last executing test programs: 33m25.147313583s ago: executing program 0 (id=863): socket$can_j1939(0x1d, 0x2, 0x7) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@gettaction={0x28, 0x5a, 0x1, 0x0, 0x25dfdbfb, {}, [@action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0xfffffffc}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1}}]}, 0x28}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x1e, &(0x7f00000002c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x4d, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@ifindex=r1, 0x5, 0x0, 0xa6c, &(0x7f0000000040)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0]}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x6, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99ee}, 0x94) 33m10.140399197s ago: executing program 32 (id=863): socket$can_j1939(0x1d, 0x2, 0x7) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@gettaction={0x28, 0x5a, 0x1, 0x0, 0x25dfdbfb, {}, [@action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0xfffffffc}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1}}]}, 0x28}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x1e, &(0x7f00000002c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x4d, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@ifindex=r1, 0x5, 0x0, 0xa6c, &(0x7f0000000040)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0]}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x6, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99ee}, 0x94) 25m41.233213576s ago: executing program 33 (id=3771): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x1012, 0x0, 0x0, 0x9, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0), 0x10, 0xfffffffd}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0x0, 0x0}, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$bpf(0x200000000000, &(0x7f0000000440)='./file0/../file0\x00', 0x0, 0x989046, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mount$bpf(0x200000000000, 0x0, 0x0, 0x1299046, 0x0) mount$bpf(0x200000000000, &(0x7f0000000040)='./file0/../file0\x00', 0x0, 0xbc0023, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_pressure(r1, &(0x7f0000000100)='cpu.pressure\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 25m40.830260842s ago: executing program 34 (id=3772): syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1, 0xf, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000400000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140072ccb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000085000000b70000000000000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) sendmsg$inet(r3, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000a40)=@newtaction={0x138, 0x1c, 0x1, 0x0, 0x0, {0x0, 0x0, 0x1300}, [{0x124, 0x1, [@m_tunnel_key={0x38, 0x17, 0x0, 0x0, {{0xf}, {0x4}, {0x5, 0x6, 'v'}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x2}}}}, @m_simple={0xe8, 0xe, 0x0, 0x0, {{0xb}, {0x4}, {0xba, 0x6, "0000009d50938851ec6d20a7e28e38fc883b4e45f471eea01af091d87de3dd785ecaa31ccf26967282d0f93b84f5c822d18e9559037a933b7a192d1e2f585bd32cdf3647a70a5064f4412248a6e3402e0b7b33976e4563328d9f99e24fcefb3a18e1669bbeb72a9022673a39a3585a79e9012149a4df670194328f0ef0bd6da70bd483e33e2f90b9df8b5a0798b1b5f7ef02692a2f86a66c7196f3d397502f34a27bcc7c362e19c952f56fac8c39d0aa2a2aa1516c48"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x2}}}}]}]}, 0x138}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6, 0x8, 0x0, 0x0}}, 0x10) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000}, 0x0, 0xc8, 0xffff, 0x7, 0xf9, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0x6, &(0x7f0000000180)=ANY=[@ANYRESDEC=r4], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r5 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="1808000000000000000000000000000018"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r7) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8923, &(0x7f00000000c0)={'bond_slave_0\x00', @random="0135014010ff"}) r8 = socket$kcm(0x29, 0x2, 0x0) close(r8) r9 = socket$kcm(0x2b, 0x1, 0x0) close(r9) r10 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r10, &(0x7f00000007c0)={&(0x7f0000000040)={0x2, 0x0, @private=0xa010101}, 0x10, &(0x7f0000000900)=[{&(0x7f0000000080)="92", 0x1}], 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB="2400000000000000840000000700000044140823e000000200000002e00000010000100000000000dc00000000000000000000000700000094040000863900000001000cb2ffb69602013567ffcb060f19367d2b99bdc0f59e428bc33a050a3660f2bb77c7045b050a31efe0215e235d56060495ae0144243471ac14142700000006ac1414bb00000001ac1414bb0000ffff0a01010200000009009404010000866000000000000c253d78b48f9458beb62d0102000d3bf9f2dbdddfea00b260f00503db010436b20603c70109e35e3ab5244a640709675e60e1799f870512e123b12c8654130f6a1f80f526064d12061127d9c9821b1bfe4b42fcb33e2e2d2594040000000000001400000000000000000000000200000022a20000000000001400000000000000000000000200000005000000000000001c"], 0x158}, 0x40) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r11, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000a00)="140000003600fb50e35d3c4a0ed8985b0808788c", 0x14}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0xd, &(0x7f0000000080), 0x2cb) close(r9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) 25m40.548345118s ago: executing program 35 (id=3774): r0 = syz_clone(0x20102400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x81ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0x7fff, 0x0, 0x0, 0x0, 0x20}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000980), 0x0, 0x2f, 0xe8034000, 0x0, 0x0, 0x0, 0x0, 0x5dc}, 0x50) socket$kcm(0xa, 0x5, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffd, 0x59}, 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="1c00000000000300000000000000010045"], 0x0}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x4c, &(0x7f0000000000), 0x4) sendmsg$inet(r4, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$TUNGETFEATURES(r6, 0xff06, 0x0) 25m40.262469625s ago: executing program 36 (id=3766): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0}, 0x28) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)=ANY=[@ANYBLOB='*\x00\x00', @ANYRES32, @ANYBLOB], 0x20) getpid() sendmsg$kcm(0xffffffffffffffff, 0x0, 0x8000) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x50) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8923, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d34, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x6, 0x4, 0x1, &(0x7f0000000500)) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$kcm(r4, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x20040000) sendmsg$inet(r4, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @local}, 0xfc, 0x0}, 0x30004001) sendmsg$sock(r4, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000500)="7a6eca88ca428c8d4f36c8b8fc", 0xd}], 0x1}, 0x4004) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) sendmsg$tipc(r0, &(0x7f0000000240)={0x0, 0x18, &(0x7f00000000c0), 0x31}, 0x0) 25m39.962053737s ago: executing program 37 (id=3775): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.time\x00', 0x26e1, 0x0) write$cgroup_pid(r0, 0x0, 0x0) (async, rerun: 64) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (rerun: 64) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000080)={'bond_slave_0\x00', @remote}) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{0x1, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x3, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd9, 0x0, 0x0, 0x0, 0x101}, [@printk={@llx}, @alu={0x7, 0x0, 0xd, 0x2, 0x4, 0x66, 0xfffffffffffffff0}, @exit]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x20, 0xf, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x6, 0x3, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0xc1e9}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffa}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x6b, &(0x7f0000000500)=""/107, 0x41100, 0x0, '\x00', 0x0, @netfilter=0x2d, r1, 0x8, &(0x7f0000000580)={0x5, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0x1, 0x5, 0x1da}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000600)=[r0, r1, r1, r0, r3, r1], 0x0, 0x10, 0x3}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async, rerun: 64) r5 = socket$nl_audit(0x10, 0x3, 0x9) (rerun: 64) sendmsg$AUDIT_GET_FEATURE(r5, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x10, 0x3fb, 0x928, 0x70bd29, 0x25dfdbfe, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8050}, 0x40000) 25m20.379191302s ago: executing program 0 (id=3780): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9549, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x0, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x2c}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x80}, 0x0, 0xca, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r6) r7 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) recvmsg$unix(r5, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000180)=ANY=[@ANYRES8=r6, @ANYBLOB="3e971d"], 0x9a) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r4, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r13, 0x1, 0x10, &(0x7f0000001280), 0x4) r14 = getpid() sendmsg$unix(r12, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000240)='C', 0x1}], 0x1, &(0x7f0000000e00)=[@cred={{0x1c, 0x1, 0x2, {r14, 0x0, 0xee01}}}], 0x20, 0x10}, 0x80) write$cgroup_pid(r12, &(0x7f0000000400), 0x12) recvmsg(r13, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x2002) r15 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000700000095000000000000002516206d4aa23c418f3fa4ecb38507509599c1a493e17758760b9c99c16d749030f1c7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', r11}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000840)=@bpf_ext={0x1c, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000009fda6b63290000000000000095000000fd000000"], &(0x7f0000000040)='GPL\x00', 0x10000, 0x0, 0x0, 0x40f00, 0x0, '\x00', r10, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xbddd, r15, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newtaction={0x64, 0x30, 0xffff, 0x3, 0x0, {0x0, 0x0, 0x1300}, [{0x50, 0x1, [@m_csum={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x9, 0x8, 0x8, 0x4, 0x6}, 0x48}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x2, 0x2}}}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x2404c080}, 0x0) 25m19.783973622s ago: executing program 0 (id=3787): r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="1400000016000b63d25a80648c2594f90d24fc60", 0x14}], 0x1}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000080)="5c00000013006bec9e3be35c6e17aa31076b876c1d0000007ea60864160af3653c001ac00400020208000200030001002c000000eab556a705251e618294ff0051f60a84c9f4d4938037e786a6d0000300000000000000ffffc6c953", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x7c}, 0x1, 0x0, 0x0, 0x8080}, 0x20004450) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x8, 0x830b}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = getpid() r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r7 = openat$cgroup_devices(r6, 0x0, 0x2, 0x0) write$cgroup_devices(r7, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) fstat(r8, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(0xffffffffffffffff, 0x0, 0x4800c) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b26, &(0x7f0000000280)={'wlan1\x00', @random="6a50bae0b3e5"}) r9 = socket$kcm(0x10, 0x2, 0x0) r10 = socket$kcm(0x2a, 0x2, 0x0) sendmsg$kcm(r10, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x20004081) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0x1f, &(0x7f0000000040)=[{&(0x7f0000000180)="2e00000011008b88040f80ec59acbc0413a1f8480f0000005e2900421803001825000a001400000002800000121f", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x3}, 0x100, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) 25m18.591764897s ago: executing program 0 (id=3795): r0 = socket$nl_crypto(0x10, 0x3, 0x15) recvmsg(r0, &(0x7f0000000440)={&(0x7f0000000140)=@nl, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000000)=""/32, 0x20}, {&(0x7f00000001c0)=""/231, 0xe7}, {&(0x7f00000002c0)=""/223, 0xdf}], 0x3, &(0x7f0000000400)}, 0x40000030) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x3, 0x9, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x880, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$kcm(0x29, 0x2, 0x0) mount$bpf(0x0, &(0x7f0000000240)='./cgroup/cgroup.procs\x00', &(0x7f00000002c0), 