last executing test programs: 14m15.605554464s ago: executing program 32 (id=676): r0 = getpid() r1 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0x104101, 0x5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000000}, r0, 0x1, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x828, 0x7fff, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a300000000040000000030a01010000000000000000080000000900010073797a30000000000900030073797a3000000000140004800800024000000000080001400000000058000000060a010400000000000000000100000008000b4000000000300004802c000180090001007866726d000000001c0002800500030001000000080002400000000108000140000000010900010073797a300000000014000000110001"], 0xe0}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)={0x24, 0x3e, 0x107, 0xfffffffc, 0x10000, {0x1, 0x7c}, [@nested={0x4, 0x142}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0x6, 0x6, 0x0, 0x0, @str='\x80\n'}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x4048011}, 0xc000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000005c0)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x8801}, 0x800) 12m38.632296344s ago: executing program 33 (id=1624): socket$nl_route(0x10, 0x3, 0x0) socket$kcm(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000000004, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8800000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xc, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e50200"/32], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$sock_attach_bpf(r2, 0x6, 0xa, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x54, 0x2, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}]}, 0x54}}, 0x20008000) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d40)={0x6, 0x2, &(0x7f0000000a80)=@raw=[@cb_func={0x18, 0xb, 0x4, 0x0, 0x6}], &(0x7f0000000c00)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c40)={0x0, 0xe, 0x7, 0x7fffffff}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4e1}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x5, &(0x7f00000006c0)=ANY=[@ANYBLOB="180900000000000000000000030000001ca100000000000085100000fcffffff95"], &(0x7f0000000080)='GPL\x00', 0x7, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ff}, 0x94) 12m24.090313146s ago: executing program 6 (id=1898): socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x1, 0x0, 0x480000000000000b, 0x954b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x7, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000002400010326bd7000008000000100000034002deb4e977c089345056167624bc488e47f3659a01965cce0c52f4f71d8228bdbf9a3b29a9df85600"/72], 0x48}, 0x1, 0x0, 0x0, 0x4840}, 0x44004) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830b}, 0x100, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socket$kcm(0x2, 0x200000000000001, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) mount$bpf(0x200000000000, &(0x7f0000000440)='./file0/../file0\x00', 0x0, 0x989046, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x989046, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000ac0)='./file0/../file0\x00', 0x0, 0x44000, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000100081044e81f782db44b904021d080c43000000e8fe55a1190015000600142603600e1209001b0000000401a80016000a0004", 0x37}], 0x1}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfe33) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) sendmsg$NFNL_MSG_COMPAT_GET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="34000000000b010200000000000000000000000608000340000000010800034000000001080002400000000508000240000000024cbe3bbfc45b9a027f09c266c5605bef4d2619c1f7b27b0be8f679b70bf4b595a611c32875df6c50c44e106d3eea3b64146a3a83"], 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x20000080) r4 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="02040003120000002cbd7000fbdbdf2503000900800000001cdc0dca1d9f68846960e580e42944af05000600000000000a0000000000000000000000000000000000000000000001020000000000000002000100000000000000070c00c6000005000500000000000a00000000000000fc010000000000000000000000000001070000000000000001000301"], 0x90}, 0x1, 0x7}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2141, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_CT_GET(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000006c0)=ANY=[@ANYBLOB="1c00000001010102000000000000000002000003080015"], 0x1c}, 0x1, 0x0, 0x0, 0x8054}, 0x20000040) sendmsg$inet(r4, &(0x7f00000004c0)={&(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xff}}, 0x10, &(0x7f0000000000)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1}, 0x3e8) 12m23.591993823s ago: executing program 6 (id=1906): bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[], 0x48) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0x4, 0x8}, 0x2, 0x4, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x14, 0x41, 0x9, 0x4, 0x25dfdbfd, {0x2}}, 0x14}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x44, 0x4, 0x2}, 0x50) socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)) getpid() r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)={{0x14}, [], {0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x84}}}, 0x28}}, 0x40088) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x19, 0x4, 0x4, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c0000002500010125bd7000fcffffff300000000800030047"], 0x1c}, 0x1, 0x0, 0x0, 0x409d6}, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={0x0}, 0x1, 0x0, 0x0, 0x40040}, 0x4000) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0xff09, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="1e000000420000000f0000000500000000180000", @ANYRES32=0x1, @ANYBLOB="0100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x50) socket$inet6_udp(0xa, 0x2, 0x0) 12m8.511492202s ago: executing program 34 (id=1906): bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[], 0x48) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0x4, 0x8}, 0x2, 0x4, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x14, 0x41, 0x9, 0x4, 0x25dfdbfd, {0x2}}, 0x14}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x44, 0x4, 0x2}, 0x50) socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)) getpid() r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)={{0x14}, [], {0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x84}}}, 0x28}}, 0x40088) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x19, 0x4, 0x4, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c0000002500010125bd7000fcffffff300000000800030047"], 0x1c}, 0x1, 0x0, 0x0, 0x409d6}, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={0x0}, 0x1, 0x0, 0x0, 0x40040}, 0x4000) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0xff09, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="1e000000420000000f0000000500000000180000", @ANYRES32=0x1, @ANYBLOB="0100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x50) socket$inet6_udp(0xa, 0x2, 0x0) 11m27.168036863s ago: executing program 35 (id=2178): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000500), 0x5}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfffffffeffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[], 0x50) socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000bc0)=ANY=[@ANYRES32, @ANYBLOB, @ANYRESOCT=0x0, @ANYRES8=0x0, @ANYRES16=r0], 0x0, 0x42}, 0x28) recvmsg$unix(0xffffffffffffffff, 0x0, 0x60000002) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x20100, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x20800000, 0x0, 0x2, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x8000}, 0x2800c051) bpf$MAP_LOOKUP_ELEM(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x1000) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x94) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000001000000000000000000000085000000870000001801000020786c2500000000072020207b1af8ff00000000bfa108000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095"], &(0x7f0000000180)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 11m24.77039548s ago: executing program 5 (id=2298): r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$can_raw(0x1d, 0x3, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) mount$bpf(0x200000000000, &(0x7f0000000440)='./file0/../file0\x00', 0x0, 0x989046, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x989046, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x5, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000780)='./file0/../file0\x00', 0x0, 0xa06002, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0xb0c) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f0000000000)=@framed={{0x6, 0x0, 0x0, 0x0, 0x0, 0x69, 0x11, 0xa1}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x90, 0x25, 0x101, 0x70bd25, 0xfefffffb, {0x8}, [@typed={0x8, 0x3, 0x0, 0x0, @binary='G\x00\x00\x00'}, @nested={0x71, 0x129, 0x0, 0x1, [@generic="ea8f2df6ecae7e4e5892040a1f54057660272f3cf7c9c05bbb0845aac1a5b8861f93db9f554827e35315880a780239abb006cf9d23d6893f75c00beb3ebc87e8c9d077ad179bf09b751c31dfc81202c03fce12ce2bb9c500577951c587f95ca7f0", @typed={0x4, 0x10}, @typed={0x8, 0x4c, 0x0, 0x0, @u32}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x4048957}, 0x28040) 11m24.321497586s ago: executing program 5 (id=2302): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x2405, &(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000010000000, 0x8}}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000b80)={{0x14}, [@NFT_MSG_NEWTABLE={0x1c, 0x0, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x2}]}, @NFT_MSG_NEWFLOWTABLE={0x30, 0x16, 0xa, 0x3, 0x0, 0x0, {0x1, 0x0, 0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x4}]}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0xa}, @NFT_OBJECT_CT_TIMEOUT=@NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x5}}], {0x14, 0x10}}, 0x94}}, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000240)={0x58, 0x2, 0x6, 0x801, 0x0, 0x0, {0x0, 0x0, 0xffff}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_PROTOCOL={0x5f, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x0, 0x4, 0x2}, @IPSET_ATTR_DATA={0x0, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x0, 0x4, 0x1, 0x0, 0x4e23}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}]}, 0x58}}, 0x14) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmsg(r3, &(0x7f00000009c0)={&(0x7f0000000140)=@alg, 0x80, &(0x7f0000000840)=[{&(0x7f00000002c0)=""/219, 0xdb}, {&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/249, 0xf9}, {&(0x7f00000004c0)=""/130, 0x82}, {&(0x7f0000000580)=""/247, 0xf7}, {&(0x7f0000000680)=""/208, 0xd0}, {&(0x7f0000000780)=""/162, 0xa2}, {&(0x7f00000001c0)=""/16, 0x10}, {&(0x7f0000001c40)=""/4096, 0x1000}], 0x9, &(0x7f0000000900)=""/142, 0x8e}, 0x40000000) 11m9.227102705s ago: executing program 36 (id=2302): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x2405, &(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000010000000, 0x8}}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000b80)={{0x14}, [@NFT_MSG_NEWTABLE={0x1c, 0x0, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x2}]}, @NFT_MSG_NEWFLOWTABLE={0x30, 0x16, 0xa, 0x3, 0x0, 0x0, {0x1, 0x0, 0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x4}]}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0xa}, @NFT_OBJECT_CT_TIMEOUT=@NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x5}}], {0x14, 0x10}}, 0x94}}, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000240)={0x58, 0x2, 0x6, 0x801, 0x0, 0x0, {0x0, 0x0, 0xffff}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_PROTOCOL={0x5f, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x0, 0x4, 0x2}, @IPSET_ATTR_DATA={0x0, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x0, 0x4, 0x1, 0x0, 0x4e23}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}]}, 0x58}}, 0x14) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmsg(r3, &(0x7f00000009c0)={&(0x7f0000000140)=@alg, 0x80, &(0x7f0000000840)=[{&(0x7f00000002c0)=""/219, 0xdb}, {&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/249, 0xf9}, {&(0x7f00000004c0)=""/130, 0x82}, {&(0x7f0000000580)=""/247, 0xf7}, {&(0x7f0000000680)=""/208, 0xd0}, {&(0x7f0000000780)=""/162, 0xa2}, {&(0x7f00000001c0)=""/16, 0x10}, {&(0x7f0000001c40)=""/4096, 0x1000}], 0x9, &(0x7f0000000900)=""/142, 0x8e}, 0x40000000) 10m54.261742263s ago: executing program 3 (id=2513): r0 = getpid() r1 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0x104101, 0x5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000000}, r0, 0x1, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x828, 0x7fff, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a300000000040000000030a01010000000000000000010000000900010073797a30000000000900030073797a3000000013140004800800024000000000080001400000000058000000060a010400000000000000000100000008000b4000000000300004802c000180090001007866726d000000001c0002800500030001000000080002400000000108000140000000010900010073797a300000000014000000110001"], 0xe0}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)={0x24, 0x3e, 0x107, 0xfffffffc, 0x10000, {0x1, 0x7c}, [@nested={0x4, 0x142}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0x6, 0x6, 0x0, 0x0, @str='\x80\n'}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x4048011}, 0xc000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000005c0)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x8801}, 0x800) 10m53.871717245s ago: executing program 3 (id=2517): socket$inet6_udplite(0xa, 0x2, 0x88) r0 = getpid() perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x100600, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f1100db5b686158bbcfe8875a65969ff57b03000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200"], 0xcfa4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r2) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r3, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xb, &(0x7f00000009c0)=@framed={{}, [@printk={@p, {0x3, 0x0, 0x6, 0xa, 0x1, 0xfff8, 0xa1}, {}, {0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffe00}, {}, {}, {0x85, 0x0, 0x0, 0x76}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 10m52.838179295s ago: executing program 3 (id=2525): mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x24080, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x300800, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) close(0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x46, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x2}}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x801, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, @NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @xfrm={{0x9}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_XFRM_DREG={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_XFRM_DIR={0x5}, @NFTA_XFRM_KEY={0x8, 0x2, 0x1, 0x0, 0x5}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x40050) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000b00)=ANY=[@ANYBLOB="140000001000010000000000000000000200000a20000000000a050000000000000000000100fffc0900010073797a300000000040000000030a01010000000000000000010000000900030073797a300000000014000480080002400000000008000140000000010900010073797a300000000058000000060a0104000000000000000001000000300004802c0001800b000100736f636b657400001c00028008000240000000010500000000000003080001400000000208000b40000000000900010073797a3000000000140000001100010000000000000000000000000a"], 0xe0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x8b7848, 0x0) unlink(&(0x7f0000000040)='./file0/../file0\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001280)={0x6, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000300000000000002000000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000240)=""/4096, 0x41100, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0), &(0x7f0000001240)=[{0x1, 0x1, 0xf, 0xb}, {0x1, 0x2, 0xd, 0x1}], 0x10, 0xffffc483}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b704000000000000850000008e00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @sock_ops=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r3, &(0x7f00000017c0)={&(0x7f0000001440)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000001580)=[{&(0x7f0000001480)="5f34a0692bc068af53fbf696b6fc19afe2d530c2e6458a909f7667780adfbe6de55cc3de853f9bc0bf879eae3673c5213c7597f616cf4e5817f1502310d6d073d6f24a3be1e665e3a7e60c806303c077210df7c999e60d31f40513f9054b93f3f1455de035e096fc3ec0122ef9925b4aff59e9bc2a9f8e1f503547e01114158bd10b7d698eff412f214deff13c5a8d7006fb2d4de7a73347d91892539ca11428fcbb6cf9477461cf2a47f47815aa8e9faab59de65f6cd4511676ba808cd8bc414765ac061264aaa950e6a1486eba16c853d5857d45883d", 0xd7}, {&(0x7f0000001ac0)="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", 0x1000}], 0x2, &(0x7f00000015c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xb}}, @ip_ttl={{0x14, 0x0, 0x2, 0xa1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x30}}, @ip_retopts={{0xe4, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @timestamp_addr={0x44, 0x44, 0xc2, 0x1, 0xc, [{@multicast2, 0xb935}, {@loopback}, {@loopback, 0xcb8}, {@empty, 0x3}, {@broadcast, 0x9}, {@multicast2, 0xfffffffa}, {@rand_addr=0x64010101, 0x5}, {@multicast2, 0x5}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x1c, 0xff, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8d55}, {@broadcast, 0x3}, {@rand_addr=0x64010101, 0x9}]}, @end, @timestamp_addr={0x44, 0x34, 0x21, 0x1, 0x6, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@empty, 0x80}, {@dev={0xac, 0x14, 0x14, 0x2a}, 0x9}, {@broadcast, 0x5d}, {@dev={0xac, 0x14, 0x14, 0x17}, 0x8001}, {@private=0xa010102, 0x8}]}, @generic={0x82, 0x9, "cddf05a595234f"}, @lsrr={0x83, 0x2b, 0x99, [@dev={0xac, 0x14, 0x14, 0xc}, @multicast1, @multicast2, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x33}, @loopback, @dev={0xac, 0x14, 0x14, 0xb}, @dev={0xac, 0x14, 0x14, 0x22}, @local, @empty]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_retopts={{0x58, 0x0, 0x7, {[@rr={0x7, 0xb, 0x79, [@multicast1, @empty]}, @timestamp_addr={0x44, 0x3c, 0xbc, 0x1, 0xc, [{@local, 0x4}, {@multicast2, 0xe2}, {@empty, 0x7fff}, {@multicast2, 0x4}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x4}, {@broadcast, 0x200}, {@rand_addr=0x64010102, 0x7}]}]}}}], 0x1e8}, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000013c0)={0x1, 0x58, &(0x7f0000001340)}, 0x10) socketpair(0xf, 0x3, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0xa}, 0xc05}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000040)=ANY=[], 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) 10m52.547468698s ago: executing program 3 (id=2529): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41000}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r0}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d34, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2000000008, 0x800}, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)={0x14, 0x1a, 0x1, 0xfffffffd, 0x25dfdbfd, "", [@typed={0x4, 0x19}]}, 0x14}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r2, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = socket$kcm(0x2, 0x3, 0x106) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a3000000000090003"], 0x7c}}, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000604000000002e"], 0x0, 0x37}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x2, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r5, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, &(0x7f0000000600)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\xa1h\xf52\xe4\xc7\xcc!\xe5\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xc5.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96p~\xde\xe0\xc9e\xa2\x96\xa8SW\xfb-3\xafM\xd7\x98\xbdN\x1d\xdc\xf98\xda\xe6\x04\xa0\xac\x1a\xa8\xa1\x12Q\xc0\xbb\xbe\xf1\xdd') sendmsg$inet(r3, &(0x7f0000000040)={&(0x7f0000000380)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000000000)=[{&(0x7f0000000600)="b9ed29d8fe490a060b483f2dd090fc6889ae6b84", 0x34}], 0x1}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xd, &(0x7f00000004c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000002000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000009800000095"], &(0x7f0000000680)='syzkaller\x00'}, 0x6b) 10m37.468041698s ago: executing program 37 (id=2529): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41000}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r0}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d34, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2000000008, 0x800}, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)={0x14, 0x1a, 0x1, 0xfffffffd, 0x25dfdbfd, "", [@typed={0x4, 0x19}]}, 0x14}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r2, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = socket$kcm(0x2, 0x3, 0x106) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a3000000000090003"], 0x7c}}, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000604000000002e"], 0x0, 0x37}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x2, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r5, 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, &(0x7f0000000600)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\xa1h\xf52\xe4\xc7\xcc!\xe5\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xc5.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96p~\xde\xe0\xc9e\xa2\x96\xa8SW\xfb-3\xafM\xd7\x98\xbdN\x1d\xdc\xf98\xda\xe6\x04\xa0\xac\x1a\xa8\xa1\x12Q\xc0\xbb\xbe\xf1\xdd') sendmsg$inet(r3, &(0x7f0000000040)={&(0x7f0000000380)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000000000)=[{&(0x7f0000000600)="b9ed29d8fe490a060b483f2dd090fc6889ae6b84", 0x34}], 0x1}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xd, &(0x7f00000004c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000002000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000009800000095"], &(0x7f0000000680)='syzkaller\x00'}, 0x6b) 6m22.401624907s ago: executing program 8 (id=5076): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8983, &(0x7f0000000080)) 6m21.917819726s ago: executing program 8 (id=5083): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, 0x0}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x7c, 0x4}, 0x2, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x4, 0x0, 0x0, 0x0, 0xa00000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x10, 0x400000002, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="17000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="14000000100001f500000000000000000000000a20000000000a010100000000000000000a0000000900010073797a300000000048000000030a012200000000000000000a0004000900010073797a30000000000900030073797a3100000000080007006e617400140004800800014000000003080002400000000014000000020a69eff1640000000000000000000114000000110001"], 0xa4}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r4, 0x0, 0x24000080) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r3, 0x0, 0x0}, 0x10) 6m21.666153523s ago: executing program 8 (id=5086): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) mount$bpf(0x200000000000, &(0x7f0000000440)='./file0/../file0\x00', 0x0, 0x989046, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x9549, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x0, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c00000040000701e5ffffff00000000017c0000040042800c00018006000600800a00000800028004001280"], 0x2c}, 0x1, 0x0, 0x0, 0x48815}, 0x4004) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000780)='./file0/../file0\x00', 0x0, 0xa06002, 0x0) r4 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000040)={r4, 0x0, 0x0}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000280)='%pS \x00'}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)=@o_path={&(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x0, r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x2, 0x17, &(0x7f00000001c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xf79}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x5, 0x13, &(0x7f0000000080)=""/19, 0x40f00, 0x30, '\x00', 0x0, @fallback=0x18, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000100)={0x3, 0x6, 0xf, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f00000003c0)=[r5, 0x1, r6, r7], &(0x7f0000000400)=[{0x0, 0x4, 0x8, 0x1}, {0x5, 0x1, 0x4, 0x9}, {0x5, 0x4, 0xa, 0xc}], 0x10, 0x7}, 0x94) 6m21.241743591s ago: executing program 8 (id=5089): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41000}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r0}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d34, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2000000008, 0x800}, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)={0x14, 0x1a, 0x1, 0xfffffffd, 0x25dfdbfd, "", [@typed={0x4, 0x19}]}, 0x14}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r2, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = socket$kcm(0x2, 0x3, 0x106) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a3000000000090003007379"], 0x7c}}, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000604000000002e"], 0x0, 0x37}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x2, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r5, 0x0, 0x1, 0x0, 0x80010000}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, &(0x7f0000000600)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\xa1h\xf52\xe4\xc7\xcc!\xe5\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xc5.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96p~\xde\xe0\xc9e\xa2\x96\xa8SW\xfb-3\xafM\xd7\x98\xbdN\x1d\xdc\xf98\xda\xe6\x04\xa0\xac\x1a\xa8\xa1\x12Q\xc0\xbb\xbe\xf1\xdd') sendmsg$inet(r3, &(0x7f0000000040)={&(0x7f0000000380)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000000000)=[{&(0x7f0000000600)="b9ed29d8fe490a060b483f2dd090fc6889ae", 0x12}], 0x1}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xd, &(0x7f00000004c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000002000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000009800000095"], &(0x7f0000000680)='syzkaller\x00'}, 0x6b) 6m6.041953811s ago: executing program 38 (id=5089): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41000}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r0}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d34, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2000000008, 0x800}, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)={0x14, 0x1a, 0x1, 0xfffffffd, 0x25dfdbfd, "", [@typed={0x4, 0x19}]}, 0x14}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r2, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = socket$kcm(0x2, 0x3, 0x106) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a3000000000090003007379"], 0x7c}}, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000604000000002e"], 0x0, 0x37}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x2, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r5, 0x0, 0x1, 0x0, 0x80010000}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, &(0x7f0000000600)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\xa1h\xf52\xe4\xc7\xcc!\xe5\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xc5.