 0x3ce, 0x7, 0x9, 0x2, 0x2, 0x6, 0x0, 0x1, 0x0, 0xfffffffffffffffd}) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r5}, 0x8) ioctl$SIOCSIFHWADDR(r10, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r11, 0x18000000000002a0, 0x6a, 0x0, &(0x7f00000002c0)="d2ff03076003008cb89e08f086dd", 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r12 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r12, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000300)="d8000000180081034e81f783db4cb9040a1d020006007c09e8fc55a10a0015000300142603600e120800060000000441a800080004001040040000000c5c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb71b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad9e3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd4e1ffffffffc1c9b6278754ca397c388b0dd6e4edef3d9300"/213, 0xd5}, {&(0x7f0000000200)='sb#', 0x3}], 0x2}, 0x0) 1m19.968695826s ago: executing program 1 (id=4376): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4015}, 0xc000) r6 = getpid() bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000180)={r1, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f00000002c0)='./cgroup/cgroup.procs\x00', &(0x7f0000000300)=[0x0], 0x0, 0x0, 0x1, 0x0, r6}}, 0x40) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x8}, 0x6018, 0x0, 0x2, 0x6, 0x3fe, 0x7ffffffc, 0x400, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x9, 0x0, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x4000000) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x891c, 0x0) perf_event_open(0x0, 0x0, 0x400b, 0xffffffffffffffff, 0x0) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000003c0)}, 0x20000880) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfe33) close(0x4) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=ANY=[@ANYBLOB="580000000102030000000000000000000a00000a440002802c000180140003"], 0x58}, 0x1, 0x0, 0x0, 0x8080}, 0x20008800) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r9, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2400000001010101000000fcff0000000000000608001a4000009fc808000340000019"], 0x24}, 0x1, 0x0, 0x0, 0x402c881}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffc}, 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x14, &(0x7f0000000340)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}}, @printk={@lli, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r11, 0x0, 0x10, 0x10, &(0x7f00000002c0)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ac0)={0x6, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="180000004000000000000000ffffffff180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8efffffb702000008000000b70300000900000085000000c800000095"], &(0x7f0000000200)='syzkaller\x00', 0x8, 0x0, 0x0, 0x40e00, 0xc, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x800}, 0x94) 1m18.839739952s ago: executing program 6 (id=4377): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_bp={0x0, 0x4}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)}, 0x0) 1m18.424913202s ago: executing program 5 (id=4378): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x4, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff}, [@call={0x85, 0x0, 0x0, 0x79}]}, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xf}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x80005, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) r1 = socket$kcm(0x15, 0x5, 0x0) recvmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffd}, 0x161) 1m18.358213989s ago: executing program 7 (id=4379): r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0xfcc9}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0x2b, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x4, &(0x7f0000000080)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x3, 0x71, 0x10, 0x74}, [@jmp={0x5, 0x1, 0xa, 0x5, 0x9, 0xfffffffffffffff0, 0x4}]}, &(0x7f0000000480)='syzkaller\x00'}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x4, &(0x7f0000000080)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x3, 0x71, 0x10, 0x74}, [@jmp={0x5, 0x1, 0xa, 0x5, 0x9, 0xfffffffffffffff0, 0x4}]}, &(0x7f0000000480)='syzkaller\x00'}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000002500010125bd7000fbfffffe4b5000000800030047"], 0x1c}, 0x1, 0x0, 0x0, 0x4048957}, 0x28040) (async) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000002500010125bd7000fbfffffe4b5000000800030047"], 0x1c}, 0x1, 0x0, 0x0, 0x4048957}, 0x28040) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x989046, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xa, 0x2, 0x1, 0x23, 0x0, 0x1, 0x3}, 0x50) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xa, 0x2, 0x1, 0x23, 0x0, 0x1, 0x3}, 0x50) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000020000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000040000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f00000000c0)=r8, 0x4) sendmsg$unix(r5, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$unix(r5, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYBLOB="0000000040000000000000000000020000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYBLOB="0000000040000000000000000000020000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="3800000040000100fcff070004000000010000000800cb8004000880100001800c0010800400088004000b800c0002"], 0x38}, 0x1, 0x0, 0x0, 0x400c801}, 0x4008094) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x9, 0x1, 0x4}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0xb6) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1m18.276125379s ago: executing program 6 (id=4380): socket$inet(0x2, 0x2, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003480)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x20}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x80003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100c, 0x0, 0x2, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x21, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x8}, 0x402, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000b00)=@updsa={0x1e8, 0x10, 0x1, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x20, 0x0, 0x5c}, {@in6=@loopback, 0x4d4, 0x33}, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, {0x0, 0xffffffffffffffff, 0x2, 0x6, 0x0, 0x0, 0x0, 0x3}, {0x0, 0xfffffffffffffffd, 0x1900000000000000, 0x80}, {}, 0x0, 0x0, 0xa, 0x4, 0x80, 0x8}, [@algo_auth_trunc={0xf6, 0x14, {{'sm3\x00'}, 0x550, 0x0, "b5a23a5b80e7f6351dda3cd2a948422aeb51677f392f2c8072860755d424492e9f0eb887acf781b5244a28757d198be950eb7c9eb5ec142bea843a9e2e6062068b7e52195bee7c6db9604c3d87b267c61521c407ec0095930d374ebc20b39a0b230860e8324df47d0c679bb79ebda2f297e190d6cc4e5e69e0964f5b18413435d34bd39ba817364ad39d995d9d1d05b48adc4e9f0ffd141299454af8894ba95a8822e6f14b2edc9c6951"}}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x20004001}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/mnt\x00') socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, 0x0, 0x84000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x4, 0x201, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x2000000000000000, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7ff, 0x7fffffff, 0xffff, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) 1m18.217775063s ago: executing program 5 (id=4381): sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x90502, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffffffff}, 0x0, 0x8, 0xfffffffe, 0x4, 0x3fe, 0x7ffffffc, 0x1, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$rxrpc(0x21, 0x2, 0xa) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000010000000900010073797a300000000080000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a30000000000800054000000021440011800a0001006d617463680000003400028008000240000000001c0003000afe6cbf96caa5debdad61b67ddb2fb68fcf19f7807076430a00010071756f"], 0xc8}, 0x1, 0x0, 0x0, 0x4000005}, 0x20000004) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000900)={'bridge0\x00', @broadcast}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x4c, &(0x7f0000000000), 0x4) recvmsg$unix(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0xfd}, 0x2062) 1m18.026575379s ago: executing program 0 (id=4382): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0xfffffffc, 0x4, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) syz_clone(0x80001000, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x0) recvmsg(r1, 0x0, 0x40000102) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x5, 0x1, 0x8, 0xc, 0x1, 0xffffffffffffffff, 0xfffffff9}, 0x50) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2501, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x828, 0x0, 0x0, 0x0, 0x10000, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_HEADER(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000001240)={0x1c, 0xc, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x9}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4010}, 0x814) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) socket$nl_xfrm(0x10, 0x3, 0x6) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=ANY=[@ANYBLOB="1400000010000700000e0000000000000000000a20000000000a03000000000000000000010000000900010073797a30000000003c000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a30000000000800054000000002600000000c0a01080000000000000000010000000900020073797a32000000003400038030000080080003400000000224000b80200001800e000100636f6e6e6c696d69740000000c00028008000140000000000900010073797a30"], 0xe4}}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000100), 0x120) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2141, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0xff07, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)=@generic={&(0x7f00000009c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x8}, 0x18) 1m17.908496495s ago: executing program 7 (id=4383): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = socket$kcm(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000900)={&(0x7f0000000500)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000880)=[{&(0x7f0000000540)="e8691a913b", 0x1718}, {0x0, 0x2900}], 0x2, &(0x7f00000008c0)=[@ip_tos_u8={{0x11, 0x11, 0x1, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @rand_addr=0x64010101}}}], 0x38}, 0x0) 1m17.809318098s ago: executing program 7 (id=4384): r0 = socket$nl_rdma(0x10, 0x3, 0x14) (async) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="3c000000110001002dbd7000fbdbdf25e00000010000000000000000000400000000000000003c0014000d"], 0x3c}, 0x1, 0x0, 0x0, 0x40840}, 0x8d0) (async) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000a, 0x8855b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4, @perf_config_ext={0x6b, 0x1ef7}, 0x11efa, 0x6, 0xfffff071, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r1, 0xfffffdffffffffff, 0xffffffffffffffff, 0x2) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) (async) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x140f, 0x1, 0x70bd28, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_CHARDEV_TYPE={0xd, 0x45, 'opa_vnic\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0xc004) 0s ago: executing program 39 (id=4381): sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x90502, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0xffffffffffffffff}, 0x0, 0x8, 0xfffffffe, 0x4, 0x3fe, 0x7ffffffc, 0x1, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$rxrpc(0x21, 0x2, 0xa) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000010000000900010073797a300000000080000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a30000000000800054000000021440011800a0001006d617463680000003400028008000240000000001c0003000afe6cbf96caa5debdad61b67ddb2fb68fcf19f7807076430a00010071756f"], 0xc8}, 0x1, 0x0, 0x0, 0x4000005}, 0x20000004) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000900)={'bridge0\x00', @broadcast}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x4c, &(0x7f0000000000), 0x4) recvmsg$unix(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0xfd}, 0x2062) kernel console output (not intermixed with test programs): 0004 [ 937.018900][T19782] RBP: 00007f4c87a5d090 R08: 0000000000000000 R09: 0000000000000000 [ 937.018912][T19782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 937.018923][T19782] R13: 00007f4c86e16038 R14: 00007f4c86e15fa0 