0x2000000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 25m17.572524948s ago: executing program 0 (id=3797): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0}, 0x28) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)=ANY=[@ANYBLOB='*\x00\x00', @ANYRES32, @ANYBLOB], 0x20) getpid() sendmsg$kcm(0xffffffffffffffff, 0x0, 0x8000) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d34, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x6, 0x4, 0x1, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{}, &(0x7f0000000040), &(0x7f0000000140)=r4}, 0x20) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r5 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$kcm(r5, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x20040000) sendmsg$inet(r5, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @local}, 0xfc, 0x0}, 0x30004001) sendmsg$sock(r5, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000500)="7a6eca88ca428c8d4f36c8b8fc", 0xd}], 0x1}, 0x4004) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) sendmsg$tipc(r0, &(0x7f0000000240)={0x0, 0x18, &(0x7f00000000c0), 0x31}, 0x0) 25m17.246762886s ago: executing program 0 (id=3800): socket$kcm(0x10, 0x2, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x0, 0xfffffbff, 0x3, 0x2, 0x5, 0x6, 0x0, 0x0, 0x0, 0x8002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0xa, &(0x7f0000000680)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000002c0000000000000018000000000000000000000000000000950000000000000095"], &(0x7f0000000000)='GPL\x00', 0x4}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xffffffffffff66b1}, 0x0, 0x0, 0x0, 0x8, 0x43fe, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0xa, 0x1, 0x106) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1e37cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x401, 0x200, 0x0, 0x7, 0x0, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x50) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x2, 0xfffffffe, 0x6, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000004c0000004c00000002000000000000000000000300000000020000000200000000000000000000000000000105000000080000020000000002000005000000000000000001000000000000000000000001"], 0x0, 0x66}, 0x20) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000100)=r1, 0x4) sendmsg$inet(r0, 0x0, 0x408c4) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000400)="a5d0", 0x1b8a}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) 24m29.798967858s ago: executing program 38 (id=3802): socket$kcm(0x10, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[], 0x50) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000140000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = getpid() r1 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x2, 0xfffffffe, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f00000008c0), 0x43) r4 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000001c0)="39000000140081ae0000dc676f97daf01e2357f9ffffffffffffff0521018701546fabca1b4e8a06a6580e88370200c54c1960b89c40ebb373", 0x39}], 0x1}, 0x0) 24m28.103902302s ago: executing program 39 (id=3803): socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffe, 0x0, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r2, &(0x7f0000000080)={&(0x7f0000000100)=@hci={0x1f, 0x0, 0x5}, 0x80, &(0x7f0000001300)=[{&(0x7f0000000240)="27050200340f3c000600002fb96dbcf706060000170000005f45f491bdd54ec5ff1144ee162fd4b8bf7256da82f600102c21880b00000000010040570000000600000000000000805db18fc083", 0x4d}, {&(0x7f0000001340)="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", 0xf36}], 0x2}, 0x9cdc2384056b48b8) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)={0x14, 0x23, 0x301, 0x270bd24, 0x25dfdbfa, {0x1}}, 0x14}}, 0xc004) 24m27.001694987s ago: executing program 40 (id=3798): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x9549, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffed, 0x0, @perf_config_ext={0x74, 0x1ef7}, 0x10c7a, 0x4, 0x1, 0x3, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x2000000000000020}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114815, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="d8000000180081054e81f782db4cb904021d0800fe007c05e8fe55a10a0015000200142603600e12080005007f370401a8001600200006000400027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2e98a61e284ce5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e970392", 0xd8}], 0x1}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) mount$bpf(0x0, &(0x7f0000000240)='./file0/../file0\x00', 0x0, 0x100000, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89fc, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000400)}, {0x0}, {0x0}], 0x3, &(0x7f0000000c80)=ANY=[], 0x240}, 0x1) socketpair(0x25, 0x80000, 0x38000000, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f00000004c0)={&(0x7f0000000100)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000280)="afb083275068ac106c24a7cff13d6ae766521721062d8f9c5159648005de1c74c341ff01feca366f703beae6e3dda5ed98468f74b01df90be6f04dd99b4b0c5b953c1ed518a707f2ee59c4c30cc259a4fa6d894ee37e68abbac35be85cc917942a70fc0a466205222b1a33b7dd739b8750bbbe42fb813bedda8ee07b091dc3b62ed9498b1cbc51af85ef273c7c81f993e479f5e15b6112932f7ccbf3241637546451b2ed7044bca2d25c286b7f0a39290c59fd22b4405d2608670d25", 0xbc}], 0x1, &(0x7f0000000400)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6e}}, @ip_ttl={{0x14, 0x0, 0x2, 0xcd}}, @ip_ttl={{0x14, 0x0, 0x2, 0x889}}, @ip_ttl={{0x14}}], 0x60}, 0x8001) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[], 0x50) socket$nl_xfrm(0x10, 0x3, 0x6) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="d8000000180081054e9cf783db4cb9040a1d080006007c09e8fc55a10a0015000600142603600e1208000f00fff00401a800080008000a4004080000055c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb71b14d6d930dfe144ecc447c65e206d25b4084121d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad9e3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd4e1ffffffffc1c9b6278754ca397c388b0dd6e4edef3d9300fc0d15", 0xd8}], 0x1}, 0x44) 24m27.001506658s ago: executing program 41 (id=3779): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x23, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8912, &(0x7f0000000080)='\x9dc#y@\xf5\xf1\x98\x1b\x93c\xa6?\x83m=\xe74\xb1\xc3\xa8/Y1\xaa\x94\xbb\xefz\xfe`\xaf\xa5\x19<\x8a\x00\x00\'3{\xac\xdb\xa3R\t \xde\x05\xf1\xfe\a\x00\x00:4\xd4\x8e\xf6`\xd8\x12\x00\x04\x00\x00\x00\x00\x00\x00\x19\xf5;\x13\xabm\x92\xb9\xebA\\\xb4\xf5&P\xb3\xf9\x97%\x9a[$\xf1\xe3\xbd\xd8\xf5\x00\xa8\x8d\xd8p\xbd\xe2\x17\xb5#/\xa0\xcd\xf3\xb9+\t\x80\x88\xb3!\x7f\x97\xbb2\x04Q\x1c\xc9S|\xa6\x16[^\x94\xff\x0e\xd8\b\xc7\xd3\x8ek/\xbbm\xceh\xe4\x17\xb7`\xc9\xa5\xaf\xf4!\xd4[\xb7\xfac\xa96\x85\x97\xba\xda\xca\x8ee<\t\xf7\xfcR\xf4l\xfb{\xdd\xba\xd3\x11 \"\xe4\xad\xdd\xa0Ut2\xad\xc0\xd7\r') bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x28) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000010) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="130000000700000002"], 0x48) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r3, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r3, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000640)=@newqdisc={0x34, 0x24, 0xf0b, 0x70bd2c, 0x25dfdbff, {0x0, 0x0, 0x12, r4, {0x0, 0x10}, {0xffff, 0xffff}, {0x2, 0x6}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@delchain={0x24, 0x65, 0x1, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0xb, 0x8}, {0x8005, 0x10}}}, 0x24}}, 0x0) 24m26.661676766s ago: executing program 42 (id=3800): socket$kcm(0x10, 0x2, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x0, 0xfffffbff, 0x3, 0x2, 0x5, 0x6, 0x0, 0x0, 0x0, 0x8002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0xa, &(0x7f0000000680)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000002c0000000000000018000000000000000000000000000000950000000000000095"], &(0x7f0000000000)='GPL\x00', 0x4}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xffffffffffff66b1}, 0x0, 0x0, 0x0, 0x8, 0x43fe, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0xa, 0x1, 0x106) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1e37cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x401, 0x200, 0x0, 0x7, 0x0, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x50) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x0, 0x2, 0xfffffffe, 0x6, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000004c0000004c00000002000000000000000000000300000000020000000200000000000000000000000000000105000000080000020000000002000005000000000000000001000000000000000000000001"], 0x0, 0x66}, 0x20) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000100)=r1, 0x4) sendmsg$inet(r0, 0x0, 0x408c4) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000400)="a5d0", 0x1b8a}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) 14m32.360301042s ago: executing program 3 (id=7530): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004", @ANYRES32=0x0], 0x48) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) getpid() getpid() fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) fstat(r2, &(0x7f0000000b40)) fstat(r1, 0x0) syz_clone(0x200, &(0x7f0000000780), 0x0, 0x0, &(0x7f0000000800), 0x0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x48, 0x2, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}]}, 0x48}}, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r3, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x30004081) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x16, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000180000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085000000a0000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='syzkaller\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x94) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x20, 0x12, 0xa01, 0x0, 0x0, {0x80}}, 0x26}}, 0x0) 14m31.948855819s ago: executing program 3 (id=7534): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x6c, 0x0, 0xb, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, [@NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_NAME={0xe, 0x1, 'syzkaller\x00'}, @NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_NAME={0x5, 0x1, '\x00'}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_COMPAT_NAME={0xe, 0x1, 'syzkaller\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) 14m31.673017628s ago: executing program 3 (id=7536): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x92340, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x80002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0, 0x8}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5069}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000300)={0x5, 0x80, 0x4, 0x0, 0x1, 0x7, 0x0, 0x5, 0x2000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x5, 0x6, 0x7, 0x8, 0x8, 0x5, 0x0, 0x7, 0x0, 0x3}) socket$nl_audit(0x10, 0x3, 0x9) socket$l2tp6(0xa, 0x2, 0x73) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xaa}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00', 0x800}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 14m31.530253554s ago: executing program 3 (id=7537): r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xb, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x3, 0x2, 0x3, 0x1, 0x0, 0x67}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdir(&(0x7f0000001a80)='./file0\x00', 0xb33328a401cad7d9) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x989046, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x989046, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) mount$bpf(0x200000000000, &(0x7f0000000000)='.