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96p~\xde\xe0\xc9e\xa2\x96\xa8SW\xfb-3\xafM\xd7\x98\xbdN\x1d\xdc\xf98\xda\xe6\x04\xa0\xac\x1a\xa8\xa1\x12Q\xc0\xbb\xbe\xf1\xdd') sendmsg$inet(r3, &(0x7f0000000040)={&(0x7f0000000380)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000000000)=[{&(0x7f0000000600)="b9ed29d8fe490a060b483f2dd090fc6889ae", 0x12}], 0x1}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xd, &(0x7f00000004c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000002000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000009800000095"], &(0x7f0000000680)='syzkaller\x00'}, 0x6b) 4m36.502860362s ago: executing program 39 (id=5652): r0 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)=@vsock={0x28, 0x0, 0x2710, @hyper}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000140)="0400", 0x2}], 0x1, 0x0, 0x0, 0x900}, 0x60) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000100)={r0}) recvmsg$kcm(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0}, 0x0) 4m36.369401245s ago: executing program 40 (id=5656): r0 = socket$kcm(0xa, 0x3, 0x3a) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000002dc0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000003c0)='`', 0x1}], 0x1}, 0x41) recvmsg$kcm(r0, &(0x7f0000000a80)={&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000002c0)=""/247, 0xf7}, {&(0x7f0000000c00)=""/221, 0xdd}, {&(0x7f00000001c0)=""/177, 0xb1}, {&(0x7f00000004c0)=""/31, 0x1f}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000000500)=""/243, 0xf3}, {&(0x7f0000000600)=""/52, 0x34}, {&(0x7f0000000640)=""/161, 0xa1}, {&(0x7f00000003c0)=""/158, 0x9e}, {&(0x7f00000007c0)=""/254, 0xfe}], 0xa, &(0x7f0000000900)=""/50, 0x32}, 0x0) 4m36.233046324s ago: executing program 41 (id=5653): r0 = perf_event_open(&(0x7f0000001100)={0x5, 0x80, 0x9, 0x8, 0xb, 0xfb, 0x0, 0x3c, 0xc002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x18842, 0x0, 0x7fffffff, 0x2, 0x3cd, 0x3, 0x7, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) (async) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[@ANYBLOB="14000000"], 0x14}, 0x1, 0x0, 0x0, 0x20008081}, 0x800) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, 0x0, &(0x7f0000000100)='GPL\x00', 0xffffffff}, 0x94) (async) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1850, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) r2 = socket$kcm(0xa, 0x5, 0x0) (rerun: 32) setsockopt$sock_attach_bpf(r2, 0x29, 0x23, &(0x7f0000000040), 0xf7) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) r3 = socket$kcm(0xa, 0x5, 0x0) socket$kcm(0x22, 0x2, 0x21) (async) r4 = getpid() r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000000008500000030000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007b0000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) (rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) setsockopt$sock_attach_bpf(r3, 0x29, 0x3b, 0x0, 0x0) (async) sendmsg$kcm(r3, &(0x7f0000002dc0)={&(0x7f0000001580)=@l2tp6={0xa, 0x0, 0x0, @remote, 0x9, 0x5c4}, 0x80, &(0x7f00000029c0)=[{&(0x7f0000001480)="89", 0x1}], 0x1}, 0xc9) 4m36.064444203s ago: executing program 42 (id=5655): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x2000c450) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x20048004) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x2010000}, 0x143}, 0x48) 4m35.848854756s ago: executing program 43 (id=5654): socket$nl_netfilter(0x10, 0x3, 0xc) r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xf}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1400000004000000040000000200020000000000", @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='.'], 0x50) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, 0x0}, 0x94) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="d8000000180081054e81f782db4cb904021d0800fe007c05e8fe55a10a0015000200142603600e12080005007f370401a8001600200006000400027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2e98a61e284ce5a7cef4090000001fb791d157643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025", 0x97}], 0x1}, 0x4000000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8923, &(0x7f0000000140)={'batadv_slave_1\x00', @link_local={0x1, 0x80, 0xc2, 0x25, 0x64, 0x2}}) socketpair(0x1d, 0x3, 0x1, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r3, &(0x7f0000000040)="c6124397183fc5d3ac399656fd8d4afdfab48847ed291d3c779446c3fc1624", &(0x7f0000000080)=@tcp=r3}, 0x20) r6 = socket$nl_sock_diag(0x10, 0x3, 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0xa38, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$TCPDIAG_GETSOCK(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="4c000000120001002bbd7000ffdbdf250aa500fd400100000000000000000000000000000600000000000000000000000000000003000000", @ANYRES32=0x0, @ANYRES64], 0x4c}, 0x1, 0x0, 0x0, 0x4008000}, 0x10) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r5, 0x0, 0x44800) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000011c0)={0x0, 0x0, 0x0}, 0x0) socket$nl_sock_diag(0x10, 0x3, 0x4) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x1, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000700)=ANY=[@ANYBLOB="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"/426], 0xc0}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) socket$kcm(0xf, 0x3, 0x2) 4m18.201292472s ago: executing program 5 (id=5659): perf_event_open(&(0x7f0000000040)={0x5, 0x6c, 0x2, 0x2, 0x8, 0x9, 0x0, 0x6, 0x0, 0xc, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x8}, 0x2000, 0xff, 0x9, 0x0, 0x4, 0x145d, 0x1, 0x0, 0x3f8, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x42000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xf}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x10, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40000, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x8, 0x10001}, 0x6018, 0xfffffffffffffffe, 0x8001, 0x6, 0x3fe, 0x7ffffffc, 0x400, 0x0, 0x2, 0x0, 0x2080000000}, 0x0, 0x3, 0xffffffffffffffff, 0xa) socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x4, 0x6, 0xa}, 0x50) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000000b0001007665"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000f40)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWRULE={0x2c, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x54}, 0x1, 0x0, 0x0, 0x2000094}, 0x4000800) 4m17.933991758s ago: executing program 5 (id=5662): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x14000, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x828, 0x9, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="d8000000180081064e81f782db4cb904021d0800fd007c05e8fe55a10a0007000140020203600e4109000800ac00060311000000160012000a00fe80000000000000c1d67f6f94007134cf6efb8000a007a290457f01a7cee4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5ae24e25ccca9e00360db79826835d3a71d95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b4337", 0xbd}], 0x1}, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x400000002, 0x0) r3 = socket(0x21, 0x6, 0xffffffff) sendmsg$NFNL_MSG_ACCT_GET(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x260408c4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e24, @local}, 0x0, 0x1003, 0x5, 0x1}}, 0x80, 0x0}, 0x4000059) write$cgroup_subtree(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="1303000056000528707b528e9a93a54a07"], 0xfe33) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x2, 0xa) socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$AUDIT_ADD_RULE(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000009c0)={0x424, 0x3f3, 0x400, 0x70bd2d, 0x25dfdbff, {0xf, 0x0, 0x3e, [0x9, 0x1000, 0x29, 0x1, 0x8001, 0x800, 0xf42a, 0x7, 0x8000, 0x1, 0x7d9f, 0x4375, 0x2, 0x5, 0xffff, 0xd1, 0x0, 0xc52, 0x5, 0x7, 0xe52f, 0xe, 0x800, 0x100, 0x0, 0x3dc, 0x1, 0x57faeb73, 0x40, 0xdc9, 0x6, 0x7, 0xe, 0x6, 0x9, 0x7c9, 0xd, 0x0, 0x81, 0xffffffff, 0x1, 0x1000, 0x46, 0x4, 0x108, 0x0, 0xffff, 0x1, 0x4, 0x2, 0x7, 0x8, 0xe, 0x8, 0x4, 0x9847, 0x9, 0x9, 0x3ff, 0x9, 0x6, 0x4, 0xfffffffa, 0xfffffffa], [0x5, 0x7, 0x39ea, 0x9b, 0xb, 0x3, 0xff, 0x5, 0xd, 0x5, 0x9, 0x2, 0x40, 0x7, 0x1, 0x5, 0x9, 0xd, 0x101, 0x401, 0x8, 0x6, 0x7, 0x4, 0xaf, 0x6, 0xc0, 0x5, 0xe, 0xfff, 0x4, 0x72, 0x0, 0x80000000, 0x3, 0x7bdb, 0x400, 0x0, 0x8, 0xfff, 0xfff, 0x0, 0xc2, 0x3, 0x8, 0x7, 0x53, 0x86f, 0x2, 0x100, 0x800, 0x7, 0x200, 0x2, 0x0, 0x8000, 0x85, 0x7, 0x8, 0x3, 0x10000, 0x5, 0x9, 0x65], [0x7, 0x3, 0x16848238, 0x48, 0x139e, 0xd, 0x539, 0xadcc, 0x1, 0x5, 0x6, 0x83c, 0x6, 0x9, 0x9, 0x7c, 0x49, 0xa276, 0xffffffff, 0x9, 0x6, 0x2, 0x4, 0x1, 0x7fa, 0x5, 0x3, 0x1, 0x0, 0x0, 0x3, 0x0, 0xff, 0x83, 0x7, 0xff, 0x7, 0x10, 0x4, 0x6, 0xd6c, 0xfffffff8, 0x67, 0x9, 0x5c0, 0x8001, 0x2, 0x6, 0x6, 0x30, 0x2, 0x6, 0x7, 0x9, 0x7fffffff, 0xffffffff, 0x574fc3a4, 0x8, 0x8, 0x400, 0x10, 0xffffffff, 0x8000, 0x80000001], [0x80, 0x86, 0x8, 0x0, 0x3, 0x3, 0x1, 0x2, 0xc, 0x80000000, 0x6, 0x6, 0x5a, 0x2, 0x7, 0x2, 0x1, 0x1, 0x6, 0x3, 0xd, 0x1, 0x6, 0x0, 0x6, 0x2, 0xaebb, 0x401, 0xb, 0x8, 0x2, 0x9, 0x8, 0xfffffffc, 0x6, 0x43, 0x4, 0x7, 0xd, 0x5, 0x6, 0xfffffff8, 0x8, 0x8, 0xe7, 0x0, 0x8, 0x4, 0x6, 0x6, 0x5, 0x8, 0x3, 0x8, 0x1, 0x1, 0x6, 0x4, 0x9, 0x5, 0x400, 0xfffffff4, 0x1, 0xc], 0x2, ['\x14\x00']}, ["", "", "", "", "", "", "", ""]}, 0x424}, 0x1, 0x0, 0x0, 0xc7ea6ca6c2ca5d7c}, 0x20000000) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x10, 0x701, 0x0, 0x0, {0xa}, [@typed={0x6, 0x1, 0x0, 0x0, @str='\x14\x00'}]}, 0x1c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0xe, 0x0, &(0x7f0000000140)='syzkaller\x00'}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x5, 0xd, 0x7, 0x0, 0x7fffffff, 0x5a4d4, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xdfffffff, 0x1, @perf_config_ext={0xffffffffffffffff, 0x5}, 0x100020, 0x91f, 0x7, 0x9, 0x81, 0x5, 0x4005, 0x0, 0x2, 0x0, 0x2}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f0, &(0x7f0000000080)) r7 = socket$kcm(0x2a, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x8917, 0x0) 4m17.870461675s ago: executing program 2 (id=5663): socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x9549, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x0, 0x0, 0x2, 0xfffff271, 0xfffb, 0x0, 0x0, 0x0, 0x20}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = socket$kcm(0x2d, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e3, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10}, 0x0, 0xca, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x100000, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x22) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYRES8=r6, @ANYRES8=r7], 0x12) setsockopt$sock_attach_bpf(r4, 0x6, 0x6, &(0x7f0000000740), 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1c, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xf}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x541b, 0x0) r8 = perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, &(0x7f0000000280)='GPL\x00', 0x43c1, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000010000000000fedbdf25070000001300000008000000", @ANYRES32, @ANYBLOB="10001a8008000200"], 0x30}], 0x1}, 0x0) r11 = socket$kcm(0x10, 0x100000000002, 0x4) sendmsg$kcm(r11, &(0x7f00000039c0)={0x0, 0xfffffffffffffca5, &(0x7f0000000000)=[{&(0x7f0000000200)="39000000140081ae00002c000500015601618575e285af014a31ba377a1b2cc32b38d3aa2a70297400"/57, 0x39}], 0x1, 0x0, 0x0, 0xc00e}, 0x4000004) 4m17.466726754s ago: executing program 6 (id=5657): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x200, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000900), 0x4}, 0x2, 0x0, 0x33a0940c, 0x8, 0x6, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7fffffff, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000000c0)=@bpf_lsm={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0x0, 0x0, 0x10}]}, 0x0, 0xc, 0xc8, &(0x7f00000001c0)=""/200, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0xfffffffffffffeb3) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000740)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x70bd2c, 0x25dfdbfb, [@sadb_key={0x2, 0x9, 0x8, 0x0, "1c"}, @sadb_x_sa2={0x2, 0x13, 0x2, 0x0, 0x0, 0x70bd28, 0x34ff}, @sadb_x_nat_t_type={0x1, 0x14, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0xfffe, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}]}, 0x60}, 0x1, 0x7}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7fffeffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0xa, 0x0, 0x0, 0xffffffffffffffff, 0x8}, 0x50) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0}, 0x48) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r3) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r4, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x18, 0x1409, 0x202, 0x70bd2d, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x18}, 0x1, 0x0, 0x0, 0x80f1}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000400)=ANY=[@ANYBLOB="1400000010000100f7000000000000000500000a44000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc08000340000000144c0000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a3100000000200003801c0000800c00018006000100d10300000c000440000000000000000114000000110001"], 0xb8}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r3, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a480000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a31000000001c000380180000800c000180060001"], 0x70}, 0x1, 0x0, 0x0, 0x4451099e661a63b1}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x66c}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x81}, 0x0, 0x7, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="6eaa000000000000611044000000000095"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000}, 0x94) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) 4m17.394403258s ago: executing program 2 (id=5664): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x16}, 0x94) r0 = socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40000120) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000008c0)=r3, 0x4) 4m17.28647587s ago: executing program 2 (id=5665): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x3, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x9, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000440)={&(0x7f0000001340)=@hci={0x1f, 0x8e88, 0x47}, 0x80, 0x0, 0x0, 0x0, 0x5dc}, 0x8000) 4m17.186967081s ago: executing program 6 (id=5666): socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = getpid() r1 = socket$kcm(0x2, 0x5, 0x84) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r2, 0x0, 0xe900) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{}, {0x10000002, 0x0, 0x0, 0x2}]}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x4, 0x201, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7ff, 0x7fffffff, 0xffff, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000100)={0x2, 0x4e21, @local}, 0x10, 0x0}, 0x20004050) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000300000001000100", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x19) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r3, &(0x7f0000000140), &(0x7f0000000000)=""/48}, 0x20) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x20565, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x4}, 0x100904, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x58, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000011008108093d8de089cb2f07264831371400000061bd6efb2502eaf60d000100020400bf0501050012014682946053b2cfcbd3996c1c963bb1b709cd0ad67fed6af6feb57134a457f53c87757fb6d373", 0x54}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @dev}}, 0x80, 0x0, 0x0, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b57000000860f5878c37ffe36e1165814d435be5b317c6c8189587d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988ab013f40afe403041323110f62055394412158e7a3adb148d641aa40d4ab077fe34232aa8b31851466d0998a61d7da0c86d700000010"], 0x10b8}, 0xff4c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) setsockopt$sock_attach_bpf(r1, 0x84, 0x65, &(0x7f0000000000), 0x10) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001340)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r3, @ANYBLOB="0600"/20, @ANYRES32=r4, @ANYRES32, @ANYBLOB="02000000000000000100000000000000000000f20000000000000000"], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001480)={0x18, 0x11, &(0x7f00000011c0)=ANY=[@ANYBLOB="18000000d700000000000000e800000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70000000002000000400000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x401, 0xc0, &(0x7f0000001280)=""/192, 0x41000, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000480)={0x3, 0xd, 0x5, 0xb6}, 0x10, 0x0, 0x0, 0x7, &(0x7f00000013c0)=[0xffffffffffffffff, r3, r7, 0xffffffffffffffff, 0xffffffffffffffff, r3], &(0x7f0000001400)=[{0x2, 0x2, 0x3, 0x5}, {0x0, 0x4, 0x5, 0x1}, {0x2, 0x2, 0x10, 0x9}, {0x0, 0x1, 0x9, 0xb}, {0x2, 0x2, 0x10}, {0x0, 0x4, 0x5, 0xb}, {0x2, 0x2, 0xb, 0xc}], 0x10, 0x6}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000040)="b9ffddc1dd9ec8cdbb67537d89067e", 0x0, 0x600, 0x60000009, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) r8 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) 4m16.999505026s ago: executing program 2 (id=5667): bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = socket$kcm(0x2, 0x200000000000001, 0x106) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0xc220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x1a, 0x3, &(0x7f0000001380)=ANY=[@ANYRESDEC, @ANYRESDEC=r1], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @tracing=0x19, r1}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x254000, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000040)={'erspan0\x00', 0x200}) sendmsg$kcm(r0, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x20040000) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @local}, 0xfc, 0x0}, 0x30004001) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r3, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r3, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f00000007c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x40, '\x00', r4}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0xe, &(0x7f0000000200)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r5 = socket$kcm(0x23, 0x5, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0xa, &(0x7f0000000180), 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x541b, &(0x7f0000000640)) socket$nl_netfilter(0x10, 0x3, 0xc) r6 = socket$kcm(0x10, 0x2, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x800, 0x0) r7 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r7, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[], 0x18}}, 0x0) sendmsg$kcm(r6, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="d8000000100081046881f782db44b904021d080b01000000e8fe55a11800150006001400060000120800040043000000a80016000a00014006000d3f036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1, 0x0, 0x0, 0xc3ff}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x83, 0x0, 0x0) close(0x3) 4m16.702824942s ago: executing program 2 (id=5668): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffcf2) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000ec3984d68efc2096215a29a300007b8af8ff00000000bfa25cda6e721e8480e13cadd205f7149c000000000000000008000000b70400000000000085000000"], 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000004080)={{r0}, &(0x7f0000004000), &(0x7f0000004040)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f0000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffee6) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x3}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) close(r4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xe, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffa}, 0x94) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) 4m16.675425442s ago: executing program 5 (id=5669): perf_event_open(&(0x7f0000000040)={0x5, 0x6c, 0x2, 0x2, 0x8, 0x9, 0x0, 0x6, 0x0, 0xc, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x8}, 0x2000, 0xff, 0x9, 0x0, 0x4, 0x145d, 0x1, 0x0, 0x3f8, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x42000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xf}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x10, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40000, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x8, 0x10001}, 0x6018, 0xfffffffffffffffe, 0x8001, 0x6, 0x3fe, 0x7ffffffc, 0x400, 0x0, 0x2, 0x0, 0x2080000000}, 0x0, 0x3, 0xffffffffffffffff, 0xa) socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x4, 0x6, 0xa}, 0x50) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000000b0001007665"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000f40)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWRULE={0x30, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x4}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x58}, 0x1, 0x0, 0x0, 0x2000094}, 0x4000800) 4m16.351979771s ago: executing program 3 (id=5660): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x12, 0x1, 0x4, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000020000000000000850000002a00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d280f", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 4m16.314890316s ago: executing program 8 (id=5661): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8800000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x44004000) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a94000000060a010400000000000000000a00000154000480500001800b00010074617267657400004000028008000240000000012c0003007339f2f10455afb9fdd672bad09dfb78c7699c74e891a0c70000000000000000000000000000000008000100544545000900020073797a32000000000900010073797a3100000000140005800800014000008917080002"], 0xbc}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000840) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000b40)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a090000000000000000000200000009000200737932000000000008000440000000000900010073797a3000000000080003400000000114"], 0x64}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r4, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000640)=@newqdisc={0x3c, 0x24, 0xf0b, 0x70bd2e, 0x20000, {0x0, 0x0, 0x12, r6, {}, {0xffff, 0xffff}, {0x9, 0x6}}, [@qdisc_kind_options=@q_cake={{0x9}, {0xc, 0x2, [@TCA_CAKE_AUTORATE={0x8}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24044014}, 0x40008090) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="640000000001010400000000141a000002000000240001801400018008000100e000000108000200e00000010c00028005000100000000002400028014000180080001000000000008000200ac1e00010c00028005000100000000000800074000000001"], 0x64}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4c000000000101040080000000000000020000001400105742ac5b40000000030800014000010001240001800c00028005000100000000001400018008000100e000000108000200e8000001"], 0x4c}, 0x1, 0x0, 0x0, 0xc4}, 0x4000810) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r7, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="5c000000020603100000000000000000050000010c00078005000300350000000900020073797a3200000000050005000a000000050005000a000000050001000600000015002b2cec6c84c776dbb75df928537b0300686173683a69702c706f72742c6e657400000000"], 0x5c}}, 0x80) r9 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$TCPDIAG_GETSOCK(r9, 0x0, 0x20004010) socket$xdp(0x2c, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf150000000000003d650000000000006507000002000000070700004c0000001f750000000000006154000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff28}, 0x48) socket$kcm(0x10, 0x2, 0x4) 4m16.23615621s ago: executing program 6 (id=5670): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0500000003f01f00040000009a00000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000b00), &(0x7f0000000000), 0x7, r0}, 0x36) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000580)={r0, &(0x7f0000001600), &(0x7f0000001680)=""/227}, 0x20) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000003c0)=@nl=@proc, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000440)=""/226, 0xe2}, {&(0x7f0000000540)=""/216, 0xd8}, {&(0x7f0000000640)=""/44, 0x2c}, {&(0x7f0000000680)=""/1, 0x1}], 0x4, &(0x7f0000000700)}, 0x0) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0xc, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000800}, 0x20000) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0xac, 0x14, 0x100, 0x70bd2a, 0x25dfdbfc, {0x29, 0x2}, [@INET_DIAG_REQ_BYTECODE={0x95, 0x1, "28a92f31feccaadaf41b7bc5812f4e903ef5fb7d644e22696f0f7eb9618351758762892f23ba142dc7d8d93945113dbd50fa12b1053fb517bf05ebb451604a0413685d89ec88610875ef7588677a297a5ade025d4f4d7a0e8f4b441b90147c8778c849d22c6b52c40dda7f62089cb8ff55043514385b5e61ca40fdeaac546f1726ed63f2bc5e41aa4801e42b40563528a3"}]}, 0xac}, 0x1, 0x0, 0x0, 0x4000000}, 0x5) 4m16.1057848s ago: executing program 2 (id=5671): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x1, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000c000}, 0xc000) recvmsg$unix(0xffffffffffffffff, &(0x7f0000003d00)={0x0, 0x0, 0x0}, 0x40) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x16, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="1802000003000000000000000000000085000000a0000000850000005000000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f86dd", 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000f40)={0x1b, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x5}, 0x50) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x0, 0x2, &(0x7f0000000140)=ANY=[@ANYBLOB="18260000", @ANYRES32, @ANYBLOB="0000000005000010"], &(0x7f0000000180)='syzkaller\x00', 0x6, 0xdd, &(0x7f0000000500)=""/221, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x2, 0xb, 0x200, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x7f}, 0x94) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001100)={&(0x7f0000001000), 0x10, &(0x7f00000010c0)={&(0x7f0000001040)=@canfd={{0x0, 0x1, 0x0, 0x1}, 0x17, 0x2, 0x0, 0x0, "40f3576453a69d979fa0e672036d2d17d9c749a8f83062a75d8cf9129f256f0035cdcba4d9c1d50dc48f02a170d39c867851399614c2f3d9fb380139d159a047"}, 0x48}, 0x1, 0x0, 0x0, 0x50}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001540)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f00000006c0)=[0x0, 0x0], &(0x7f0000000c80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf0, &(0x7f0000000cc0), 0x0, 0x10, &(0x7f0000000d00), &(0x7f0000000d40), 0x8, 0xd1, 0x8, 0x8, &(0x7f0000000d80)}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000f00)={@map, 0xffffffffffffffff, 0x17, 0xa, 0xffffffffffffffff, @void, @value=r1}, 0x20) 4m16.005915932s ago: executing program 3 (id=5672): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x9549, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x0, 0x0, 0x2, 0xfffff271, 0xfffb, 0x0, 0x0, 0x0, 0x20}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x10, 0x400000002, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x2, 0x0, 0x0, 0x8, 0x8, 0x77ffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100000, 0x0, 0x2, 0x0, 0x80}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000580)=@newtaction={0x48, 0x1e, 0x109, 0x100, 0x25dfdbff, {}, [{0x34, 0x1, [@m_bpf={0x30, 0x20, 0x0, 0x0, {{0x8}, {0x4}, {0x6, 0x6, '2W'}, {0xc}, {0xc, 0x8, {0x3, 0x1}}}}]}]}, 0x48}, 0x1, 0x2b1e}, 0x40810) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x47, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xa}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x29, &(0x7f0000000000), 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)=@o_path={&(0x7f0000000040)='./file0\x00', 0x0, 0x8, r6}, 0x18) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x8}, 0x4202, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xa}, 0x0, 0x0, 0x0, 0x4, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYRES64=r7], &(0x7f0000000000)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1, 0xa, &(0x7f0000000200)=ANY=[@ANYBLOB="18110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000500850000008200000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x25, &(0x7f00000001c0)={r9, 0x0, 0x25, 0x1, @val=@tcx={@void, @value=r9}}, 0x1c) close(r5) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r10 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r10, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) sendmsg$TCPDIAG_GETSOCK(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4c00000012000100040000000000000002030000fffc4e2202000000ffffffff000000000000000003080000000000003800000001000000", @ANYRES32=0x0, @ANYBLOB="00000000ffffff7f6582615e097676d701964113394f98452eebb0151152"], 0x4c}}, 0x200040c4) 4m16.004320883s ago: executing program 5 (id=5673): socket$kcm(0x2, 0x922000000001, 0x106) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0xfd, 0x0, 0x0, 0x4, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000001946}, 0x0, 0x0, 0x0, 0x8, 0x3fd, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000300)='cgroup\x00'}, 0x17) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300)}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfde6) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, 0x0, 0x39, 0x0, 0x6}, 0x28) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/time_for_children\x00') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x100, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1a, 0x5, 0xfffffffc, &(0x7f0000000200)) r3 = socket$kcm(0xa, 0x1, 0x106) sendmsg$kcm(r3, &(0x7f00000019c0)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @remote, 0xfffffffe}, 0x80, 0x0}, 0x20040010) sendmsg$kcm(r3, 0x0, 0x20000000) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0xf, 0x5, 0x5, 0xe6, 0x0, 0x10000000007, 0x1, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2a, 0x0, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x9, 0xecb, 0x2, 0x7a08, 0x0, 0x4, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0xfffffffffffffffd, r0, 0x8) 4m15.524019211s ago: executing program 8 (id=5674): r0 = getpid() bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = perf_event_open(0x0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xc, 0x830d}, 0x0, 0x9, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x4, 0x1, 0x10001, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[], 0x48) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x3, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r3, @ANYBLOB="000000000000000018100000", @ANYRES32=r4, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000180), &(0x7f0000000200), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r5, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) 4m13.364690083s ago: executing program 6 (id=5675): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0x3) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x7, 0x3, 0x3}, 0x50) socket$nl_rdma(0x10, 0x3, 0x14) r1 = getpid() r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x40}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x9, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x64}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) sendmsg$inet(0xffffffffffffffff, &(0x7f0000002480)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x41, 0x0, 0x11}, 0x0) r4 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0xa, [@struct={0x8, 0x1, 0x0, 0xf, 0x0, 0x5, [{0x1, 0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x3a, 0x0, 0x6}, 0x28) setsockopt$sock_attach_bpf(r4, 0x84, 0x64, &(0x7f0000000000)=r7, 0x10) sendmsg$inet(r4, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0xffc0}], 0x1}, 0x80d1) r8 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10, 0x0}, 0x40040d4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r8, 0x84, 0x64, &(0x7f0000000000)=r11, 0x10) sendmsg$inet(r8, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0xffc0}], 0x1}, 0x80d1) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r12 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r12, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@gettaction={0x18, 0x32, 0x6dd711a25f4cb68b, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x4}]}, 0x18}}, 0x0) 3m36.681288991s ago: executing program 44 (id=5675): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0x3) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x7, 0x3, 0x3}, 0x50) socket$nl_rdma(0x10, 0x3, 0x14) r1 = getpid() r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x40}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x9, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x64}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) sendmsg$inet(0xffffffffffffffff, &(0x7f0000002480)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x41, 0x0, 0x11}, 0x0) r4 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0xa, [@struct={0x8, 0x1, 0x0, 0xf, 0x0, 0x5, [{0x1, 0x0, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x3a, 0x0, 0x6}, 0x28) setsockopt$sock_attach_bpf(r4, 0x84, 0x64, &(0x7f0000000000)=r7, 0x10) sendmsg$inet(r4, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0xffc0}], 0x1}, 0x80d1) r8 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10, 0x0}, 0x40040d4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r8, 0x84, 0x64, &(0x7f0000000000)=r11, 0x10) sendmsg$inet(r8, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0xffc0}], 0x1}, 0x80d1) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r12 