R15: 00007ffe51dd1748 [ 937.018957][T19782] [ 939.225358][T19761] bond0: (slave netdevsim0): Enslaving as an active interface with an up link [ 939.454194][T19821] netlink: 'syz.0.4030': attribute type 10 has an invalid length. [ 939.467352][T19819] netlink: 8 bytes leftover after parsing attributes in process `syz.7.4029'. [ 939.542573][T19821] team0: Device ip_vti0 is of different type [ 939.577237][T19826] netlink: 160 bytes leftover after parsing attributes in process `syz.1.4031'. [ 939.587070][T19826] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 939.605001][T19821] netlink: 'syz.0.4030': attribute type 1 has an invalid length. [ 940.945335][T19848] netlink: 504 bytes leftover after parsing attributes in process `syz.7.4036'. [ 941.279085][T19867] netlink: 'syz.0.4038': attribute type 3 has an invalid length. [ 941.321455][T19867] netlink: 152 bytes leftover after parsing attributes in process `syz.0.4038'. [ 941.354249][T19870] netlink: 20 bytes leftover after parsing attributes in process `syz.0.4038'. [ 941.405848][T19870] netlink: 20 bytes leftover after parsing attributes in process `syz.0.4038'. [ 941.606157][T19879] netlink: 'syz.5.4041': attribute type 1 has an invalid length. [ 942.399065][T19903] netlink: 160 bytes leftover after parsing attributes in process `syz.1.4043'. [ 942.408709][T19903] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 942.733992][T19911] netlink: 'syz.0.4046': attribute type 1 has an invalid length. [ 942.907598][T19924] C: renamed from team_slave_0 (while UP) [ 942.938835][T19924] netlink: 'syz.7.4047': attribute type 3 has an invalid length. [ 942.947532][T19924] netlink: 152 bytes leftover after parsing attributes in process `syz.7.4047'. [ 942.987929][T19924] netlink: 20 bytes leftover after parsing attributes in process `syz.7.4047'. [ 943.017221][T19924] netlink: 20 bytes leftover after parsing attributes in process `syz.7.4047'. [ 944.004211][ T5833] Bluetooth: hci3: command 0x0406 tx timeout [ 945.235388][T19988] __nla_validate_parse: 2 callbacks suppressed [ 945.235440][T19988] netlink: 188 bytes leftover after parsing attributes in process `syz.0.4065'. [ 945.262916][T19988] netlink: 188 bytes leftover after parsing attributes in process `syz.0.4065'. [ 945.903830][T20015] netlink: 24 bytes leftover after parsing attributes in process `syz.7.4076'. [ 945.982416][T20020] ksmbd: Daemon and kernel module version mismatch. ksmbd: 0, kernel module: 1. User-space ksmbd should terminate. [ 946.021429][T20021] netlink: 36 bytes leftover after parsing attributes in process `syz.5.4075'. [ 947.029711][T20033] netlink: 'syz.7.4080': attribute type 2 has an invalid length. [ 947.105413][ T30] audit: type=1107 audit(1769478726.952:77): pid=20032 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 948.045876][T20057] openvswitch: netlink: Unexpected mask (mask=240, allowed=10048) [ 948.341216][T20068] netlink: 'syz.6.4091': attribute type 39 has an invalid length. [ 949.246334][T20087] netlink: 'syz.6.4095': attribute type 2 has an invalid length. [ 949.270778][T20087] IPv6: Can't replace route, no match found [ 949.307448][T20078] delete_channel: no stack [ 949.790957][T20113] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 950.024710][T20113] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 950.207501][ T30] audit: type=1107 audit(1769478730.062:78): pid=20121 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 950.680072][T20132] bridge0: port 3(veth0_to_bridge) entered blocking state [ 950.716352][T20132] bridge0: port 3(veth0_to_bridge) entered disabled state [ 950.739468][T20132] veth0_to_bridge: entered allmulticast mode [ 950.761761][T20132] veth0_to_bridge: entered promiscuous mode [ 950.787304][T20132] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 950.840832][T20132] bridge0: port 3(veth0_to_bridge) entered blocking state [ 950.848272][T20132] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 953.376272][T20135] netlink: 'syz.1.4109': attribute type 2 has an invalid length. [ 953.394697][T20135] IPv6: Can't replace route, no match found [ 953.417693][T20138] netlink: 40 bytes leftover after parsing attributes in process `syz.5.4110'. [ 953.582367][T20138] netlink: 24 bytes leftover after parsing attributes in process `syz.5.4110'. [ 953.897944][T20160] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4117'. [ 953.945485][T20159] netlink: 4 bytes leftover after parsing attributes in process `syz.7.4118'. [ 954.222190][T20151] netlink: 'syz.1.4115': attribute type 21 has an invalid length. [ 954.736321][ T30] audit: type=1107 audit(1769478734.592:79): pid=20183 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 955.037027][T20195] netlink: 'syz.1.4123': attribute type 1 has an invalid length. [ 955.056533][T20193] netlink: 'syz.7.4125': attribute type 2 has an invalid length. [ 955.066008][T20193] IPv6: Can't replace route, no match found [ 956.667935][T20231] netlink: 52 bytes leftover after parsing attributes in process `syz.1.4131'. [ 959.981034][T20277] netlink: 'syz.6.4140': attribute type 1 has an invalid length. [ 960.973075][T20289] netlink: 'syz.1.4142': attribute type 1 has an invalid length. [ 961.428096][T20305] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4147'. [ 961.470244][T20308] netlink: 'syz.6.4145': attribute type 1 has an invalid length. [ 961.838420][T20316] netlink: 52 bytes leftover after parsing attributes in process `syz.7.4149'. [ 962.009121][T20323] netlink: 'syz.0.4151': attribute type 1 has an invalid length. [ 963.137418][ T6724] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 963.796172][ T5835] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 963.815741][ T5835] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 963.826320][ T5835] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 963.836728][ T5835] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 963.844756][ T5835] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 963.857150][ T5833] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 963.873969][T17856] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 963.884303][T17856] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 963.896140][T17856] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 963.904231][T17856] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 963.935939][ T6724] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 964.387182][ T6724] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 964.417524][T20358] netlink: 4 bytes leftover after parsing attributes in process `syz.7.4162'. [ 964.427576][T20359] netlink: 'syz.0.4160': attribute type 39 has an invalid length. [ 964.677853][ T6724] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 964.832946][T20365] netlink: 'syz.5.4163': attribute type 10 has an invalid length. [ 964.880669][T20365] team0: Device ip_vti0 is of different type [ 964.909473][T20368] netlink: 'syz.7.4164': attribute type 3 has an invalid length. [ 964.963323][T20368] netlink: 132 bytes leftover after parsing attributes in process `syz.7.4164'. [ 964.966366][T20369] netlink: 'syz.5.4163': attribute type 1 has an invalid length. [ 965.311975][T20344] chnl_net:caif_netlink_parms(): no params data found [ 965.549349][ T6724] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 965.928668][T17856] Bluetooth: hci1: command tx timeout [ 966.015632][T17856] Bluetooth: hci2: command tx timeout [ 966.797526][ T6724] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 966.933180][T20350] chnl_net:caif_netlink_parms(): no params data found [ 967.193857][ T6724] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 967.362378][T20344] bridge0: port 1(bridge_slave_0) entered blocking state [ 967.423264][T20344] bridge0: port 1(bridge_slave_0) entered disabled state [ 967.430759][T20344] bridge_slave_0: entered allmulticast mode [ 967.463120][T20417] netlink: 'syz.5.4173': attribute type 21 has an invalid length. [ 967.493172][T20344] bridge_slave_0: entered promiscuous mode [ 967.774024][T20423] netlink: 16410 bytes leftover after parsing attributes in process `syz.7.4174'. [ 967.968012][ T6724] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 968.000409][T20344] bridge0: port 2(bridge_slave_1) entered blocking state [ 968.005859][T17856] Bluetooth: hci1: command tx timeout [ 968.018703][T20344] bridge0: port 2(bridge_slave_1) entered disabled state [ 968.058317][T20344] bridge_slave_1: entered allmulticast mode [ 968.082727][T17856] Bluetooth: hci2: command tx timeout [ 968.096427][T20344] bridge_slave_1: entered promiscuous mode [ 968.267253][T20344] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 968.519862][T20344] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 968.798318][T20438] netlink: 'syz.5.4177': attribute type 10 has an invalid length. [ 968.815191][T20344] team0: Port device team_slave_0 added [ 968.849559][T20344] team0: Port device team_slave_1 added [ 969.325389][T20350] bridge0: port 1(bridge_slave_0) entered blocking state [ 969.371022][T20350] bridge0: port 1(bridge_slave_0) entered disabled state [ 969.413673][T20350] bridge_slave_0: entered allmulticast mode [ 969.466646][T20350] bridge_slave_0: entered promiscuous mode [ 969.598427][ T30] audit: type=1107 audit(1769478749.452:80): pid=20445 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 969.721569][T20350] bridge0: port 2(bridge_slave_1) entered blocking state [ 969.748805][T20350] bridge0: port 2(bridge_slave_1) entered disabled state [ 969.771333][T20350] bridge_slave_1: entered allmulticast mode [ 969.785027][T20350] bridge_slave_1: entered promiscuous mode [ 969.934696][T20453] netlink: 'syz.5.4180': attribute type 1 has an invalid length. [ 970.019145][T20453] netlink: 164 bytes leftover after parsing attributes in process `syz.5.4180'. [ 970.053151][T20344] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 970.060181][T20344] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 970.089403][T17856] Bluetooth: hci1: command tx timeout [ 970.127553][T20344] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 970.150962][T20344] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 970.158053][T20344] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 970.184806][T17856] Bluetooth: hci2: command tx timeout [ 970.190511][T20344] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 970.268636][ T6724] bridge_slave_1: left allmulticast mode [ 970.285571][ T6724] bridge_slave_1: left promiscuous mode [ 970.291473][ T6724] bridge0: port 2(bridge_slave_1) entered disabled state [ 970.535524][ T6724] bridge_slave_0: left allmulticast mode [ 970.541577][ T6724] bridge_slave_0: left promiscuous mode [ 970.561136][ T6724] bridge0: port 1(bridge_slave_0) entered disabled state [ 971.792542][ T6724] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 971.808872][ T6724] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 971.821775][ T6724] bond0 (unregistering): Released all slaves [ 972.176838][T17856] Bluetooth: hci1: command tx timeout [ 972.237647][ T6724] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 972.249337][ T6724] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 972.254333][T17856] Bluetooth: hci2: command tx timeout [ 972.275900][ T6724] bond0 (unregistering): Released all slaves [ 972.334072][T20350] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 972.348608][T20459] netlink: 28 bytes leftover after parsing attributes in process `syz.7.4182'. [ 972.359051][T20459] netlink: 28 bytes leftover after parsing attributes in process `syz.7.4182'. [ 972.409515][T20480] netlink: 'syz.0.4185': attribute type 39 has an invalid length. [ 972.427140][T20344] hsr_slave_0: entered promiscuous mode [ 972.450418][T20344] hsr_slave_1: entered promiscuous mode [ 972.460240][T20344] debugfs: 'hsr0' already exists in 'hsr' [ 972.488796][T20344] Cannot create hsr debugfs directory [ 972.498473][T20350] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 972.767485][ T30] audit: type=1107 audit(1769478752.622:81): pid=20486 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 972.845240][T20350] team0: Port device team_slave_0 added [ 972.868254][T20350] team0: Port device team_slave_1 added [ 973.155703][T20490] openvswitch: netlink: Unexpected mask (mask=240, allowed=10048) [ 973.323133][T20350] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 973.330141][T20350] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 973.371802][T20350] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 973.516106][T17856] Bluetooth: hci3: ISO packet for unknown connection handle 260 [ 973.680557][T20350] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 973.696043][T20350] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 973.780728][T20350] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 974.079607][ T6724] hsr_slave_0: left promiscuous mode [ 974.096109][ T6724] hsr_slave_1: left promiscuous mode [ 974.105776][ T6724] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 974.117364][ T6724] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 974.129176][ T6724] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 974.137805][ T6724] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 974.162265][ T6724] hsr_slave_0: left promiscuous mode [ 974.191306][ T6724] hsr_slave_1: left promiscuous mode [ 974.198250][ T6724] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 974.213249][ T6724] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 974.222398][T20523] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4196'. [ 974.233910][ T6724] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 974.244196][T20523] netlink: 'syz.5.4196': attribute type 2 has an invalid length. [ 974.252839][ T6724] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 974.260660][T20523] IPv6: Can't replace route, no match found [ 974.359250][ T6724] veth1_macvtap: left promiscuous mode [ 974.376812][ T6724] veth1_vlan: left promiscuous mode [ 974.382685][ T6724] veth0_vlan: left promiscuous mode [ 974.418321][ T6724] veth1_macvtap: left promiscuous mode [ 974.433932][ T6724] veth1_vlan: left promiscuous mode [ 974.543375][T20530] netlink: 'syz.5.4197': attribute type 39 has an invalid length. [ 975.475988][ T6724] team0 (unregistering): Port device team_slave_1 removed [ 975.543848][T20535] netlink: 'syz.0.4199': attribute type 3 has an invalid length. [ 975.552523][T20535] netlink: 156 bytes leftover after parsing attributes in process `syz.0.4199'. [ 975.568174][T20535] netlink: 'syz.0.4199': attribute type 3 has an invalid length. [ 975.577688][T20535] netlink: 156 bytes leftover after parsing attributes in process `syz.0.4199'. [ 975.601194][ T6724] team0 (unregistering): Port device team_slave_0 removed [ 975.860846][T20540] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4201'. [ 976.071565][T20543] openvswitch: netlink: Unexpected mask (mask=240, allowed=10048) [ 976.167768][T20545] openvswitch: netlink: Missing key (keys=40, expected=80) [ 976.257452][T20547] openvswitch: netlink: Missing key (keys=40, expected=80) [ 976.583418][ T6724] team0 (unregistering): Port device team_slave_1 removed [ 976.632564][ T6724] team0 (unregistering): Port device team_slave_0 removed [ 976.746323][T20552] netlink: 'syz.0.4205': attribute type 13 has an invalid length. [ 976.754680][T20552] netlink: 14589 bytes leftover after parsing attributes in process `syz.0.4205'. [ 977.262459][T20350] hsr_slave_0: entered promiscuous mode [ 977.309121][T20350] hsr_slave_1: entered promiscuous mode [ 977.333795][T20350] debugfs: 'hsr0' already exists in 'hsr' [ 977.350448][T20350] Cannot create hsr debugfs directory [ 977.395849][T20556] FAULT_INJECTION: forcing a failure. [ 977.395849][T20556] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 977.425192][T20556] CPU: 0 UID: 0 PID: 20556 Comm: syz.0.4206 Not tainted syzkaller #0 PREEMPT(full) [ 977.425222][T20556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 977.425237][T20556] Call Trace: [ 977.425246][T20556] [ 977.425255][T20556] dump_stack_lvl+0xe8/0x150 [ 977.425290][T20556] should_fail_ex+0x412/0x560 [ 977.425323][T20556] _copy_to_user+0x31/0xb0 [ 977.425359][T20556] bpf_test_finish+0x22c/0x6b0 [ 977.425393][T20556] ? __pfx_bpf_test_finish+0x10/0x10 [ 977.425416][T20556] ? eth_type_trans+0x35e/0x6d0 [ 977.425454][T20556] bpf_prog_test_run_skb+0x114f/0x1d50 [ 977.425493][T20556] ? __fget_files+0x2a/0x420 [ 977.425517][T20556] ? __fget_files+0x3a0/0x420 [ 977.425539][T20556] ? __fget_files+0x2a/0x420 [ 977.425568][T20556] ? __pfx_bpf_prog_test_run_skb+0x10/0x10 [ 977.425591][T20556] bpf_prog_test_run+0x2c7/0x340 [ 977.425620][T20556] __sys_bpf+0x5cb/0x920 [ 977.425644][T20556] ? __pfx___sys_bpf+0x10/0x10 [ 977.425701][T20556] __x64_sys_bpf+0x7c/0x90 [ 977.425733][T20556] do_syscall_64+0xe2/0xf80 [ 977.425757][T20556] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 977.425790][T20556] ? clear_bhb_loop+0x60/0xb0 [ 977.425816][T20556] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 977.425836][T20556] RIP: 0033:0x7f05afb9aeb9 [ 977.425855][T20556] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 977.425873][T20556] RSP: 002b:00007f05addf6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 977.425895][T20556] RAX: ffffffffffffffda RBX: 00007f05afe15fa0 RCX: 00007f05afb9aeb9 [ 977.425911][T20556] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 977.425924][T20556] RBP: 00007f05addf6090 R08: 0000000000000000 R09: 0000000000000000 [ 977.425938][T20556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 977.425950][T20556] R13: 00007f05afe16038 R14: 00007f05afe15fa0 R15: 00007ffc519c44c8 [ 977.425991][T20556] [ 978.600354][T20570] netlink: 'syz.5.4210': attribute type 29 has an invalid length. [ 979.058986][T20580] netlink: 60 bytes leftover after parsing attributes in process `syz.7.4214'. [ 979.110329][T20578] openvswitch: netlink: Unexpected mask (mask=240, allowed=10048) [ 979.134596][T20580] netlink: 60 bytes leftover after parsing attributes in process `syz.7.4214'. [ 979.150798][T20584] netlink: 60 bytes leftover after parsing attributes in process `syz.7.4214'. [ 979.161586][T20344] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 979.179533][T20344] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 979.193053][T20580] Freezing with imperfect legacy cgroup freezer. See cgroup.freeze of cgroup v2 [ 979.223810][T20344] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 979.330541][T20586] netlink: 'syz.5.4216': attribute type 13 has an invalid length. [ 979.353419][T20586] netlink: 14589 bytes leftover after parsing attributes in process `syz.5.4216'. [ 979.363706][T20344] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 979.631601][T20601] FAULT_INJECTION: forcing a failure. [ 979.631601][T20601] name failslab, interval 1, probability 0, space 0, times 0 [ 979.654202][T20599] netlink: 512 bytes leftover after parsing attributes in process `syz.5.4218'. [ 979.691845][T20601] CPU: 1 UID: 0 PID: 20601 Comm: syz.7.4219 Not tainted syzkaller #0 PREEMPT(full) [ 979.691874][T20601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 979.691887][T20601] Call Trace: [ 979.691899][T20601] [ 979.691912][T20601] dump_stack_lvl+0xe8/0x150 [ 979.691961][T20601] should_fail_ex+0x412/0x560 [ 979.692022][T20601] should_failslab+0xa8/0x100 [ 979.692063][T20601] kmem_cache_alloc_node_noprof+0x8b/0x6f0 [ 979.692101][T20601] ? __alloc_skb+0x193/0x390 [ 979.692128][T20601] ? __alloc_skb+0x1d7/0x390 [ 979.692150][T20601] ? __local_bh_enable_ip+0xd0/0x130 [ 979.692180][T20601] ? __alloc_skb+0x193/0x390 [ 979.692218][T20601] __alloc_skb+0x1d7/0x390 [ 979.692275][T20601] netlink_ack+0x146/0xa50 [ 979.692305][T20601] ? sock_diag_lock_handler+0x19/0x290 [ 979.692335][T20601] ? sock_diag_lock_handler+0x19/0x290 [ 979.692376][T20601] ? sock_diag_lock_handler+0x227/0x290 [ 979.692414][T20601] ? sock_diag_rcv_msg+0x4ed/0x600 [ 979.692468][T20601] netlink_rcv_skb+0x2b6/0x4b0 [ 979.692512][T20601] ? __pfx_sock_diag_rcv_msg+0x10/0x10 [ 979.692554][T20601] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 979.692645][T20601] ? netlink_deliver_tap+0x2e/0x1b0 [ 979.692714][T20601] netlink_unicast+0x80f/0x9b0 [ 979.692801][T20601] ? __pfx_netlink_unicast+0x10/0x10 [ 979.692839][T20601] ? __alloc_skb+0x193/0x390 [ 979.692873][T20601] ? netlink_sendmsg+0x650/0xb40 [ 979.692894][T20601] ? skb_put+0x11b/0x210 [ 979.692951][T20601] netlink_sendmsg+0x813/0xb40 [ 979.693030][T20601] ? __pfx_netlink_sendmsg+0x10/0x10 [ 979.693081][T20601] ? aa_sock_msg_perm+0xf1/0x1b0 [ 979.693125][T20601] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 979.693163][T20601] ? __pfx_netlink_sendmsg+0x10/0x10 [ 979.693188][T20601] ____sys_sendmsg+0xa68/0xad0 [ 979.693224][T20601] ? __pfx_perf_trace_lock+0x10/0x10 [ 979.693287][T20601] ? __pfx_____sys_sendmsg+0x10/0x10 [ 979.693374][T20601] ? import_iovec+0x73/0xa0 [ 979.693436][T20601] ___sys_sendmsg+0x2a5/0x360 [ 979.693512][T20601] ? __pfx____sys_sendmsg+0x10/0x10 [ 979.693654][T20601] ? __fget_files+0x2a/0x420 [ 979.693748][T20601] ? __fget_files+0x2a/0x420 [ 979.693773][T20601] ? __fget_files+0x3a0/0x420 [ 979.693858][T20601] __x64_sys_sendmsg+0x1bd/0x2a0 [ 979.693911][T20601] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 979.693998][T20601] ? rcu_is_watching+0x15/0xb0 [ 979.694088][T20601] do_syscall_64+0xe2/0xf80 [ 979.694117][T20601] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 979.694137][T20601] ? trace_irq_disable+0x37/0x100 [ 979.694156][T20601] ? clear_bhb_loop+0x60/0xb0 [ 979.694198][T20601] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 979.694221][T20601] RIP: 0033:0x7f4cc219aeb9 [ 979.694249][T20601] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 979.694267][T20601] RSP: 002b:00007f4cc2f93028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 979.694294][T20601] RAX: ffffffffffffffda RBX: 00007f4cc2415fa0 RCX: 00007f4cc219aeb9 [ 979.694310][T20601] RDX: 0000000000000000 RSI: 0000200000000100 RDI: 0000000000000005 [ 979.694331][T20601] RBP: 00007f4cc2f93090 R08: 0000000000000000 R09: 0000000000000000 [ 979.694344][T20601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 979.694358][T20601] R13: 00007f4cc2416038 R14: 00007f4cc2415fa0 R15: 00007ffc01854768 [ 979.694466][T20601] [ 980.374357][T20606] netlink: 512 bytes leftover after parsing attributes in process `syz.0.4220'. [ 980.506266][T20344] 8021q: adding VLAN 0 to HW filter on device bond0 [ 980.625490][T20344] 8021q: adding VLAN 0 to HW filter on device team0 [ 980.647434][T20350] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 980.743775][T20617] netlink: 4 bytes leftover after parsing attributes in process `syz.7.4222'. [ 982.884195][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 982.898071][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 982.916303][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 982.932104][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 982.947031][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 982.962197][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 982.979238][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 982.996116][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 983.010976][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 984.015674][T20350] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 984.120592][ C1] net_ratelimit: 300 callbacks suppressed [ 984.120632][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 984.150746][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 984.196680][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 984.219519][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 984.240382][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 984.262332][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 984.277812][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 984.293412][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 984.309101][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 984.330513][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 984.400974][T17856] Bluetooth: hci0: ISO packet for unknown connection handle 255 [ 984.470478][T15445] bridge0: port 1(bridge_slave_0) entered blocking state [ 984.477778][T15445] bridge0: port 1(bridge_slave_0) entered forwarding state [ 984.540128][T20350] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 984.584790][T15445] bridge0: port 2(bridge_slave_1) entered blocking state [ 984.592045][T15445] bridge0: port 2(bridge_slave_1) entered forwarding state [ 984.605585][T20350] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 985.239625][T20350] 8021q: adding VLAN 0 to HW filter on device bond0 [ 985.411650][T20350] 8021q: adding VLAN 0 to HW filter on device team0 [ 985.478208][T15445] bridge0: port 1(bridge_slave_0) entered blocking state [ 985.485459][T15445] bridge0: port 1(bridge_slave_0) entered forwarding state [ 985.520584][T20648] netlink: 'syz.0.4228': attribute type 13 has an invalid length. [ 985.551325][T20648] netlink: 14589 bytes leftover after parsing attributes in process `syz.0.4228'. [ 985.637630][T15445] bridge0: port 2(bridge_slave_1) entered blocking state [ 985.644886][T15445] bridge0: port 2(bridge_slave_1) entered forwarding state [ 986.054768][T20657] netlink: 'syz.5.4230': attribute type 29 has an invalid length. [ 986.181528][T20344] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 986.423697][T20668] netlink: 512 bytes leftover after parsing attributes in process `syz.0.4231'. [ 986.453716][T20666] netlink: 'syz.7.4232': attribute type 39 has an invalid length. [ 987.068072][T20666] veth0_macvtap: left promiscuous mode [ 987.638865][T20344] veth0_vlan: entered promiscuous mode [ 987.758440][T20344] veth1_vlan: entered promiscuous mode [ 987.946220][T20350] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 988.034989][T20689] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4234'. [ 988.238526][T20344] veth0_macvtap: entered promiscuous mode [ 988.332241][T20344] veth1_macvtap: entered promiscuous mode [ 988.567040][T20344] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 988.667191][T20344] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 988.809784][ T6724] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 988.888399][ T6724] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 989.046732][ T6724] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 989.117157][ T6724] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 989.129495][ C1] net_ratelimit: 2683 callbacks suppressed [ 989.129531][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 989.151366][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 989.151545][T20714] openvswitch: netlink: Unexpected mask (mask=240, allowed=10048) [ 989.182428][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 989.199133][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 989.215332][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 989.239039][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 989.255316][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 989.271340][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 989.295944][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 989.834336][T20713] netlink: 127868 bytes leftover after parsing attributes in process `syz.5.4238'. [ 994.077669][T20748] netlink: 'syz.7.4241': attribute type 13 has an invalid length. [ 994.133500][ C1] net_ratelimit: 965 callbacks suppressed [ 994.133521][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 994.151896][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 994.164424][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 994.173502][T20748] netlink: 14589 bytes leftover after parsing attributes in process `syz.7.4241'. [ 994.179959][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 994.198179][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 994.210696][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 994.224072][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 994.236582][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 994.249144][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 994.262547][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 994.332416][ T7925] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 994.371602][ T7925] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 994.662235][T15445] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 994.685830][T20754] netlink: 'syz.5.4243': attribute type 29 has an invalid length. [ 994.726373][T15445] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 994.814021][T20350] veth0_vlan: entered promiscuous mode [ 994.876948][T20350] veth1_vlan: entered promiscuous mode [ 994.983973][T20761] netlink: 'syz.7.4244': attribute type 39 has an invalid length. [ 995.255032][T20767] netlink: 'syz.0.4245': attribute type 10 has an invalid length. [ 995.285848][T20350] veth0_macvtap: entered promiscuous mode [ 995.391910][T20774] netlink: 'syz.5.4246': attribute type 39 has an invalid length. [ 995.483680][T20773] netlink: 'syz.0.4245': attribute type 1 has an invalid length. [ 998.254110][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 998.260620][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 999.091622][T20767] team0: Device ip_vti0 is of different type [ 999.143081][ C1] net_ratelimit: 8351 callbacks suppressed [ 999.143104][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 999.161563][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 999.174225][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 999.187552][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 999.200102][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 999.212700][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 999.226116][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 999.238598][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 999.251140][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 999.264508][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 999.461691][T20803] netlink: 'syz.7.4247': attribute type 10 has an invalid length. [ 999.475982][T20804] netlink: 'syz.0.4248': attribute type 10 has an invalid length. [ 1002.095822][T20350] veth1_macvtap: entered promiscuous mode [ 1002.116310][T20803] team0: Device ip_vti0 is of different type [ 1002.140365][T20804] team0: Device ip_vti0 is of different type [ 1002.299565][T20350] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1002.457931][T20350] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1002.922076][T15440] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1003.358713][T20824] netlink: 'syz.5.4252': attribute type 29 has an invalid length. [ 1004.152681][ C1] net_ratelimit: 7947 callbacks suppressed [ 1004.152706][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1004.171163][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1004.184628][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1004.197158][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1004.209710][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1004.223612][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1004.236156][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1004.248721][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1004.262278][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1004.274801][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1004.285780][T15440] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1004.316328][T20822] netlink: 'syz.1.4253': attribute type 6 has an invalid length. [ 1004.837342][T15440] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1005.892879][T20822] netlink: 360 bytes leftover after parsing attributes in process `syz.1.4253'. [ 1006.079821][T15440] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1006.121705][T20835] netlink: 512 bytes leftover after parsing attributes in process `syz.5.4255'. [ 1006.463414][ T38] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1006.471328][ T38] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1006.486084][T20840] netlink: 'syz.1.4257': attribute type 1 has an invalid length. [ 1006.568024][T20843] FAULT_INJECTION: forcing a failure. [ 1006.568024][T20843] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1006.677227][T20843] CPU: 0 UID: 0 PID: 20843 Comm: syz.7.4258 Not tainted syzkaller #0 PREEMPT(full) [ 1006.677258][T20843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1006.677273][T20843] Call Trace: [ 1006.677282][T20843] [ 1006.677292][T20843] dump_stack_lvl+0xe8/0x150 [ 1006.677327][T20843] should_fail_ex+0x412/0x560 [ 1006.677359][T20843] _copy_from_iter+0x1d3/0x1670 [ 1006.677395][T20843] ? trace_kmem_cache_alloc+0x1f/0xb0 [ 1006.677432][T20843] ? __pfx__copy_from_iter+0x10/0x10 [ 1006.677462][T20843] ? __build_skb_around+0x22d/0x3c0 [ 1006.677490][T20843] ? __alloc_skb+0x193/0x390 [ 1006.677515][T20843] ? netlink_sendmsg+0x650/0xb40 [ 1006.677536][T20843] ? skb_put+0x11b/0x210 [ 1006.677566][T20843] netlink_sendmsg+0x6c0/0xb40 [ 1006.677590][T20843] ? irqentry_exit+0x59c/0x620 [ 1006.677621][T20843] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1006.677658][T20843] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1006.677679][T20843] ____sys_sendmsg+0xa68/0xad0 [ 1006.677719][T20843] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1006.677758][T20843] ? import_iovec+0x73/0xa0 [ 1006.677801][T20843] ___sys_sendmsg+0x2a5/0x360 [ 1006.677828][T20843] ? __lock_acquire+0x6b5/0x2cf0 [ 1006.677864][T20843] ? __pfx____sys_sendmsg+0x10/0x10 [ 1006.677932][T20843] ? __fget_files+0x2a/0x420 [ 1006.677955][T20843] ? __fget_files+0x3a0/0x420 [ 1006.677990][T20843] __x64_sys_sendmsg+0x1bd/0x2a0 [ 1006.678023][T20843] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 1006.678080][T20843] do_syscall_64+0xe2/0xf80 [ 1006.678103][T20843] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1006.678124][T20843] ? clear_bhb_loop+0x60/0xb0 [ 1006.678150][T20843] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1006.678171][T20843] RIP: 0033:0x7f4cc219aeb9 [ 1006.678190][T20843] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1006.678208][T20843] RSP: 002b:00007f4cc2f93028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1006.678231][T20843] RAX: ffffffffffffffda RBX: 00007f4cc2415fa0 RCX: 00007f4cc219aeb9 [ 1006.678246][T20843] RDX: 0000000000028040 RSI: 0000200000000180 RDI: 0000000000000006 [ 1006.678260][T20843] RBP: 00007f4cc2f93090 R08: 0000000000000000 R09: 0000000000000000 [ 1006.678273][T20843] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1006.678285][T20843] R13: 00007f4cc2416038 R14: 00007f4cc2415fa0 R15: 00007ffc01854768 [ 1006.678320][T20843] [ 1007.019220][T15439] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1007.031560][T15439] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1007.118978][T20855] netlink: 'syz.7.4260': attribute type 3 has an invalid length. [ 1007.127044][T20855] netlink: 132 bytes leftover after parsing attributes in process `syz.7.4260'. [ 1007.427820][T20860] netlink: 'syz.0.4262': attribute type 10 has an invalid length. [ 1007.445360][T20860] team0: Device ip_vti0 is of different type [ 1007.656835][T20865] netlink: 'syz.0.4262': attribute type 1 has an invalid length. [ 1007.668420][T20864] FAULT_INJECTION: forcing a failure. [ 1007.668420][T20864] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1007.739080][T20864] CPU: 0 UID: 0 PID: 20864 Comm: syz.1.4264 Not tainted syzkaller #0 PREEMPT(full) [ 1007.739110][T20864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1007.739124][T20864] Call Trace: [ 1007.739133][T20864] [ 1007.739142][T20864] dump_stack_lvl+0xe8/0x150 [ 1007.739175][T20864] should_fail_ex+0x412/0x560 [ 1007.739207][T20864] _copy_from_user+0x2d/0xb0 [ 1007.739241][T20864] __sys_bpf+0x229/0x920 [ 1007.739263][T20864] ? seqcount_lockdep_reader_access+0xd4/0x100 [ 1007.739292][T20864] ? __pfx___sys_bpf+0x10/0x10 [ 1007.739330][T20864] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1007.739359][T20864] ? __pfx_sched_clock_cpu+0x10/0x10 [ 1007.739398][T20864] __x64_sys_bpf+0x7c/0x90 [ 1007.739431][T20864] do_syscall_64+0xe2/0xf80 [ 1007.739454][T20864] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1007.739475][T20864] ? clear_bhb_loop+0x60/0xb0 [ 1007.739500][T20864] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1007.739521][T20864] RIP: 0033:0x7fe91519aeb9 [ 1007.739539][T20864] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1007.739557][T20864] RSP: 002b:00007fe916039028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1007.739580][T20864] RAX: ffffffffffffffda RBX: 00007fe915415fa0 RCX: 00007fe91519aeb9 [ 