\x00', 0x0, 0x8b7848, 0x0) mount$bpf(0x200000000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x98d046, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_tracing={0x1a, 0x35, &(0x7f0000000540)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@map_val={0x18, 0x3, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xe}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xd}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xf77}}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7f}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x2, 0xac, &(0x7f0000000180)=""/172, 0x41100, 0xa3005c4beb02b6d1, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0x3, 0xffff, 0x6b}, 0x10, 0x1e3e8, r1, 0x5, &(0x7f0000000280)=[r5, r5, r5, r5, r5, r5, r5], &(0x7f0000000340)=[{0x4, 0x4, 0x6, 0x4}, {0x5, 0x4, 0x3, 0x4}, {0x2, 0x3, 0x0, 0x3}, {0x4, 0x5, 0xc, 0xa}, {0x0, 0x2, 0x8, 0x6}], 0x10, 0x15aaca06}, 0x94) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000002c0)=r6, 0x4) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xffc0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000140)=""/12, 0x0, 0xc, 0x0, 0x9f2a}, 0x28) setsockopt$sock_attach_bpf(r0, 0x29, 0x30, &(0x7f0000000100), 0x90) 14m30.499507556s ago: executing program 3 (id=7541): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x7c, 0x4}, 0x2, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0xa00000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x4000) socket$inet_sctp(0x2, 0x5, 0x84) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0xfffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback=0x31}, 0x94) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030033000b35d25a806c8c6f94f90224fc60100005000a000200053582c137153e37000c06", 0xfffffffffffffea7}], 0x1}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newqdisc={0x2c, 0x24, 0xf0b, 0x70bd2e, 0x0, {0x0, 0x0, 0x12, 0x0, {}, {0xffff, 0xffff}, {0x2}}, [@qdisc_kind_options=@q_mq={0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8004043}, 0x20040000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000700)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d, &(0x7f00000007c0)=[{}], 0x8, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x7c, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="e4b3a0847ab129507eee0ef33f9c9700b24be63e92f738d0dc83dc3ace7355e091089fb591e6d235813ee9cfad04740e62d60734a88d246e113eb0af9829bbe3d92859e216fcbb9715c824bb6332204503c6a2adaac3b29b6b423ac8", @ANYRES32, @ANYBLOB, @ANYRES32=r2, @ANYRES64=0x0], 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)=ANY=[], 0x20) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0xb, 0xffffffffffffffff}, 0xc, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x400200000000003e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_SET(0xffffffffffffffff, 0x0, 0x20004090) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r4 = bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r3}, 0x8) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(r4, &(0x7f00000001c0), 0xfffffdef) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xfe33) sendmsg$IPCTNL_MSG_CT_DELETE(0xffffffffffffffff, 0x0, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x98, 0x3, 0x7, 0x201, 0x0, 0x0, {0x7, 0x0, 0x8}, [@NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x6}, @NFACCT_FILTER={0x4c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x200}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x7}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xc55b}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xa5f}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x698}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xc00}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x7970}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x44841}, 0x4004000) 14m29.96494332s ago: executing program 3 (id=7545): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x5c, 0x0, 0xb, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, [@NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_NAME={0xe, 0x1, 'syzkaller\x00'}, @NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_NAME={0x5, 0x1, '\x00'}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) 14m29.263343301s ago: executing program 43 (id=7545): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x5c, 0x0, 0xb, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, [@NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_NAME={0xe, 0x1, 'syzkaller\x00'}, @NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_NAME={0x5, 0x1, '\x00'}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) 9m3.831868457s ago: executing program 2 (id=9752): r0 = socket$nl_route(0x10, 0x3, 0x0) (async) r1 = socket$kcm(0xa, 0x3, 0x73) setsockopt$sock_attach_bpf(r1, 0x29, 0x21, 0x0, 0x0) (async) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001940)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0xfffffffd, 0x25dfdbfc, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe56, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{0x0, 0x0, 0x20}, 0x97, 0x0, [{}, {}]}, [{}, {}, {}, {}, {}, {0x448eade7}, {0x0, 0x0, 0x80000000}, {}, {}, {}, {}, {}, {}, {0x2}, {}, {}, {0x0, 0x20000000, 0x0, 0xffffffff, 0x3}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0xfffffffc, 0x0, 0x0, 0x0, 0x2}, {}, {}, {}, {0x0, 0x4}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, {0xfffffffd}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, {0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0xfffffffe}, {}, {0xd5}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {0x0, 0x10}, {0x80000000}, {0x8eb9, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x4, 0x0, 0x7ee}, {}, {}, {}, {0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x9}, {}, {}, {}, {}, {0x3}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, {}, {0x0, 0x9, 0xfffffffc, 0x0, 0x0, 0xfffffffd}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {0x0, 0x0, 0x0, 0x4, 0x2}, {}, {}, {}, {}, {}, {0x10000}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xb}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x3}, {}, {}, {}, {}, {}, {0x0, 0x1}, {0x7}, {0x0, 0x1}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {0x2}, {0x2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {0x3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) (async) r2 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="1800000011140103400000000000000008004b"], 0x18}}, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x58, 0x140e, 0x1, 0x70bd26, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_RES_PDN={0x8, 0x3c, 0x4}, @RDMA_NLDEV_ATTR_RES_PDN={0x8, 0x3c, 0x3}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_RES_PDN={0x8, 0x3c, 0x4}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000080}, 0x20004000) 9m3.587827064s ago: executing program 2 (id=9756): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x40}, 0x0) r0 = socket$kcm(0x2, 0x3, 0x84) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000002"], 0x50) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x890b, &(0x7f0000000100)) 9m3.393317628s ago: executing program 2 (id=9757): r0 = socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x1000b, 0x8, 0x2}, 0x50) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0xffffffffffffffff}, 0x8, 0x0, 0x0, 0x0, 0x6, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x400200000000003e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000480)={0x2, 0x3, 0x0, 0x3, 0x13, 0x0, 0x4070bd2c, 0x25dfdbfc, [@sadb_key={0x3, 0x9, 0x80, 0x0, "1cdc0dca1d9f68846960e56de42944af"}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0x7, @mcast1, 0x80000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x7, 0xc, 0x80000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0xff, @local, 0x1ff}}, @sadb_x_sa2={0x2, 0x13, 0x2, 0x0, 0x0, 0x70bd29, 0x3506}]}, 0x98}, 0x1, 0x7}, 0x0) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="364000002600913e"], 0xfe33) 9m2.967738732s ago: executing program 2 (id=9761): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYRESOCT=0x0], &(0x7f0000000000)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r0, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0], 0x0, 0xb, &(0x7f0000000280)=[{}], 0x8, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x1f, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair(0x1, 0x2, 0x0, &(0x7f00000004c0)) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x20004450) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x32, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = getpid() r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(0x0, r2, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xa0800, 0x0) close(r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000007c0)) ioctl$SIOCSIFHWADDR(r6, 0x8943, &(0x7f0000000080)={'syzkaller0\x00'}) ioctl$SIOCSIFHWADDR(r6, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000001ac0)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001700010029bdf000fcdbdf2509000000c47ed8aa123fcd510e11edcc6e211bb61e64259984c57a31ff06479e685398095968615d7243543d8941003769273abd13012d14"], 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x30044012) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) fstat(r8, 0x0) 9m2.059430551s ago: executing program 2 (id=9764): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0xb, 0x0, &(0x7f0000000900)="e02742e8680d85ff978276", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x2000, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x9, &(0x7f0000000380), 0x98) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x48) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$bpf(0x200000000000, 0x0, 0x0, 0x999047, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4d31, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x1}, 0x1a308, 0x2, 0xfffffffe}, 0x0, 0xd, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x27}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) mount$bpf(0x0, 0x0, 0x0, 0x100000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0xa38, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0x10, 0x3, 0x10) mount$bpf(0x200000000000, &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x104000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000"], 0x48) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfe33) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000024c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000010000000900010073797a30000000002c000000030a01020000000000000000010000000900010073797a30000000000900030073797a310000000038000000030a01040000000000000000010000010900030073797a32000000000c00024000000000000000010900010073797a300000000054000000060a01040000000000000000010000000900010073797a310000000008000b40"], 0x7904}, 0x1, 0x0, 0x0, 0x4000040}, 0x0) 9m1.819864442s ago: executing program 2 (id=9767): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="3c00000000000200000000000700000001441cca1164"], 0x40}, 0x0) r0 = socket$kcm(0x2, 0x3, 0x84) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000002"], 0x50) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x890b, &(0x7f0000000100)) 9m1.579946723s ago: executing program 6 (id=9769): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000000c0), 0x0}, 0x20) socket$kcm(0x10, 0x2, 0x0) r1 = getpid() socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, 0x0, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x20004010) socket$kcm(0x22, 0x2, 0x21) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1948}, 0x10020, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x105e40, 0x102, 0xfffffffc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r5, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @local}, 0xfc, 0x0}, 0x30004001) setsockopt$sock_attach_bpf(r5, 0x6, 0xd, &(0x7f0000000000), 0x4) 9m1.263970834s ago: executing program 1 (id=9770): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_rdma(0x10, 0x3, 0x14) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{0x1, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000240)='%pI4 \x00'}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000006c0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x50) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r0, 0x0, 0x40804) r2 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x100, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2002c0c4}, 0x8000) r4 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000a80)=ANY=[@ANYBLOB="140000002e000701fc8dfaff9b000015da91ad00"], 0x14}, 0x1, 0x0, 0x0, 0x488c4}, 0x2400c080) close(r6) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48815}, 0xc404) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) sendmsg$NFNL_MSG_CTHELPER_GET(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000004c0)={0x1c8, 0x1, 0x9, 0x3, 0x0, 0x0, {0xa, 0x0, 0xf}, [@NFCTH_TUPLE={0x9c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0xb}}, {0x14, 0x4, @loopback}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x20}}, {0x8, 