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r12, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@gettaction={0x18, 0x32, 0x6dd711a25f4cb68b, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x4}]}, 0x18}}, 0x0) 3m36.677004636s ago: executing program 45 (id=5671): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x1, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000c000}, 0xc000) recvmsg$unix(0xffffffffffffffff, &(0x7f0000003d00)={0x0, 0x0, 0x0}, 0x40) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x16, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="1802000003000000000000000000000085000000a0000000850000005000000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f86dd", 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000f40)={0x1b, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x5}, 0x50) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x0, 0x2, &(0x7f0000000140)=ANY=[@ANYBLOB="18260000", @ANYRES32, @ANYBLOB="0000000005000010"], &(0x7f0000000180)='syzkaller\x00', 0x6, 0xdd, &(0x7f0000000500)=""/221, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x2, 0xb, 0x200, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x7f}, 0x94) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001100)={&(0x7f0000001000), 0x10, &(0x7f00000010c0)={&(0x7f0000001040)=@canfd={{0x0, 0x1, 0x0, 0x1}, 0x17, 0x2, 0x0, 0x0, "40f3576453a69d979fa0e672036d2d17d9c749a8f83062a75d8cf9129f256f0035cdcba4d9c1d50dc48f02a170d39c867851399614c2f3d9fb380139d159a047"}, 0x48}, 0x1, 0x0, 0x0, 0x50}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001540)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f00000006c0)=[0x0, 0x0], &(0x7f0000000c80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf0, &(0x7f0000000cc0), 0x0, 0x10, &(0x7f0000000d00), &(0x7f0000000d40), 0x8, 0xd1, 0x8, 0x8, &(0x7f0000000d80)}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000f00)={@map, 0xffffffffffffffff, 0x17, 0xa, 0xffffffffffffffff, @void, @value=r1}, 0x20) 3m36.654170118s ago: executing program 46 (id=5673): socket$kcm(0x2, 0x922000000001, 0x106) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0xfd, 0x0, 0x0, 0x4, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000001946}, 0x0, 0x0, 0x0, 0x8, 0x3fd, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000300)='cgroup\x00'}, 0x17) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300)}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfde6) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, 0x0, 0x39, 0x0, 0x6}, 0x28) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/time_for_children\x00') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000100), 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x100, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1a, 0x5, 0xfffffffc, &(0x7f0000000200)) r3 = socket$kcm(0xa, 0x1, 0x106) sendmsg$kcm(r3, &(0x7f00000019c0)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @remote, 0xfffffffe}, 0x80, 0x0}, 0x20040010) sendmsg$kcm(r3, 0x0, 0x20000000) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0xf, 0x5, 0x5, 0xe6, 0x0, 0x10000000007, 0x1, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2a, 0x0, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x9, 0xecb, 0x2, 0x7a08, 0x0, 0x4, 0x0, 0x1, 0x0, 0x4}, 0xffffffffffffffff, 0xfffffffffffffffd, r0, 0x8) 3m36.302633817s ago: executing program 47 (id=5672): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x9549, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x0, 0x0, 0x2, 0xfffff271, 0xfffb, 0x0, 0x0, 0x0, 0x20}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$kcm(0x10, 0x400000002, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x2, 0x0, 0x0, 0x8, 0x8, 0x77ffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100000, 0x0, 0x2, 0x0, 0x80}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000580)=@newtaction={0x48, 0x1e, 0x109, 0x100, 0x25dfdbff, {}, [{0x34, 0x1, [@m_bpf={0x30, 0x20, 0x0, 0x0, {{0x8}, {0x4}, {0x6, 0x6, '2W'}, {0xc}, {0xc, 0x8, {0x3, 0x1}}}}]}]}, 0x48}, 0x1, 0x2b1e}, 0x40810) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x47, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xa}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x29, &(0x7f0000000000), 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)=@o_path={&(0x7f0000000040)='./file0\x00', 0x0, 0x8, r6}, 0x18) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x8}, 0x4202, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xa}, 0x0, 0x0, 0x0, 0x4, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYRES64=r7], &(0x7f0000000000)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1, 0xa, &(0x7f0000000200)=ANY=[@ANYBLOB="18110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000500850000008200000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x25, &(0x7f00000001c0)={r9, 0x0, 0x25, 0x1, @val=@tcx={@void, @value=r9}}, 0x1c) close(r5) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r10 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r10, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) sendmsg$TCPDIAG_GETSOCK(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4c00000012000100040000000000000002030000fffc4e2202000000ffffffff000000000000000003080000000000003800000001000000", @ANYRES32=0x0, @ANYBLOB="00000000ffffff7f6582615e097676d701964113394f98452eebb0151152"], 0x4c}}, 0x200040c4) 3m35.587204832s ago: executing program 48 (id=5674): r0 = getpid() bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = perf_event_open(0x0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xc, 0x830d}, 0x0, 0x9, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x4, 0x1, 0x10001, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[], 0x48) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x3, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r3, @ANYBLOB="000000000000000018100000", @ANYRES32=r4, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000180), &(0x7f0000000200), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r5, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) 1m47.075203093s ago: executing program 1 (id=5948): sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x20004000) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0xa, 0x4, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x80, 0x1, 0xe, 0xf7, 0x3, 0x0, 0x100000000, 0x100, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x88, 0x6, 0x7, 0x6, 0x10000, 0xfff, 0x1, 0x0, 0x1000, 0x0, 0x8}, r1, 0x10, r1, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000300)='\x97:\\\x7f\x00') bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r3 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r3, 0x84, 0x9, &(0x7f0000000380), 0x98) sendmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000440)=@in={0x2, 0x4e20, @loopback=0x7f0000e0}, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000000580)="0df7c96eaeb7d77687dcb2f8735a47ae7a69347526b2b875de1e1036ef0ca033c0588657db4b0b66f0fe9b8df469c5e3da12fbddc2a252a1caf8b8a51be42b3af1c50f9313bc228c4d85ef33ca5860bdab9a0c22a53e372568d838b51662c5713ec108f562432a2f78776c9dadf857d0157bd0336eab0cf062abf1e5bd3fc62000a4b87dc4f7", 0x86}], 0x1}, 0x40) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x100020, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01040000000000000000010000000900010073797a310000000054000000030a01020000000000000000010000000900030073797a320000040028000480080002400000000008000140000000051400030076"], 0xe8}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0xaf18, 0x39}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffb, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f5a6bb8, 0x0, @perf_config_ext={0x3, 0xb}, 0x4000, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x6}, 0x5000, 0x0, 0x101, 0x0, 0x0, 0x2, 0xfffc, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0xfffffffffffffffc, 0xffffffffffffffff, 0x1) setsockopt$sock_attach_bpf(r4, 0x29, 0x23, &(0x7f0000000040), 0xcf) sendmsg$kcm(r4, &(0x7f0000001240)={&(0x7f0000000940)=@generic={0xa, "8ab77fa26849ff263ef30c98b353011a5990650042e2dacdc165ececece6be1862e2adacd2737d00ad6f9fa9f3d7145e15dd9fb1a7adc211220963ad5def53b911ba5b9da13641f982757012a7496de0b3a36f5849f260c603dbc317f54b901ee80ea6132ca6e88c776553e1833052ca376304313c5637786a36a4b83857"}, 0x80, 0x0}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x202, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xff00) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, 0x0, 0x8800) socket$kcm(0xa, 0x2, 0x0) socket$kcm(0xa, 0x5, 0x0) 1m46.628655611s ago: executing program 4 (id=5952): r0 = socket$kcm(0x10, 0x2, 0x0) socket$igmp(0x2, 0x3, 0x2) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) socket$inet6_udp(0xa, 0x2, 0x0) socket(0x10, 0x3, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000bc00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000400850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r2}, &(0x7f00000001c0), &(0x7f0000000300)=r3}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x5, 0xe, 0x0, &(0x7f00000003c0)="000000000000000000000001e370", 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x50) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000040)="2e00000011008188040f80ec59acbc0413a1f8480b0000005e140602000000000e0027001000000002800000121f", 0x2e}], 0x1}, 0x0) 1m46.417660979s ago: executing program 1 (id=5954): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="010000004200000006000000536e0000000000003d5c73cf9103b973e668b7386fe983f3e2816adf25c07b8d2d361bd2aae7c12bad6f8729e3afc6f6c973eadd80e9d57609a5874500000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000004440)={0x0, 0x0, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0x728}, {0x0}, {0x0}, {&(0x7f00000020c0)}], 0x4}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0c00000004000000040000000180000000000000", @ANYRES32=r0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000041daa1f776f37225e15a4bf78e00000000000000000000000000000000000000000000000000bf6738ca0b394b1444947406fce31eb24ccd4911a7175c7b62bb41"], 0x50) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d34, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2000000008, 0x800}, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000002c0)="1400000034000b45d30000000000000004d25a80dff0388434c17894ab95990e72852ea34bb8d449c55923f88f40b6f0144119a131c3ab777943b45d09a5888dffe365a9e44422b2c0fc10fd9d", 0x4d}], 0x1}, 0x810) 1m46.286239771s ago: executing program 1 (id=5955): r0 = socket(0x1, 0x803, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x40000}, 0x84) 1m46.214282083s ago: executing program 1 (id=5956): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x6, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x12, 0x8, 0x4, 0x7cb4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x94) socket$nl_crypto(0x10, 0x3, 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x4, 0xc, &(0x7f0000001180)=ANY=[@ANYBLOB="180000000000000000000000000000008500000060000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b200000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x42000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x306) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f00000000c0)={'pim6reg1\x00', @multicast}) close(0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB], 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x80000001, '\x00', 0x0, 0x0}, 0x48) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x60, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x11, 0x1, 0x0, 0x1}, @IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffff}]}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}]}, 0x60}}, 0x0) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2020600}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x2, 0x3, 0x101, 0x0, 0x0, {0x5, 0x0, 0x5}, [@NFQA_CFG_PARAMS={0x9, 0x2, {0xf4, 0x1}}]}, 0x20}, 0x1, 0x0, 0x0, 0x24040080}, 0x4040805) 1m44.943282919s ago: executing program 0 (id=5963): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = getpid() r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xa}, 0x21, 0x0, 0x0, 0x4, 0x2, 0x7fffffff}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0xa0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x400000000008, 0x8000008}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24048015) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x1ff) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1e, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x100, 0x0, 0x0, 0x40f00, 0x62, '\x00', 0x0, @sk_lookup, r0, 0x8, &(0x7f00000002c0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x2, 0x101, 0x7}, 0x10, 0xffffffffffffffff, r0, 0x5, &(0x7f0000000340)=[0xffffffffffffffff, r1, r1, r1, r1, r1, r0, 0xffffffffffffffff], &(0x7f0000000440)=[{0x4, 0x1, 0xf, 0x8}, {0x4, 0x5, 0x4, 0x5}, {0x5, 0x2, 0xe, 0xc}, {0x1, 0x5, 0x7, 0x2}, {0x4, 0x3, 0xc, 0x1}], 0x10, 0x3ff}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={@fallback=r3, 0xc, 0x1, 0x9, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000006c0)={r5, 0x0, 0x25, 0x0, @val=@tcx={@void, @value=r4, @void, @void, r6}}, 0x1c) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x3}, 0x50) r7 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x2000, 0x0) fstat(r7, &(0x7f00000000c0)) socket$kcm(0x21, 0x2, 0x2) openat$ppp(0xffffffffffffff9c, 0x0, 0x80c00, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r8, &(0x7f0000002840)={0x0, 0x0, &(0x7f0000002800)={&(0x7f0000002780)=ANY=[@ANYBLOB="34000000000b010300000000000007000200000a080002400000000008000340000000000d0001007270"], 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x4040010) 1m44.851256631s ago: executing program 0 (id=5964): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000080)={0x4c, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1128586c, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x18208800, &(0x7f0000000500)="066359a77a78e1854d6883c1cd1dc3a6d18c10cedd281164c55c994a729b4338769b9d33e3f72b021a0463506bc475d77f52a99fef1fc992eb74c42825f0999b54add748", 0x44, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="3954bb1433fc070a7f46be011205c9baeb718bd2041728ad1bacb192c3968ed27421d2fa5840a768af2eeed943b83636750a66ab292111fc7d373d09154fdb0b16694163a53c7699a573808be34eb50db9fde9c111184653e7e0a573f882ee5b4ad81a5845ef7ec3c0bf3018b9800a1099367ea0d04642") perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0xe9, 0x6, 0x8, 0x4, 0x0, 0xf, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8, 0xe7}, 0x4022, 0xf, 0x4, 0x1, 0x7, 0x9536, 0x4, 0x0, 0x5a4da1ed, 0x0, 0xffff}, r1, 0xa, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000120000007f00000001"], 0x48) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a20000000000a01080000000000000000010000090900010073797a3100000000d0000000030a030000060000000000000100000a0900010073797a31000000000900030073797a3000000000a4000300627269646765b8", @ANYRESOCT=r2], 0x118}, 0x1, 0x0, 0x0, 0x24000144}, 0x240408d0) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, 0x1, 0x2, 0x101, 0x0, 0x0, {0x3, 0x0, 0x2}, [@CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0xc}, @CTA_EXPECT_MASTER={0x38, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x200040c5}, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0xa4, 0x15, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x5}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_USERDATA={0x61, 0x8, "4e68a3976238fdcc499d7e9b48c463f89c8e9519a6f5a11259428aef3e0a8cfce63d192bba8b3b6576d37d36c3a65d1fdd339c76330bee73ff6ddb4ea795639db0d21a8998e6c754b682aeb2d49332d2a8c5c299b000dc6f0a4d7f0be5"}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x5}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x5}]}, 0xa4}, 0x1, 0x0, 0x0, 0x20040045}, 0x80) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="2400000076001f03000000000000000008000000ffffffff0c000d80"], 0x24}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf150000000000003d650000000000006507000002000000070700004c0000001f750000000000006154000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0xc, 0x0, 0x0, 0x41000}, 0x1b) sendmsg$IPSET_CMD_RENAME(r2, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000400)={&(0x7f0000000300)={0x20, 0x5, 0x6, 0x3, 0x0, 0x0, {0x2, 0x0, 0x6}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x4001}, 0x4) 1m43.996236402s ago: executing program 0 (id=5966): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x1056b, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_config_ext={0x8, 0x830d}, 0x0, 0x4000000000000002, 0xfffffffa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000140)="a2", 0x1}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x3d}, 0x1}, 0x80, &(0x7f00000001c0)}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xb2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x20000000000000}, 0x810, 0x5, 0x20000000, 0x3, 0x4, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x1) syz_clone(0x80002000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r4 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0xfffffcf4}, {0x0}], 0x2, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x106) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff00, 0x2}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r7) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1, 0x830d}, 0x0, 0x5, 0x0, 0x7, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r8, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80, 0x1000000}, 0x0) r10 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x890b, 0x0) 1m43.992598065s ago: executing program 4 (id=5968): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x1, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0xc000) recvmsg$unix(0xffffffffffffffff, &(0x7f0000003d00)={0x0, 0x0, 0x0}, 0x40) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x16, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="1802000003000000000000000000000085000000a0000000850000005000000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f86dd", 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000f40)={0x1b, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x5}, 0x50) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x0, 0x2, &(0x7f0000000140)=ANY=[], 0x0, 0x6, 0xdd, &(0x7f0000000500)=""/221, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600)={0x2, 0xb, 0x200, 0xa}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7f}, 0x94) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001100)={&(0x7f0000001000), 0x10, &(0x7f00000010c0)={&(0x7f0000001040)=@canfd={{0x0, 0x1, 0x0, 0x1}, 0x17, 0x2, 0x0, 0x0, "40f3576453a69d979fa0e672036d2d17d9c749a8f83062a75d8cf9129f256f0035cdcba4d9c1d50dc48f02a170d39c867851399614c2f3d9fb380139d159a047"}, 0x48}, 0x1, 0x0, 0x0, 0x50}, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={0xffffffffffffffff, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001540)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f00000006c0)=[0x0, 0x0], &(0x7f0000000c80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf0, &(0x7f0000000cc0), 0x0, 0x10, &(0x7f0000000d00), &(0x7f0000000d40), 0x8, 0xd1, 0x8, 0x8, &(0x7f0000000d80)}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000f00)={@map, 0xffffffffffffffff, 0x17, 0xa, 0xffffffffffffffff, @void, @value=r1}, 0x20) 1m43.856622938s ago: executing program 7 (id=5969): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="640000000206010100000000000000000000000005000400000000000900020073797a30000000000500010007000000050005000a000000140007800800114000000000080012400000ffff16000300686173683a6e6574"], 0x64}}, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000140)='%ps \x00'}, 0x20) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000000c0)=@newtaction={0x70, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_ctinfo={0x58, 0x1, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x3f00}, @TCA_CTINFO_ACT={0x18, 0x3, {0x0, 0x1, 0xffffffffffffffff, 0x100}}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x4, 0x6, 0xfffffff9}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x440c0}, 0x0) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffb}, @jmp={0x5, 0x1, 0xd, 0x4, 0x5, 0xc, 0xffffffffffffffff}]}, &(0x7f0000000100)='syzkaller\x00', 0xfffffff7, 0xe, &(0x7f0000000080)=""/14, 0x41000, 0x21, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x4, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0)=[0x1, 0x1, r1, 0xffffffffffffffff, 0xffffffffffffffff, r1], &(0x7f0000000200)=[{0x5, 0x4, 0xe, 0x5}, {0x2, 0x5, 0x1, 0x5}], 0x10, 0x1}, 0x94) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000240)=r3, 0x4) 1m43.85048221s ago: executing program 9 (id=5970): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000bc0)={0x2c, 0xb, 0x6, 0x801, 0x0, 0x0, {0x5, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x880}, 0x4800) 1m43.848646021s ago: executing program 1 (id=5971): r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x9, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x10, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000010000000000000000000000711215000000000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2568}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x1f2f, 0xf, 0x3253, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000a40)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) 1m43.69611261s ago: executing program 9 (id=5972): bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000b00), &(0x7f0000000000), 0x7}, 0x36) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000580)={0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=""/227}, 0x20) 1m43.590241871s ago: executing program 7 (id=5973): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2501, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_config_ext={0xe, 0x9}, 0x118d2a, 0x0, 0x0, 0x0, 0x10000, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="d800000021", 0x5}], 0x1}, 0x0) socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x28, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x10001, 0x0, 0xe, 0x5}, {0x2}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001340)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb0000ff0f000000000000000000"], 0x0, 0x2a}, 0x28) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xa44f, 0x6}, 0x2, 0x0, 0x0, 0x19ee8a9192a1fb60, 0x43fe, 0x7fffffff, 0xf, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r2, &(0x7f00000050c0)={0x0, 0x0, &(0x7f0000005080)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x18}, 0x1, 0x0, 0x0, 0xc0}, 0x40) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) close(0xffffffffffffffff) socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f0000000040), 0x20}, 0x20) sendmsg$NFT_BATCH(r3, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x80) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$vsock_stream(0x28, 0x1, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="b80000001300e999000000000000000000000000000000000000ffff00000000fc000000000000000000000000000000fffe0400100000000200002002000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="000000000000000000000000000000000020000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000003000000000071eaad117bc4dac31dc40d83df87675d561a7ed0829c6888a2eaecde1dfe2b974f772f1eef579c859bbc4eb3c5a819e5d73e80ab4bc2d61f834d54737da667c5f5fe"], 0xb8}}, 0x0) sendmsg$nl_xfrm(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[], 0x188}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) 1m43.571813841s ago: executing program 9 (id=5974): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = getpid() r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xa}, 0x21, 0x0, 0x0, 0x4, 0x2, 0x7fffffff}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0xa0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x400000000008, 0x8000008}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24048015) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x1ff) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1e, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x100, 0x0, 0x0, 0x40f00, 0x62, '\x00', 0x0, @sk_lookup, r0, 0x8, &(0x7f00000002c0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x2, 0x101, 0x7}, 0x10, 0xffffffffffffffff, r0, 0x5, &(0x7f0000000340)=[0xffffffffffffffff, r1, r1, r1, r1, r1, r0, 0xffffffffffffffff], &(0x7f0000000440)=[{0x4, 0x1, 0xf, 0x8}, {0x4, 0x5, 0x4, 0x5}, {0x5, 0x2, 0xe, 0xc}, {0x1, 0x5, 0x7, 0x2}, {0x4, 0x3, 0xc, 0x1}], 0x10, 0x3ff}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={@fallback=r3, 0xc, 0x1, 0x9, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000006c0)={r5, 0x0, 0x25, 0x0, @val=@tcx={@void, @value=r4, @void, @void, r6}}, 0x1c) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x3}, 0x50) r7 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x2000, 0x0) fstat(r7, &(0x7f00000000c0)) socket$kcm(0x21, 0x2, 0x2) openat$ppp(0xffffffffffffff9c, 0x0, 0x80c00, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r8, &(0x7f0000002840)={0x0, 0x0, &(0x7f0000002800)={&(0x7f0000002780)=ANY=[@ANYBLOB="34000000000b010300000000000007000200000a080002400000000008000340000000000d0001007270"], 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x4040010) 1m43.110467796s ago: executing program 1 (id=5975): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5, 0x8, 0x3fe, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair(0x1e, 0x3, 0x0, &(0x7f00000000c0)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="e40000000202010300000000000000000500000008000540000008000800084000000001500002801400018008100100ac1414bb08000200000000000a000337000200000c000280050001"], 0xe4}, 0x1, 0x0, 0x0, 0x5}, 0x0) r8 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f00000008c0), 0x43) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00\v'], 0x48) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x3c, 0x2, 0x6, 0x300, 0x0, 0x0, {0xa}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x4000801) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmsg(r9, &(0x7f0000000a00)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPSET_CMD_LIST(r9, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000a80)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {0xa, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x800) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f00000008c0), 0x43) close(r2) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r11) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r12 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r12, 0xc004743e, 0x110c230000) 1m43.018866421s ago: executing program 4 (id=5976): perf_event_open(&(0x7f0000000a00)={0x3, 0x80, 0x4, 0x0, 0x0, 0xff, 0x0, 0x4, 0xb37e1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x0, 0x4, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x21}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x2) r0 = getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x10, 0x2, 0x9, 0x0, 0xffffffffffffffff, 0x10000}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xf, &(0x7f0000000080)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {0x7, 0x0, 0xb, 0x2}, {0x85, 0x0, 0x0, 0xd3}}}, &(0x7f0000000040)='syzkaller\x00'}, 0x90) r3 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x40}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xc, 0x830d}, 0x0, 0x9, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000180), &(0x7f0000000200), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="48111a"], 0x18c0}}, 0x0) close(0x3) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r2) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r10}, &(0x7f0000000280), &(0x7f0000000240)}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x9, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r10, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f00000000c0)=r11, 0x4) sendmsg$inet(r9, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 1m42.951962614s ago: executing program 9 (id=5977): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={0x0, 0xc4}}, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x6, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_bp={0x0, 0x4}, 0xbafa, 0x8, 0x98, 0x0, 0x2, 0xfffff26f, 0xfffb, 0x0, 0x0, 0x0, 0x20}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000006c59850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x29, 0x17, &(0x7f0000000100)=r1, 0x4) sendmsg$inet6(r2, &(0x7f0000000480)={&(0x7f0000000000)={0xa, 0x4e22, 0x7fff, @local, 0x9}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@hopopts={{0x18, 0x29, 0x36, {0x2f}}}], 0x18}, 0x1) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000600)=ANY=[], 0x60}}, 0x0) sendmsg$NFNL_MSG_CTHELPER_DEL(r3, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="cc000000020903000000000000000000030000090900010073797a3100000000080005400000000c800002002c00018014000300ff01000000000000000000000000000114000400200100000000000000000000000000000c0002807a9407050001003a0000000c00028005000100010000000c00028005000100d30000002c00018014000300fc0014000400fc020000000000000000000000000000240002000c00028005000100880000000e000340000000000c000280050001001100"/207], 0xcc}}, 0x800) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) sendmsg$nl_xfrm(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="9402000021000100fcffffff00000000ac1414aae5fffff8b49ed9825133a900fc0100000000000000000000000000000000add500200000000000801aeaaec1", @ANYRES16=r6, @ANYRES32=0x0, @ANYBLOB="000000000000000070000400706362632874776f666973682900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040010000dc06216ef2c68e9f6da05d886dbc3273ef99796b36698e2bd5179c3eea5474fc78c9720bfc4f90a708001f0001000000cc0111"], 0x294}}, 0x0) 1m42.780203638s ago: executing program 7 (id=5978): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x18, 0x3e, 0x9, 0x0, 0x800, {0x3}, [@nested={0x4, 0x1}]}, 0x18}}, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1b, &(0x7f0000000080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffff9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0xffffffff, 0x4c, &(0x7f0000000200)=""/76, 0x40f00, 0x1, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000280)=[0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f00000002c0)=[{0x2, 0x3, 0xd, 0xc}, {0x0, 0x5, 0xe, 0x5}, {0xf, 0x5, 