1007.739596][T20864] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 1007.739609][T20864] RBP: 00007fe916039090 R08: 0000000000000000 R09: 0000000000000000 [ 1007.739622][T20864] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1007.739635][T20864] R13: 00007fe915416038 R14: 00007fe915415fa0 R15: 00007ffd6af04f68 [ 1007.739676][T20864] [ 1009.163267][ C1] net_ratelimit: 5728 callbacks suppressed [ 1009.163302][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1009.181820][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1009.194427][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1009.208308][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1009.220915][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1009.233529][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1009.247182][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1009.259782][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1009.272445][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1009.286074][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1010.658876][ T5835] Bluetooth: hci4: command 0x0406 tx timeout [ 1011.988833][T20903] netlink: 'syz.1.4271': attribute type 3 has an invalid length. [ 1012.093877][T20903] netlink: 156 bytes leftover after parsing attributes in process `syz.1.4271'. [ 1013.223442][T20903] netlink: 'syz.1.4271': attribute type 3 has an invalid length. [ 1013.326908][T20903] netlink: 156 bytes leftover after parsing attributes in process `syz.1.4271'. [ 1014.232182][ C1] net_ratelimit: 5360 callbacks suppressed [ 1014.232290][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1014.275812][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1014.305961][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1014.334141][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1014.413226][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1014.445338][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1014.477618][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1014.513045][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1014.598920][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1014.624167][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1015.470635][T20918] netlink: 'syz.6.4276': attribute type 4 has an invalid length. [ 1016.143813][T20931] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4280'. [ 1017.256402][T20950] netlink: 'syz.0.4285': attribute type 10 has an invalid length. [ 1017.857409][T20958] netlink: 'syz.6.4286': attribute type 10 has an invalid length. [ 1018.012793][T20958] netlink: 40 bytes leftover after parsing attributes in process `syz.6.4286'. [ 1018.620283][T20962] netlink: 'syz.1.4288': attribute type 21 has an invalid length. [ 1018.711016][T20962] IPv6: NLM_F_CREATE should be specified when creating new route [ 1019.196018][T20971] netlink: 52 bytes leftover after parsing attributes in process `syz.5.4291'. [ 1019.233081][ C1] net_ratelimit: 7127 callbacks suppressed [ 1019.233103][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1019.251578][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1019.264090][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1019.276641][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1019.290213][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1019.302833][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1019.315332][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1019.327880][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1019.341467][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1019.354119][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1020.246190][T20978] netlink: 'syz.1.4292': attribute type 21 has an invalid length. [ 1022.475825][T20950] batman_adv: batadv0: Adding interface: team0 [ 1022.529491][T20950] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1022.561455][T20950] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 1022.576464][T20958] dummy0: entered promiscuous mode [ 1023.098126][T20990] netlink: 52 bytes leftover after parsing attributes in process `syz.1.4296'. [ 1024.243143][ C1] net_ratelimit: 6458 callbacks suppressed [ 1024.243170][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1024.261592][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1024.274103][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1024.286689][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1024.300169][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1024.312759][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1024.325211][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1024.337891][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1024.351435][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1024.364119][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1027.164597][T21013] netlink: 24 bytes leftover after parsing attributes in process `syz.1.4299'. [ 1027.462413][T21022] netlink: 'syz.0.4305': attribute type 10 has an invalid length. [ 1027.577786][T21026] netlink: 'syz.7.4306': attribute type 10 has an invalid length. [ 1028.622992][T21028] netlink: 'syz.7.4306': attribute type 1 has an invalid length. [ 1028.634442][T21022] team0: Device ip_vti0 is of different type [ 1028.760283][T21026] team0: Device ip_vti0 is of different type [ 1029.252617][ C1] net_ratelimit: 6880 callbacks suppressed [ 1029.252641][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1029.272005][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1029.285496][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1029.298064][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1029.310639][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1029.324261][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1029.336854][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1029.349385][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1029.361846][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1029.375498][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1029.442882][T21039] netlink: 52 bytes leftover after parsing attributes in process `syz.5.4309'. [ 1033.455012][T21068] netlink: 'syz.1.4316': attribute type 1 has an invalid length. [ 1034.263526][ C1] net_ratelimit: 2083 callbacks suppressed [ 1034.263573][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1034.286539][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1034.301578][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1034.317246][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1034.336832][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1034.353905][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1034.369279][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1034.384809][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1034.405876][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1034.421176][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1039.274647][ C1] net_ratelimit: 1508 callbacks suppressed [ 1039.274696][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1039.296717][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1039.320012][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1039.336081][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1039.351139][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1039.367339][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1039.390795][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1039.406207][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1039.421087][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1039.437016][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1039.926376][T21073] netlink: 'syz.6.4319': attribute type 29 has an invalid length. [ 1040.303569][T21079] netlink: 60 bytes leftover after parsing attributes in process `syz.5.4321'. [ 1040.348728][T21079] netlink: 60 bytes leftover after parsing attributes in process `syz.5.4321'. [ 1042.571714][T21103] netlink: 'syz.7.4327': attribute type 3 has an invalid length. [ 1042.783053][T21103] netlink: 156 bytes leftover after parsing attributes in process `syz.7.4327'. [ 1042.864423][T21103] netlink: 'syz.7.4327': attribute type 3 has an invalid length. [ 1042.892502][T21103] netlink: 156 bytes leftover after parsing attributes in process `syz.7.4327'. [ 1042.928587][T21107] netlink: 'syz.5.4328': attribute type 1 has an invalid length. [ 1043.171151][T21108] tmpfs: Bad value for 'uid' [ 1043.182144][T21108] tmpfs: Bad value for 'uid' [ 1044.283037][ C1] net_ratelimit: 3711 callbacks suppressed [ 1044.283062][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1044.304879][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1044.318216][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1044.331427][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1044.344798][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1044.361009][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1044.374358][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1044.387561][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1044.400911][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1044.416853][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1048.599048][T21117] netlink: 8 bytes leftover after parsing attributes in process `syz.7.4331'. [ 1049.293133][ C1] net_ratelimit: 4304 callbacks suppressed [ 1049.293158][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1049.311606][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1049.324116][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1049.336857][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1049.350446][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1049.363053][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1049.375568][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1049.388146][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1049.401636][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1049.414186][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1049.974271][T21127] netlink: 'syz.5.4333': attribute type 21 has an invalid length. [ 1050.234564][T21139] netlink: 'syz.7.4338': attribute type 10 has an invalid length. [ 1050.308382][T21139] team0: Device ip_vti0 is of different type [ 1050.477107][T21147] netlink: 'syz.0.4337': attribute type 29 has an invalid length. [ 1054.303109][ C1] net_ratelimit: 4910 callbacks suppressed [ 1054.303135][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1054.321645][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1054.334189][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1054.346899][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1054.360550][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1054.373186][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1054.385733][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1054.398378][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1054.412053][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1054.424635][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1054.884970][T21173] netlink: 'syz.6.4346': attribute type 1 has an invalid length. [ 1055.333185][T21176] netlink: 8063 bytes leftover after parsing attributes in process `syz.1.4347'. [ 1056.129934][T21187] netlink: 'syz.7.4351': attribute type 10 has an invalid length. [ 1056.764860][T21187] bond0: (slave bond_slave_0): Releasing backup interface [ 1057.047860][T21194] netlink: 'syz.6.4354': attribute type 29 has an invalid length. [ 1057.305990][T21203] netlink: 'syz.1.4353': attribute type 21 has an invalid length. [ 1057.398497][T21207] netlink: 'syz.5.4357': attribute type 2 has an invalid length. [ 1057.444344][T21206] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4356'. [ 1057.457037][T21208] netlink: 'syz.7.4355': attribute type 3 has an invalid length. [ 1057.478986][T21207] IPv6: Can't replace route, no match found [ 1057.566812][T21210] netlink: 14593 bytes leftover after parsing attributes in process `syz.0.4356'. [ 1057.586696][T21208] netlink: 156 bytes leftover after parsing attributes in process `syz.7.4355'. [ 1057.606254][T21208] netlink: 'syz.7.4355': attribute type 3 has an invalid length. [ 