0x2, @rand_addr=0x64010101}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1b}}}}]}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_STATUS={0x8}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x5}, @NFCTH_STATUS={0x8}, @NFCTH_TUPLE={0xe8, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @multicast1}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private=0xa010102}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x14, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0x12}}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @loopback}}}]}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x8}}]}, 0x1c8}, 0x1, 0x0, 0x0, 0x8041}, 0x20040000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYRES64=r5], 0xfdef) 9m0.549854989s ago: executing program 1 (id=9771): bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="090000000600000004000000fc"], 0x48) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000ec0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x10) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8081}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x100, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x40, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0x10, 0x2, 0x0) r1 = getpid() r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x22, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x1}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xf}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000740)=ANY=[@ANYBLOB="0203f602310000002cbd7000fbdbdf2502000900080000001c0000000000000005000600000000000a0000000000000000000000000000000000000000000001020000000000000002000100000000000000070c0000000005000500000000000a00000000000000fc0100000000000000000000000000010700000000000000210008000008"], 0x188}, 0x1, 0x7}, 0x0) 9m0.443236289s ago: executing program 6 (id=9772): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000000c0), 0x0}, 0x20) socket$kcm(0x10, 0x2, 0x0) r1 = getpid() socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, 0x0, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, 0x0, 0x20004010) socket$kcm(0x22, 0x2, 0x21) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1948}, 0x10020, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x105e40, 0x102, 0xfffffffc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r5, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @local}, 0xfc, 0x0}, 0x30004001) setsockopt$sock_attach_bpf(r5, 0x6, 0xd, &(0x7f0000000000), 0x4) 9m0.160817116s ago: executing program 1 (id=9773): r0 = socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x8, 0x2004}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETGEN(r1, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, 0x10, 0xa, 0x801, 0x0, 0x0, {0x5, 0x0, 0x4}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) recvmsg(r0, &(0x7f0000001540)={&(0x7f0000000cc0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000d40)=""/70, 0x46}, {&(0x7f0000000dc0)=""/40, 0x28}, {&(0x7f0000000e00)=""/251, 0xfb}, {&(0x7f0000001040)=""/193, 0xc1}, {&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000000f00)=""/77, 0x4d}, {&(0x7f0000001140)=""/209, 0xd1}, {&(0x7f0000001240)=""/145, 0x91}, {&(0x7f0000001300)=""/117, 0x75}], 0x9, &(0x7f0000001440)=""/196, 0xc4}, 0x40000020) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x8, 0x830b}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001e80)=@newtaction={0x48, 0x32, 0x1, 0xfffffffd, 0x25dfdbfb, {0x0, 0x0, 0x11}, [{0x34, 0x1, [@m_police={0x30, 0x1, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc, 0x3, {0x1}}, {0xc}}}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x8800}, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001d80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe, 0x6000002c, &(0x7f0000000100)="b9ff03316844268cb89e14f0080048e0050000000000008877fbac141516e0000001440404feb180008903040000845013f2325f003901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0103461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014c0000c0adc043084617d7ecf41effff38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d7da058f6efa6d1f5f7ff400"/254, 0x0, 0x14, 0x60000000, 0x0, 0xfffffffe}, 0x2c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000018c0)={{r4}, &(0x7f0000001840), &(0x7f0000001880)=r2}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{}, &(0x7f0000000240), &(0x7f0000000280)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000240)=ANY=[@ANYRES32=r4], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000c80)={0x1, &(0x7f0000000340)=[{0x5, 0x2, 0x2, 0x7f}]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r6, 0x5, 0x7, 0x0, &(0x7f0000000380)="25a688a800a344", 0x0, 0xd00, 0x2a0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="340000003e000701feffffff00000000017c0000040042800c000180061206129039fe"], 0x34}, 0x1, 0x0, 0x0, 0x4000895}, 0xc000) 8m59.939249065s ago: executing program 1 (id=9775): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[], 0x20}, 0x1, 0x0, 0x0, 0x40098}, 0x20008854) 8m59.80771799s ago: executing program 1 (id=9777): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0xb, 0x0, &(0x7f0000000900)="e02742e8680d85ff978276", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x2000, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x9, &(0x7f0000000380), 0x98) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x48) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$bpf(0x200000000000, 0x0, 0x0, 0x999047, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4d31, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x1}, 0x1a308, 0x2, 0xfffffffe}, 0x0, 0xd, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x27}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) mount$bpf(0x0, 0x0, 0x0, 0x100000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0xa38, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0x10, 0x3, 0x10) mount$bpf(0x200000000000, &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x104000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000"], 0x48) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfe33) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000024c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000010000000900010073797a30000000002c000000030a01020000000000000000010000000900010073797a30000000000900030073797a310000000038000000030a01040000000000000000010000010900030073797a32000000000c00024000000000000000010900010073797a300000000054000000060a01040000000000000000010000000900010073797a310000000008000b40"], 0x7904}, 0x1, 0x0, 0x0, 0x4000040}, 0x0) 8m59.588222655s ago: executing program 1 (id=9779): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x4, 0x2}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000b0000000300000000", @ANYRES32], 0x50) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socket$nl_route(0x10, 0x3, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfe33) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="240000003800250825bd7000f9dbdf250f000000100007800c00028008"], 0x24}, 0x1, 0x0, 0x0, 0x4050}, 0x804c050) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x5}, 0x100, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)={0xac, 0x40, 0x107, 0xfffffffe, 0x0, {0x1, 0x7c}, [@nested={0x4, 0x142}, @nested={0x83, 0x1, 0x0, 0x1, [@generic="5e591df4b1e17bfd8ff540036516246e5b48a89c2cf15233d3798be3437e956c0060e6372e1eb8750193551eda8ef83c8cd0bd807ad5989471654eda7ba3ec4ccb1baea646e47f433d9cbdfeaa36a31f90958b8cbb44588590ab4f6dfc08b9fcab7aad61ef0ead3b5a5f93fca26e2d8b31ed2351a5516d217aa30b9e3bf321"]}, @nested={0x10, 0x2, 0x0, 0x1, [@nested={0x9, 0x14, 0x0, 0x1, [@nested={0x4, 0x18}, @generic=')']}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x48815}, 0xc000) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair(0x28, 0x2, 0x0, &(0x7f0000000200)) 8m59.290288632s ago: executing program 6 (id=9782): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, &(0x7f00000002c0)}, 0x20) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x801, 0x9, 0x6, 0x6, 0xfffffffffdf7bbfe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x200000001}, 0x0, 0x4000000000e, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, 0x0}, 0x28) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x18, &(0x7f00000000c0), 0x31}, 0x0) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)=@o_path={&(0x7f00000000c0)='./file0\x00', 0x0, 0x4008, r2}, 0x18) r4 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x100, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) fstat(r4, &(0x7f0000000200)) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x12, 0x5, &(0x7f0000000080)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x5, 0x49, &(0x7f0000000280)=""/73, 0x41000, 0x44, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r4, 0x0, &(0x7f0000000340)=[0x1], 0x0, 0x10, 0x8}, 0x94) r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb0900, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x1000000, 0x1000000, 0x4, 0x3fe, 0xfffffffc, 0x400}, 0x0, 0x3, 0xffffffffffffffff, 0xa) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, 0x0, &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r7, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000003c0)={@fallback, 0x10, 0x0, 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)=ANY=[@ANYRES32=r6, @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00\b\x00\x00\x00', @ANYRES32=r7, @ANYBLOB, @ANYRES32=r7, @ANYBLOB="ee0c3983e14c9b00000058e43f8225d09ccca34ea5a2", @ANYRES64=r8], 0x20) socket$inet_mptcp(0x2, 0x1, 0x106) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r4, 0x0, 0x5, &(0x7f0000000400)=',%$/\x00'}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r9, 0x1, 0x4c, &(0x7f0000000000), 0x4) recvmsg$unix(r9, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x2000) ioctl$TUNSETNOCSUM(r10, 0xff05, 0x0) r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r10}, &(0x7f0000000000), &(0x7f0000000240)=r11}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000e00000000000000050000001836000002000000000000000000"], &(0x7f0000000300)='GPL\x00', 0x2, 0x59, &(0x7f0000000340)=""/89, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0xa, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[r0, r0, r0, r0, r0, r0, r0, r0, r0], 0x0, 0x10, 0x10000}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r5, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xd5, &(0x7f0000000700)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000740), &(0x7f0000000840), 0x8, 0x7a, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f00000005c0)={0xc}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000a80)=ANY=[@ANYRES32=r10, @ANYRES32=r3, @ANYBLOB="060000001400000000000000", @ANYRES32, @ANYBLOB="af263d92198e5c070a1af5b83c07eb033c1da3ac678450a5b95db69d4954745438468d65640497371ad0b2d862bf4129e13bb8d2e4ac7f6b2ad6231b60b4df7dfc4781e47df9c3b85bdcfbe422e506fb599e90e58106eb1d5f96b43029064c0bd3c3aa4d951fc0bb", @ANYRES64=r8], 0x20) 8m58.365632827s ago: executing program 6 (id=9787): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB], 0x20}, 0x1, 0x0, 0x0, 0x40098}, 0x20008854) 8m58.117666045s ago: executing program 6 (id=9789): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0xb, 0x0, &(0x7f0000000900)="e02742e8680d85ff978276", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x2000, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r2, 0x84, 0x9, &(0x7f0000000380), 0x98) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x48) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$bpf(0x200000000000, 0x0, 0x0, 0x999047, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4d31, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x1}, 0x1a308, 0x2, 0xfffffffe}, 0x0, 0xd, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x27}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) mount$bpf(0x0, 0x0, 0x0, 0x100000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0xa38, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0x10, 0x3, 0x10) mount$bpf(0x200000000000, &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x104000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000"], 0x48) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x80) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfe33) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000024c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000010000000900010073797a30000000002c000000030a01020000000000000000010000000900010073797a30000000000900030073797a310000000038000000030a01040000000000000000010000010900030073797a32000000000c00024000000000000000010900010073797a300000000054000000060a01040000000000000000010000000900010073797a310000000008000b40"], 