0xb, 0xa}, {0x2, 0x3, 0x6, 0x9}, {0x5, 0x4, 0x8, 0xb}], 0x10, 0x3}, 0x94) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)=@generic={&(0x7f0000000400)='./file0\x00', 0x0, 0x4}, 0x18) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000f80)={@fallback, 0x6, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000fc0)={@ifindex, r3, 0x16, 0x34, r3, @void, @void, @void, @value, r4}, 0x20) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000900)={r5, 0x20, &(0x7f00000008c0)={0x0, 0x0, 0x0, &(0x7f0000000800)=""/175, 0xaf}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000480)={@cgroup=r5, r1, 0x2f, 0x0, r2, @void, @value=r0, @void, @void, r4}, 0x20) 1m42.687101205s ago: executing program 4 (id=5979): r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000018c0)=ANY=[@ANYBLOB="280200001900010000000000000000001d0109005000118049002100c9a7befe6f6d645a1a11b81b2c4b101c7510e19fee6bb49f6cc7a2c50fd57c06db1af5df432aa833928a0772ff8f5e9ed3103bc77d35b296674f1fe35663c0d236fd88d7ba000000c4010e"], 0x228}, 0x1, 0x0, 0x0, 0x5}, 0x10) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, 0x15, 0x1, 0x70bd26, 0x25dfdbff, {0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x48c1}, 0x40010) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r1}, 0x8) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x1f, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000071490000000000000000000095c62175ab5dc8b8a38cb6b68352baf4d48557b6cd1e281aec20ec9c001e3b2623567fd00e"], &(0x7f0000000180)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x11}, 0x94) (async) r4 = socket$nl_route(0x10, 0x3, 0x0) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffe3a}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r5, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newqdisc={0x4c, 0x24, 0xf0b, 0x70bd2c, 0x0, {0x0, 0x0, 0x12, r6, {}, {0xffff, 0xffff}, {0x2}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x0, 0x0, 0x8, 0x7ff, 0x5, 0x611}}}}]}, 0x4c}}, 0x4000010) (async) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000b000000000000000dc4000018250000", @ANYRES32=r1, @ANYBLOB="000000007f0000616cc98ef571f2f0e1b5624551a65ba92a5f062c7984b63b939be0d92ce314ff447bb97ff8d7a55d6e30fceaf8f7cddc9857092981f9ab7415c9c306360b31e7914410f92b1e47ec28c2829a279392645c9ee94134bef535e4"], &(0x7f0000000200)='syzkaller\x00', 0x5, 0x48, &(0x7f00000004c0)=""/72, 0x41000, 0x20, '\x00', r6, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000540)={0x5, 0xf, 0x7ff, 0x6}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000580)=[r1, r1, r1, r1], &(0x7f00000005c0)=[{0x2, 0x5, 0xd, 0x8}, {0x1, 0x3, 0xa, 0x4}, {0x2, 0x5, 0xd, 0x6}, {0x5, 0x4, 0xa, 0x1}, {0x5, 0x5, 0x6, 0x6}, {0x2, 0x3, 0x3, 0xa}, {0x2, 0x3, 0xc, 0x7}, {0x5, 0x3, 0xd, 0x9}]}, 0x94) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30c99d959da92059, 0x0, &(0x7f00000008c0)="89", 0x0}, 0x32) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x41100}, 0x94) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f0000000340)=r8, 0x4) (async) sendmsg$inet(r10, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 1m42.639579831s ago: executing program 7 (id=5980): r0 = socket$nl_route(0x10, 0x3, 0x0) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0xf, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000001c0)=r2, 0x4) (async, rerun: 64) r3 = socket$nl_rdma(0x10, 0x3, 0x14) (rerun: 64) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r3, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000400)={&(0x7f0000000240)={0x50, 0x140c, 0x400, 0x70bd29, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_RES_CQN={0x8}, @RDMA_NLDEV_ATTR_RES_CQN={0x8, 0x3d, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_RES_CQN={0x8, 0x3d, 0x3}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x50}}, 0x20000004) (async) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x84, 0x30, 0xffff, 0xfffffffe, 0x0, {}, [{0x70, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x5, 0x0, 0x0, 0x4, {0xfd}, {0x0, 0x0, 0x0, 0x6}}}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) 1m42.638614564s ago: executing program 0 (id=5981): socket$kcm(0x2, 0x5, 0x84) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xf}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x1e, 0x80005, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r4, @ANYBLOB="000000000200f300b705000008000000850000005e00000095"], &(0x7f0000000300)='GPL\x00', 0x9}, 0x94) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x48) mount$bpf(0x200000000000, 0x0, 0x0, 0x989046, 0x0) r8 = socket$kcm(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r9, 0x0, 0x0) setsockopt$sock_attach_bpf(r8, 0x84, 0x64, &(0x7f0000000000), 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x1e, 0x3, &(0x7f0000000f80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10000}}, &(0x7f0000000340)='GPL\x00', 0x0, 0x31, &(0x7f0000000540)=""/49, 0x41100, 0x10, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600)={0x3, 0x0, 0xd, 0x7}, 0x10, 0x0, r3, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, r7, r4], 0x0, 0x10, 0x8}, 0x94) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001280)={&(0x7f0000000800)=@file={0x0, './file0/../file0\x00'}, 0x6e, &(0x7f0000000e80), 0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB="1c0000000000", @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=r6, @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=r10, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32=r11, @ANYBLOB], 0xb8, 0x20000004}, 0x810) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x101, 0x2}, 0x0, 0xffffffffffffffff, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0x6, 0xffffffffffffffff, 0x1) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000004}, 0x0) 1m42.4350926s ago: executing program 9 (id=5982): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r0, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000003c0)=@newqdisc={0x2c, 0x24, 0xf0b, 0x70bd2e, 0x0, {0x0, 0x0, 0x12, r1, {}, {0xffff, 0xffff}, {0xffff}}, [@qdisc_kind_options=@q_mq={0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8004001}, 0x200000000000000) 1m42.432468159s ago: executing program 7 (id=5983): socket$kcm(0x29, 0x5, 0x0) r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00@\x00\x00'], 0x5) write$cgroup_subtree(r5, &(0x7f0000000a00)=ANY=[@ANYBLOB='-cpu'], 0x20) r6 = openat$cgroup_type(r3, &(0x7f0000000040), 0x2, 0x0) write$cgroup_type(r6, &(0x7f0000000080), 0x9) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73772cc9f1ba1f848430000005e140602000000000e000a", 0x23}, {&(0x7f0000000400)="6a718e5e", 0x4}], 0x2}, 0x0) r8 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r2], 0xfdef) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r9, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="5c00000001010104000000000000000002001000240002801400018008000100e000000108000200e00000010c000280050001"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) 1m42.41684712s ago: executing program 4 (id=5984): bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000b00), &(0x7f0000000000), 0x7}, 0x36) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000580)={0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=""/227}, 0x20) 1m42.274260487s ago: executing program 0 (id=5985): r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x9, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x10, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000010000000000000000000000711215000000000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2568}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x1f2f, 0xf, 0x3253, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000a40)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) 1m42.262408281s ago: executing program 4 (id=5986): socketpair(0x21, 0x5, 0x6, &(0x7f00000002c0)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeb5) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x10, &(0x7f0000000000)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000006000000040000000000000e0400000000000000000000000100000d0400000004000000040000000000000000000010040000000000000000000002030000000000000061"], 0x0, 0x5a, 0x0, 0x4, 0x80000}, 0x28) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xd, 0x0, &(0x7f0000000000)="e0b9547ed387dbe9abc89b6f5b", 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r3, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0e00000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB, @ANYRES32], 0x48) r4 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="1b0000001a007f029e", 0x9}, {&(0x7f0000000200)="68cabf2dfb58fc0a01008888ffff0200258f", 0x12}], 0x2}, 0x0) r5 = socket$kcm(0xa, 0x5, 0x0) r6 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x8916, &(0x7f0000000000)={r6}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x8936, &(0x7f0000000000)={r6}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x2, 0x1ef5}, 0x11efa, 0x4, 0x98, 0x2, 0x4000000000000002, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r2, 0x1, 0xffffffffffffffff, 0x2) 1m42.237499622s ago: executing program 9 (id=5987): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = getpid() r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xa}, 0x21, 0x0, 0x0, 0x4, 0x2, 0x7fffffff}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0xa0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x400000000008, 0x8000008}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24048015) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x1ff) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1e, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x100, 0x0, 0x0, 0x40f00, 0x62, '\x00', 0x0, @sk_lookup, r0, 0x8, &(0x7f00000002c0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x2, 0x101, 0x7}, 0x10, 0xffffffffffffffff, r0, 0x5, &(0x7f0000000340)=[0xffffffffffffffff, r1, r1, r1, r1, r1, r0, 0xffffffffffffffff], &(0x7f0000000440)=[{0x4, 0x1, 0xf, 0x8}, {0x4, 0x5, 0x4, 0x5}, {0x5, 0x2, 0xe, 0xc}, {0x1, 0x5, 0x7, 0x2}, {0x4, 0x3, 0xc, 0x1}], 0x10, 0x3ff}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={@fallback=r3, 0xc, 0x1, 0x9, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000006c0)={r5, 0x0, 0x25, 0x0, @val=@tcx={@void, @value=r4, @void, @void, r6}}, 0x1c) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x3}, 0x50) r7 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x2000, 0x0) fstat(r7, &(0x7f00000000c0)) socket$kcm(0x21, 0x2, 0x2) openat$ppp(0xffffffffffffff9c, 0x0, 0x80c00, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r8, &(0x7f0000002840)={0x0, 0x0, &(0x7f0000002800)={&(0x7f0000002780)=ANY=[@ANYBLOB="34000000000b010300000000000007000200000a080002400000000008000340000000000d000100727066696c"], 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x4040010) 1m42.11817525s ago: executing program 0 (id=5988): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x14000, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x828, 0x9, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="d8000000180081064e81f782db4cb904021d0800fd007c05e8fe55a10a0007000140020203600e4109000800ac00060311000000160012000a00fe80000000000000c1d67f6f94007134cf6efb8000a007a290457f01a7cee4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5ae24e25ccca9e00360db79826835d3a71d95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b4337", 0xbd}], 0x1}, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x400000002, 0x0) r3 = socket(0x21, 0x6, 0xffffffff) sendmsg$NFNL_MSG_ACCT_GET(r3, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x260408c4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e24, @local}, 0x0, 0x1003, 0x5, 0x1}}, 0x80, 0x0}, 0x4000059) write$cgroup_subtree(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="1303000056000528707b528e9a93a54a07"], 0xfe33) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x2, 0xa) socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$AUDIT_ADD_RULE(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000009c0)={0x428, 0x3f3, 0x400, 0x70bd2d, 0x25dfdbff, {0xf, 0x0, 0x3e, [0x9, 0x1000, 0x29, 0x1, 0x8001, 0x800, 0xf42a, 0x7, 0x8000, 0x1, 0x7d9f, 0x4375, 0x2, 0x5, 0xffff, 0xd1, 0x0, 0xc52, 0x5, 0x7, 0xe52f, 0xe, 0x800, 0x100, 0x0, 0x3dc, 0x1, 0x57faeb73, 0x40, 0xdc9, 0x6, 0x7, 0xe, 0x6, 0x9, 0x7c9, 0xd, 0x0, 0x81, 0xffffffff, 0x1, 0x1000, 0x46, 0x4, 0x108, 0x0, 0xffff, 0x1, 0x4, 0x2, 0x7, 0x8, 0xe, 0x8, 0x4, 0x9847, 0x9, 0x9, 0x3ff, 0x9, 0x6, 0x4, 0xfffffffa, 0xfffffffa], [0x5, 0x7, 0x39ea, 0x9b, 0xb, 0x3, 0xff, 0x5, 0xd, 0x5, 0x9, 0x2, 0x40, 0x7, 0x1, 0x5, 0x9, 0xd, 0x101, 0x401, 0x8, 0x6, 0x7, 0x4, 0xaf, 0x6, 0xc0, 0x5, 0xe, 0xfff, 0x4, 0x72, 0x0, 0x80000000, 0x3, 0x7bdb, 0x400, 0x0, 0x8, 0xfff, 0xfff, 0x0, 0xc2, 0x3, 0x8, 0x7, 0x53, 0x86f, 0x2, 0x100, 0x800, 0x7, 0x200, 0x2, 0x0, 0x8000, 0x85, 0x7, 0x8, 0x3, 0x10000, 0x5, 0x9, 0x65], [0x7, 0x3, 0x16848238, 0x48, 0x139e, 0xd, 0x539, 0xadcc, 0x1, 0x5, 0x6, 0x83c, 0x6, 0x9, 0x9, 0x7c, 0x49, 0xa276, 0xffffffff, 0x9, 0x6, 0x2, 0x4, 0x1, 0x7fa, 0x5, 0x3, 0x1, 0x0, 0x0, 0x3, 0x0, 0xff, 0x83, 0x7, 0xff, 0x7, 0x10, 0x4, 0x6, 0xd6c, 0xfffffff8, 0x67, 0x9, 0x5c0, 0x8001, 0x2, 0x6, 0x6, 0x30, 0x2, 0x6, 0x7, 0x9, 0x7fffffff, 0xffffffff, 0x574fc3a4, 0x8, 0x8, 0x400, 0x10, 0xffffffff, 0x8000, 0x80000001], [0x80, 0x86, 0x8, 0x0, 0x3, 0x3, 0x1, 0x2, 0xc, 0x80000000, 0x6, 0x6, 0x5a, 0x2, 0x7, 0x2, 0x1, 0x1, 0x6, 0x3, 0xd, 0x1, 0x6, 0x0, 0x6, 0x2, 0xaebb, 0x401, 0xb, 0x8, 0x2, 0x9, 0x8, 0xfffffffc, 0x6, 0x43, 0x4, 0x7, 0xd, 0x5, 0x6, 0xfffffff8, 0x8, 0x8, 0xe7, 0x0, 0x8, 0x4, 0x6, 0x6, 0x5, 0x8, 0x3, 0x8, 0x1, 0x1, 0x6, 0x4, 0x9, 0x5, 0x400, 0xfffffff4, 0x1, 0xc], 0x7, ['syz0\x00', '\x14\x00']}}, 0x428}, 0x1, 0x0, 0x0, 0xc7ea6ca6c2ca5d7c}, 0x20000000) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x10, 0x701, 0x0, 0x0, {0xa}, [@typed={0x6, 0x1, 0x0, 0x0, @str='\x14\x00'}]}, 0x1c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0xe, 0x0, &(0x7f0000000140)='syzkaller\x00'}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x5, 0xd, 0x7, 0x0, 0x7fffffff, 0x5a4d4, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xdfffffff, 0x1, @perf_config_ext={0xffffffffffffffff, 0x5}, 0x100020, 0x91f, 0x7, 0x9, 0x81, 0x5, 0x4005, 0x0, 0x2, 0x0, 0x2}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8020, 0x90024, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x6}, 0x8224, 0x2, 0x400, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f0, &(0x7f0000000080)) 1m42.105050895s ago: executing program 7 (id=5989): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xa}, 0x21, 0x0, 0x0, 0x4, 0x2, 0x7fffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0xa0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x400000000008, 0x8000008}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=@updpolicy={0xfc, 0x19, 0x1, 0x70bd2d, 0x0, {{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xc, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xa00, 0x407ffffffffffe, 0x800000000000002}, 0x0, 0x0, 0x1, 0x0, 0x6, 0x3}, [@tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x0, 0x3c}, 0x2, @in6=@loopback, 0x6, 0x4, 0x3}]}]}, 0xfc}}, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r4, &(0x7f0000002dc0)={&(0x7f0000001640)=@l2tp6={0xa, 0x0, 0x0, @local, 0x3, 0x3}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000002c0)='\t', 0x1}], 0x1}, 0x41) r5 = syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x21}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f00000005c0)=r5, 0x12) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000040)=0x1, 0x12) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r11 = openat$cgroup_ro(r10, &(0x7f0000000280)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_int(r11, &(0x7f0000000040)=0x1, 0x12) 0s ago: executing program 49 (id=5987): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = getpid() r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xa}, 0x21, 0x0, 0x0, 0x4, 0x2, 0x7fffffff}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0xa0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x400000000008, 0x8000008}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24048015) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x1ff) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1e, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x100, 0x0, 0x0, 0x40f00, 0x62, '\x00', 0x0, @sk_lookup, r0, 0x8, &(0x7f00000002c0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x2, 0x101, 0x7}, 0x10, 0xffffffffffffffff, r0, 0x5, &(0x7f0000000340)=[0xffffffffffffffff, r1, r1, r1, r1, r1, r0, 0xffffffffffffffff], &(0x7f0000000440)=[{0x4, 0x1, 0xf, 0x8}, {0x4, 0x5, 0x4, 0x5}, {0x5, 0x2, 0xe, 0xc}, {0x1, 0x5, 0x7, 0x2}, {0x4, 0x3, 0xc, 0x1}], 0x10, 0x3ff}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000680)={@fallback=r3, 0xc, 0x1, 0x9, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000006c0)={r5, 0x0, 0x25, 0x0, @val=@tcx={@void, @value=r4, @void, @void, r6}}, 0x1c) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x3}, 0x50) r7 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x2000, 0x0) fstat(r7, &(0x7f00000000c0)) socket$kcm(0x21, 0x2, 0x2) openat$ppp(0xffffffffffffff9c, 0x0, 0x80c00, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r8, &(0x7f0000002840)={0x0, 0x0, &(0x7f0000002800)={&(0x7f0000002780)=ANY=[@ANYBLOB="34000000000b010300000000000007000200000a080002400000000008000340000000000d000100727066696c"], 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x4040010) kernel console output (not intermixed with test programs): _macvtap: entered promiscuous mode [ 667.967317][T22293] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 667.990408][T22293] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 668.016646][T14973] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 668.029561][T22653] netlink: 'syz.7.5244': attribute type 10 has an invalid length. [ 668.097741][T14973] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 668.138249][T14973] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 668.164693][T14973] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 668.678283][T14961] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 668.720527][T14961] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 668.869091][T14985] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 668.889324][T14985] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 669.107087][T22678] netlink: 'syz.9.5252': attribute type 26 has an invalid length. [ 669.117229][T22682] netlink: 128 bytes leftover after parsing attributes in process `syz.7.5253'. [ 669.344268][T22688] FAULT_INJECTION: forcing a failure. [ 669.344268][T22688] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 669.365536][T22688] CPU: 0 UID: 0 PID: 22688 Comm: syz.7.5255 Not tainted syzkaller #0 PREEMPT(full) [ 669.365562][T22688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 669.365573][T22688] Call Trace: [ 669.365581][T22688] [ 669.365589][T22688] dump_stack_lvl+0xe8/0x150 [ 669.365616][T22688] should_fail_ex+0x412/0x560 [ 669.365645][T22688] prepare_alloc_pages+0x22a/0x650 [ 669.365673][T22688] __alloc_frozen_pages_noprof+0x12f/0x380 [ 669.365698][T22688] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 669.365723][T22688] ? __pfx__copy_from_iter+0x10/0x10 [ 669.365749][T22688] ? policy_nodemask+0x27c/0x710 [ 669.365776][T22688] alloc_pages_mpol+0x232/0x4a0 [ 669.365802][T22688] alloc_pages_noprof+0xa8/0x190 [ 669.365825][T22688] anon_pipe_write+0xc06/0x1480 [ 669.365846][T22688] ? __pfx_aa_file_perm+0x10/0x10 [ 669.365892][T22688] ? __pfx_anon_pipe_write+0x10/0x10 [ 669.365910][T22688] ? common_file_perm+0x1b4/0x220 [ 669.365938][T22688] ? bpf_lsm_file_permission+0x9/0x20 [ 669.365956][T22688] ? security_file_permission+0x75/0x260 [ 669.365984][T22688] vfs_write+0x61d/0xb90 [ 669.366010][T22688] ? __pfx_vfs_write+0x10/0x10 [ 669.366037][T22688] ? __fget_files+0x2a/0x420 [ 669.366067][T22688] ksys_write+0x150/0x270 [ 669.366087][T22688] ? __pfx_ksys_write+0x10/0x10 [ 669.366117][T22688] do_syscall_64+0xe2/0xf80 [ 669.366140][T22688] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 669.366157][T22688] ? clear_bhb_loop+0x60/0xb0 [ 669.366179][T22688] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 669.366197][T22688] RIP: 0033:0x7fd660f9acb9 [ 669.366214][T22688] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 669.366230][T22688] RSP: 002b:00007fd661e7c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 669.366250][T22688] RAX: ffffffffffffffda RBX: 00007fd661215fa0 RCX: 00007fd660f9acb9 [ 669.366263][T22688] RDX: 0000000000033fe0 RSI: 0000200000000000 RDI: 0000000000000000 [ 669.366275][T22688] RBP: 00007fd661e7c090 R08: 0000000000000000 R09: 0000000000000000 [ 669.366293][T22688] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 669.366304][T22688] R13: 00007fd661216038 R14: 00007fd661215fa0 R15: 00007ffd7eea7ff8 [ 669.366335][T22688] [ 669.759633][T22701] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5259'. [ 669.863694][T22714] netlink: 'syz.1.5262': attribute type 10 has an invalid length. [ 669.878821][T22716] netlink: 'syz.1.5262': attribute type 10 has an invalid length. [ 670.154320][T22709] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 670.248709][T22709] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 670.774102][T22709] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 670.905675][T22709] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 671.247858][T22765] xt_policy: too many policy elements [ 671.381186][T22780] netlink: 'syz.7.5276': attribute type 2 has an invalid length. [ 671.453704][T22775] __nla_validate_parse: 3 callbacks suppressed [ 671.453737][T22775] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5275'. [ 671.481650][T22780] netlink: 164 bytes leftover after parsing attributes in process `syz.7.5276'. [ 671.486403][T22780] netlink: 'syz.7.5276': attribute type 2 has an invalid length. [ 671.486426][T22780] netlink: 164 bytes leftover after parsing attributes in process `syz.7.5276'. [ 671.486748][T22780] netlink: 'syz.7.5276': attribute type 2 has an invalid length. [ 671.486766][T22780] netlink: 164 bytes leftover after parsing attributes in process `syz.7.5276'. [ 671.487162][T22780] netlink: 'syz.7.5276': attribute type 2 has an invalid length. [ 671.487181][T22780] netlink: 164 bytes leftover after parsing attributes in process `syz.7.5276'. [ 671.487479][T22780] netlink: 'syz.7.5276': attribute type 2 has an invalid length. [ 671.487497][T22780] netlink: 164 bytes leftover after parsing attributes in process `syz.7.5276'. [ 671.487785][T22780] netlink: 'syz.7.5276': attribute type 2 has an invalid length. [ 671.487802][T22780] netlink: 164 bytes leftover after parsing attributes in process `syz.7.5276'. [ 671.488179][T22780] netlink: 'syz.7.5276': attribute type 2 has an invalid length. [ 671.488197][T22780] netlink: 164 bytes leftover after parsing attributes in process `syz.7.5276'. [ 671.488497][T22780] netlink: 'syz.7.5276': attribute type 2 has an invalid length. [ 671.488515][T22780] netlink: 164 bytes leftover after parsing attributes in process `syz.7.5276'. [ 671.488801][T22780] netlink: 'syz.7.5276': attribute type 2 has an invalid length. [ 671.488819][T22780] netlink: 164 bytes leftover after parsing attributes in process `syz.7.5276'. [ 671.489185][T22780] netlink: 'syz.7.5276': attribute type 2 has an invalid length. [ 671.585981][T20713] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 671.714685][T20713] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 671.723089][T20713] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 671.732089][T20713] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 671.740998][T20713] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 671.920713][T22782] lo speed is unknown, defaulting to 1000 [ 673.098047][T22815] FAULT_INJECTION: forcing a failure. [ 673.098047][T22815] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 673.138935][T22815] CPU: 0 UID: 0 PID: 22815 Comm: syz.7.5284 Not tainted syzkaller #0 PREEMPT(full) [ 673.138981][T22815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 673.138996][T22815] Call Trace: [ 673.139004][T22815] [ 673.139012][T22815] dump_stack_lvl+0xe8/0x150 [ 673.139040][T22815] should_fail_ex+0x412/0x560 [ 673.139072][T22815] prepare_alloc_pages+0x22a/0x650 [ 673.139103][T22815] __alloc_frozen_pages_noprof+0x12f/0x380 [ 673.139130][T22815] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 673.139157][T22815] ? __pfx__copy_from_iter+0x10/0x10 [ 673.139185][T22815] ? policy_nodemask+0x27c/0x710 [ 673.139206][T22815] ? aa_file_perm+0x440/0x1630 [ 673.139236][T22815] alloc_pages_mpol+0x232/0x4a0 [ 673.139270][T22815] alloc_pages_noprof+0xa8/0x190 [ 673.139294][T22815] anon_pipe_write+0xc06/0x1480 [ 673.139317][T22815] ? __pfx_aa_file_perm+0x10/0x10 [ 673.139370][T22815] ? __pfx_anon_pipe_write+0x10/0x10 [ 673.139388][T22815] ? common_file_perm+0x1b4/0x220 [ 673.139417][T22815] ? bpf_lsm_file_permission+0x9/0x20 [ 673.139436][T22815] ? security_file_permission+0x75/0x260 [ 673.139467][T22815] vfs_write+0x61d/0xb90 [ 673.139497][T22815] ? __pfx_vfs_write+0x10/0x10 [ 673.139529][T22815] ? __fget_files+0x2a/0x420 [ 673.139563][T22815] ksys_write+0x150/0x270 [ 673.139586][T22815] ? __pfx_ksys_write+0x10/0x10 [ 673.139620][T22815] do_syscall_64+0xe2/0xf80 [ 673.139643][T22815] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 673.139661][T22815] ? trace_irq_disable+0x37/0x100 [ 673.139682][T22815] ? clear_bhb_loop+0x60/0xb0 [ 673.139706][T22815] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 673.139724][T22815] RIP: 0033:0x7fd660f9acb9 [ 673.139750][T22815] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 673.139767][T22815] RSP: 002b:00007fd661e5b028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 673.139786][T22815] RAX: ffffffffffffffda RBX: 00007fd661216090 RCX: 00007fd660f9acb9 [ 673.139800][T22815] RDX: 0000000000033fe0 RSI: 0000200000000000 RDI: 0000000000000000 [ 673.139812][T22815] RBP: 00007fd661e5b090 R08: 0000000000000000 R09: 0000000000000000 [ 673.139823][T22815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 673.139834][T22815] R13: 00007fd661216128 R14: 00007fd661216090 R15: 00007ffd7eea7ff8 [ 673.139871][T22815] [ 673.438805][T22797] macvlan1: entered allmulticast mode [ 673.451420][T22797] veth1_vlan: entered allmulticast mode [ 673.484573][T22797] team0: Port device macvlan1 added [ 673.708604][T14969] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 673.806239][T20713] Bluetooth: hci0: command tx timeout [ 674.208456][T14969] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 674.479902][T14969] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 674.713093][T14969] bond0: (slave netdevsim0): Releasing backup interface [ 674.786036][T14969] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 674.864060][T22782] chnl_net:caif_netlink_parms(): no params data found [ 676.017666][T20713] Bluetooth: hci0: command tx timeout [ 676.347937][T22782] bridge0: port 1(bridge_slave_0) entered blocking state [ 676.373579][T22782] bridge0: port 1(bridge_slave_0) entered disabled state [ 676.380814][T22782] bridge_slave_0: entered allmulticast mode [ 676.420596][T22782] bridge_slave_0: entered promiscuous mode [ 676.468460][T22782] bridge0: port 2(bridge_slave_1) entered blocking state [ 676.478490][T22782] bridge0: port 2(bridge_slave_1) entered disabled state [ 676.489529][T22782] bridge_slave_1: entered allmulticast mode [ 676.508553][T22782] bridge_slave_1: entered promiscuous mode [ 676.767483][T22905] : entered promiscuous mode [ 676.837271][T22782] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 676.874604][T22782] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 677.164883][T22909] __nla_validate_parse: 59 callbacks suppressed [ 677.164905][T22909] netlink: 12 bytes leftover after parsing attributes in process `syz.0.5304'. [ 677.182899][T22921] validate_nla: 57 callbacks suppressed [ 677.182930][T22921] netlink: 'syz.7.5308': attribute type 26 has an invalid length. [ 677.874223][T22945] netlink: 'syz.1.5313': attribute type 10 has an invalid length. [ 678.030014][T14969] team0: Port device bond0 removed [ 678.043715][T20713] Bluetooth: hci0: command tx timeout [ 678.051983][T14969] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 678.083240][T14969] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 678.106376][T14969] bond0 (unregistering): Released all slaves [ 678.153899][T22782] team0: Port device team_slave_0 added [ 678.175563][T22908] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5304'. [ 678.241153][T22945] bond0: (slave netdevsim0): Enslaving as an active interface with an up link [ 678.291656][T22782] team0: Port device team_slave_1 added [ 678.316839][T22909] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5304'. [ 678.326602][T14969] : left promiscuous mode [ 678.487314][T22954] sit0: entered allmulticast mode [ 678.559034][T22782] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 678.567905][T22782] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 678.666915][T22782] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 678.690406][T22958] netlink: 'syz.1.5316': attribute type 10 has an invalid length. [ 678.718945][T22964] netlink: 'syz.0.5315': attribute type 3 has an invalid length. [ 678.736369][T22954] sit0: entered promiscuous mode [ 678.737923][T22964] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.5315'. [ 678.754573][T22958] netlink: 156 bytes leftover after parsing attributes in process `syz.1.5316'. [ 679.852896][T22983] netlink: 'syz.7.5320': attribute type 26 has an invalid length. [ 679.983518][T22782] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 679.990644][T22782] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 680.037056][T22782] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 680.098252][T14969] team0: Port device wlan1 removed [ 680.122987][T20713] Bluetooth: hci0: command tx timeout [ 680.445034][T22782] hsr_slave_0: entered promiscuous mode [ 680.460365][T22782] hsr_slave_1: entered promiscuous mode [ 680.471739][T22782] debugfs: 'hsr0' already exists in 'hsr' [ 680.494378][T22782] Cannot