1057.615501][T21208] netlink: 156 bytes leftover after parsing attributes in process `syz.7.4355'. [ 1059.313138][ C1] net_ratelimit: 8250 callbacks suppressed [ 1059.313156][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1059.331461][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1059.343922][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1059.356444][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1059.369883][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1059.382446][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1059.394941][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1059.407468][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1059.420930][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1059.433252][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1059.689705][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 1059.696686][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 1064.322815][ C1] net_ratelimit: 10765 callbacks suppressed [ 1064.322838][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1064.342536][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1064.355412][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1064.368139][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1064.380753][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1064.394391][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1064.407024][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1064.419663][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1064.432312][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1064.446000][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1064.682010][T21231] netlink: 80 bytes leftover after parsing attributes in process `syz.5.4363'. [ 1068.454569][T21247] netlink: 'syz.0.4368': attribute type 2 has an invalid length. [ 1068.511711][T21247] tipc: Started in network mode [ 1068.542962][T21247] tipc: Node identity 1340008, cluster identity 4711 [ 1068.588703][T21247] tipc: Node number set to 20185096 [ 1068.635987][T21257] netlink: 'syz.5.4372': attribute type 1 has an invalid length. [ 1069.071770][T21264] netlink: 'syz.5.4374': attribute type 10 has an invalid length. [ 1069.135681][T21264] team0: Device ip_vti0 is of different type [ 1069.152116][ T30] audit: type=1107 audit(1769478848.982:82): pid=21259 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 1069.332954][ C1] net_ratelimit: 6142 callbacks suppressed [ 1069.332981][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1069.352428][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1069.365102][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1069.377774][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1069.390449][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1069.404083][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1069.416853][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1069.429451][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1069.442034][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1069.455646][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1069.543951][T21269] netlink: 20 bytes leftover after parsing attributes in process `syz.1.4376'. [ 1069.600905][T21264] netlink: 'syz.5.4374': attribute type 1 has an invalid length. [ 1070.173407][T21269] netlink: 20 bytes leftover after parsing attributes in process `syz.1.4376'. [ 1070.361057][T21267] netlink: 'syz.0.4375': attribute type 21 has an invalid length. [ 1071.182125][T21298] bridge0: entered promiscuous mode [ 1071.210825][T21298] bridge0: entered allmulticast mode [ 1074.342777][ C0] net_ratelimit: 15209 callbacks suppressed [ 1074.342800][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1074.343203][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1074.349849][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1074.364102][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1074.374132][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1074.385969][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1074.397676][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1074.409700][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1074.422020][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1074.433931][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1079.352618][ C0] net_ratelimit: 19594 callbacks suppressed [ 1079.352641][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1079.355602][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1079.359969][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1079.371902][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1079.383584][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1079.395550][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1079.408022][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1079.419831][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1079.431470][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1079.446258][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1084.362859][ C0] net_ratelimit: 19447 callbacks suppressed [ 1084.362884][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1084.363179][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1084.370217][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1084.381859][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1084.393890][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1084.406193][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1084.418301][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1084.432225][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1084.441920][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1084.454071][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1089.372727][ C1] net_ratelimit: 19509 callbacks suppressed [ 1089.372751][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1089.373238][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1089.382216][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1089.391811][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1089.404016][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1089.417297][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1089.427707][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1089.439794][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1089.452001][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1089.463988][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1091.706718][ T5833] Bluetooth: hci2: command 0x0406 tx timeout [ 1091.727348][T20352] Bluetooth: hci1: command 0x0406 tx timeout [ 1094.382759][ C0] net_ratelimit: 20020 callbacks suppressed [ 1094.382782][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1094.383937][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1094.390660][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1094.401905][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1094.413533][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1094.425673][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1094.437844][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1094.449773][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1094.461478][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1094.475900][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1099.392877][ C0] net_ratelimit: 18639 callbacks suppressed [ 1099.392903][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1099.393532][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1099.400096][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1099.411746][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1099.423763][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1099.436078][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1099.448219][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1099.462327][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1099.471894][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1099.486565][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1104.402705][ C0] net_ratelimit: 18526 callbacks suppressed [ 1104.402731][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1104.404764][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1104.410025][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1104.421824][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1104.433602][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1104.447973][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1104.457948][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1104.469513][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1104.481485][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1104.494489][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1109.412857][ C1] net_ratelimit: 19450 callbacks suppressed [ 1109.412882][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1109.412929][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1109.420227][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1109.431814][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1109.445199][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1109.456290][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1109.467978][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1109.480122][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1109.492441][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1109.504357][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1114.422655][ C0] net_ratelimit: 19787 callbacks suppressed [ 1114.422677][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1114.423866][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1114.429966][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1114.441942][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1114.453619][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1114.466821][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1114.477987][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1114.489457][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1114.501521][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1114.513869][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1119.432701][ C1] net_ratelimit: 20134 callbacks suppressed [ 1119.432723][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1119.432729][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1119.434036][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1119.441946][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1119.451770][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1119.463830][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1119.476008][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1119.489135][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1119.499823][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1119.512061][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1121.563758][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 1121.581902][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 1124.442653][ C1] net_ratelimit: 19574 callbacks suppressed [ 1124.442678][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1124.442924][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1124.449996][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1124.461453][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1124.474809][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1124.485776][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1124.497846][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1124.509411][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1124.523231][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1124.533806][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1129.452878][ C0] net_ratelimit: 20022 callbacks suppressed [ 1129.452903][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1129.453966][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1129.460062][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1129.472204][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1129.484056][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1129.496990][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1129.508111][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1129.520015][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1129.531611][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1129.544845][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1134.462700][ C0] net_ratelimit: 19551 callbacks suppressed [ 1134.462704][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1134.462722][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1134.463628][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1134.469836][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1134.481927][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1134.494865][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1134.505616][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1134.517791][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1134.529841][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1134.542973][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1139.472778][ C0] net_ratelimit: 19397 callbacks suppressed [ 1139.472802][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1139.473231][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1139.479797][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1139.494493][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1139.504050][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1139.515997][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1139.527676][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1139.540962][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1139.551994][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1139.563843][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1144.482602][ C0] net_ratelimit: 19476 callbacks suppressed [ 1144.482625][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1144.483722][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1144.490005][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1144.502000][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1144.513630][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1144.526749][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1144.537999][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1144.549809][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1144.561556][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1144.574935][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1149.492693][ C1] net_ratelimit: 19807 callbacks suppressed [ 1149.492695][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1149.492716][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1149.499598][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1149.513130][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1149.524036][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1149.535904][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1149.547569][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1149.560811][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1149.572275][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1149.583560][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1154.502649][ C1] net_ratelimit: 19336 callbacks suppressed [ 1154.502673][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1154.503509][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1154.509925][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1154.521665][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1154.534762][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1154.546046][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1154.557805][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1154.569568][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1154.582830][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1154.594047][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1159.512786][ C0] net_ratelimit: 19744 callbacks suppressed [ 1159.512810][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1159.514144][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1159.519858][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1159.531958][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1159.544424][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1159.556337][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1159.567756][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1159.581586][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1159.592260][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1159.605712][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1164.522757][ C0] net_ratelimit: 19746 callbacks suppressed [ 1164.522781][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1164.523113][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1164.529905][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1164.541709][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1164.554216][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1164.566079][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1164.577745][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1164.590839][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1164.602122][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1164.615063][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1169.532851][ C0] net_ratelimit: 19980 callbacks suppressed [ 1169.532876][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1169.532901][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1169.540175][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1169.553181][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1169.563772][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1169.575684][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1169.588211][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1169.600050][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1169.611852][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1169.624881][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1174.542597][ C1] net_ratelimit: 19144 callbacks suppressed [ 1174.542620][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1174.542719][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1174.550991][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1174.561863][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1174.573745][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1174.585399][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1174.598641][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1174.609939][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1174.621589][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1174.633437][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1179.552809][ C0] net_ratelimit: 19604 callbacks suppressed [ 1179.552833][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1179.552964][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1179.559817][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1179.572066][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1179.584395][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1179.597141][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1179.607718][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1179.619979][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1179.631993][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1179.645086][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1182.793128][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 1182.811472][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 1184.562849][ C0] net_ratelimit: 20045 callbacks suppressed [ 1184.562873][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1184.563804][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1184.570227][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1184.581682][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1184.593834][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1184.605983][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1184.618091][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1184.630825][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1184.641774][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1184.655032][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1189.572712][ C1] net_ratelimit: 19772 callbacks suppressed [ 1189.572722][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1189.572735][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1189.574154][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1189.579941][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1189.593245][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1189.603629][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1189.615959][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1189.627958][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1189.641349][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1189.651456][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1194.582674][ C0] net_ratelimit: 20318 callbacks suppressed [ 1194.582680][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1194.582699][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1194.583880][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1194.590814][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1194.601699][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1194.614891][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1194.625952][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1194.637917][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1194.649702][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1194.662769][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1199.592758][ C0] net_ratelimit: 19691 callbacks suppressed [ 1199.592782][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1199.594079][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1199.599775][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1199.612097][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1199.624042][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1199.636925][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1199.647646][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1199.659629][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1199.672074][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1199.684479][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1204.602949][ C0] net_ratelimit: 19957 callbacks suppressed [ 1204.602973][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1204.603213][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1204.609927][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1204.623573][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1204.634198][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1204.646236][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1204.657812][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1204.671340][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1204.682074][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1204.694180][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1209.612878][ C0] net_ratelimit: 19454 callbacks suppressed [ 1209.612898][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1209.612902][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1209.614125][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1209.621064][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1209.631888][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1209.645117][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1209.656265][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1209.667972][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1209.679654][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1209.692924][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1214.622646][ C0] net_ratelimit: 19836 callbacks suppressed [ 