0x7904}, 0x1, 0x0, 0x0, 0x4000040}, 0x0) 8m57.844474237s ago: executing program 6 (id=9793): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket(0x10, 0x803, 0x0) r1 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x9, 0x9}, 0x11efa, 0x4, 0x98, 0x7, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f31, 0xc220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb26, 0x200000000002}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x10, &(0x7f0000000b00)=ANY=[@ANYBLOB="1808000c6e8f00000000000000000000000000b70800e7ff0000007b8af8ff00000000aa080000000000007b8af0ff00000000bfa100000000000007010000f8d1e222e8215affffffbf"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r3, 0x84, 0x85, &(0x7f0000000ac0), 0x90) sendmsg$inet(r3, &(0x7f00000006c0)={&(0x7f0000000080)={0x2, 0x0, @private=0xa010100}, 0x10, &(0x7f0000000300)=[{&(0x7f00000000c0)="83", 0x1}], 0x1}, 0xe0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a3c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c00018006000100d103000014000000110001"], 0xa4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000050000080900010073797a30000000005c000000030a1b000000000000000000050000000900010073797a300000000009000300"], 0xa4}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x11, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000040000000000000a20000000000a0300"], 0x122}}, 0x0) 8m46.724910835s ago: executing program 44 (id=9767): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="3c00000000000200000000000700000001441cca1164"], 0x40}, 0x0) r0 = socket$kcm(0x2, 0x3, 0x84) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000002"], 0x50) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x890b, &(0x7f0000000100)) 8m44.378716202s ago: executing program 45 (id=9779): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x4, 0x2}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000b0000000300000000", @ANYRES32], 0x50) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socket$nl_route(0x10, 0x3, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfe33) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="240000003800250825bd7000f9dbdf250f000000100007800c00028008"], 0x24}, 0x1, 0x0, 0x0, 0x4050}, 0x804c050) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x5}, 0x100, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)={0xac, 0x40, 0x107, 0xfffffffe, 0x0, {0x1, 0x7c}, [@nested={0x4, 0x142}, @nested={0x83, 0x1, 0x0, 0x1, [@generic="5e591df4b1e17bfd8ff540036516246e5b48a89c2cf15233d3798be3437e956c0060e6372e1eb8750193551eda8ef83c8cd0bd807ad5989471654eda7ba3ec4ccb1baea646e47f433d9cbdfeaa36a31f90958b8cbb44588590ab4f6dfc08b9fcab7aad61ef0ead3b5a5f93fca26e2d8b31ed2351a5516d217aa30b9e3bf321"]}, @nested={0x10, 0x2, 0x0, 0x1, [@nested={0x9, 0x14, 0x0, 0x1, [@nested={0x4, 0x18}, @generic=')']}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x48815}, 0xc000) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000dc0)=ANY=[@ANYBLOB="7a0af8ff7525707cbfa100000000000007010000f8ffffffb702000005000000bf130000000000008500000006000000b700000000000000950000ff00000000b2595285faa6ead0169191d54f8196217fc563e2fc91f6da4dad4fdc2eb1b5986fc4a3f611a7c80000040000000000b1a297cfddd73f30f2382f6cda4bfdd45be583823c0f092248a57d48621f3c1c65ee19ee875daf45006a4c4ea5e15b2f9618d547244a22000000000800db583620ce7243d1ae9f2cfe401dbef6619358399aa9c2acd068c03efefd8bc77edf2d34b12cd48a1b20fb7dd843267e0331759f4ec6b5b0af58e604f494eff289026d5045ef08000000000000007718a09f4800afc26abba34635d0e8b598a51bc742135a6e1d33fe226c944bc70bb30d435aa8b5202db761014b1b999a12df6bee431a6681000000263b6233e1c0fe30e384c3cb07b74a72291a1a2b523dd81b6651b1ee48e999bb004823ebcd8c65743f31f84b263ab9b3426692f01ad194f302d7a658e90000000001000000b6b2f25ddb8c640ab321a402058c9221b6870814cf4ee23ddb79fff5eb156e0a000000000000f2bd1d4a178d86d6935eb8b75bc4eb680d10e8b6a54c5c5b011cf63ff76622939a20d4aadf85db40179c2cf83ee07e30a279d8f9f3bc282deb53a03409f8e6972f3f720d045923702cede0f3e91411f3f1b16f065624f280a7dcce8db910f93c49b9e0aa390d0da6972ed719d7e0efb2bb713d1890e317c8de105c3933fd5d5bf38f6b9fc39fc829dcfe4af8ac5fbb7314a7a433e0182767d1376eda2b9c66200349e62d4d0ab1a1dc51907c9800000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair(0x28, 0x2, 0x0, &(0x7f0000000200)) 8m42.743474433s ago: executing program 46 (id=9793): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket(0x10, 0x803, 0x0) r1 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x9, 0x9}, 0x11efa, 0x4, 0x98, 0x7, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f31, 0xc220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb26, 0x200000000002}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x10, &(0x7f0000000b00)=ANY=[@ANYBLOB="1808000c6e8f00000000000000000000000000b70800e7ff0000007b8af8ff00000000aa080000000000007b8af0ff00000000bfa100000000000007010000f8d1e222e8215affffffbf"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r3, 0x84, 0x85, &(0x7f0000000ac0), 0x90) sendmsg$inet(r3, &(0x7f00000006c0)={&(0x7f0000000080)={0x2, 0x0, @private=0xa010100}, 0x10, &(0x7f0000000300)=[{&(0x7f00000000c0)="83", 0x1}], 0x1}, 0xe0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a3c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c00018006000100d103000014000000110001"], 0xa4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000050000080900010073797a30000000005c000000030a1b000000000000000000050000000900010073797a300000000009000300"], 0xa4}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x11, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000040000000000000a20000000000a0300"], 0x122}}, 0x0) 1m16.339671098s ago: executing program 8 (id=12826): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sendmsg$inet(r0, &(0x7f0000000480)={&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000040)="cb363dee90d9d9ae077a391a010529020dbd099eded97e5e6a00c5b33ad2642a4f85a5ac", 0x24}, {&(0x7f0000000100)}, {&(0x7f0000000140)="9eb06783ab1a74abb3099ce2974016ac26f3e5d419dde19f69f2b23b3e04b265eb891c863dd505", 0x27}, {&(0x7f0000000180)="ae8ad15d725e79bf05ba66e970be65021372ebe28ad8589c156e6a622596b8181f2844d13b517201457f91a3f81f0802f984b80d32d3e7470917dfdbef788189dd3bae6e6b360e6a0ba4ac3ddbf9c8f283e7ac262bc1c47a27ff81213e9b20959b75a281dffd84cac3e0942593c5ef8568e0c8bde9a5fe5276f6d083d0efede41eeca74dc084d1445e79932d020212ab2cbea8fb781a2e3eeb3c52c67da427", 0x9f}, {&(0x7f00000002c0)="0431da46754cdee8ea90654d95daa10b4b3b642b8b38a9f030cb55f3beb7a0d26791c2f3d727e8fa58235fa730bf772196087f43be139552d9e85aeedadc6ef48991b4942a76568c70388042eae07ac0030d9782da0dcc67884fab29e0e4b9b45e66807808459f1dd6eb021a", 0x6c}, {&(0x7f0000000340)="8abb9b8d548d1b75c13f01648d5ff84ff56746b50c9687a8f4d2aece38450265bd9d2fe151a9852f640210980677afd3fa877b791ff2769196b1d9f87226e0c1a1bdf70b2f29", 0x46}, {&(0x7f00000003c0)="11046b1ddc8db7e1d2e40d0bed0561045eff799b2c98b69164a2794cdd39d5ef48918d9cf77a49f9f6212fef77c2429607602487baa7ecab2a54813170da05e5a3a82e7dcd7a4511b7829064f8920121f0b545fbf7bd5a1b4d6a2dd1cc526ddf2f8d315131ca675d9043345222050ba8f20aa727c6d293d0741484e9ba4a80e2dd3a8ddfaf72523bb8122b232145c97c9e1338fd5cf65a28d3c2ff02bf8d349b69885e56729365afb3b4be19a1131af78b5386e9", 0xb4}, {&(0x7f0000000580)="936265e0b9920a4bc81fe3a80bb935d5c4e8259b5208c7eedaec8e86093ae26b08e1806e53bcfd0b530f475a8241e2e4fdfdb3db08448f594941e4b001f92aea12ff39e165a90ffdce6bb68a8f12d56b93ff2f5584ee2fc08d9d82c3d11fef00a2c45dbc65a80374cb66849532b44cc1fb629ff3ec4d22b9679241b0969ef1ff020729f5163781da2171f7d8a61098e29b1a958a8f9b7c7fb2227ea2f7705161f237e24354de1f9182422e5065909332fd9c2c67b29c8f330204c25320d6", 0xbe}], 0x8, &(0x7f0000000740)=[@ip_ttl={{0x14, 0x0, 0x2, 0xffff3e31}}, @ip_retopts={{0xc8, 0x0, 0x7, {[@noop, @ssrr={0x89, 0xb, 0x30, [@private=0xa010101, @empty]}, @timestamp_addr={0x44, 0x4c, 0x93, 0x1, 0x7, [{@multicast2, 0x1}, {@rand_addr=0x64010100, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@loopback, 0x4}, {@multicast2, 0x6d9fe6eb}, {@remote, 0x6}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x401}, {@local, 0x6}, {@loopback, 0x80000000}]}, @timestamp={0x44, 0x20, 0xd1, 0x0, 0x4, [0x7ff, 0x3, 0xfffffffe, 0x0, 0x101, 0x8, 0x9]}, @timestamp_addr={0x44, 0x14, 0x88, 0x1, 0x3, [{@broadcast, 0x8}, {@empty, 0x800}]}, @ra={0x94, 0x4}, @lsrr={0x83, 0x27, 0xe9, [@multicast2, @private=0xa010100, @loopback, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x2d}, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, @local, @multicast1]}]}}}], 0xe0}, 0x8000) r1 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="85000000070000006a0a00ff000000000c00000000000000950000000000000018100000", @ANYRES32, @ANYBLOB="000000000000000005000000000000009500000000000000b1f8306e05d1e4aab009c16b5c05077115d0749619ca39f89974785ae0619b77c6585f678ac92a3b6b4148f56b43c3dd75d75f97c8f92f60a2def458df05e2fbfb3e849b2b3cffd4f29446ae60dd76654b2639b2bc14350706214a6ab7a712d4317fbc3ca01d0d3ed6110b3775903141a5091a4d3db8eb335414fbdb288aba73aaf6d18000a3a2a069cf7f9402e1425bb6bc370576aa1faea0fe222671ecf99038fce8dba53dcb11f87cca"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e}, 0x2d) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)={@ifindex, r1, 0x11}, 0xa) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x1954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0x9, 0x0, 0x0, 0x0, 0x20}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.current\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) close(r6) ioctl$SIOCSIFHWADDR(r6, 0x8b1a, &(0x7f0000000000)={'wlan1\x00', @random="0000230c1100"}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000b40)=r4}, 0x20) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000bc0)={0xffffffffffffffff, 0xfffffff7, 0x10}, 0xc) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c40)=@generic={&(0x7f0000000c00)='./file0\x00', 0x0, 0x10}, 0x18) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x7a4e, 0x0, 0xffffffffffffffff, 0xb, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x50) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000d00)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x50) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000300000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r12}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000200)={0x0, &(0x7f0000001d80)=""/183, &(0x7f0000000500), &(0x7f00000006c0), 0x3, r12}, 0x38) r13 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000d80)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x3}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000e80)={0x6, 0xf, &(0x7f00000009c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x14a8, 0x0, 0x0, 0x0, 0x1}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_val={0x18, 0xa, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000840)='GPL\x00', 0x7fff, 0x6c, &(0x7f0000000a40)=""/108, 0x40f00, 0x10, '\x00', 0x0, 0x25, r6, 0x8, &(0x7f0000000940)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000ac0)={0x2, 0x7, 0x0, 0x800}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000e00)=[r7, 0xffffffffffffffff, 0x1, r8, r9, r10, r11, r12, r13], &(0x7f0000000e40)=[{0x3, 0x1, 0xb, 0xf}, {0x4, 0x4, 0xf, 0x6}], 0x10, 0xb}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[], 0x10) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x76, 0x1ef7}, 0x9000, 0x1, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x19) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000001000010000000000000000000700000a78000000060a030400000000000000000a0000010900010073797a31000000004c000480480001800b000100746172676574000038000280240003000739f2f10455afb9fdd672bad09dfb78c7699c74e891a0c700000000000000000800024000000000080001004c4f47000900020073797a32"], 0xa0}, 0x1, 0x0, 0x0, 0x4000850}, 0x20040040) 1m16.04518209s ago: executing program 8 (id=12829): bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x13, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x9, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180000000800000000"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="240000002c0007012bbd7000ffdbdf25047c0000080001800400dd8008000380040003"], 0x24}}, 0x2000c004) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) socket$kcm(0xa, 0x5, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x6, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x3, 