create hsr debugfs directory [ 680.560381][T22993] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5324'. [ 680.569677][T22993] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5324'. [ 680.751281][T14969] hsr_slave_0: left promiscuous mode [ 680.768409][T14969] hsr_slave_1: left promiscuous mode [ 680.776679][T14969] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 680.784707][T14969] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 680.810715][T14969] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 680.823752][T14969] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 680.877272][T14969] veth1_macvtap: left promiscuous mode [ 680.882956][T14969] veth0_macvtap: left promiscuous mode [ 680.888644][T14969] veth1_vlan: left allmulticast mode [ 680.895816][T14969] veth1_vlan: left promiscuous mode [ 680.914631][T14969] veth0_vlan: left promiscuous mode [ 680.969082][T23017] netlink: 'syz.7.5331': attribute type 26 has an invalid length. [ 681.411097][T14969] team0 (unregistering): Port device macvlan1 removed [ 682.148891][T14969] team0 (unregistering): Port device team_slave_1 removed [ 682.238964][T14969] team0 (unregistering): Port device C removed [ 682.251496][T23065] netlink: 180 bytes leftover after parsing attributes in process `syz.4.5342'. [ 682.260909][T23065] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5342'. [ 682.539748][T23077] netlink: 'syz.4.5344': attribute type 26 has an invalid length. [ 682.959434][ T57] infiniband syz0: ib_query_port failed (-19) [ 682.970883][T23050] netlink: 763 bytes leftover after parsing attributes in process `syz.0.5339'. [ 682.980544][ T5944] lo speed is unknown, defaulting to 1000 [ 682.990054][ T5944] infiniband syz2: ib_query_port failed (-19) [ 683.842357][T23115] netlink: 'syz.4.5354': attribute type 26 has an invalid length. [ 684.541974][T23118] netlink: 4595 bytes leftover after parsing attributes in process `syz.1.5353'. [ 684.713449][T23135] netlink: 'syz.1.5356': attribute type 6 has an invalid length. [ 684.732893][T23135] netlink: 168 bytes leftover after parsing attributes in process `syz.1.5356'. [ 684.842024][T22782] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 684.875258][T23138] netlink: 763 bytes leftover after parsing attributes in process `syz.4.5357'. [ 684.895235][T22782] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 684.931767][T22782] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 684.974270][T22782] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 685.260608][T22782] 8021q: adding VLAN 0 to HW filter on device bond0 [ 685.345665][T22782] 8021q: adding VLAN 0 to HW filter on device team0 [ 685.364686][T23167] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5362'. [ 685.367885][ T61] bridge0: port 1(bridge_slave_0) entered blocking state [ 685.380789][ T61] bridge0: port 1(bridge_slave_0) entered forwarding state [ 685.443858][T14976] bridge0: port 2(bridge_slave_1) entered blocking state [ 685.451035][T14976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 685.649234][ T1303] ieee802154 phy0 wpan0: encryption failed: -22 [ 685.656542][ T1303] ieee802154 phy1 wpan1: encryption failed: -22 [ 685.873704][T23180] netlink: 'syz.0.5366': attribute type 26 has an invalid length. [ 686.298120][T22782] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 686.761055][T23211] netlink: 'syz.7.5374': attribute type 10 has an invalid length. [ 686.811890][T23211] netlink: 55 bytes leftover after parsing attributes in process `syz.7.5374'. [ 686.870998][T23213] FAULT_INJECTION: forcing a failure. [ 686.870998][T23213] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 687.352575][T23213] CPU: 0 UID: 0 PID: 23213 Comm: syz.4.5375 Not tainted syzkaller #0 PREEMPT(full) [ 687.352602][T23213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 687.352614][T23213] Call Trace: [ 687.352622][T23213] [ 687.352630][T23213] dump_stack_lvl+0xe8/0x150 [ 687.352659][T23213] should_fail_ex+0x412/0x560 [ 687.352688][T23213] _copy_from_iter+0x1d3/0x1670 [ 687.352715][T23213] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 687.352748][T23213] ? __alloc_frozen_pages_noprof+0x1de/0x380 [ 687.352776][T23213] ? lockdep_hardirqs_on+0x7a/0x110 [ 687.352800][T23213] ? __pfx__copy_from_iter+0x10/0x10 [ 687.352835][T23213] ? page_copy_sane+0x4e/0x270 [ 687.352862][T23213] copy_page_from_iter+0xdd/0x170 [ 687.352892][T23213] anon_pipe_write+0xa0b/0x1480 [ 687.352914][T23213] ? __pfx_aa_file_perm+0x10/0x10 [ 687.352962][T23213] ? __pfx_anon_pipe_write+0x10/0x10 [ 687.352979][T23213] ? common_file_perm+0x1b4/0x220 [ 687.353006][T23213] ? bpf_lsm_file_permission+0x9/0x20 [ 687.353025][T23213] ? security_file_permission+0x75/0x260 [ 687.353053][T23213] vfs_write+0x61d/0xb90 [ 687.353080][T23213] ? __pfx_vfs_write+0x10/0x10 [ 687.353109][T23213] ? __fget_files+0x2a/0x420 [ 687.353140][T23213] ksys_write+0x150/0x270 [ 687.353161][T23213] ? __pfx_ksys_write+0x10/0x10 [ 687.353190][T23213] do_syscall_64+0xe2/0xf80 [ 687.353213][T23213] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 687.353231][T23213] ? clear_bhb_loop+0x60/0xb0 [ 687.353253][T23213] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 687.353271][T23213] RIP: 0033:0x7fca2939acb9 [ 687.353289][T23213] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 687.353305][T23213] RSP: 002b:00007fca2a18a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 687.353324][T23213] RAX: ffffffffffffffda RBX: 00007fca29615fa0 RCX: 00007fca2939acb9 [ 687.353338][T23213] RDX: 0000000000033fe0 RSI: 0000200000000000 RDI: 0000000000000000 [ 687.353350][T23213] RBP: 00007fca2a18a090 R08: 0000000000000000 R09: 0000000000000000 [ 687.353362][T23213] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 687.353373][T23213] R13: 00007fca29616038 R14: 00007fca29615fa0 R15: 00007ffeac3500b8 [ 687.353405][T23213] [ 687.939293][T23223] netlink: 'syz.4.5378': attribute type 6 has an invalid length. [ 688.016134][T23223] netlink: 12 bytes leftover after parsing attributes in process `syz.4.5378'. [ 688.044632][T23223] netlink: 24 bytes leftover after parsing attributes in process `syz.4.5378'. [ 688.446584][T22782] veth0_vlan: entered promiscuous mode [ 688.489737][T22782] veth1_vlan: entered promiscuous mode [ 688.508082][T23248] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5385'. [ 688.535117][T23247] netlink: 4 bytes leftover after parsing attributes in process `syz.7.5386'. [ 688.590114][T22782] veth0_macvtap: entered promiscuous mode [ 688.605241][T22782] veth1_macvtap: entered promiscuous mode [ 688.666385][T22782] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 688.732379][T22782] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 688.782333][ T36] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 688.813564][ T36] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 688.822397][ T36] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 688.879194][ T36] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 689.142720][T23262] : entered promiscuous mode [ 689.246876][T14973] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 689.268387][T14973] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 689.382295][T23277] netlink: 20 bytes leftover after parsing attributes in process `syz.0.5393'. [ 689.532061][ T36] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 689.561102][ T36] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 690.346531][T23313] FAULT_INJECTION: forcing a failure. [ 690.346531][T23313] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 690.372779][T23313] CPU: 0 UID: 0 PID: 23313 Comm: syz.4.5402 Not tainted syzkaller #0 PREEMPT(full) [ 690.372804][T23313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 690.372815][T23313] Call Trace: [ 690.372822][T23313] [ 690.372830][T23313] dump_stack_lvl+0xe8/0x150 [ 690.372858][T23313] should_fail_ex+0x412/0x560 [ 690.372889][T23313] _copy_from_iter+0x1d3/0x1670 [ 690.372914][T23313] ? __alloc_frozen_pages_noprof+0x1de/0x380 [ 690.372935][T23313] ? irqentry_exit+0x59c/0x620 [ 690.372960][T23313] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 690.372983][T23313] ? __pfx__copy_from_iter+0x10/0x10 [ 690.373007][T23313] ? policy_nodemask+0x27c/0x710 [ 690.373032][T23313] ? page_copy_sane+0x4e/0x270 [ 690.373057][T23313] copy_page_from_iter+0xdd/0x170 [ 690.373084][T23313] anon_pipe_write+0xa0b/0x1480 [ 690.373104][T23313] ? __pfx_aa_file_perm+0x10/0x10 [ 690.373148][T23313] ? __pfx_anon_pipe_write+0x10/0x10 [ 690.373164][T23313] ? common_file_perm+0x1b4/0x220 [ 690.373189][T23313] ? bpf_lsm_file_permission+0x9/0x20 [ 690.373205][T23313] ? security_file_permission+0x75/0x260 [ 690.373229][T23313] vfs_write+0x61d/0xb90 [ 690.373253][T23313] ? __pfx_vfs_write+0x10/0x10 [ 690.373279][T23313] ? __fget_files+0x2a/0x420 [ 690.373308][T23313] ksys_write+0x150/0x270 [ 690.373325][T23313] ? __pfx_ksys_write+0x10/0x10 [ 690.373354][T23313] do_syscall_64+0xe2/0xf80 [ 690.373375][T23313] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 690.373391][T23313] ? clear_bhb_loop+0x60/0xb0 [ 690.373411][T23313] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 690.373426][T23313] RIP: 0033:0x7fca2939acb9 [ 690.373442][T23313] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 690.373458][T23313] RSP: 002b:00007fca2a18a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 690.373476][T23313] RAX: ffffffffffffffda RBX: 00007fca29615fa0 RCX: 00007fca2939acb9 [ 690.373488][T23313] RDX: 0000000000033fe0 RSI: 0000200000000000 RDI: 0000000000000000 [ 690.373499][T23313] RBP: 00007fca2a18a090 R08: 0000000000000000 R09: 0000000000000000 [ 690.373509][T23313] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 690.373518][T23313] R13: 00007fca29616038 R14: 00007fca29615fa0 R15: 00007ffeac3500b8 [ 690.373556][T23313] [ 690.759562][T23324] netlink: 'syz.0.5406': attribute type 10 has an invalid length. [ 690.860677][T23324] netlink: 152 bytes leftover after parsing attributes in process `syz.0.5406'. [ 690.872209][T23324] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 691.322824][T23341] netlink: 16 bytes leftover after parsing attributes in process `syz.7.5413'. [ 692.070326][T23364] FAULT_INJECTION: forcing a failure. [ 692.070326][T23364] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 692.170454][T23368] netlink: 12 bytes leftover after parsing attributes in process `syz.0.5420'. [ 692.195079][T23364] CPU: 0 UID: 0 PID: 23364 Comm: syz.7.5419 Not tainted syzkaller #0 PREEMPT(full) [ 692.195103][T23364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 692.195114][T23364] Call Trace: [ 692.195122][T23364] [ 692.195130][T23364] dump_stack_lvl+0xe8/0x150 [ 692.195158][T23364] should_fail_ex+0x412/0x560 [ 692.195188][T23364] prepare_alloc_pages+0x22a/0x650 [ 692.195220][T23364] __alloc_frozen_pages_noprof+0x12f/0x380 [ 692.195245][T23364] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 692.195270][T23364] ? __pfx__copy_from_iter+0x10/0x10 [ 692.195297][T23364] ? policy_nodemask+0x27c/0x710 [ 692.195325][T23364] alloc_pages_mpol+0x232/0x4a0 [ 692.195353][T23364] alloc_pages_noprof+0xa8/0x190 [ 692.195376][T23364] anon_pipe_write+0xc06/0x1480 [ 692.195397][T23364] ? __pfx_aa_file_perm+0x10/0x10 [ 692.195449][T23364] ? __pfx_anon_pipe_write+0x10/0x10 [ 692.195466][T23364] ? common_file_perm+0x1b4/0x220 [ 692.195494][T23364] ? bpf_lsm_file_permission+0x9/0x20 [ 692.195513][T23364] ? security_file_permission+0x75/0x260 [ 692.195542][T23364] vfs_write+0x61d/0xb90 [ 692.195570][T23364] ? __pfx_vfs_write+0x10/0x10 [ 692.195601][T23364] ? __fget_files+0x2a/0x420 [ 692.195642][T23364] ksys_write+0x150/0x270 [ 692.195663][T23364] ? __pfx_ksys_write+0x10/0x10 [ 692.195696][T23364] do_syscall_64+0xe2/0xf80 [ 692.195719][T23364] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 692.195737][T23364] ? clear_bhb_loop+0x60/0xb0 [ 692.195760][T23364] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 692.195778][T23364] RIP: 0033:0x7fd660f9acb9 [ 692.195796][T23364] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 692.195811][T23364] RSP: 002b:00007fd661e7c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 692.195830][T23364] RAX: ffffffffffffffda RBX: 00007fd661215fa0 RCX: 00007fd660f9acb9 [ 692.195844][T23364] RDX: 0000000000033fe0 RSI: 0000200000000000 RDI: 0000000000000000 [ 692.195856][T23364] RBP: 00007fd661e7c090 R08: 0000000000000000 R09: 0000000000000000 [ 692.195867][T23364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 692.195879][T23364] R13: 00007fd661216038 R14: 00007fd661215fa0 R15: 00007ffd7eea7ff8 [ 692.195915][T23364] [ 694.927559][T23453] FAULT_INJECTION: forcing a failure. [ 694.927559][T23453] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 695.101262][T23453] CPU: 1 UID: 0 PID: 23453 Comm: syz.7.5444 Not tainted syzkaller #0 PREEMPT(full) [ 695.101288][T23453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 695.101301][T23453] Call Trace: [ 695.101309][T23453] [ 695.101317][T23453] dump_stack_lvl+0xe8/0x150 [ 695.101350][T23453] should_fail_ex+0x412/0x560 [ 695.101381][T23453] _copy_from_user+0x2d/0xb0 [ 695.101402][T23453] smc_setsockopt+0x3c5/0xac0 [ 695.101439][T23453] ? __pfx_smc_setsockopt+0x10/0x10 [ 695.101459][T23453] ? aa_sock_opt_perm+0xff/0x1a0 [ 695.101494][T23453] ? bpf_lsm_socket_setsockopt+0x9/0x20 [ 695.101512][T23453] ? __pfx_smc_setsockopt+0x10/0x10 [ 695.101535][T23453] do_sock_setsockopt+0x17c/0x1b0 [ 695.101568][T23453] __x64_sys_setsockopt+0x13d/0x1b0 [ 695.101600][T23453] do_syscall_64+0xe2/0xf80 [ 695.101624][T23453] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 695.101642][T23453] ? trace_irq_disable+0x37/0x100 [ 695.101664][T23453] ? clear_bhb_loop+0x60/0xb0 [ 695.101687][T23453] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 695.101705][T23453] RIP: 0033:0x7fd660f9acb9 [ 695.101722][T23453] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 695.101738][T23453] RSP: 002b:00007fd661e7c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 695.101757][T23453] RAX: ffffffffffffffda RBX: 00007fd661215fa0 RCX: 00007fd660f9acb9 [ 695.101771][T23453] RDX: 0000000000000024 RSI: 0000000000000006 RDI: 0000000000000004 [ 695.101783][T23453] RBP: 00007fd661e7c090 R08: 0000000000000004 R09: 0000000000000000 [ 695.101794][T23453] R10: 0000200000000200 R11: 0000000000000246 R12: 0000000000000001 [ 695.101806][T23453] R13: 00007fd661216038 R14: 00007fd661215fa0 R15: 00007ffd7eea7ff8 [ 695.101840][T23453] [ 696.820357][T23493] netlink: 12 bytes leftover after parsing attributes in process `syz.0.5456'. [ 697.936010][T23512] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5459'. [ 698.903687][T23528] netlink: 76 bytes leftover after parsing attributes in process `syz.0.5463'. [ 698.963283][T23530] netlink: 16 bytes leftover after parsing attributes in process `syz.7.5462'. [ 700.405061][T23543] netlink: 'syz.0.5467': attribute type 10 has an invalid length. [ 700.447648][T23543] veth1_vlan: left allmulticast mode [ 700.771915][T23551] netlink: 112 bytes leftover after parsing attributes in process `syz.4.5469'. [ 700.898797][T23554] netlink: 260 bytes leftover after parsing attributes in process `syz.7.5470'. [ 700.914307][T23551] netlink: 16 bytes leftover after parsing attributes in process `syz.4.5469'. [ 701.035534][T23559] netlink: 40 bytes leftover after parsing attributes in process `syz.9.5471'. [ 701.203158][T23563] netlink: 40 bytes leftover after parsing attributes in process `syz.9.5471'. [ 701.308800][T23563] netlink: 40 bytes leftover after parsing attributes in process `syz.9.5471'. [ 701.390690][T23557] delete_channel: no stack [ 702.855608][T23607] netlink: 'syz.1.5477': attribute type 10 has an invalid length. [ 702.881432][T23607] veth1_vlan: left allmulticast mode [ 703.702325][T23616] netlink: 'syz.0.5482': attribute type 26 has an invalid length. [ 703.867419][T23626] netlink: 'syz.9.5485': attribute type 32 has an invalid length. [ 704.128616][T23638] netlink: 'syz.9.5489': attribute type 10 has an invalid length. [ 704.148775][T23638] bond0: (slave bond_slave_0): Releasing backup interface [ 704.628917][T23659] netlink: 4595 bytes leftover after parsing attributes in process `syz.4.5494'. [ 704.640977][T23659] netlink: 4595 bytes leftover after parsing attributes in process `syz.4.5494'. [ 705.182841][T23671] netlink: 'syz.4.5499': attribute type 26 has an invalid length. [ 707.751831][T23720] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5516'. [ 707.813315][T23721] netlink: 132 bytes leftover after parsing attributes in process `syz.0.5516'. [ 709.177190][T23723] netlink: 'syz.4.5518': attribute type 26 has an invalid length. [ 710.421247][T23775] netlink: 'syz.1.5539': attribute type 26 has an invalid length. [ 710.529074][T23784] netlink: 763 bytes leftover after parsing attributes in process `syz.4.5541'. [ 710.670951][T23787] netlink: 'syz.9.5543': attribute type 30 has an invalid length. [ 712.083932][T23828] netlink: 'syz.4.5556': attribute type 26 has an invalid length. [ 712.151401][T23821] mac80211_hwsim hwsim62 wlan0: entered allmulticast mode [ 712.550953][T23838] netlink: 12 bytes leftover after parsing attributes in process `syz.0.5559'. [ 712.560716][T23838] netlink: 48 bytes leftover after parsing attributes in process `syz.0.5559'. [ 712.616364][T23844] netlink: 'syz.4.5560': attribute type 15 has an invalid length. [ 712.653717][T23846] netlink: 830 bytes leftover after parsing attributes in process `syz.0.5559'. [ 713.153192][T20713] Bluetooth: hci0: ISO packet for unknown connection handle 3129 [ 713.515543][T23869] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5568'. [ 714.993721][T23883] FAULT_INJECTION: forcing a failure. [ 714.993721][T23883] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 715.024343][T23883] CPU: 1 UID: 0 PID: 23883 Comm: syz.7.5572 Not tainted syzkaller #0 PREEMPT(full) [ 715.024368][T23883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 715.024379][T23883] Call Trace: [ 715.024388][T23883] [ 715.024397][T23883] dump_stack_lvl+0xe8/0x150 [ 715.024432][T23883] should_fail_ex+0x412/0x560 [ 715.024474][T23883] _copy_from_user+0x2d/0xb0 [ 715.024499][T23883] ___sys_sendmsg+0x1c6/0x360 [ 715.024518][T23883] ? __lock_acquire+0x6b5/0x2cf0 [ 715.024552][T23883] ? __pfx____sys_sendmsg+0x10/0x10 [ 715.024671][T23883] ? __fget_files+0x2a/0x420 [ 715.024694][T23883] ? __fget_files+0x3a0/0x420 [ 715.024747][T23883] __x64_sys_sendmsg+0x1bd/0x2a0 [ 715.024777][T23883] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 715.024825][T23883] ? __pfx_ksys_write+0x10/0x10 [ 715.024881][T23883] do_syscall_64+0xe2/0xf80 [ 715.024906][T23883] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 715.024923][T23883] ? trace_irq_disable+0x37/0x100 [ 715.024952][T23883] ? clear_bhb_loop+0x60/0xb0 [ 715.024982][T23883] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 715.025001][T23883] RIP: 0033:0x7fd660f9acb9 [ 715.025021][T23883] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 715.025037][T23883] RSP: 002b:00007fd661e7c028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 715.025057][T23883] RAX: ffffffffffffffda RBX: 00007fd661215fa0 RCX: 00007fd660f9acb9 [ 715.025070][T23883] RDX: 0000000000000044 RSI: 0000200000000980 RDI: 0000000000000003 [ 715.025083][T23883] RBP: 00007fd661e7c090 R08: 0000000000000000 R09: 0000000000000000 [ 715.025094][T23883] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 715.025105][T23883] R13: 00007fd661216038 R14: 00007fd661215fa0 R15: 00007ffd7eea7ff8 [ 715.025168][T23883] [ 715.480355][T23897] netlink: 'syz.4.5577': attribute type 10 has an invalid length. [ 715.653464][T23897] macvlan1: entered allmulticast mode [ 715.753836][T23905] netlink: 'syz.7.5580': attribute type 26 has an invalid length. [ 715.829639][T23897] veth1_vlan: entered allmulticast mode [ 715.859312][T23897] team0: Port device macvlan1 added [ 716.098759][T23914] FAULT_INJECTION: forcing a failure. [ 716.098759][T23914] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 716.119415][T23914] CPU: 1 UID: 0 PID: 23914 Comm: syz.9.5584 Not tainted syzkaller #0 PREEMPT(full) [ 716.119453][T23914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 716.119464][T23914] Call Trace: [ 716.119475][T23914] [ 716.119486][T23914] dump_stack_lvl+0xe8/0x150 [ 716.119528][T23914] should_fail_ex+0x412/0x560 [ 716.119586][T23914] _copy_from_user+0x2d/0xb0 [ 716.119617][T23914] ___sys_sendmsg+0x1c6/0x360 [ 716.119637][T23914] ? __lock_acquire+0x6b5/0x2cf0 [ 716.119684][T23914] ? __pfx____sys_sendmsg+0x10/0x10 [ 716.119812][T23914] ? __fget_files+0x2a/0x420 [ 716.119906][T23914] ? __fget_files+0x2a/0x420 [ 716.119929][T23914] ? __fget_files+0x3a0/0x420 [ 716.120005][T23914] __x64_sys_sendmsg+0x1bd/0x2a0 [ 716.120044][T23914] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 716.120059][T23914] ? perf_trace_preemptirq_template+0xab/0x340 [ 716.120134][T23914] ? __pfx_ksys_write+0x10/0x10 [ 716.120221][T23914] do_syscall_64+0xe2/0xf80 [ 716.120248][T23914] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 716.120266][T23914] ? trace_irq_disable+0x37/0x100 [ 716.120286][T23914] ? clear_bhb_loop+0x60/0xb0 [ 716.120327][T23914] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 716.120347][T23914] RIP: 0033:0x7f894fd9acb9 [ 716.120370][T23914] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 716.120385][T23914] RSP: 002b:00007f8950d2f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 716.120405][T23914] RAX: ffffffffffffffda RBX: 00007f8950015fa0 RCX: 00007f894fd9acb9 [ 716.120419][T23914] RDX: 0000000004000004 RSI: 00002000000039c0 RDI: 0000000000000007 [ 716.120431][T23914] RBP: 00007f8950d2f090 R08: 0000000000000000 R09: 0000000000000000 [ 716.120441][T23914] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 716.120451][T23914] R13: 00007f8950016038 R14: 00007f8950015fa0 R15: 00007ffc848180b8 [ 716.120553][T23914] [ 716.367350][T23912] netlink: 332 bytes leftover after parsing attributes in process `syz.1.5583'. [ 716.377634][T23912] netlink: 24 bytes leftover after parsing attributes in process `syz.1.5583'. [ 716.430503][T23912] netlink: 'syz.1.5583': attribute type 1 has an invalid length. [ 716.553060][T23922] netlink: 44 bytes leftover after parsing attributes in process `syz.0.5587'. [ 716.562373][T23922] netlink: 'syz.0.5587': attribute type 3 has an invalid length. [ 717.015840][T23939] netlink: 160 bytes leftover after parsing attributes in process `syz.0.5593'. [ 717.546595][T23944] netlink: 'syz.7.5595': attribute type 10 has an invalid length. [ 717.603154][T23944] macvlan1: entered allmulticast mode [ 717.688761][T23944] veth1_vlan: entered allmulticast mode [ 717.715663][T23956] FAULT_INJECTION: forcing a failure. [ 717.715663][T23956] name failslab, interval 1, probability 0, space 0, times 0 [ 717.715709][T23956] CPU: 0 UID: 0 PID: 23956 Comm: syz.4.5599 Not tainted syzkaller #0 PREEMPT(full) [ 717.715730][T23956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 717.715741][T23956] Call Trace: [ 717.715752][T23956] [ 717.715763][T23956] dump_stack_lvl+0xe8/0x150 [ 717.715805][T23956] should_fail_ex+0x412/0x560 [ 717.715864][T23956] should_failslab+0xa8/0x100 [ 717.715902][T23956] kmem_cache_alloc_node_noprof+0x8b/0x6f0 [ 717.715934][T23956] ? __alloc_skb+0x193/0x390 [ 717.715960][T23956] ? __alloc_skb+0x1d7/0x390 [ 717.715981][T23956] ? __local_bh_enable_ip+0xd0/0x130 [ 717.716011][T23956] ? __alloc_skb+0x193/0x390 [ 717.716049][T23956] __alloc_skb+0x1d7/0x390 [ 717.716103][T23956] netlink_sendmsg+0x5d4/0xb40 [ 717.716178][T23956] ? __pfx_netlink_sendmsg+0x10/0x10 [ 717.716225][T23956] ? aa_sock_msg_perm+0xf1/0x1b0 [ 717.716266][T23956] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 717.716289][T23956] ? __pfx_netlink_sendmsg+0x10/0x10 [ 717.716321][T23956] __sock_sendmsg+0x21c/0x270 [ 717.716370][T23956] ____sys_sendmsg+0x4d7/0x810 [ 717.716402][T23956] ? __pfx_perf_trace_lock+0x10/0x10 [ 717.716462][T23956] ? __pfx_____sys_sendmsg+0x10/0x10 [ 717.716542][T23956] ? import_iovec+0x73/0xa0 [ 717.716590][T23956] ___sys_sendmsg+0x2a5/0x360 [ 717.716611][T23956] ? __lock_acquire+0x6b5/0x2cf0 [ 717.716660][T23956] ? __pfx____sys_sendmsg+0x10/0x10 [ 717.716799][T23956] ? __fget_files+0x2a/0x420 [ 717.716889][T23956] ? __fget_files+0x2a/0x420 [ 717.716912][T23956] ? __fget_files+0x3a0/0x420 [ 717.716994][T23956] __x64_sys_sendmsg+0x1bd/0x2a0 [ 717.717035][T23956] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 717.717110][T23956] ? __pfx_ksys_write+0x10/0x10 [ 717.717194][T23956] do_syscall_64+0xe2/0xf80 [ 717.717222][T23956] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 717.717239][T23956] ? trace_irq_disable+0x37/0x100 [ 717.717261][T23956] ? clear_bhb_loop+0x60/0xb0 [ 717.717301][T23956] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 717.717322][T23956] RIP: 0033:0x7fca2939acb9 [ 717.717344][T23956] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 717.717361][T23956] RSP: 002b:00007fca2a18a028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 717.717380][T23956] RAX: ffffffffffffffda RBX: 00007fca29615fa0 RCX: 00007fca2939acb9 [ 717.717394][T23956] RDX: 0000000004000004 RSI: 00002000000039c0 RDI: 0000000000000007 [ 717.717406][T23956] RBP: 00007fca2a18a090 R08: 0000000000000000 R09: 0000000000000000 [ 717.717417][T23956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 717.717428][T23956] R13: 00007fca29616038 R14: 00007fca29615fa0 R15: 00007ffeac3500b8 [ 717.717529][T23956] [ 718.157809][T23944] team0: Port device macvlan1 added [ 718.385243][T23968] netlink: 763 bytes leftover after parsing attributes in process `syz.4.5601'. [ 718.436761][T23980] netlink: 'syz.0.5605': attribute type 1 has an invalid length. [ 718.838027][T23990] netlink: 56 bytes leftover after parsing attributes in process `syz.1.5606'. [ 718.999367][T23991] netlink: 'syz.1.5606': attribute type 21 has an invalid length. [ 719.103355][T23991] netlink: 132 bytes leftover after parsing attributes in process `syz.1.5606'. [ 720.279747][T24034] netlink: 'syz.1.5623': attribute type 1 has an invalid length. [ 721.227318][T24060] netlink: 65047 bytes leftover after parsing attributes in process `syz.1.5631'. [ 721.561781][T24074] netlink: 72 bytes leftover after parsing attributes in process `syz.1.5636'. [ 721.574050][T24074] netlink: 72 bytes leftover after parsing attributes in process `syz.1.5636'. [ 723.022331][T24115] openvswitch: netlink: IP tunnel dst address not specified [ 723.054225][T24115] bridge0: port 1(bridge_slave_0) entered forwarding state [ 723.098844][T24112] netlink: 60 bytes leftover after parsing attributes in process `syz.0.5650'. [ 723.146624][T24112] netlink: 60 bytes leftover after parsing attributes in process `syz.0.5650'. [ 739.450358][T24124] delete_channel: no stack [ 740.238722][ T5832] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 740.248986][ T5832] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 740.257296][ T5832] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 740.297589][ T5832] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 740.305866][ T5832] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 740.463362][ T5832] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 740.492753][ T5832] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 740.500764][ T5832] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 740.509726][ T5832] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 740.518331][ T5832] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 740.644638][T20713] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 740.654508][T20713] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 740.662395][T20713] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 740.686674][T20713] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 740.696846][T20713] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 740.839494][ T5832] Bluetooth: hci8: unexpected cc 0x0c03 length: 249 > 1 [ 740.850746][ T5832] Bluetooth: hci8: unexpected cc 0x1003 length: 249 > 9 [ 740.860596][ T5832] Bluetooth: hci8: unexpected cc 0x1001 length: 249 > 9 [ 740.951197][ T5832] Bluetooth: hci8: unexpected cc 0x0c23 length: 249 > 4 [ 740.993586][ T5832] Bluetooth: hci8: unexpected cc 0x0c38 length: 249 > 2 [ 741.330390][ T5832] Bluetooth: hci9: unexpected cc 0x0c03 length: 249 > 1 [ 741.340265][ T5832] Bluetooth: hci9: unexpected cc 0x1003 length: 249 > 9 [ 741.348198][ T5832] Bluetooth: hci9: unexpected cc 0x1001 length: 249 > 9 [ 741.358783][ T5832] Bluetooth: hci9: unexpected cc 0x0c23 length: 249 > 4 [ 741.366826][ T5832] Bluetooth: hci9: unexpected cc 0x0c38 length: 249 > 2 [ 742.372862][ T5832] Bluetooth: hci2: command tx timeout [ 742.619423][T20713] Bluetooth: hci6: command tx timeout [ 742.765891][T20713] Bluetooth: hci7: command tx timeout [ 743.087853][T20713] Bluetooth: hci8: command tx timeout [ 743.234355][ C1] sched: DL replenish lagged too much [ 743.280730][T24141] chnl_net:caif_netlink_parms(): no params data found [ 743.408746][T20713] Bluetooth: hci9: command tx timeout [ 743.495652][T24147] chnl_net:caif_netlink_parms(): no params data found [ 743.837344][T24145] chnl_net:caif_netlink_parms(): no params data found [ 744.228059][T24151] chnl_net:caif_netlink_parms(): no params data found [ 744.245265][T24141] bridge0: port 1(bridge_slave_0) entered blocking state [ 744.252685][T24141] bridge0: port 1(bridge_slave_0) entered disabled state [ 744.259937][T24141] bridge_slave_0: entered allmulticast mode [ 744.267855][T24141] bridge_slave_0: entered promiscuous mode [ 744.348410][T24141] bridge0: port 2(bridge_slave_1) entered blocking state [ 744.356917][T24141] bridge0: port 2(bridge_slave_1) entered disabled state [ 744.364683][T24141] bridge_slave_1: entered allmulticast mode [ 744.371731][T24141] bridge_slave_1: entered promiscuous mode [ 744.430117][ T36] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 744.443483][T20713] Bluetooth: hci2: command tx timeout [ 744.450022][T24149] chnl_net:caif_netlink_parms(): no params data found [ 744.548830][T24141] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 744.607355][ T36] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 