1214.622671][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1214.623624][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1214.629883][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1214.641818][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1214.653508][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1214.666796][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1214.677893][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1214.689401][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1214.701722][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1214.713798][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1219.632585][ C0] net_ratelimit: 19278 callbacks suppressed [ 1219.632609][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1219.632969][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1219.639517][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1219.652979][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1219.663882][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1219.675643][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1219.687426][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1219.700678][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1219.711753][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1219.723509][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1224.642891][ C0] net_ratelimit: 19550 callbacks suppressed [ 1224.642916][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1224.643887][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1224.650033][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1224.663392][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1224.674313][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1224.686103][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1224.697794][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1224.711070][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1224.722065][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1224.734056][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1229.652785][ C1] net_ratelimit: 19490 callbacks suppressed [ 1229.652809][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1229.652816][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1229.653725][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1229.660865][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1229.672202][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1229.693333][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1229.695848][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1229.709750][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1229.719971][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1229.731886][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1234.662610][ C0] net_ratelimit: 19990 callbacks suppressed [ 1234.662636][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1234.662676][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1234.669760][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1234.682885][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1234.693616][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1234.707236][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1234.717826][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1234.729863][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1234.741462][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1234.754836][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1239.672565][ C0] net_ratelimit: 19663 callbacks suppressed [ 1239.672588][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1239.673096][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1239.679545][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1239.692020][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1239.703897][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1239.716961][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1239.727543][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1239.739854][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1239.751969][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1239.765172][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1244.348852][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 1244.367104][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 1244.682523][ C0] net_ratelimit: 19525 callbacks suppressed [ 1244.682546][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1244.682896][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1244.689938][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1244.702716][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1244.713563][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1244.726872][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1244.737777][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1244.749667][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1244.761393][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1244.774472][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1249.692706][ C0] net_ratelimit: 19733 callbacks suppressed [ 1249.692729][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1249.692907][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1249.700004][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1249.713098][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1249.723715][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1249.736000][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1249.748086][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1249.761038][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1249.771576][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1249.783584][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1254.702546][ C0] net_ratelimit: 20063 callbacks suppressed [ 1254.702570][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1254.702932][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1254.709766][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1254.721808][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1254.733394][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1254.747017][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1254.757762][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1254.769381][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1254.781359][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1254.793888][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1259.712725][ C0] net_ratelimit: 19306 callbacks suppressed [ 1259.712749][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1259.713310][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1259.719680][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1259.733226][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1259.744138][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1259.755649][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1259.767721][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1259.780011][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1259.791952][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1259.804928][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1264.722530][ C1] net_ratelimit: 19527 callbacks suppressed [ 1264.722554][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1264.723198][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1264.730972][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1264.741638][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1264.755071][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1264.765866][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1264.777808][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1264.789505][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1264.802806][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1264.813800][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1269.732548][ C0] net_ratelimit: 20207 callbacks suppressed [ 1269.732572][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1269.734125][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1269.739548][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1269.753202][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1269.763799][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1269.775750][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1269.787400][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1269.800778][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1269.811668][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1269.823735][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1274.742562][ C0] net_ratelimit: 20272 callbacks suppressed [ 1274.742585][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1274.744118][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1274.749744][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1274.761929][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1274.773591][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1274.786984][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1274.797700][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1274.809329][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1274.821320][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1274.833780][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1279.752612][ C0] net_ratelimit: 19586 callbacks suppressed [ 1279.752635][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1279.753150][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1279.759690][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1279.772988][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1279.784075][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1279.795899][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1279.807618][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1279.821083][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1279.832033][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1279.843434][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1284.762606][ C1] net_ratelimit: 19127 callbacks suppressed [ 1284.762629][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1284.762761][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1284.769783][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1284.781580][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1284.794816][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1284.805788][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1284.817401][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1284.829435][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1284.841709][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1284.853722][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1286.348281][ T31] INFO: task kworker/R-ipv6_:3183 blocked for more than 145 seconds. [ 1289.772733][ C0] net_ratelimit: 19506 callbacks suppressed [ 1289.772765][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1289.773061][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1289.779973][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1289.793143][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1289.803619][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1289.815653][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1289.828031][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1289.839866][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1289.851579][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1289.864687][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1294.782525][ C0] net_ratelimit: 19589 callbacks suppressed [ 1294.782547][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1294.782949][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1294.789514][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1294.802974][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1294.813892][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1294.825549][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:20:10:00:00:00, vlan:0) [ 1294.837482][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1294.850470][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1294.861687][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1294.873573][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)