0x5, &(0x7f0000000b40)=ANY=[@ANYBLOB="180200000002000000000000000040008500000020000000850000002300000095"], &(0x7f0000000080)='GPL\x00'}, 0x94) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe, 0x66c}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000bf000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) getpid() perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0x11, 0x2, 0x0) socket$kcm(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x8}, 0x6018, 0x0, 0x2, 0x6, 0x3fe, 0x7ffffffc, 0x400, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32, @ANYBLOB="8700"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000b715556f00000000090000dd00000072d903a6eff35ea3fc0b4a7a8474dd2f0000000000000000000000000000005776874ce406826180e5aac1cbf0"], 0x76) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000001500010300000000000000000a00000008000200", @ANYRES64=r4], 0x1c}}, 0x0) 1m15.914432392s ago: executing program 8 (id=12831): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7ffeffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x3}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x4, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) close(r1) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000000c0)="5c00000014006b05c84e21000ab16d6e230675f811000000440002005817d30461bc24eeb556a7ef59510525ba56dcd79a36c23d3b9844e1571a86ea1698fa51f60a64c9f408000000e786a6d0bdd70000b6c0504bb9189d9193e9bd", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x40004) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x14, 0x18, 0x107, 0xfffffffe, 0x0, {0x1, 0x7c}}, 0x14}, 0x1, 0x0, 0x0, 0x4048011}, 0xc000) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000300)={{}, 0x0, 0x0}, 0x20) recvmsg$unix(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102"], 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@phonet, 0x80, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xeaff}, 0x0) 1m15.72696826s ago: executing program 8 (id=12834): perf_event_open(0x0, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0xa) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x9, 0x0, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0xa, 0x1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x4000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000079104800000000007100330000000000950003"], 0x0, 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'vlan1\x00', @random="010000201000"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'vlan0\x00', @random="010000201000"}) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) sendmsg(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdfe}, 0x8800) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0500000003f01f006600", @ANYRES32, @ANYRES32], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x38) syz_open_procfs$namespace(0x0, &(0x7f0000000780)='ns/pid_for_children\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) socket$kcm(0x22, 0x2, 0x21) socket$kcm(0x11, 0x200000000000002, 0x300) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4048886) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r3, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r3, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x1943}, 0xa720, 0x2, 0x0, 0x8, 0x1, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000001700000095"], &(0x7f00000005c0)='GPL\x00', 0x8, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r4, 0x4000000, 0x2000, 0x2000, &(0x7f0000000040)="976d9023d56482cd284a63da539706d7009be646625bd75b025352ebe557df463106baeed6c2d75549b140f143fb8bb67bfe5b308b8d05758115c7ad", &(0x7f0000000180)=""/114, 0x0, 0x0, 0xd8, 0xc4, &(0x7f0000000400)="cf2240e6919817e49555d221b4e6c6ba11c4d974ddab2318db7b52cee499399a00be4b71119246d7bca28cc8346eb84414e45f3f4633f4acb77bf8cc38c4c16fe035905db79cdc0be634a915662c4cac58ae94706f86ea320f339c21399b5bb7607044916c63c528ab4149718d6215a9a3749113c268e49b2b9dae91ed804e5ac5d4ec7ac9c5fd67a76f9a2b06f7304f6e81221a751008e786e1edde82cf1ecb76cb4cd71cf781ea3a19b917a1e215b1a6c7ee605b32b91eaae38517fde4303d5f2b1e63e9e52ae4b197fd72de1f71801e1f9f1369d1f530", &(0x7f0000000280)="bf049fd184f7b03c21d9bcddc4eef9ebb6a0da3eb91c56454e873dd7336ccf21a1eeb8da7adf80d6e06ef46c7f36222fadaed2103c286468b3f44adee51445bd1bedf8fcc1c0b9fdc8b3829b1bf0c9d2d409cdecb12ad033e299c029331993ae9760345bf7feb91ee96b0eee19454ad3dbce5019b68c114ff1921a9b4665744c7784ac6736101a70592d83c448a84c31ec60bb901d96ea99471d823ee523318878ee704a8d9502b566cad45587cb74ea8259c1c0a926fc09499395b2db5af40bb6f4c526", 0x0, 0x8000}, 0x24) 1m14.967942271s ago: executing program 8 (id=12839): bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[], 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10}, 0x0, 0xca, 0x0, 0x2, 0x0, 0x10, 0x0, 0x0, 0x5, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x828, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7ffb, 0xfcc9, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0x10, 0x2, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r5) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[@ANYRES8=r1, @ANYRES8=r4], 0x12) 1m14.795908145s ago: executing program 8 (id=12841): perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x3a7b, 0x0, 0x0, 0x9, 0x4, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x2, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000bc0)={r0, &(0x7f0000000ac0), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$kcm(0x2, 0x5, 0x84) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r2) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r3, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="5c00000015006b0300224ed86e6c1d0002117ea6e070d6064e22000300000000250002000f00000017d34460bc24eab556a705251e6182949a00003d3b48dfd8cdbf9767b4fa51f62a64c9f4060046d88037e786a6d0a5d700000017", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) sendmsg$inet(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x2, 0x4e24, @private=0xa010102}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000140)='A', 0x1}], 0x1}, 0x24008051) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000000), 0x0}, 0x20) 1m4.434616432s ago: executing program 5 (id=12908): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x922000000001, 0x106) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) sendmsg$NFT_BATCH(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a50000000060a0b043900000000000000020000002400048020000180070001006374000014000280080001400000000d080002400000000f0900010073797a30000000000900020073797a3200000000140000001100010000000000000000000000000ab5858462dbaf5eaab0aaf65b241b34a614bb63d330aa95cca41c04f1585bdbc1d0e0a065c4589ba539202df987a1512cca163884c3fbb05cdc8baad891d117a2e7893218"], 0x78}}, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r4, 0x84, 0x14, &(0x7f0000000000)=r6, 0x8) recvmsg$can_j1939(r6, &(0x7f0000001c00)={&(0x7f00000017c0)=@l2tp={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000001b80)=[{&(0x7f0000001840)=""/228, 0xe4}, {&(0x7f0000001940)=""/151, 0x97}, {&(0x7f0000001a00)=""/254, 0xfe}, {&(0x7f0000001b00)=""/114, 0x72}], 0x4, &(0x7f0000001bc0)=""/54, 0x36}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2105, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x828, 0x0, 0x0, 0x6, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000002c0)="2e00000011008b88040f80ee59acbc04130800480f0000005e2900421803001825800000000000000280000c0012", 0x2e}], 0x1}, 0x0) sendmsg$AUDIT_USER_AVC(r6, &(0x7f0000001780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x2080c02}, 0xc, &(0x7f0000001740)={&(0x7f0000000700)={0xfd0, 0x453, 0x2, 0x70bd29, 0x25dfdbfb, "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", ["", ""]}, 0xfd0}, 0x1, 0x0, 0x0, 0x20040810}, 0x800) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x400, 0x2, 0xfffffffb, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000b00)=ANY=[], 0x0, 0x52}, 0x28) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r8) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r9, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x74, 0x0, 0xb, 0x301, 0x0, 0x0, {0x7, 0x0, 0x6}, [@NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_NAME={0xe, 0x1, 'syzkaller\x00'}, @NFTA_COMPAT_TYPE={0x8}, @NFTA_COMPAT_NAME={0x5, 0x1, '\x00'}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_COMPAT_NAME={0xe, 0x1, 'syzkaller\x00'}, @NFTA_COMPAT_REV={0x8, 0x2, 0x1, 0x0, 0x1}]}, 0x74}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x6000, &(0x7f0000000640)="b9ff03076844268cb89e14f088a847e0ffff20000000ff84000aac141440e0", 0x0, 0x11, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x48) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x47e6) 1m3.27236422s ago: executing program 5 (id=12917): bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0), 0xc) r0 = getpid() r1 = socket(0x2b, 0x96cbf723d5cfc03a, 0x3) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) r3 = socket$kcm(0x2, 0x1, 0x84) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, 0x0, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="580000000206030000000000000000000300000705000100070000000900020073797a31000000000c00078008001240000000050500050002000000050004000100000011000300686173683a69702c706f727400"], 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x20004000) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="50000000090601020000000000000000020000840900020073797a31000000000500010007000000280007800c00018008000140fffffff70500070088000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x10000082}, 0x90) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_xfrm(0x10, 0x3, 0x6) r10 = socket$key(0xf, 0x3, 0x2) fstat(r10, &(0x7f0000000180)) fstat(r4, &(0x7f0000002f80)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r5, &(0x7f0000003000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = socket$can_bcm(0x1d, 0x2, 0x2) fstat(r9, &(0x7f0000003080)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r5, &(0x7f00000008c0)={&(0x7f0000000100)=@kern={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0, 0x0, &(0x7f0000003100)=[@rights={{0x14, 0x1, 0x1, [r3]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, r11, r12}}}, @rights={{0x24, 0x1, 0x1, [r7, r8, r13, r8, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r0, r14, 0xee01}}}], 0xa0, 0x2404c800}, 0x20000040) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 1m2.224380703s ago: executing program 7 (id=12921): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7ffeffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x3}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x4, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) close(r1) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000000c0)="5c00000014006b05c84e21000ab16d6e230675f811000000440002005817d30461bc24eeb556a7ef59510525ba56dcd79a36c23d3b9844e1571a86ea1698fa51f60a64c9f408000000e786a6d0bdd70000b6c0504bb9189d9193e9bd", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x40004) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x20, 0x18, 0x107, 0xfffffffe, 0x0, {0x1, 0x7c}, [@nested={0xc, 0x1, 0x0, 0x1, [@typed={0x8, 0x6, 0x0, 0x0, @ipv4=@local}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4048011}, 0xc000) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000300)={{}, 0x0, 0x0}, 0x20) recvmsg$unix(r0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102"], 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)=@phonet, 0x80, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xeaff}, 0x0) 1m2.221150295s ago: executing program 9 (id=12922): socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x10009004) socket$nl_route(0x10, 0x3, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x1, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket(0x840000000002, 0x3, 0xff) socket$kcm(0x10, 0x0, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/31], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0xc, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000020000000000000002000004"], 0x0, 0x4e}, 0x28) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000140)={0x1b, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x0, '\x00', 0x0, r3, 0x1, 0x1}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='freezer.parent_freezing\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb8}, 0x42) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1d, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x4}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00', 