744.620436][T24147] bridge0: port 1(bridge_slave_0) entered blocking state [ 744.627693][T24147] bridge0: port 1(bridge_slave_0) entered disabled state [ 744.635145][T24147] bridge_slave_0: entered allmulticast mode [ 744.642070][T24147] bridge_slave_0: entered promiscuous mode [ 744.652047][T24147] bridge0: port 2(bridge_slave_1) entered blocking state [ 744.659781][T24147] bridge0: port 2(bridge_slave_1) entered disabled state [ 744.667666][T24147] bridge_slave_1: entered allmulticast mode [ 744.675159][T24147] bridge_slave_1: entered promiscuous mode [ 744.682850][T20713] Bluetooth: hci6: command tx timeout [ 744.694428][T24141] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 744.784787][ T36] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 744.830784][T24145] bridge0: port 1(bridge_slave_0) entered blocking state [ 744.838730][T24145] bridge0: port 1(bridge_slave_0) entered disabled state [ 744.846448][T20713] Bluetooth: hci7: command tx timeout [ 744.846732][T24145] bridge_slave_0: entered allmulticast mode [ 744.859322][T24145] bridge_slave_0: entered promiscuous mode [ 744.876667][T24147] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 744.887897][T24141] team0: Port device team_slave_0 added [ 744.905682][T24145] bridge0: port 2(bridge_slave_1) entered blocking state [ 744.912954][T24145] bridge0: port 2(bridge_slave_1) entered disabled state [ 744.920157][T24145] bridge_slave_1: entered allmulticast mode [ 744.927544][T24145] bridge_slave_1: entered promiscuous mode [ 744.945352][T24147] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 744.956120][T24141] team0: Port device team_slave_1 added [ 744.961854][T24151] bridge0: port 1(bridge_slave_0) entered blocking state [ 744.969631][T24151] bridge0: port 1(bridge_slave_0) entered disabled state [ 744.977064][T24151] bridge_slave_0: entered allmulticast mode [ 744.984690][T24151] bridge_slave_0: entered promiscuous mode [ 745.008074][ T36] bond0: (slave netdevsim0): Releasing backup interface [ 745.019246][ T36] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 745.073171][T24151] bridge0: port 2(bridge_slave_1) entered blocking state [ 745.080303][T24151] bridge0: port 2(bridge_slave_1) entered disabled state [ 745.087505][T24151] bridge_slave_1: entered allmulticast mode [ 745.096468][T24151] bridge_slave_1: entered promiscuous mode [ 745.115641][T24149] bridge0: port 1(bridge_slave_0) entered blocking state [ 745.123606][T24149] bridge0: port 1(bridge_slave_0) entered disabled state [ 745.130864][T24149] bridge_slave_0: entered allmulticast mode [ 745.138122][T24149] bridge_slave_0: entered promiscuous mode [ 745.163155][T20713] Bluetooth: hci8: command tx timeout [ 745.178517][T24145] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 745.187914][T24149] bridge0: port 2(bridge_slave_1) entered blocking state [ 745.195514][T24149] bridge0: port 2(bridge_slave_1) entered disabled state [ 745.204092][T24149] bridge_slave_1: entered allmulticast mode [ 745.210925][T24149] bridge_slave_1: entered promiscuous mode [ 745.219427][T24147] team0: Port device team_slave_0 added [ 745.230991][T24141] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 745.238495][T24141] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 745.265180][T24141] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 745.287203][T24145] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 745.309032][T24147] team0: Port device team_slave_1 added [ 745.324140][T24141] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 745.331088][T24141] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 745.360089][T24141] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 745.374335][T24151] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 745.433620][T24151] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 745.455466][T24149] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 745.480264][T24147] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 745.489479][T24147] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 745.497526][T20713] Bluetooth: hci9: command tx timeout [ 745.524341][T24147] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 745.548009][T24145] team0: Port device team_slave_0 added [ 745.555803][T24149] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 745.580566][T24147] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 745.589342][T24147] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 745.616220][T24147] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 745.639678][T24145] team0: Port device team_slave_1 added [ 745.676824][T24149] team0: Port device team_slave_0 added [ 745.695202][T24151] team0: Port device team_slave_0 added [ 745.734514][T24149] team0: Port device team_slave_1 added [ 745.751199][T24151] team0: Port device team_slave_1 added [ 745.757723][T24145] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 745.765102][T24145] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 745.791660][T24145] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 745.832119][T24141] hsr_slave_0: entered promiscuous mode [ 745.838710][T24141] hsr_slave_1: entered promiscuous mode [ 745.845340][T24141] debugfs: 'hsr0' already exists in 'hsr' [ 745.851056][T24141] Cannot create hsr debugfs directory [ 745.867523][T24145] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 745.874470][T24145] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 745.900939][T24145] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 745.964467][ T36] bridge_slave_1: left allmulticast mode [ 745.970132][ T36] bridge_slave_1: left promiscuous mode [ 745.976709][ T36] bridge0: port 2(bridge_slave_1) entered disabled state [ 745.985842][ T36] bridge_slave_0: left promiscuous mode [ 745.991486][ T36] bridge0: port 1(bridge_slave_0) entered disabled state [ 746.328722][ T36] team0: Port device bond0 removed [ 746.335598][ T36] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 746.346425][ T36] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 746.359162][ T36] bond0 (unregistering): Released all slaves [ 746.371442][T24147] hsr_slave_0: entered promiscuous mode [ 746.378524][T24147] hsr_slave_1: entered promiscuous mode [ 746.385250][T24147] debugfs: 'hsr0' already exists in 'hsr' [ 746.390967][T24147] Cannot create hsr debugfs directory [ 746.419847][T24149] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 746.427966][T24149] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 746.454694][T24149] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 746.468694][T24149] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 746.475922][T24149] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 746.505595][T24149] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 746.527029][T20713] Bluetooth: hci2: command tx timeout [ 746.534664][T24151] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 746.541612][T24151] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 746.567797][T24151] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 746.595686][ T36] : left promiscuous mode [ 746.634593][T24151] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 746.641531][T24151] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 746.667985][T24151] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 746.762809][T20713] Bluetooth: hci6: command tx timeout [ 746.811738][T24145] hsr_slave_0: entered promiscuous mode [ 746.819769][T24145] hsr_slave_1: entered promiscuous mode [ 746.826055][T24145] debugfs: 'hsr0' already exists in 'hsr' [ 746.831772][T24145] Cannot create hsr debugfs directory [ 746.873237][T24149] hsr_slave_0: entered promiscuous mode [ 746.879604][T24149] hsr_slave_1: entered promiscuous mode [ 746.885724][T24149] debugfs: 'hsr0' already exists in 'hsr' [ 746.891437][T24149] Cannot create hsr debugfs directory [ 746.922952][T20713] Bluetooth: hci7: command tx timeout [ 746.948066][T24151] hsr_slave_0: entered promiscuous mode [ 746.954784][T24151] hsr_slave_1: entered promiscuous mode [ 746.960804][T24151] debugfs: 'hsr0' already exists in 'hsr' [ 746.968679][T24151] Cannot create hsr debugfs directory [ 747.088702][ T1303] ieee802154 phy0 wpan0: encryption failed: -22 [ 747.095314][ T1303] ieee802154 phy1 wpan1: encryption failed: -22 [ 747.242869][T20713] Bluetooth: hci8: command tx timeout [ 747.420241][ T36] team0: Port device wlan1 removed [ 747.569723][T20713] Bluetooth: hci9: command tx timeout [ 747.748665][ T36] hsr_slave_0: left promiscuous mode [ 747.762268][ T36] hsr_slave_1: left promiscuous mode [ 747.789834][ T36] veth1_macvtap: left promiscuous mode [ 747.796236][ T36] veth0_macvtap: left promiscuous mode [ 747.801745][ T36] veth1_vlan: left promiscuous mode [ 747.807479][ T36] veth0_vlan: left promiscuous mode [ 747.948479][ T36] team0 (unregistering): Port device macvlan1 removed [ 748.178357][ T36] team0 (unregistering): Port device team_slave_1 removed [ 748.212677][ T36] team0 (unregistering): Port device team_slave_0 removed [ 748.602536][T20713] Bluetooth: hci2: command tx timeout [ 748.843604][T20713] Bluetooth: hci6: command tx timeout [ 748.941286][ T36] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 749.004422][T20713] Bluetooth: hci7: command tx timeout [ 749.039848][ T36] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 749.154613][ T36] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 749.226214][ T36] bond0: (slave netdevsim0): Releasing backup interface [ 749.239353][ T36] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 749.322824][T20713] Bluetooth: hci8: command tx timeout [ 749.432271][ T36] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 749.511378][ T36] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 749.563916][ T36] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 749.639963][ T36] bond0: (slave netdevsim0): Releasing backup interface [ 749.643041][T20713] Bluetooth: hci9: command tx timeout [ 749.657243][ T36] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 749.870081][ T36] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 749.951002][ T36] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 750.029327][ T36] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 750.093754][ T36] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 750.248549][ T36] bridge_slave_1: left allmulticast mode [ 750.255109][ T36] bridge_slave_1: left promiscuous mode [ 750.260865][ T36] bridge0: port 2(bridge_slave_1) entered disabled state [ 750.271088][ T36] bridge_slave_0: left allmulticast mode [ 750.277161][ T36] bridge_slave_0: left promiscuous mode [ 750.283861][ T36] bridge0: port 1(bridge_slave_0) entered disabled state [ 750.297330][ T36] bridge_slave_1: left allmulticast mode [ 750.303833][ T36] bridge_slave_1: left promiscuous mode [ 750.309547][ T36] bridge0: port 2(bridge_slave_1) entered disabled state [ 750.320688][ T36] bridge_slave_0: left allmulticast mode [ 750.328000][ T36] bridge_slave_0: left promiscuous mode [ 750.334034][ T36] bridge0: port 1(bridge_slave_0) entered disabled state [ 750.346504][ T36] bridge_slave_1: left allmulticast mode [ 750.352132][ T36] bridge_slave_1: left promiscuous mode [ 750.362843][ T36] bridge0: port 2(bridge_slave_1) entered disabled state [ 750.375055][ T36] bridge_slave_0: left allmulticast mode [ 750.382885][ T36] bridge_slave_0: left promiscuous mode [ 750.388590][ T36] bridge0: port 1(bridge_slave_0) entered disabled state [ 750.705721][ T36] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 750.716226][ T36] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 750.726041][ T36] bond0 (unregistering): Released all slaves [ 750.906126][ T36] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 750.916393][ T36] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 750.927198][ T36] bond0 (unregistering): Released all slaves [ 751.138473][ T36] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 751.148220][ T36] bond0 (unregistering): Released all slaves [ 751.239395][ T36] : left promiscuous mode [ 751.294996][ T36] : left promiscuous mode [ 752.006257][ T36] hsr_slave_0: left promiscuous mode [ 752.018563][ T36] hsr_slave_1: left promiscuous mode [ 752.030513][ T36] hsr_slave_0: left promiscuous mode [ 752.036602][ T36] hsr_slave_1: left promiscuous mode [ 752.042662][ T36] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 752.052169][ T36] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 752.060613][ T36] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 752.082651][ T36] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 752.097010][ T36] hsr_slave_0: left promiscuous mode [ 752.111431][ T36] hsr_slave_1: left promiscuous mode [ 752.120178][ T36] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 752.128345][ T36] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 752.136275][ T36] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 752.146081][ T36] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 752.198923][ T36] veth1_macvtap: left promiscuous mode [ 752.214064][ T36] veth0_macvtap: left promiscuous mode [ 752.224951][ T36] veth1_vlan: left allmulticast mode [ 752.230328][ T36] veth1_vlan: left promiscuous mode [ 752.252647][ T36] veth0_vlan: left promiscuous mode [ 752.264592][ T36] veth1_macvtap: left promiscuous mode [ 752.270136][ T36] veth0_macvtap: left promiscuous mode [ 752.288090][ T36] veth1_vlan: left promiscuous mode [ 752.302659][ T36] veth0_vlan: left promiscuous mode [ 752.314152][ T36] veth1_macvtap: left promiscuous mode [ 752.319690][ T36] veth0_macvtap: left promiscuous mode [ 752.342752][ T36] veth1_vlan: left promiscuous mode [ 752.348085][ T36] veth0_vlan: left promiscuous mode [ 752.837728][ T36] team0 (unregistering): Port device macvlan1 removed [ 753.030397][ T36] team0 (unregistering): Port device team_slave_1 removed [ 753.063114][ T36] team0 (unregistering): Port device team_slave_0 removed [ 753.398586][ T36] team0 (unregistering): Port device macvlan1 removed [ 753.618832][ T36] team0 (unregistering): Port device team_slave_1 removed [ 753.652309][ T36] team0 (unregistering): Port device team_slave_0 removed [ 754.200261][ T36] team0 (unregistering): Port device team_slave_1 removed [ 754.231394][ T36] team0 (unregistering): Port device team_slave_0 removed [ 754.616828][T24147] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 754.642867][T24147] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 754.666891][T24147] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 754.680817][T24147] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 754.773739][T24141] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 754.797611][T24141] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 754.837928][T24141] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 754.859136][T24141] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 754.942886][T24145] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 754.968729][T24145] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 754.986331][T24145] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 755.015384][T24147] 8021q: adding VLAN 0 to HW filter on device bond0 [ 755.035156][T24145] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 755.118929][T24151] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 755.141510][T24151] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 755.166533][T24151] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 755.180567][T24147] 8021q: adding VLAN 0 to HW filter on device team0 [ 755.222395][T24151] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 755.275659][ T61] bridge0: port 1(bridge_slave_0) entered blocking state [ 755.282833][ T61] bridge0: port 1(bridge_slave_0) entered forwarding state [ 755.316207][ T61] bridge0: port 2(bridge_slave_1) entered blocking state [ 755.323359][ T61] bridge0: port 2(bridge_slave_1) entered forwarding state [ 755.371255][T24149] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 755.382352][T24149] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 755.405097][T24149] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 755.419058][T24149] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 755.521774][T24141] 8021q: adding VLAN 0 to HW filter on device bond0 [ 755.532283][T24145] 8021q: adding VLAN 0 to HW filter on device bond0 [ 755.590424][T24145] 8021q: adding VLAN 0 to HW filter on device team0 [ 755.618173][T24141] 8021q: adding VLAN 0 to HW filter on device team0 [ 755.632343][T14985] bridge0: port 1(bridge_slave_0) entered blocking state [ 755.639518][T14985] bridge0: port 1(bridge_slave_0) entered forwarding state [ 755.669775][T14985] bridge0: port 1(bridge_slave_0) entered blocking state [ 755.676932][T14985] bridge0: port 1(bridge_slave_0) entered forwarding state [ 755.706415][T14976] bridge0: port 2(bridge_slave_1) entered blocking state [ 755.713572][T14976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 755.752239][ T61] bridge0: port 2(bridge_slave_1) entered blocking state [ 755.759378][ T61] bridge0: port 2(bridge_slave_1) entered forwarding state [ 755.824431][T24151] 8021q: adding VLAN 0 to HW filter on device bond0 [ 755.896001][T24151] 8021q: adding VLAN 0 to HW filter on device team0 [ 755.934105][T14976] bridge0: port 1(bridge_slave_0) entered blocking state [ 755.941252][T14976] bridge0: port 1(bridge_slave_0) entered forwarding state [ 755.956378][T24147] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 755.988409][T14976] bridge0: port 2(bridge_slave_1) entered blocking state [ 755.995572][T14976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 756.026748][T24149] 8021q: adding VLAN 0 to HW filter on device bond0 [ 756.099401][T24149] 8021q: adding VLAN 0 to HW filter on device team0 [ 756.145056][T14976] bridge0: port 1(bridge_slave_0) entered blocking state [ 756.152174][T14976] bridge0: port 1(bridge_slave_0) entered forwarding state [ 756.216062][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 756.223236][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 756.433453][T24145] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 756.476052][T24141] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 756.624708][T24145] veth0_vlan: entered promiscuous mode [ 756.675524][T24145] veth1_vlan: entered promiscuous mode [ 756.693968][T24147] veth0_vlan: entered promiscuous mode [ 756.739884][T24147] veth1_vlan: entered promiscuous mode [ 756.819940][T24151] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 756.880812][T24145] veth0_macvtap: entered promiscuous mode [ 756.902158][T24147] veth0_macvtap: entered promiscuous mode [ 756.912239][T24145] veth1_macvtap: entered promiscuous mode [ 756.948808][T24149] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 756.958788][T24147] veth1_macvtap: entered promiscuous mode [ 757.015410][T24147] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 757.027431][T24145] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 757.056182][T24147] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 757.068887][T24145] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 757.117739][T14976] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 757.148345][T24141] veth0_vlan: entered promiscuous mode [ 757.154863][T14976] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 757.186214][T14976] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 757.206480][T14976] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 757.230054][T14976] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 757.265120][T14976] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 757.284821][T24149] veth0_vlan: entered promiscuous mode [ 757.295596][T24141] veth1_vlan: entered promiscuous mode [ 757.301978][T14976] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 757.311991][T14976] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 757.365756][T24149] veth1_vlan: entered promiscuous mode [ 757.381502][ T13] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 757.402372][ T13] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 757.433083][T14976] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 757.440908][T14976] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 757.458533][T24141] veth0_macvtap: entered promiscuous mode [ 757.511948][ T61] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 757.517782][T24141] veth1_macvtap: entered promiscuous mode [ 757.523038][ T61] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 757.545595][T24151] veth0_vlan: entered promiscuous mode [ 757.558785][ T13] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 757.567507][T24141] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 757.571332][T24141] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 757.594509][ T13] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 757.609678][T14985] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 757.633502][T14985] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 757.654777][T24149] veth0_macvtap: entered promiscuous mode [ 757.667430][T14985] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 757.680340][T24151] veth1_vlan: entered promiscuous mode [ 757.703705][T14985] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 757.747942][T24149] veth1_macvtap: entered promiscuous mode [ 757.864705][T24151] veth0_macvtap: entered promiscuous mode [ 757.892107][T24151] veth1_macvtap: entered promiscuous mode [ 757.942792][T24149] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 757.952558][T14969] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 757.985385][T14969] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 758.017222][T24149] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 758.036735][T24367] netlink: 763 bytes leftover after parsing attributes in process `syz.5.5662'. [ 758.063674][T24151] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 758.093656][ T36] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 758.144941][T24369] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5663'. [ 758.156534][T24369] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5663'. [ 758.176970][ T36] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 758.212151][ T36] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 758.226183][T14969] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 758.238812][T14969] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 758.256520][T24151] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 758.276688][ T36] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 758.335212][T14969] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 758.352574][ T36] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 758.368468][ T36] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 758.491460][T14980] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 758.700693][T14976] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 758.737324][T14976] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 758.769394][T24383] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 758.778138][T24383] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 758.796791][T24383] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 758.813114][T24383] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 758.962845][T14985] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 758.978432][T14985] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 759.018753][T24386] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 759.186120][T14968] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 759.207079][T14968] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 759.243556][T14968] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 759.259386][T14968] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 759.683218][T24400] netlink: 4 bytes leftover after parsing attributes in process `syz.8.5661'. [ 760.268188][T24419] netlink: 'syz.3.5672': attribute type 7 has an invalid length. [ 760.313723][T24419] netlink: 'syz.3.5672': attribute type 8 has an invalid length. [ 801.702938][ T5832] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 801.753018][ T5832] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 801.774840][ T5832] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 801.785325][ T5832] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 801.806157][ T5832] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 802.273953][ T5832] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 802.297541][ T5832] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 802.320355][ T5832] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 802.353445][ T5832] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 802.367778][ T5832] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 802.964019][ T5832] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 803.013468][ T5832] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 803.034846][ T5832] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 803.045314][ T5832] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 803.084361][ T5832] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 803.647910][ T5832] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 803.675190][ T5832] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 803.694451][ T5832] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 803.704517][ T5832] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 803.714040][ T5832] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 803.892672][ T5832] Bluetooth: hci0: command tx timeout [ 804.164196][T20713] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 804.216128][T20713] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 804.225972][T20713] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 804.236978][T20713] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 804.246927][T20713] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 804.455948][ T5832] Bluetooth: hci1: command tx timeout [ 805.177578][ T5832] Bluetooth: hci3: command tx timeout [ 805.802616][ T5832] Bluetooth: hci4: command tx timeout [ 805.971971][ T5832] Bluetooth: hci0: command tx timeout [ 806.373071][ T5832] Bluetooth: hci5: command tx timeout [ 806.522689][ T5832] Bluetooth: hci1: command tx timeout [ 807.261230][ T5832] Bluetooth: hci3: command tx timeout [ 807.903442][ T5832] Bluetooth: hci4: command tx timeout [ 808.053014][ T5832] Bluetooth: hci0: command tx timeout [ 808.443066][ T5832] Bluetooth: hci5: command tx timeout [ 808.602830][ T5832] Bluetooth: hci1: command tx timeout [ 809.324517][ T5832] Bluetooth: hci3: command tx timeout [ 809.886806][ T1303] ieee802154 phy0 wpan0: encryption failed: -22 [ 809.902941][ T1303] ieee802154 phy1 wpan1: encryption failed: -22 [ 809.962983][ T5832] Bluetooth: hci4: command tx timeout [ 810.127651][ T5832] Bluetooth: hci0: command tx timeout [ 810.523485][ T5832] Bluetooth: hci5: command tx timeout [ 810.662135][T24442] chnl_net:caif_netlink_parms(): no params data found [ 810.683729][ T5832] Bluetooth: hci1: command tx timeout [ 811.403896][ T5832] Bluetooth: hci3: command tx timeout [ 812.052676][ T5832] Bluetooth: hci4: command tx timeout [ 812.603179][ T5832] Bluetooth: hci5: command tx timeout [ 813.539226][T24445] chnl_net:caif_netlink_parms(): no params data found [ 814.857732][T24451] chnl_net:caif_netlink_parms(): no params data found [ 815.304426][T24442] bridge0: port 1(bridge_slave_0) entered blocking state [ 815.349743][T24442] bridge0: port 1(bridge_slave_0) entered disabled state [ 815.412882][T24442] bridge_slave_0: entered allmulticast mode [ 815.522674][T24442] bridge_slave_0: entered promiscuous mode [ 816.614244][T24442] bridge0: port 2(bridge_slave_1) entered blocking state [ 816.637509][T24442] bridge0: port 2(bridge_slave_1) entered disabled state [ 816.693143][T24442] bridge_slave_1: entered allmulticast mode [ 816.785464][T24442] bridge_slave_1: entered promiscuous mode [ 816.873748][T24453] chnl_net:caif_netlink_parms(): no params data found [ 820.641120][T24453] bridge0: port 1(bridge_slave_0) entered blocking state [ 820.712773][T24453] bridge0: port 1(bridge_slave_0) entered disabled state [ 820.720259][T24453] bridge_slave_0: entered allmulticast mode [ 820.766793][T24453] bridge_slave_0: entered promiscuous mode [ 820.830336][T24453] bridge0: port 2(bridge_slave_1) entered blocking state [ 820.883006][T24453] bridge0: port 2(bridge_slave_1) entered disabled state [ 820.890472][T24453] bridge_slave_1: entered allmulticast mode [ 820.963109][T24453] bridge_slave_1: entered promiscuous mode [ 821.463591][T24453] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 821.564894][T24453] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 822.015842][T24453] team0: Port device team_slave_0 added [ 822.070658][T24453] team0: Port device team_slave_1 added [ 822.492660][T24453] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 822.499664][T24453] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 822.642629][T24453] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 822.732807][T24453] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 822.739800][T24453] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 822.872611][T24453] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 823.517547][T24453] hsr_slave_0: entered promiscuous mode [ 823.561996][T24453] hsr_slave_1: entered promiscuous mode [ 823.612960][T24453] debugfs: 'hsr0' already exists in 'hsr' [ 823.618745][T24453] Cannot create hsr debugfs directory [ 827.988020][T24442] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 828.004030][T24455] chnl_net:caif_netlink_parms(): no params data found [ 828.229010][T24442] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 828.524660][ T9187] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 828.543447][T24445] bridge0: port 1(bridge_slave_0) entered blocking state [ 828.551507][T24445] bridge0: port 1(bridge_slave_0) entered disabled state [ 828.560895][T24445] bridge_slave_0: entered allmulticast mode [ 828.567911][T24445] bridge_slave_0: entered promiscuous mode [ 