0x200}) socketpair(0x1f, 0x80000, 0x2083, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="a00100000102010200000000000000000a00000209000600707074700000000008010000000000000000000014000180060003400004000006000340000400000800054000000002100001800c000280050001008400000008000540000000005400028006000340000400002c0001"], 0x1a0}, 0x1, 0x0, 0x0, 0xd4}, 0x40d4) r5 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DESTROY(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="640100001200"], 0x164}, 0x1, 0x0, 0x0, 0x20008c51}, 0x90) 1m2.215165293s ago: executing program 5 (id=12923): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe, 0x66c}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x88e}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x3, 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000000000000000000000000850000009b0000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8fbffffb702000008000000b70300000000000085000000d000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x0, &(0x7f0000000000)="e0b9547e2db80000000000000002", 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r4 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_generic(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001800050027bd70d400fedbdf54"], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x8040) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r5) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="1e0000000000000008000000ffff0000c0000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000020000db030000000000000000"], 0x50) r6 = syz_clone(0x8000600, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x11, &(0x7f0000000ac0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8f, 0x0, 0x0, 0x0, 0xb}, {{0x18, 0x1, 0x1, 0x0, r7}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x700}, {0x85, 0x0, 0x0, 0x86}}, {}, [@jmp={0x5, 0x1, 0xa, 0xa, 0x0, 0x1}, @jmp={0x5, 0x0, 0xa, 0x0, 0x0, 0xfffffffffffffff4, 0xfffffffffffffffc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x2a}}}, &(0x7f0000000080)='GPL\x00', 0x3, 0x1018, &(0x7f0000004b00)=""/4120, 0x41100, 0x2}, 0x94) r8 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x75, 0x1ef7}, 0x20, 0x4, 0x98, 0x0, 0x6, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x20}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r10, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB="34000000dc060605000000000000000000010000090900020073797a31000000000900030073797a310000000005000100070000"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x40000800) r11 = socket$kcm(0xa, 0x2, 0x73) getpid() sendmsg$inet(r11, &(0x7f0000000540)={&(0x7f0000000000)={0xa, 0x0, @empty}, 0xffac, &(0x7f0000000600)=[{&(0x7f0000002440)="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", 0xffa0}, {&(0x7f0000001040)="9d7fcf3efc63f4a6a555ba8b4726d7ccaf8a207100e69cfac4377876021d7131b838059f96bd206d4776368ed2a92432e5af71", 0x33}, {&(0x7f0000000580)="24a10f2a16837717b9ac706f53cbc1865aa4e9cedccce6e0f6cdd54704bfe2f26db6fd0918ff7915774192e5003559a7667bf77c485c4952a3d5647790cab7fef3989d2359387ade1a6b3c1d57dae491b8e93df2beee9bddd174f6bd022cd4f8f38b1e40f63e0eab48ddf3775067a0c5b648690d65f30a6c084c813c06e4e167"}], 0x2, &(0x7f0000001940)=[@ip_tos_int={{0x50, 0x29, 0x32}}, @ip_ttl={{0x0, 0xf00}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @loopback}}}], 0x6d}, 0x20004044) 1m2.067852982s ago: executing program 4 (id=12924): syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/net\x00') r0 = getpid() sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x2, 0x1948}, 0x10020, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x830d}, 0x105e40, 0x102, 0xfffffffc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_xfrm(0x10, 0x3, 0x6) close(0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd824498949714ffaac8a6f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb5447000001000000008f2b9000f22425e4097ed62cbc891061017cfa6fa26fa7088c60897d4a6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001100)=ANY=[@ANYBLOB="120000000400000004000000"], 0x50) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={r3, r4, 0x4, 0x0, @val=@perf_event={0x7}}, 0x18) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x8854) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x24000058) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x27, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)=@o_path={0x0}, 0x18) r7 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x29, 0x30, &(0x7f0000000100)=r6, 0x5042) 1m1.932264134s ago: executing program 7 (id=12925): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$kcm(0x23, 0x2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3800000040000701feffffff00000000017c0000040042801c00018006000600800a000008001500", @ANYRES32=0x0, @ANYBLOB="06001200800a0000040002"], 0x38}, 0x1, 0x0, 0x0, 0x48815}, 0xc000) sendmsg$key(r3, &(0x7f0000000040)={0xa, 0x0, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[@ANYBLOB="02037f02210000000000000000000000030006000000000002000000ac14142e00000000000000000200010000000000000009007fffffff030005002b00000002000000ac1414aa0000000000000000170008007805"], 0x108}, 0x1, 0x7}, 0x0) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000000)=@phonet, 0x80, 0x0, 0x0, 0x0, 0x0, 0xeaff}, 0x0) 1m1.761084771s ago: executing program 9 (id=12926): mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(r0, 0x0, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x83, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9, 0x0, 0xd, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b26, &(0x7f0000000000)={'wlan1\x00', @random="0202000400"}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f39138e486dd6349080006"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0763707573740153646370750806"], 0x12) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x80, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x2}, 0x101200, 0xc8, 0x0, 0x0, 0x0, 0x2000000, 0xd}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 1m1.411396057s ago: executing program 4 (id=12927): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={0x1}, 0x4) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x3}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x0, 0x401, 0x3, 0xb, 0x20, 0x1, 0x535, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x50) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0x0, 0x8}, 0xc) r4 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000006c0)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, &(0x7f0000000680)='%pi6 \x00'}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000800)={0x6, 0x21, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, {}, {}, [@exit, @exit, @generic={0x2, 0x0, 0x8, 0x2, 0x2}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x429, 0x0, 0x0, 0x0, 0x8}, @map_fd={0x18, 0x7, 0x1, 0x0, r0}, @jmp={0x5, 0x1, 0x2, 0x7, 0x3, 0x50, 0x8}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1000}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000100)='GPL\x00', 0xffff, 0x0, &(0x7f0000000140), 0x40f00, 0x8, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x3, 0xd, 0x6, 0x7}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000740)=[r2, r3, r4, r5, 0xffffffffffffffff], &(0x7f0000000780)=[{0x5, 0x5, 0xa, 0xb}, {0x4, 0x2, 0x4, 0x4}, {0x0, 0x2, 0x10}, {0x5, 0x1, 0x0, 0xa}, {0x1, 0x2}], 0x10, 0x7}, 0x94) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, 0x24, 0x107, 0x70bd27, 0x25dfdbfb, {0x5, 0x7c}}, 0x14}, 0x1, 0x0, 0x0, 0x4048011}, 0x8010) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x6, 0x0, 0x4, 0x3ff, 0x7ffffffc, 0xffad, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x4, 0x4, 0x3}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r7, &(0x7f0000000980)}, 0x20) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$rds(0xffffffffffffffff, 0x0, 0x80) 1m0.107262993s ago: executing program 7 (id=12928): r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f000000a180)={&(0x7f0000009d80)=@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f000000a0c0)=[{&(0x7f0000009dc0)="c18cd1f1bc", 0x5}], 0x1, &(0x7f000000a140)=[@dstaddrv6={0x20, 0x84, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}}], 0x20, 0x4000000}, 0x40000) r1 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SET_FEATURE(r1, 0x0, 0xc000) r2 = socket$kcm(0x1e, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = getpid() r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[], 0x104}}, 0x840) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a30000000006c000000160a01000000000000000000010000000900010073797a30000000000900020073797a3000000000400003800800014000000000080002400000fbff2b0003801400010067656e6576653000000000000000000014000100776732000000000000000000c6e49c0f5c000000180a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c0003801400010067656e65766530000000000000000000140001"], 0x110}}, 0x0) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="50000000020601080000000000000000000000080c00078008000640200000000500010006000000050005000a00000005000400000000000900020073797a31000000000c00030068"], 0x50}, 0x1, 0x0, 0x0, 0x4010}, 0x20040000) sendmsg$kcm(r2, &(0x7f00000014c0)={&(0x7f0000001540)=@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x80, 0x0}, 0x0) close(r2) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x6, 0x17, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_query, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @map_val={0x18, 0xb, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x631bbb56}, @ldst={0x2, 0x3, 0x1, 0x3, 0x7, 0x18, 0xfffffffffffffffc}, @map_fd={0x18, 0x2}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}]}, &(0x7f0000000180)='syzkaller\x00', 0x8, 0x3d, &(0x7f0000000280)=""/61, 0x41000, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000840), &(0x7f0000000880)=[{0x2, 0x3, 0x4, 0x2}, {0x2, 0x4, 0x0, 0x4}, {0x0, 0x3, 0xb, 0x8}, {0x4, 0x4, 0x1, 0x5}, {0x4, 0x3, 0x7, 0x9}], 0x10, 0x7}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r9, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), 0x0, 0xc2, 0x0, 0x0, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0x37, 0x8, 0x8, &(0x7f0000000140)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x20, &(0x7f0000000580)={&(0x7f0000000440)=""/62, 0x3e, 0x0, &(0x7f0000000480)=""/237, 0xed}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0xffffffffffffffff, 0x7fff, 0x10}, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0xc000) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r10, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000640)={0x34, 0x3, 0x1, 0x101, 0x0, 0x0, {0x7, 0x0, 0xa}, [@CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x80}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x2404}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x9}, @CTA_TUPLE_ORIG={0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x40488c0}, 0x20800) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2}, 0x94) 1m0.10655061s ago: executing program 9 (id=12929): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) socket$l2tp6(0xa, 0x2, 0x73) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0xfffe, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff274, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x8000000, &(0x7f0000000680)=[{&(0x7f0000000000)="5c00000014006b05c84e21000ab16d6e230675f802000000440002005817d30461bc24eeb556a705251e6182149a36c23d3b48dfd8cdbf9367b098fa51f60a64c9f408000000e786a6d0bdd70000b6c0504bb9189d9193e9bd1c1b78", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x5c, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xa000000}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xaa}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00', 0x800}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NFT_MSG_GETTABLE(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x1, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x7}, [@NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x804) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) sendmsg$nl_netfilter(r4, &(0x7f0000000580)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0x98, 0x5, 0x6, 