828.578646][T24445] bridge0: port 2(bridge_slave_1) entered blocking state [ 828.587574][T24445] bridge0: port 2(bridge_slave_1) entered disabled state [ 828.594808][T24445] bridge_slave_1: entered allmulticast mode [ 828.601621][T24445] bridge_slave_1: entered promiscuous mode [ 828.676180][T24451] bridge0: port 1(bridge_slave_0) entered blocking state [ 828.683625][T24451] bridge0: port 1(bridge_slave_0) entered disabled state [ 828.691567][T24451] bridge_slave_0: entered allmulticast mode [ 828.699369][T24451] bridge_slave_0: entered promiscuous mode [ 828.708111][T24442] team0: Port device team_slave_0 added [ 828.735433][ T9187] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 828.768581][T24445] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 828.783219][T24451] bridge0: port 2(bridge_slave_1) entered blocking state [ 828.790414][T24451] bridge0: port 2(bridge_slave_1) entered disabled state [ 828.806709][T24451] bridge_slave_1: entered allmulticast mode [ 828.815156][T24451] bridge_slave_1: entered promiscuous mode [ 828.825336][T24442] team0: Port device team_slave_1 added [ 828.868388][T24445] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 828.982327][ T9187] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 829.088674][T24451] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 829.109473][T24451] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 829.137818][T24445] team0: Port device team_slave_0 added [ 829.146066][T24442] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 829.153854][T24442] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 829.188876][T24442] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 829.232778][ T9187] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 829.266751][T24455] bridge0: port 1(bridge_slave_0) entered blocking state [ 829.278527][T24455] bridge0: port 1(bridge_slave_0) entered disabled state [ 829.290784][T24455] bridge_slave_0: entered allmulticast mode [ 829.299172][T24455] bridge_slave_0: entered promiscuous mode [ 829.311271][T24445] team0: Port device team_slave_1 added [ 829.318100][T24442] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 829.330740][T24442] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 829.358585][T24442] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 829.390007][T24455] bridge0: port 2(bridge_slave_1) entered blocking state [ 829.401346][T24455] bridge0: port 2(bridge_slave_1) entered disabled state [ 829.409570][T24455] bridge_slave_1: entered allmulticast mode [ 829.419340][T24455] bridge_slave_1: entered promiscuous mode [ 829.481393][T24451] team0: Port device team_slave_0 added [ 829.554545][T24451] team0: Port device team_slave_1 added [ 829.576768][T24445] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 829.584648][T24445] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 829.611304][T24445] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 829.629126][T24442] hsr_slave_0: entered promiscuous mode [ 829.637026][T24442] hsr_slave_1: entered promiscuous mode [ 829.645114][T24442] debugfs: 'hsr0' already exists in 'hsr' [ 829.650850][T24442] Cannot create hsr debugfs directory [ 829.675273][T24455] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 829.693184][T24445] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 829.700208][T24445] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 829.728014][T24445] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 829.776091][T24455] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 829.799761][T24451] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 829.810038][T24451] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 829.836346][T24451] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 829.898628][T24453] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 829.911184][T24451] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 829.918927][T24451] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 829.945233][T24451] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 829.981862][T24453] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 830.054505][T24455] team0: Port device team_slave_0 added [ 830.063288][T24453] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 830.106743][T24455] team0: Port device team_slave_1 added [ 830.129359][T24453] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 830.158769][T24445] hsr_slave_0: entered promiscuous mode [ 830.168221][T24445] hsr_slave_1: entered promiscuous mode [ 830.175213][T24445] debugfs: 'hsr0' already exists in 'hsr' [ 830.180958][T24445] Cannot create hsr debugfs directory [ 830.247020][ T9187] bridge_slave_1: left allmulticast mode [ 830.252858][ T9187] bridge_slave_1: left promiscuous mode [ 830.258525][ T9187] bridge0: port 2(bridge_slave_1) entered disabled state [ 830.267597][ T9187] bridge_slave_0: left allmulticast mode [ 830.273438][ T9187] bridge_slave_0: left promiscuous mode [ 830.280241][ T9187] bridge0: port 1(bridge_slave_0) entered disabled state [ 830.526620][ T9187] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 830.537681][ T9187] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 830.547680][ T9187] bond0 (unregistering): Released all slaves [ 830.576308][T24455] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 830.583297][T24455] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 830.611916][T24455] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 830.639687][T24451] hsr_slave_0: entered promiscuous mode [ 830.658250][T24451] hsr_slave_1: entered promiscuous mode [ 830.665322][T24451] debugfs: 'hsr0' already exists in 'hsr' [ 830.671049][T24451] Cannot create hsr debugfs directory [ 830.696027][T24455] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 830.704567][T24455] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 830.731920][T24455] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 831.080914][T24455] hsr_slave_0: entered promiscuous mode [ 831.088267][T24455] hsr_slave_1: entered promiscuous mode [ 831.095645][T24455] debugfs: 'hsr0' already exists in 'hsr' [ 831.101603][T24455] Cannot create hsr debugfs directory [ 831.181158][ T9187] hsr_slave_0: left promiscuous mode [ 831.187515][ T9187] hsr_slave_1: left promiscuous mode [ 831.194025][ T9187] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 831.201418][ T9187] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 831.219011][ T9187] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 831.226586][ T9187] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 831.253733][ T9187] veth1_macvtap: left promiscuous mode [ 831.259284][ T9187] veth0_macvtap: left promiscuous mode [ 831.266493][ T9187] veth1_vlan: left promiscuous mode [ 831.271793][ T9187] veth0_vlan: left promiscuous mode [ 831.849820][ T9187] team0 (unregistering): Port device team_slave_1 removed [ 831.898925][ T9187] team0 (unregistering): Port device team_slave_0 removed [ 832.779344][T24453] 8021q: adding VLAN 0 to HW filter on device bond0 [ 832.836466][T24453] 8021q: adding VLAN 0 to HW filter on device team0 [ 832.854750][T14975] bridge0: port 1(bridge_slave_0) entered blocking state [ 832.861873][T14975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 832.881006][T14975] bridge0: port 2(bridge_slave_1) entered blocking state [ 832.888191][T14975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 833.023418][T14975] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 833.100523][T14975] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 833.239028][T14975] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 833.397787][T14975] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 833.455300][T24453] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 833.617196][T24453] veth0_vlan: entered promiscuous mode [ 833.660518][T24453] veth1_vlan: entered promiscuous mode [ 833.718309][T14975] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 833.779244][T24455] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 833.821521][T14975] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 833.857446][T24455] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 833.891050][T24453] veth0_macvtap: entered promiscuous mode [ 833.945946][T14975] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 833.980813][T24455] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 834.022097][T14975] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 834.047137][T24453] veth1_macvtap: entered promiscuous mode [ 834.068904][T24455] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 834.115908][T24453] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 834.147697][T24453] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 834.215763][T14964] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 834.267718][T14964] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 834.290064][T14964] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 834.300690][T14964] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 834.456618][T14975] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 834.546325][T14975] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 834.582607][T24455] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 834.607328][T14968] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 834.629626][T14968] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 834.649446][T14975] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 834.689393][T24455] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 834.725042][T24455] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 834.738415][T24455] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 834.786784][T14975] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 834.828709][ T3527] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 834.845239][T24442] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 834.860352][ T3527] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 834.863734][T24442] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 834.890514][T24442] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 834.949869][T24442] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 835.196219][T24445] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 835.267977][T24445] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 835.301536][T14975] bridge_slave_1: left allmulticast mode [ 835.309195][T14975] bridge_slave_1: left promiscuous mode [ 835.315469][T14975] bridge0: port 2(bridge_slave_1) entered disabled state [ 835.340525][T14975] bridge_slave_0: left allmulticast mode [ 835.353674][T14975] bridge_slave_0: left promiscuous mode [ 835.359430][T14975] bridge0: port 1(bridge_slave_0) entered disabled state [ 835.385880][T14975] bridge_slave_1: left allmulticast mode [ 835.391603][T14975] bridge_slave_1: left promiscuous mode [ 835.400047][T14975] bridge0: port 2(bridge_slave_1) entered disabled state [ 835.433870][T14975] bridge_slave_0: left allmulticast mode [ 835.442587][T14975] bridge_slave_0: left promiscuous mode [ 835.448239][T14975] bridge0: port 1(bridge_slave_0) entered disabled state [ 835.459547][T14975] bridge_slave_1: left allmulticast mode [ 835.466416][T14975] bridge_slave_1: left promiscuous mode [ 835.472145][T14975] bridge0: port 2(bridge_slave_1) entered disabled state [ 835.487323][T14975] bridge_slave_0: left allmulticast mode [ 835.502460][T14975] bridge_slave_0: left promiscuous mode [ 835.508152][T14975] bridge0: port 1(bridge_slave_0) entered disabled state [ 835.981396][T14975] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 835.998372][T14975] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 836.009176][T14975] bond0 (unregistering): Released all slaves [ 836.239324][T14975] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 836.249715][T14975] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 836.259856][T14975] bond0 (unregistering): Released all slaves [ 836.459747][T14975] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 836.470328][T14975] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 836.480534][T14975] bond0 (unregistering): Released all slaves [ 836.491189][T24445] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 836.510714][T24722] : entered promiscuous mode [ 836.544294][T24445] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 836.652777][T24745] netlink: 'syz.0.5683': attribute type 10 has an invalid length. [ 836.855424][T24758] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5684'. [ 836.872728][T24758] netlink: 12 bytes leftover after parsing attributes in process `syz.0.5684'. [ 837.425834][T24451] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 837.478929][T24451] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 837.550807][T24451] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 837.618508][T24451] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 837.671822][T24455] 8021q: adding VLAN 0 to HW filter on device bond0 [ 837.894062][T24455] 8021q: adding VLAN 0 to HW filter on device team0 [ 837.960560][T24442] 8021q: adding VLAN 0 to HW filter on device bond0 [ 837.978236][ T9184] bridge0: port 1(bridge_slave_0) entered blocking state [ 837.985331][ T9184] bridge0: port 1(bridge_slave_0) entered forwarding state [ 837.998447][ T9184] bridge0: port 2(bridge_slave_1) entered blocking state [ 838.005618][ T9184] bridge0: port 2(bridge_slave_1) entered forwarding state [ 838.159835][T14975] hsr_slave_0: left promiscuous mode [ 838.166366][T14975] hsr_slave_1: left promiscuous mode [ 838.178593][T14975] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 838.199673][T14975] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 838.214485][T14975] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 838.233272][T14975] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 838.257401][T14975] hsr_slave_0: left promiscuous mode [ 838.270358][T14975] hsr_slave_1: left promiscuous mode [ 838.281221][T14975] hsr_slave_0: left promiscuous mode [ 838.289426][T14975] hsr_slave_1: left promiscuous mode [ 838.304187][T14975] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 838.311578][T14975] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 838.331665][T14975] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 838.340861][T14975] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 838.428391][T14975] veth1_macvtap: left promiscuous mode [ 838.434123][T14975] veth0_macvtap: left promiscuous mode [ 838.440905][T14975] veth1_vlan: left promiscuous mode [ 838.450442][T14975] veth0_vlan: left promiscuous mode [ 838.481282][T14975] veth1_macvtap: left promiscuous mode [ 838.492812][T14975] veth0_macvtap: left promiscuous mode [ 838.498501][T14975] veth1_vlan: left promiscuous mode [ 838.512886][T14975] veth0_vlan: left promiscuous mode [ 838.520717][T14975] veth1_macvtap: left promiscuous mode [ 838.535135][T14975] veth0_macvtap: left promiscuous mode [ 838.540812][T14975] veth1_vlan: left promiscuous mode [ 838.546573][T14975] veth0_vlan: left promiscuous mode [ 841.711292][T24817] netlink: 204 bytes leftover after parsing attributes in process `syz.0.5691'. [ 841.731961][T24817] netlink: 60 bytes leftover after parsing attributes in process `syz.0.5691'. [ 841.903401][T14975] team0 (unregistering): Port device team_slave_1 removed [ 841.947158][T14975] team0 (unregistering): Port device team_slave_0 removed [ 842.595185][T14975] team0 (unregistering): Port device team_slave_1 removed [ 842.629775][T14975] team0 (unregistering): Port device team_slave_0 removed [ 843.210076][T14975] team0 (unregistering): Port device team_slave_1 removed [ 843.241534][T14975] team0 (unregistering): Port device team_slave_0 removed [ 843.540617][T24442] 8021q: adding VLAN 0 to HW filter on device team0 [ 843.571369][T24445] 8021q: adding VLAN 0 to HW filter on device bond0 [ 843.591358][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 843.598505][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 843.639373][T14973] bridge0: port 2(bridge_slave_1) entered blocking state [ 843.646557][T14973] bridge0: port 2(bridge_slave_1) entered forwarding state [ 843.679586][T24445] 8021q: adding VLAN 0 to HW filter on device team0 [ 843.722352][T14973] bridge0: port 1(bridge_slave_0) entered blocking state [ 843.729548][T14973] bridge0: port 1(bridge_slave_0) entered forwarding state [ 843.769505][T24827] netlink: 'syz.0.5695': attribute type 2 has an invalid length. [ 843.789099][T24827] netlink: 51 bytes leftover after parsing attributes in process `syz.0.5695'. [ 843.803129][T24451] 8021q: adding VLAN 0 to HW filter on device bond0 [ 843.861080][ T9184] bridge0: port 2(bridge_slave_1) entered blocking state [ 843.868268][ T9184] bridge0: port 2(bridge_slave_1) entered forwarding state [ 843.948059][T24451] 8021q: adding VLAN 0 to HW filter on device team0 [ 843.963492][T24835] netlink: 'syz.0.5696': attribute type 6 has an invalid length. [ 844.073882][T14961] bridge0: port 1(bridge_slave_0) entered blocking state [ 844.081076][T14961] bridge0: port 1(bridge_slave_0) entered forwarding state [ 844.120018][T14961] bridge0: port 2(bridge_slave_1) entered blocking state [ 844.127200][T14961] bridge0: port 2(bridge_slave_1) entered forwarding state [ 844.537843][T24455] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 844.754244][T24862] netlink: 12 bytes leftover after parsing attributes in process `syz.0.5697'. [ 844.808391][T24442] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 845.060858][T24445] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 845.117379][T24451] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 845.331899][T14975] bridge_slave_1: left allmulticast mode [ 845.361078][T14975] bridge_slave_1: left promiscuous mode [ 845.373442][T14975] bridge0: port 2(bridge_slave_1) entered disabled state [ 845.414406][T14975] bridge_slave_0: left allmulticast mode [ 845.426394][T14975] bridge_slave_0: left promiscuous mode [ 845.432166][T14975] bridge0: port 1(bridge_slave_0) entered disabled state [ 845.845923][T24905] netlink: 16 bytes leftover after parsing attributes in process `syz.0.5702'. [ 845.858520][T24905] netlink: 'syz.0.5702': attribute type 4 has an invalid length. [ 845.866344][T24905] netlink: 12 bytes leftover after parsing attributes in process `syz.0.5702'. [ 845.892085][T24905] netlink: 212760 bytes leftover after parsing attributes in process `syz.0.5702'. [ 845.919312][T14975] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 845.929562][T14975] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 845.939308][T14975] bond0 (unregistering): Released all slaves [ 846.005372][T24451] veth0_vlan: entered promiscuous mode [ 846.053850][T14975] : left promiscuous mode [ 846.128054][T24451] veth1_vlan: entered promiscuous mode [ 846.316615][T24455] veth0_vlan: entered promiscuous mode [ 846.349291][T24442] veth0_vlan: entered promiscuous mode [ 846.482639][T24455] veth1_vlan: entered promiscuous mode [ 846.494306][T24442] veth1_vlan: entered promiscuous mode [ 846.563504][T24451] veth0_macvtap: entered promiscuous mode [ 846.645861][T24451] veth1_macvtap: entered promiscuous mode [ 846.672010][T14975] hsr_slave_0: left promiscuous mode [ 846.697478][T14975] hsr_slave_1: left promiscuous mode [ 846.716605][T14975] veth1_macvtap: left promiscuous mode [ 846.722161][T14975] veth0_macvtap: left promiscuous mode [ 846.728106][T14975] veth1_vlan: left allmulticast mode [ 846.735756][T14975] veth1_vlan: left promiscuous mode [ 846.741376][T14975] veth0_vlan: left promiscuous mode [ 846.963510][T14975] team0 (unregistering): Port device macvlan1 removed [ 847.247621][T14975] team0 (unregistering): Port device team_slave_1 removed [ 847.281193][T14975] team0 (unregistering): Port device team_slave_0 removed [ 847.736498][T24451] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 847.753771][T24451] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 847.761880][T24455] veth0_macvtap: entered promiscuous mode [ 847.776819][T24442] veth0_macvtap: entered promiscuous mode [ 847.789446][T24445] veth0_vlan: entered promiscuous mode [ 847.810531][T24442] veth1_macvtap: entered promiscuous mode [ 847.846544][T24455] veth1_macvtap: entered promiscuous mode [ 847.856758][T14961] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 847.877547][T14961] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 847.894361][T14961] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 847.923727][T14961] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 847.964704][T24445] veth1_vlan: entered promiscuous mode [ 847.996908][T24442] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 848.040479][T24442] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 848.115109][T24455] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 848.135979][T24954] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5707'. [ 848.154202][T24954] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5707'. [ 848.194684][T24455] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 848.241836][T14961] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 848.257323][T14961] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 848.271253][T14961] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 848.310632][T14961] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 848.325656][T14961] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 848.368349][T14961] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 848.401451][T14961] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 848.411504][T14961] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 848.453789][T14961] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 848.461628][T14961] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 848.480807][T24445] veth0_macvtap: entered promiscuous mode [ 848.521148][T24445] veth1_macvtap: entered promiscuous mode [ 848.638672][T14961] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 848.660334][T24445] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 848.670072][T14961] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 848.725582][T24445] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 848.764245][T14975] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 848.784219][T14975] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 848.797561][ T3527] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 848.848132][T14975] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 848.880325][ T9184] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 848.880881][T14975] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 848.914707][ T9184] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 848.972636][T14975] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 849.002515][T14981] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 849.010343][T14981] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 849.067125][ T3527] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 849.092468][ T3527] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 849.229083][ T9184] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 849.268115][ T9184] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 849.505349][ T9184] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 849.543604][ T9184] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 849.759669][T25004] netlink: 'syz.9.5715': attribute type 1 has an invalid length. [ 850.001054][T25013] netlink: 'syz.0.5717': attribute type 12 has an invalid length. [ 850.068715][T25013] netlink: 132 bytes leftover after parsing attributes in process `syz.0.5717'. [ 850.230842][T25025] netlink: 16410 bytes leftover after parsing attributes in process `syz.7.5719'. [ 850.766586][T25039] netlink: 'syz.9.5722': attribute type 10 has an invalid length. [ 850.802551][T25039] netlink: 40 bytes leftover after parsing attributes in process `syz.9.5722'. [ 850.868784][T25039] netlink: 'syz.9.5722': attribute type 2 has an invalid length. [ 850.929394][T25039] !: entered promiscuous mode [ 850.973296][T25039] netlink: 'syz.9.5722': attribute type 2 has an invalid length. [ 850.983476][T25039] !: left promiscuous mode [ 851.154037][T25057] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 851.184061][T25057] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 851.202799][T25057] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 851.219678][T25057] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 851.826663][T25053] netlink: 'syz.1.5727': attribute type 10 has an invalid length. [ 852.015753][T25087] netlink: 'syz.7.5732': attribute type 10 has an invalid length. [ 852.027326][T25088] netlink: 'syz.9.5731': attribute type 10 has an invalid length. [ 852.055671][T25087] netlink: 40 bytes leftover after parsing attributes in process `syz.7.5732'. [ 852.245465][T25095] netlink: 'syz.7.5732': attribute type 10 has an invalid length. [ 852.263396][T25095] netlink: 40 bytes leftover after parsing attributes in process `syz.7.5732'. [ 852.422356][T25065] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 853.400483][T25066] delete_channel: no stack [ 853.416728][T25053] macvlan1: entered allmulticast mode [ 853.451815][T25053] veth1_vlan: entered allmulticast mode [ 853.468783][T25053] team0: Port device macvlan1 added [ 853.481271][T25088] team0: Port device dummy0 added [ 853.486580][T25090] netlink: 128 bytes leftover after parsing attributes in process `syz.4.5730'. [ 853.507427][T25087] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 853.537853][T25095] batman_adv: batadv0: Adding interface: virt_wifi0 [ 853.559333][T25095] batman_adv: batadv0: The MTU of interface virt_wifi0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 853.602519][T25095] batman_adv: batadv0: Interface activated: virt_wifi0 [ 853.668469][T25103] lo speed is unknown, defaulting to 1000 [ 853.697323][T25103] lo speed is unknown, defaulting to 1000 [ 853.716421][T25103] lo speed is unknown, defaulting to 1000 [ 853.748653][T25103] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 853.884936][T25106] netlink: 'syz.1.5735': attribute type 10 has an invalid length. [ 853.914497][T25103] lo speed is unknown, defaulting to 1000 [ 853.928192][T25106] netlink: 55 bytes leftover after parsing attributes in process `syz.1.5735'. [ 853.934946][T25103] lo speed is unknown, defaulting to 1000 [ 855.634126][T25106] veth1_vlan (unregistering): left allmulticast mode [ 855.728997][T25106] team0: Port device macvlan1 removed [ 858.690429][T25103] lo speed is unknown, defaulting to 1000 [ 858.714673][T25103] lo speed is unknown, defaulting to 1000 [ 858.745251][T25103] lo speed is unknown, defaulting to 1000 [ 858.800646][T25103] lo speed is unknown, defaulting to 1000 [ 859.000507][T25152] netlink: 12 bytes leftover after parsing attributes in process `syz.7.5743'. [ 859.016549][T25157] netlink: 'syz.1.5745': attribute type 26 has an invalid length. [ 859.139337][T25152] netlink: 152 bytes leftover after parsing attributes in process `syz.7.5743'. [ 859.247766][T25163] netlink: 132 bytes leftover after parsing attributes in process `syz.9.5746'. [ 860.007464][T25167] delete_channel: no stack [ 860.273294][T25192] netdevsim netdevsim1 netdevsim0: entered promiscuous mode [ 860.312643][T25192] netdevsim netdevsim1 netdevsim0: entered allmulticast mode [ 860.339982][T25195] netlink: 18187 bytes leftover after parsing attributes in process `syz.7.5755'. [ 860.352010][T25197] netlink: 64995 bytes leftover after parsing attributes in process `syz.7.5755'. [ 860.870878][T25218] netlink: 40 bytes leftover after parsing attributes in process `syz.0.5761'. [ 860.899200][T25218] netlink: 40 bytes leftover after parsing attributes in process `syz.0.5761'. [ 860.922043][T25223] netlink: 116 bytes leftover after parsing attributes in process `syz.9.5762'. [ 860.948404][T25218] netlink: 40 bytes leftover after parsing attributes in process `syz.0.5761'. [ 861.210114][T25236] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 861.265940][T25236] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 861.417238][T25236] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 861.441602][T25236] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 862.398561][T25260] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5770'. [ 862.583488][T25287] netlink: 'syz.7.5777': attribute type 1 has an invalid length. [ 863.420441][T25312] €Â0: renamed from batadv_slave_1 (while UP) [ 864.929661][T25315] €Â0: renamed from batadv_slave_1 (while UP) [ 865.354310][T25347] __nla_validate_parse: 1 callbacks suppressed [ 865.354331][T25347] netlink: 763 bytes leftover after parsing attributes in process `syz.1.5786'. [ 865.481022][T25354] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 865.526167][T25359] netlink: 'syz.7.5790': attribute type 3 has an invalid length. [ 865.539128][T25359] netlink: 132 bytes leftover after parsing attributes in process `syz.7.5790'. [ 865.551620][T25361] netlink: 'syz.7.5790': attribute type 3 has an invalid length. [ 865.573520][T25361] netlink: 132 bytes leftover after parsing attributes in process `syz.7.5790'. [ 865.968031][T25380] netlink: 16 bytes leftover after parsing attributes in process `syz.4.5794'. [ 866.104421][T25382] netlink: 44 bytes leftover after parsing attributes in process `syz.7.5795'. [ 866.304016][T25388] netlink: 14 bytes leftover after parsing attributes in process `syz.0.5796'. [ 866.321106][T25390] syzkaller0: entered promiscuous mode [ 866.356888][T25390] syzkaller0: entered allmulticast mode [ 867.461389][T25421] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5802'. [ 869.977912][ T1303] ieee802154 phy0 wpan0: encryption failed: -22 [ 869.990370][ T1303] ieee802154 phy1 wpan1: encryption failed: -22 [ 872.901407][T25403] €Â0: renamed from batadv_slave_1 (while UP) [ 872.938044][T25439] netlink: 763 bytes leftover after parsing attributes in process `syz.1.5807'. [ 873.526742][T25452] netlink: 44 bytes leftover after parsing attributes in process `syz.9.5809'. [ 873.875903][T25456] netlink: 60 bytes leftover after parsing attributes in process `syz.7.5811'. [ 873.924626][T25456] netlink: 60 bytes leftover after parsing attributes in process `syz.7.5811'. [ 874.205619][T25465] netlink: 'syz.1.5813': attribute type 11 has an invalid length. [ 874.322573][T25465] netlink: 199828 bytes leftover after parsing attributes in process `syz.1.5813'. [ 874.381864][T25469] lo speed is unknown, defaulting to 1000 [ 874.419084][T25469] lo speed is unknown, defaulting to 1000 [ 874.490262][T25469] lo speed is unknown, defaulting to 1000 [ 874.607390][T25475] netlink: 'syz.0.5814': attribute type 1 has an invalid length. [ 874.788314][T25472] netlink: 'syz.9.5815': attribute type 2 has an invalid length. [ 874.982887][T25473] netlink: 60 bytes leftover after parsing attributes in process `syz.4.5816'. [ 875.151242][T25469] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 875.545590][T25486] netlink: 'syz.7.5819': attribute type 4 has an invalid length. [ 875.601671][T25486] netlink: 152 bytes leftover after parsing attributes in process `syz.7.5819'. [ 875.706104][T25486] .`: renamed from bond0 (while UP) [ 875.873325][T25469] lo speed is unknown, defaulting to 1000 [ 875.928754][T25469] lo speed is unknown, defaulting to 1000 [ 875.973024][T25469] lo speed is unknown, defaulting to 1000 [ 876.035891][T25469] lo speed is unknown, defaulting to 1000 [ 876.094151][T25469] lo speed is unknown, defaulting to 1000 [ 876.151384][T25469] lo speed is unknown, defaulting to 1000 [ 877.922288][T25525] netlink: 'syz.9.5828': attribute type 9 has an invalid length. [ 877.940670][T25525] netlink: 'syz.9.5828': attribute type 11 has an invalid length. [ 877.953999][T25525] netlink: 'syz.9.5828': attribute type 12 has an invalid length. [ 878.087741][T25528] netlink: 52 bytes leftover after parsing attributes in process `syz.0.5829'. [ 878.091222][T25525] netlink: 210020 bytes leftover after parsing attributes in process `syz.9.5828'. [ 878.117013][T25525] netlink: 4 bytes leftover after parsing attributes in process `syz.9.5828'. [ 878.219954][T25538] netlink: 'syz.7.5832': attribute type 5 has an invalid length. [ 878.450831][T25546] netlink: 'syz.9.5835': attribute type 26 has an invalid length. [ 879.009601][T25572] netlink: 'syz.9.5844': attribute type 10 has an invalid length. [ 879.903612][T25572] bond0: (slave netdevsim0): Enslaving as an active interface with an up link [ 879.919096][T25589] netlink: 24 bytes leftover after parsing attributes in process `syz.1.5847'. [ 881.997666][T25628] netlink: 'syz.1.5854': attribute type 26 has an invalid length. [ 882.347308][T25642] netlink: 228 bytes leftover after parsing attributes in process `syz.1.5859'. [ 882.797763][T25657] netlink: 'syz.9.5862': attribute type 10 has an invalid length. [ 883.417735][T25675] FAULT_INJECTION: forcing a failure. [ 883.417735][T25675] name failslab, interval 1, probability 0, space 0, times 0 [ 883.431525][T25675] CPU: 0 UID: 0 PID: 25675 Comm: syz.4.5864 Not tainted syzkaller #0 PREEMPT(full) [ 883.431551][T25675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 883.431563][T25675] Call Trace: [ 883.431571][T25675] [ 883.431580][T25675] dump_stack_lvl+0xe8/0x150 [ 883.431609][T25675] should_fail_ex+0x412/0x560 [ 883.431638][T25675] should_failslab+0xa8/0x100 [ 883.431661][T25675] __kvmalloc_node_noprof+0x166/0x8d0 [ 883.431682][T25675] ? bpf_test_run_xdp_live+0x223/0x1cf0 [ 883.431708][T25675] bpf_test_run_xdp_live+0x223/0x1cf0 [ 883.431732][T25675] ? bpf_dispatcher_change_prog+0xae0/0xd70 [ 883.431764][T25675] ? __pfx_wait_rcu_exp_gp+0x10/0x10 [ 883.431795][T25675] ? __pfx_bpf_test_run_xdp_live+0x10/0x10 [ 883.431830][T25675] ? 0xffffffffa02019dc [ 883.431866][T25675] ? __pfx_xdp_test_run_init_page+0x10/0x10 [ 883.431894][T25675] ? xdp_convert_md_to_buff+0x5b/0x330 [ 883.431911][T25675] bpf_prog_test_run_xdp+0x81c/0x1160 [ 883.431940][T25675] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 883.431960][T25675] ? __fget_files+0x2a/0x420 [ 883.431982][T25675] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 883.431998][T25675] bpf_prog_test_run+0x2c7/0x340 [ 883.432022][T25675] __sys_bpf+0x5cb/0x920 [ 883.432044][T25675] ? __pfx___sys_bpf+0x10/0x10 [ 883.432076][T25675] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 883.432101][T25675] ? __pfx_sched_clock_cpu+0x10/0x10 [ 883.432124][T25675] __x64_sys_bpf+0x7c/0x90 [ 883.432143][T25675] do_syscall_64+0xe2/0xf80 [ 883.432163][T25675] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 883.432178][T25675] ? clear_bhb_loop+0x60/0xb0 [ 883.432197][T25675] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 883.432212][T25675] RIP: 0033:0x7fc55819acb9 [ 883.432226][T25675] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 883.432240][T25675] RSP: 002b:00007fc5590ae028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 883.432258][T25675] RAX: ffffffffffffffda RBX: 00007fc558415fa0 RCX: 00007fc55819acb9 [ 883.432270][T25675] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 883.432281][T25675] RBP: 00007fc5590ae090 R08: 0000000000000000 R09: 0000000000000000 [ 883.432290][T25675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 883.432300][T25675] R13: 00007fc558416038 R14: 00007fc558415fa0 R15: 00007ffdf4095c78 [ 883.432326][T25675] [ 884.015245][T25686] delete_channel: no stack [ 886.885450][T25657] bond0: (slave netdevsim0): Releasing backup interface [ 886.906502][T25657] team0: Port device netdevsim0 added [ 886.911950][T25659] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5861'. [ 887.139453][T25762] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5874'. [ 887.230149][T25762] openvswitch: netlink: Flow actions attr not present in new flow. [ 887.235275][T25760] netlink: 14593 bytes leftover after parsing attributes in process `syz.7.5871'. [ 887.660162][T25762] lo speed is unknown, defaulting to 1000 [ 887.668169][T25762] lo speed is unknown, defaulting to 1000 [ 890.423780][T25856] netlink: 'syz.9.5890': attribute type 2 has an invalid length. [ 890.431559][T25856] netlink: 'syz.9.5890': attribute type 1 has an invalid length. [ 890.552632][T25856] netlink: 4 bytes leftover after parsing attributes in process `syz.9.5890'. [ 890.694552][T25862] netlink: 9 bytes leftover after parsing attributes in process `syz.1.5891'. [ 890.835363][T25862] netlink: 9 bytes leftover after parsing attributes in process `syz.1.5891'. [ 890.907334][T14980] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 891.290058][T14980] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 891.500358][T25895] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5898'. [ 894.418408][T14980] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 894.712216][T25927] netlink: 'syz.9.5902': attribute type 10 has an invalid length. [ 895.385231][T25927] macvlan1: entered allmulticast mode [ 895.589328][T25927] veth1_vlan: entered allmulticast mode [ 895.747840][T25927] team0: Port device macvlan1 added [ 897.371893][T25955] netlink: 60 bytes leftover after parsing attributes in process `syz.7.5907'. [ 897.986119][T25965] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 899.489955][T14980] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 899.691220][T25939] netlink: 60 bytes leftover after parsing attributes in process `syz.0.5901'. [ 899.947767][T25949] delete_channel: no stack [ 901.146241][T26026] netlink: 'syz.4.5918': attribute type 2 has an invalid length. [ 901.180321][T26026] netlink: 'syz.4.5918': attribute type 1 has an invalid length. [ 901.413069][T26033] netlink: 212348 bytes leftover after parsing attributes in process `syz.1.5920'. [ 901.462850][T26035] netlink: 60 bytes leftover after parsing attributes in process `syz.4.5921'. [ 901.473005][T26037] netlink: 8908 bytes leftover after parsing attributes in process `syz.1.5920'. [ 901.509594][T26037] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5920'. [ 901.523604][T26039] netlink: 60 bytes leftover after parsing attributes in process `syz.4.5921'. [ 902.115756][T26056] netlink: 763 bytes leftover after parsing attributes in process `syz.4.5924'. [ 902.225079][T26058] netlink: 164 bytes leftover after parsing attributes in process `syz.4.5924'. [ 902.475160][T14980] bridge_slave_1: left allmulticast mode [ 902.532577][T14980] bridge_slave_1: left promiscuous mode [ 902.546190][T14980] bridge0: port 2(bridge_slave_1) entered disabled state [ 902.620155][T14980] bridge_slave_0: left allmulticast mode [ 902.636660][T14980] bridge_slave_0: left promiscuous mode [ 902.658350][T14980] bridge0: port 1(bridge_slave_0) entered disabled state [ 903.590590][T26090] bpf: Bad value for 'gid' [ 904.969704][T14980] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 904.985827][T14980] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 904.997970][T14980] bond0 (unregistering): Released all slaves [ 905.025827][T26096] syz.0.5930 (26096) used obsolete PPPIOCDETACH ioctl [ 905.025846][T26120] netlink: 132 bytes leftover after parsing attributes in process `syz.1.5934'. [ 906.250603][T26131] netlink: 'syz.9.5935': attribute type 10 has an invalid length. [ 907.211492][T26131] veth1_vlan: left allmulticast mode [ 908.605100][T14980] hsr_slave_0: left promiscuous mode [ 908.635478][T14980] hsr_slave_1: left promiscuous mode [ 908.646502][T14980] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 908.662550][T14980] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 908.676096][T14980] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 908.699204][T14980] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 908.778637][T14980] veth1_macvtap: left promiscuous mode [ 908.804049][T14980] veth0_macvtap: left promiscuous mode [ 908.820235][T14980] veth1_vlan: left promiscuous mode [ 908.837323][T14980] veth0_vlan: left promiscuous mode [ 909.368450][T26212] netlink: 'syz.4.5952': attribute type 39 has an invalid length. [ 910.951916][T14980] team0 (unregistering): Port device team_slave_1 removed [ 911.034776][T14980] team0 (unregistering): Port device team_slave_0 removed [ 911.577244][T26195] netlink: 32 bytes leftover after parsing attributes in process `syz.7.5947'. [ 911.587242][T26195] netlink: 32 bytes leftover after parsing attributes in process `syz.7.5947'. [ 911.684041][T26232] pim6reg1: entered promiscuous mode [ 911.689507][T26232] pim6reg1: entered allmulticast mode [ 912.064390][T26304] netlink: 'syz.7.5969': attribute type 6 has an invalid length. [ 912.879450][T26337] netlink: 'syz.4.5976': attribute type 26 has an invalid length. [ 912.961422][T26345] netlink: 112 bytes leftover after parsing attributes in process `syz.1.5975'. [ 913.015307][T26346] netlink: 36 bytes leftover after parsing attributes in process `syz.9.5977'. [ 913.024392][T26346] netlink: 'syz.9.5977': attribute type 1 has an invalid length. [ 913.034360][T26346] netlink: 'syz.9.5977': attribute type 2 has an invalid length. [ 913.052632][T26346] netlink: 68 bytes leftover after parsing attributes in process `syz.9.5977'. [ 913.153223][T26342] netlink: 576 bytes leftover after parsing attributes in process `syz.9.5977'. [ 913.291724][T26359] netlink: 'syz.4.5979': attribute type 14 has an invalid length. [ 913.884072][T26387] netlink: 763 bytes leftover after parsing attributes in process `syz.0.5988'. [ 955.294892][ T1303] ieee802154 phy0 wpan0: encryption failed: -22 [ 955.301242][ T1303] ieee802154 phy1 wpan1: encryption failed: -22 [ 1005.546136][ T1303] ieee802154 phy0 wpan0: encryption failed: -22 [ 1005.566777][ T1303] ieee802154 phy1 wpan1: encryption failed: -22 [ 1015.142151][T26398] Bluetooth: hci0: command 0x0406 tx timeout [ 1015.148417][T26398] Bluetooth: hci1: command 0x0406 tx timeout [ 1015.156651][T26398] Bluetooth: hci3: command 0x0406 tx timeout [ 1015.164109][T26398] Bluetooth: hci4: command tx timeout [ 1015.169517][T26398] Bluetooth: hci5: command tx timeout [ 1058.133520][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 143s! [syz.0.5988:26387] [ 1058.133559][ C0] Modules linked in: [ 1058.133581][ C0] irq event stamp: 13444993 [ 1058.133589][ C0] hardirqs last enabled at (13444992): [] irqentry_exit+0x59c/0x620 [ 1058.133625][ C0] hardirqs last disabled at (13444993): [] sysvec_apic_timer_interrupt+0xe/0xc0 [ 1058.133653][ C0] softirqs last enabled at (13152416): [] __irq_exit_rcu+0x5f/0x150 [ 1058.133679][ C0] softirqs last disabled at (13152419): [] __irq_exit_rcu+0x5f/0x150 [ 1058.133715][ C0] CPU: 0 UID: 0 PID: 26387 Comm: syz.0.5988 Not tainted syzkaller #0 PREEMPT(full) [ 1058.133737][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1058.133748][ C0] RIP: 0010:tracing_gen_ctx_irq_test+0x1d/0x160 [ 1058.133770][ C0] Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 40 d6 55 41 57 41 56 41 55 41 54 53 89 fb e8 ab bc fb ff 65 44 8b 25 53 7b 08 11 <45> 89 e6 89 dd 83 cd 40 4c 89 f6 48 81 e6 00 00 f0 00 0f 44 eb 31 [ 1058.133787][ C0] RSP: 0018:ffffc900000072d8 EFLAGS: 00000246 [ 1058.133803][ C0] RAX: ffffffff81c6c4d5 RBX: 0000000000000000 RCX: ffff8880538f1e80 [ 1058.133817][ C0] RDX: 0000000000000100 RSI: 0000000000000200 RDI: 0000000000000000 [ 1058.133829][ C0] RBP: 00000000000000ec R08: ffffc9000000750f R09: 0000000000000000 [ 1058.133841][ C0] R10: ffffc90000007500 R11: fffff52000000ea2 R12: 0000000000000102 [ 1058.133856][ C0] R13: 1ffff92000000e70 R14: 0000000000000000 R15: dffffc0000000000 [ 1058.133869][ C0] FS: 00007f8bdfbf66c0(0000) GS:ffff88812592c000(0000) knlGS:0000000000000000 [ 1058.133885][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1058.133900][ C0] CR2: 000055efb0da8a38 CR3: 000000006c114000 CR4: 00000000003526f0 [ 1058.133917][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1058.133928][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1058.133941][ C0] Call Trace: [ 1058.133949][ C0] [ 1058.133971][ C0] perf_trace_buf_update+0x3f/0x190 [ 1058.134005][ C0] perf_tp_event+0x14c/0x1420 [ 1058.134054][ C0] ? __pfx_perf_tp_event+0x10/0x10 [ 1058.134087][ C0] ? perf_trace_run_bpf_submit+0xee/0x170 [ 1058.134196][ C0] ? irqentry_exit+0x59c/0x620 [ 1058.134224][ C0] ? lockdep_hardirqs_on+0x7a/0x110 [ 1058.134297][ C0] perf_trace_run_bpf_submit+0xee/0x170 [ 1058.134360][ C0] perf_trace_lock+0x326/0x3f0 [ 1058.134391][ C0] ? __pfx_perf_trace_lock_acquire+0x10/0x10 [ 1058.134428][ C0] ? __pfx_perf_trace_lock+0x10/0x10 [ 1058.134472][ C0] ? lock_acquire+0x106/0x330 [ 1058.134502][ C0] ? unwind_next_frame+0xa5/0x23c0 [ 1058.134527][ C0] ? unwind_next_frame+0xa5/0x23c0 [ 1058.134550][ C0] ? unwind_next_frame+0xa5/0x23c0 [ 1058.134579][ C0] lock_release+0x379/0x3a0 [ 1058.134600][ C0] ? deref_stack_reg+0x19f/0x230 [ 1058.134639][ C0] ? unwind_next_frame+0xa5/0x23c0 [ 1058.134663][ C0] unwind_next_frame+0x1aaa/0x23c0 [ 1058.134708][ C0] ? unwind_next_frame+0xa5/0x23c0 [ 1058.134737][ C0] ? stack_trace_save+0xa9/0x100 [ 1058.134778][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 1058.134810][ C0] arch_stack_walk+0x11b/0x150 [ 1058.134852][ C0] ? save_stack+0x122/0x230 [ 1058.134888][ C0] stack_trace_save+0xa9/0x100 [ 1058.134920][ C0] ? __pfx_stack_trace_save+0x10/0x10 [ 1058.134959][ C0] ? perf_trace_preemptirq_template+0x268/0x340 [ 1058.134994][ C0] ? irqentry_exit+0x59c/0x620 [ 1058.135026][ C0] kasan_save_track+0x3e/0x80 [ 1058.135046][ C0] ? kasan_save_track+0x3e/0x80 [ 1058.135063][ C0] ? kasan_save_free_info+0x46/0x50 [ 1058.135087][ C0] ? __kasan_slab_free+0x5c/0x80 [ 1058.135105][ C0] ? kmem_cache_free+0x195/0x610 [ 1058.135122][ C0] ? mac80211_hwsim_beacon_tx+0x3e8/0x870 [ 1058.135147][ C0] ? __iterate_interfaces+0x2ab/0x590 [ 1058.135171][ C0] ? ieee80211_iterate_active_interfaces_atomic+0xdb/0x180 [ 1058.135197][ C0] ? mac80211_hwsim_beacon+0xbb/0x180 [ 1058.135215][ C0] ? __hrtimer_run_queues+0x527/0xc30 [ 1058.135238][ C0] ? hrtimer_run_softirq+0x187/0x2b0 [ 1058.135261][ C0] ? handle_softirqs+0x22a/0x7c0 [ 1058.135279][ C0] ? __irq_exit_rcu+0x5f/0x150 [ 1058.135297][ C0] ? irq_exit_rcu+0x9/0x30 [ 1058.135315][ C0] ? sysvec_apic_timer_interrupt+0xa6/0xc0 [ 1058.135338][ C0] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1058.135356][ C0] ? __schedule+0x5/0x4fb0 [ 1058.135377][ C0] ? preempt_schedule_notrace+0x57/0x90 [ 1058.135399][ C0] ? preempt_schedule_notrace_thunk+0x16/0x30 [ 1058.135417][ C0] ? lock_release+0x391/0x3a0 [ 1058.135434][ C0] ? unwind_next_frame+0x1aaa/0x23c0 [ 1058.135455][ C0] ? arch_stack_walk+0x11b/0x150 [ 1058.135475][ C0] ? stack_trace_save+0xa9/0x100 [ 1058.135617][ C0] kasan_save_free_info+0x46/0x50 [ 1058.135644][ C0] __kasan_slab_free+0x5c/0x80 [ 1058.135670][ C0] kmem_cache_free+0x195/0x610 [ 1058.135691][ C0] ? mac80211_hwsim_beacon_tx+0x3e8/0x870 [ 1058.135736][ C0] mac80211_hwsim_beacon_tx+0x3e8/0x870 [ 1058.135786][ C0] __iterate_interfaces+0x2ab/0x590 [ 1058.135819][ C0] ? __pfx_mac80211_hwsim_beacon_tx+0x10/0x10 [ 1058.135845][ C0] ? ieee80211_iterate_active_interfaces_atomic+0x2a/0x180 [ 1058.135879][ C0] ? __pfx_mac80211_hwsim_beacon_tx+0x10/0x10 [ 1058.135905][ C0] ieee80211_iterate_active_interfaces_atomic+0xdb/0x180 [ 1058.135946][ C0] mac80211_hwsim_beacon+0xbb/0x180 [ 1058.135972][ C0] ? __pfx_mac80211_hwsim_beacon+0x10/0x10 [ 1058.135995][ C0] __hrtimer_run_queues+0x527/0xc30 [ 1058.136077][ C0] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 1058.136100][ C0] ? read_tsc+0x9/0x20 [ 1058.136158][ C0] hrtimer_run_softirq+0x187/0x2b0 [ 1058.136199][ C0] handle_softirqs+0x22a/0x7c0 [ 1058.136231][ C0] ? __irq_exit_rcu+0x5f/0x150 [ 1058.136279][ C0] __irq_exit_rcu+0x5f/0x150 [ 1058.136302][ C0] irq_exit_rcu+0x9/0x30 [ 1058.136320][ C0] sysvec_apic_timer_interrupt+0xa6/0xc0 [ 1058.136347][ C0] [ 1058.136353][ C0] [ 1058.136365][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1058.136386][ C0] RIP: 0010:__schedule+0x5/0x4fb0 [ 1058.136408][ C0] Code: 89 d9 48 8b 5c 24 08 e9 ee fe ff ff cc cc cc cc cc cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 55 <48> 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 e0 48 81 ec c0 01 00 [ 1058.136423][ C0] RSP: 0018:ffffc9000d65f630 EFLAGS: 00000246 [ 1058.136438][ C0] RAX: 1ffff1100a71e674 RBX: ffffffff8174c0e5 RCX: dffffc0000000000 [ 1058.136453][ C0] RDX: ffffc90014033000 RSI: 00000000000197a3 RDI: 0000000000000001 [ 1058.136466][ C0] RBP: ffffc9000d65f6a0 R08: ffffc9000d65f357 R09: 0000000000000000 [ 1058.136479][ C0] R10: ffffc9000d65f348 R11: fffff52001acbe6b R12: ffffc9000d65f920 [ 1058.136500][ C0] R13: ffffffff8174c0e5 R14: dffffc0000000000 R15: ffffffff8e35a320 [ 1058.136519][ C0] ? unwind_next_frame+0xa5/0x23c0 [ 1058.136546][ C0] ? unwind_next_frame+0xa5/0x23c0 [ 1058.136603][ C0] preempt_schedule_notrace+0x57/0x90 [ 1058.136628][ C0] ? unwind_next_frame+0xa5/0x23c0 [ 1058.136652][ C0] preempt_schedule_notrace_thunk+0x16/0x30 [ 1058.136693][ C0] lock_release+0x391/0x3a0 [ 1058.136713][ C0] ? unwind_next_frame+0x1aaf/0x23c0 [ 1058.136734][ C0] ? deref_stack_reg+0x19f/0x230 [ 1058.136773][ C0] ? unwind_next_frame+0xa5/0x23c0 [ 1058.136797][ C0] unwind_next_frame+0x1aaa/0x23c0 [ 1058.136844][ C0] ? unwind_next_frame+0xa5/0x23c0 [ 1058.136871][ C0] ? stack_trace_save+0xa9/0x100 [ 1058.136913][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 1058.136945][ C0] arch_stack_walk+0x11b/0x150 [ 1058.136987][ C0] ? save_stack+0x122/0x230 [ 1058.137022][ C0] stack_trace_save+0xa9/0x100 [ 1058.137054][ C0] ? __pfx_stack_trace_save+0x10/0x10 [ 1058.137116][ C0] save_stack+0x122/0x230 [ 1058.137139][ C0] ? __pfx_perf_trace_lock+0x10/0x10 [ 1058.137166][ C0] ? __pfx_save_stack+0x10/0x10 [ 1058.137256][ C0] __reset_page_owner+0x71/0x1f0 [ 1058.137287][ C0] __free_frozen_pages+0xbb0/0xd10 [ 1058.137338][ C0] __put_partials+0x146/0x170 [ 1058.137381][ C0] __slab_free+0x294/0x320 [ 1058.137437][ C0] ? qlist_free_all+0x8c/0x100 [ 1058.137467][ C0] qlist_free_all+0x97/0x100 [ 1058.137504][ C0] kasan_quarantine_reduce+0x148/0x160 [ 1058.137535][ C0] __kasan_slab_alloc+0x22/0x80 [ 1058.137564][ C0] __kmalloc_noprof+0x3c2/0x7e0 [ 1058.137587][ C0] ? security_sk_alloc+0x52/0x360 [ 1058.137634][ C0] security_sk_alloc+0x52/0x360 [ 1058.137675][ C0] sk_prot_alloc+0x101/0x210 [ 1058.137718][ C0] sk_alloc+0x3a/0x390 [ 1058.137761][ C0] rxrpc_create+0xd9/0x750 [ 1058.137795][ C0] __sock_create+0x4b2/0x9d0 [ 1058.137852][ C0] __sys_socket+0xd6/0x1b0 [ 1058.137893][ C0] __x64_sys_socket+0x7a/0x90 [ 1058.137925][ C0] do_syscall_64+0xe2/0xf80 [ 1058.137951][ C0] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1058.137972][ C0] ? clear_bhb_loop+0x60/0xb0 [ 1058.138005][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1058.138025][ C0] RIP: 0033:0x7f8be199acb9 [ 1058.138048][ C0] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1058.138063][ C0] RSP: 002b:00007f8bdfbf6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 1058.138081][ C0] RAX: ffffffffffffffda RBX: 00007f8be1c15fa0 RCX: 00007f8be199acb9 [ 1058.138094][ C0] RDX: 000000000000000a RSI: 0000000000000002 RDI: 0000000000000021 [ 1058.138106][ C0] RBP: 00007f8be1a08bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1058.138118][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1058.138129][ C0] R13: 00007f8be1c16038 R14: 00007f8be1c15fa0 R15: 00007ffccbbe6e28 [ 1058.138196][ C0] [ 1058.138214][ C0] Sending NMI from CPU 0 to CPUs 1: [ 1059.066134][ C1] NMI backtrace for cpu 1 [ 1059.066150][ C1] CPU: 1 UID: 0 PID: 26379 Comm: syz.4.5986 Not tainted syzkaller #0 PREEMPT(full) [ 1059.066170][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1059.066181][ C1] RIP: 0010:native_apic_msr_write+0x39/0x50 [ 1059.066209][ C1] Code: 74 2a 83 ff 30 74 25 eb 10 81 ff d0 00 00 00 74 1b 81 ff e0 00 00 00 74 13 c1 ef 04 81 c7 00 08 00 00 89 f9 89 f0 31 d2 0f 30 <66> 90 e9 90 92 07 0a cc 89 f6 31 d2 e9 96 d7 5e 03 66 0f 1f 44 00 [ 1059.066224][ C1] RSP: 0018:ffffc90000a08958 EFLAGS: 00000046 [ 1059.066240][ C1] RAX: 00000000000000a5 RBX: ffff8880b8723e40 RCX: 0000000000000838 [ 1059.066252][ C1] RDX: 0000000000000000 RSI: 00000000000000a5 RDI: 0000000000000838 [ 1059.066263][ C1] RBP: 0000000000000000 R08: ffffffff81b01155 R09: ffffffff99dec508 [ 1059.066275][ C1] R10: ffffc90000a08508 R11: ffffffff81721570 R12: 0000000010004676 [ 1059.066287][ C1] R13: dffffc0000000000 R14: 00000000000000a5 R15: 0000000000000020 [ 1059.066299][ C1] FS: 00007fc5590ae6c0(0000) GS:ffff888125a2c000(0000) knlGS:0000000000000000 [ 1059.066313][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1059.066325][ C1] CR2: 00007f77f4de0ad8 CR3: 0000000056d22000 CR4: 00000000003526f0 [ 1059.066341][ C1] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 1059.066352][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1059.066362][ C1] Call Trace: [ 1059.066372][ C1] [ 1059.066383][ C1] lapic_next_event+0x11/0x20 [ 1059.066403][ C1] clockevents_program_event+0x1c9/0x350 [ 1059.066438][ C1] hrtimer_interrupt+0x620/0xaa0 [ 1059.066524][ C1] __sysvec_apic_timer_interrupt+0x102/0x3d0 [ 1059.066551][ C1] sysvec_apic_timer_interrupt+0x52/0xc0 [ 1059.066577][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1059.066596][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x17/0x70 [ 1059.066618][ C1] Code: cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 48 8b 04 24 65 48 8b 0d 78 be 0c 11 65 8b 15 99 be 0c 11 <81> e2 00 01 ff 00 74 11 81 fa 00 01 00 00 75 35 83 b9 6c 16 00 00 [ 1059.066632][ C1] RSP: 0018:ffffc90000a08bc8 EFLAGS: 00000246 [ 1059.066646][ C1] RAX: ffffffff89bea4bb RBX: 000000000000e900 RCX: ffff88807abf1e80 [ 1059.066658][ C1] RDX: 0000000000000302 RSI: 0000000000000000 RDI: 0000000000000002 [ 1059.066669][ C1] RBP: ffff888020fac6a0 R08: ffff88807a4e1d27 R09: 1ffff1100f49c3a4 [ 1059.066682][ C1] R10: dffffc0000000000 R11: ffffed100f49c3a5 R12: 000000000000e932 [ 1059.066694][ C1] R13: ffff888020fac6c0 R14: ffff88807a4e0000 R15: ffff8880a100000c [ 1059.066724][ C1] ? bitmap_port_gc+0x28b/0x560 [ 1059.066762][ C1] bitmap_port_gc+0x28b/0x560 [ 1059.066824][ C1] call_timer_fn+0x192/0x5a0 [ 1059.066846][ C1] ? __pfx_bitmap_port_gc+0x10/0x10 [ 1059.066864][ C1] ? call_timer_fn+0xd4/0x5a0 [ 1059.066885][ C1] ? __pfx_call_timer_fn+0x10/0x10 [ 1059.066934][ C1] ? __pfx_bitmap_port_gc+0x10/0x10 [ 1059.066960][ C1] __run_timer_base+0x652/0x8b0 [ 1059.067016][ C1] ? __pfx___run_timer_base+0x10/0x10 [ 1059.067074][ C1] run_timer_softirq+0xb7/0x170 [ 1059.067096][ C1] handle_softirqs+0x22a/0x7c0 [ 1059.067123][ C1] ? __irq_exit_rcu+0x5f/0x150 [ 1059.067162][ C1] __irq_exit_rcu+0x5f/0x150 [ 1059.067182][ C1] irq_exit_rcu+0x9/0x30 [ 1059.067199][ C1] sysvec_apic_timer_interrupt+0xa6/0xc0 [ 1059.067222][ C1] [ 1059.067228][ C1] [ 1059.067237][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1059.067255][ C1] RIP: 0010:perf_tp_event+0x2ef/0x1420 [ 1059.067279][ C1] Code: 31 f6 e8 e4 8c 35 00 48 89 d8 48 c1 e8 03 42 80 3c 38 00 74 08 48 89 df e8 fe 89 35 00 48 8b 1b be 00 04 00 00 48 21 de 31 ff dc 96 ce ff b8 00 04 00 00 48 21 c3 75 0a e8 ed 91 ce ff e9 2a [ 1059.067292][ C1] RSP: 0018:ffffc90004f168c0 EFLAGS: 00000246 [ 1059.067306][ C1] RAX: 1ffff1100527c72f RBX: 0000000000002101 RCX: 0000000000000000 [ 1059.067318][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1059.067328][ C1] RBP: ffffc90004f16b48 R08: ffffc90004f16957 R09: 0000000000000000 [ 1059.067340][ C1] R10: ffffc90004f16948 R11: fffff520009e2d2b R12: ffff8880293e3888 [ 1059.067352][ C1] R13: ffffc90004f16948 R14: ffff8880b8733178 R15: dffffc0000000000 [ 1059.067417][ C1] ? __pfx_perf_trace_lock+0x10/0x10 [ 1059.067441][ C1] ? __pfx_perf_tp_event+0x10/0x10 [ 1059.067552][ C1] ? perf_trace_buf_alloc+0x1bf/0x280 [ 1059.067589][ C1] ? perf_trace_run_bpf_submit+0xee/0x170 [ 1059.067624][ C1] perf_trace_run_bpf_submit+0xee/0x170 [ 1059.067665][ C1] perf_trace_lock_acquire+0x33e/0x420 [ 1059.067706][ C1] ? __pfx_perf_trace_lock_acquire+0x10/0x10 [ 1059.067737][ C1] ? __pfx_perf_trace_lock+0x10/0x10 [ 1059.067775][ C1] ? unwind_next_frame+0xa5/0x23c0 [ 1059.067795][ C1] lock_acquire+0x2ea/0x330 [ 1059.067813][ C1] ? unwind_next_frame+0xa5/0x23c0 [ 1059.067850][ C1] ? unwind_next_frame+0xa5/0x23c0 [ 1059.067871][ C1] ? kasan_quarantine_reduce+0x148/0x160 [ 1059.067892][ C1] ? unwind_next_frame+0xa5/0x23c0 [ 1059.067913][ C1] unwind_next_frame+0xc2/0x23c0 [ 1059.067932][ C1] ? unwind_next_frame+0xa5/0x23c0 [ 1059.067969][ C1] ? unwind_next_frame+0xa5/0x23c0 [ 1059.067992][ C1] ? qlist_free_all+0x97/0x100 [ 1059.068009][ C1] ? kasan_quarantine_reduce+0x148/0x160 [ 1059.068033][ C1] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 1059.068061][ C1] arch_stack_walk+0x11b/0x150 [ 1059.068097][ C1] ? kasan_quarantine_reduce+0x148/0x160 [ 1059.068126][ C1] stack_trace_save+0xa9/0x100 [ 1059.068153][ C1] ? __pfx_stack_trace_save+0x10/0x10 [ 1059.068183][ C1] ? page_ext_put+0x97/0xc0 [ 1059.068216][ C1] save_stack+0x122/0x230 [ 1059.068243][ C1] ? __pfx_save_stack+0x10/0x10 [ 1059.068259][ C1] ? __free_frozen_pages+0xbb0/0xd10 [ 1059.068274][ C1] ? __slab_free+0x2ce/0x320 [ 1059.068294][ C1] ? qlist_free_all+0x97/0x100 [ 1059.068308][ C1] ? kasan_quarantine_reduce+0x148/0x160 [ 1059.068355][ C1] ? page_ext_put+0x97/0xc0 [ 1059.068392][ C1] __reset_page_owner+0x71/0x1f0 [ 1059.068418][ C1] __free_frozen_pages+0xbb0/0xd10 [ 1059.068459][ C1] __slab_free+0x2ce/0x320 [ 1059.068504][ C1] ? qlist_free_all+0x8c/0x100 [ 1059.068529][ C1] qlist_free_all+0x97/0x100 [ 1059.068555][ C1] kasan_quarantine_reduce+0x148/0x160 [ 1059.068580][ C1] __kasan_slab_alloc+0x22/0x80 [ 1059.068605][ C1] __kvmalloc_node_noprof+0x548/0x8d0 [ 1059.068629][ C1] ? check_cfg+0x12c/0x3da0 [ 1059.068665][ C1] check_cfg+0x12c/0x3da0 [ 1059.068702][ C1] ? irqentry_exit+0x59c/0x620 [ 1059.068725][ C1] ? lockdep_hardirqs_on+0x7a/0x110 [ 1059.068749][ C1] ? irqentry_exit+0x59c/0x620 [ 1059.068812][ C1] ? __pfx_check_cfg+0x10/0x10 [ 1059.068834][ C1] ? bpf_opcode_in_insntable+0x2e/0x50 [ 1059.068859][ C1] ? resolve_pseudo_ldimm64+0xac8/0xcd0 [ 1059.068903][ C1] ? __pfx_resolve_pseudo_ldimm64+0x10/0x10 [ 1059.068958][ C1] bpf_check+0x2120/0x1c4a0 [ 1059.068987][ C1] ? __pfx_perf_swevent_event+0x10/0x10 [ 1059.069127][ C1] ? irqentry_exit+0x59c/0x620 [ 1059.069159][ C1] ? perf_trace_run_bpf_submit+0xee/0x170 [ 1059.069217][ C1] ? perf_trace_lock+0xf8/0x3f0 [ 1059.069238][ C1] ? __pfx_perf_trace_lock_acquire+0x10/0x10 [ 1059.069269][ C1] ? __pfx_bpf_check+0x10/0x10 [ 1059.069293][ C1] ? perf_trace_preemptirq_template+0xab/0x340 [ 1059.069319][ C1] ? seqcount_lockdep_reader_access+0xa9/0x100 [ 1059.069347][ C1] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1059.069379][ C1] ? ktime_get_with_offset+0x93/0x2a0 [ 1059.069421][ C1] ? ktime_get_with_offset+0x93/0x2a0 [ 1059.069457][ C1] ? __asan_memset+0x22/0x50 [ 1059.069484][ C1] ? bpf_lsm_bpf_prog_load+0x9/0x20 [ 1059.069503][ C1] ? security_bpf_prog_load+0x125/0x3c0 [ 1059.069534][ C1] bpf_prog_load+0x1484/0x1ae0 [ 1059.069560][ C1] ? irqentry_enter+0xac/0x130 [ 1059.069613][ C1] ? __pfx_bpf_prog_load+0x10/0x10 [ 1059.069682][ C1] ? __pfx_bpf_lsm_bpf+0x10/0x10 [ 1059.069705][ C1] ? bpf_lsm_bpf+0x9/0x20 [ 1059.069722][ C1] ? security_bpf+0x7e/0x2d0 [ 1059.069749][ C1] __sys_bpf+0x570/0x920 [ 1059.069780][ C1] ? __pfx___sys_bpf+0x10/0x10 [ 1059.069800][ C1] ? ktime_get+0x1d2/0x200 [ 1059.069860][ C1] ? do_syscall_64+0x9f/0xf80 [ 1059.069886][ C1] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1059.069914][ C1] ? rcu_is_watching+0x15/0xb0 [ 1059.069956][ C1] __x64_sys_bpf+0x7c/0x90 [ 1059.069982][ C1] do_syscall_64+0xe2/0xf80 [ 1059.070006][ C1] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1059.070023][ C1] ? clear_bhb_loop+0x60/0xb0 [ 1059.070050][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1059.070067][ C1] RIP: 0033:0x7fc55819acb9 [ 1059.070086][ C1] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1059.070100][ C1] RSP: 002b:00007fc5590ae028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1059.070116][ C1] RAX: ffffffffffffffda RBX: 00007fc558415fa0 RCX: 00007fc55819acb9 [ 1059.070129][ C1] RDX: 0000000000000094 RSI: 0000200000000780 RDI: 0000000000000005 [ 1059.070140][ C1] RBP: 00007fc558208bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1059.070150][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1059.070161][ C1] R13: 00007fc558416038 R14: 00007fc558415fa0 R15: 00007ffdf4095c78 [ 1059.070217][ C1]