0x301, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x2}, [@generic="cdad714e415cacd2c8888d1b7cfc91d209a73a7a887e4cb5d00bd1a39b8289dc54dba2358d4e614e228c4d29c1d44ad9d8b804fe045a4c06de6fd07207666a6121dc0c705860be85d8d16e099a2e12831e2536e16845e78a3a0ea9836bdef9e3eaba7ac3fa343ab7a86278338a0a887715fff0572f88e230732407d866a3585fdd94"]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x400c800) 59.169902098s ago: executing program 4 (id=12930): sendmsg$rds(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000240)=""/112, 0x70}], 0x1, &(0x7f0000000900)=[@fadd={0x58, 0x114, 0x6, {{0xef7, 0x4}, &(0x7f00000002c0)=0x3, &(0x7f0000000380)=0x14a3, 0x0, 0x2, 0x2, 0x5ce, 0x62}}, @rdma_args={0x48, 0x114, 0x1, {{0xa, 0x6}, {&(0x7f0000000600)=""/193, 0xc1}, &(0x7f0000000540)=[{0x0}], 0x1, 0x64, 0x4}}, @zcopy_cookie={0x18, 0x114, 0xc, 0xa}, @rdma_args={0x48, 0x114, 0x1, {{0x68e1, 0xfffffffb}, {0x0}, &(0x7f0000000580), 0x0, 0x10, 0x2}}, @fadd={0x58, 0x114, 0x6, {{0x6}, &(0x7f0000000880)=0x6, &(0x7f00000008c0)=0x29, 0x8, 0x9, 0xffffffffffffffce, 0xc, 0x8, 0xfff}}], 0x158, 0x24044000}, 0x20040040) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1802000080100000000000000400000085000000b500000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x8, 0x830b}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = socket$kcm(0x10, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x2a, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000b50000008200000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8a00fe00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000bf91000000000000b7020000010000008500000085000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(r3, &(0x7f0000000080)={0x0, 0x74, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509c5bb", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000ac0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\b\x00\x00\x00', @ANYRES32, @ANYBLOB="2d6a6a5c1c01988f4bf629e1c81dbcfdd12ff5869fc96d9313b37277d6ad0c17b35d378cc54f5fddb7fd297814b18640b3214e772b9e70c18c4dadb800b7af295bb9ac0ea61865a4bc0ed746c6e036646e", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x20) r5 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r5, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) sendmsg$inet(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0x2ee0}], 0x13, 0x0, 0x0, 0x10000000}, 0x12cd) 58.183590457s ago: executing program 5 (id=12931): bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0xffffffff, 0x0, 0xb}, {0x10000002, 0x0, 0x4, 0x2}]}, 0x94) r0 = socket$kcm(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) (async) recvmsg$unix(r1, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000)=r3, 0x10) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000140)=[{&(0x7f00000005c0)="df", 0x1}], 0x1}, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000680)=ANY=[@ANYRES8=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r4) (async) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x40000000001946}, 0x0, 0x0, 0x10000, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000240)={0x4, 0x80, 0x1, 0x9, 0x1, 0x1, 0x0, 0x81, 0x40001, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4b5f, 0x0, @perf_bp={0x0, 0xc4d223093c16158}, 0x1000, 0x5, 0x6, 0x4, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0x6}) (async) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000000)=@newtaction={0x14, 0x30, 0x1, 0x3}, 0x14}}, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) (async) socket(0x8, 0x80000, 0x8) (async) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000200), 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x61, 0xd, 0x0, 0x0, 0x0, 0x0, 0x2600, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000002, 0x0, @perf_config_ext={0x1002, 0x7ff}, 0x4044, 0x80, 0x0, 0x8, 0x8, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) r8 = socket$kcm(0x2a, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000001f80)={&(0x7f0000001d00)=@pppoe={0x18, 0x0, {0x2, @multicast, 'wg1\x00'}}, 0x80, 0x0}, 0x0) socket$alg(0x26, 0x5, 0x0) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xa, 0x0, &(0x7f0000000100)="b9ff030f6044238cb89e", 0x0, 0xfb, 0x60000000, 0x0, 0x17, &(0x7f0000000000), &(0x7f0000001c40)="beb61ec2ca90080239f2a54e2368fa761313c3a024a981", 0x2}, 0x50) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r10, &(0x7f000000c2c0)={0x0, 0xfffffffffffffd21, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) (async) sendmsg$NFT_BATCH(r10, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x74}}, 0x0) (async) close(0x3) (async) recvmsg(r0, 0x0, 0x10142) 57.96735861s ago: executing program 4 (id=12932): bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0), 0xc) r0 = getpid() r1 = socket(0x2b, 0x96cbf723d5cfc03a, 0x3) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) r3 = socket$kcm(0x2, 0x1, 0x84) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, 0x0, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="580000000206030000000000000000000300000705000100070000000900020073797a31000000000c00078008001240000000050500050002000000050004000100000011000300686173683a69702c706f727400"], 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x20004000) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="50000000090601020000000000000000020000840900020073797a31000000000500010007000000280007800c00018008000140fffffff70500070088000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x10000082}, 0x90) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_xfrm(0x10, 0x3, 0x6) r10 = socket$key(0xf, 0x3, 0x2) fstat(r10, &(0x7f0000000180)) fstat(r4, &(0x7f0000002f80)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r5, &(0x7f0000003000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = socket$can_bcm(0x1d, 0x2, 0x2) fstat(r9, &(0x7f0000003080)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r5, &(0x7f00000008c0)={&(0x7f0000000100)=@kern={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0, 0x0, &(0x7f0000003100)=[@rights={{0x14, 0x1, 0x1, [r3]}}, @cred={{0x1c, 0x1, 0x2, {r0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, r11, r12}}}, @rights={{0x24, 0x1, 0x1, [r7, r8, r13, r8, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r0, r14, 0xee01}}}], 0xa0, 0x2404c800}, 0x20000040) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 57.950179456s ago: executing program 9 (id=12933): perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0xa) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0xfcc9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000340)}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x38000, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000380), 0x6}, 0x0, 0x2, 0xfffffffe, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket(0x840000000002, 0x3, 0xff) socket$kcm(0x1e, 0x1, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$rds(r1, &(0x7f0000000140)={&(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x20048004) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x50) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a3c000000090a010400000000000000000a0000040900010073797a3100000000080005400000000209000200737997310000000008000a40fffffffc14000000110001"], 0x64}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000000) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000100001fffffff500000000000100000a3c000000090a010400000040000000000a0000040900020073797a310000000008000a40fffffffc0900010073797a3100000000080005400000000b140000001100"], 0x64}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) 57.933788698s ago: executing program 7 (id=12934): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40885}, 0x40080) r1 = getpid() r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xa}, 0x0, 0x0, 0x0, 0x4, 0x7fff, 0x7fffffff}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x15, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffdffd, 0x0, 0x0, 0x0, 0x7fe}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x200000}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x2000000, 0xe, 0x0, &(0x7f00000004c0)="630b008646dc3f0adf33c9f7b986", 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x3f) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="1400000010003507d25a806f8c6394f90324fc60", 0x14}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000039c0)=""/4104, 0x1008}, {&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000600)=""/4083, 0xff3}, {&(0x7f0000000180)=""/45, 0x2d}, {&(0x7f00000016c0)=""/257, 0x101}, {&(0x7f0000001600)=""/154, 0x9a}, {&(0x7f0000000040)=""/120, 0x78}], 0x7}, 0x0) r6 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r6, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_retopts={{0x10, 0x0, 0xffffffdf}}], 0x10}, 0x20000000) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000000)={r0}, 0x8) r8 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$kcm(r8, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[], 0x318}, 0x24008000) setsockopt$sock_attach_bpf(r8, 0x6, 0x3, &(0x7f0000000040)=r7, 0x4) 57.80901238s ago: executing program 5 (id=12935): socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x10009004) socket$nl_route(0x10, 0x3, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x1, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket(0x840000000002, 0x3, 0xff) socket$kcm(0x10, 0x0, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/31], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0xc, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000020000000000000002000004"], 0x0, 0x4e}, 0x28) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000140)={0x1b, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x0, '\x00', 0x0, r3, 0x1, 0x1}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='freezer.parent_freezing\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb8}, 0x42) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1d, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x4}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00', 0x200}) socketpair(0x1f, 0x80000, 0x2083, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) sendmsg$IPCTNL_MSG_EXP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="a00100000102010200000000000000000a00000209000600707074700000000008010000000000000000000014000180060003400004000006000340000400000800054000000002100001800c000280050001008400000008000540000000005400028006000340000400002c0001"], 0x1a0}, 0x1, 0x0, 0x0, 0xd4}, 0x40d4) r5 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DESTROY(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="640100001200"], 0x164}, 0x1, 0x0, 0x0, 0x20008c51}, 0x90) 57.79102819s ago: executing program 9 (id=12936): syz_open_procfs$namespace(0x0, &(0x7f0000000340)='ns/net\x00') r0 = getpid() sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x2, 0x1948}, 0x10020, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x830d}, 0x105e40, 0x102, 0xfffffffc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_xfrm(0x10, 0x3, 0x6) close(0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd824498949714ffaac8a6f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb5447000001000000008f2b9000f22425e4097ed62cbc891061017cfa6fa26fa7088c60897d4a6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001100)=ANY=[@ANYBLOB="120000000400000004000000"], 0x50) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={r3, r4, 0x4, 0x0, @val=@perf_event={0x7}}, 0x18) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x8854) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x24000058) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x27, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)=@o_path={0x0}, 0x18) r7 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x29, 0x30, &(0x7f0000000100)=r6, 0x5042) 57.738430616s ago: executing program 4 (id=12937): bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$kcm(0xa, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) sendmsg$inet(r0, &(0x7f0000000000)={&(0x7f0000001340)={0x2, 0x6, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000001580)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x41}, @multicast1}}}], 0x20}, 0x8000) sendmsg$inet(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 57.6415566s ago: executing program 7 (id=12938): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, @perf_bp={0x0, 0x5}, 0x104101, 0x4, 0x9, 0x1, 0x6, 0x4, 0x3}, 0x0, 0x1, 0xffffffffffffffff, 0x8) r0 = socket$kcm(0x2d, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000340)={r0}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x48, 0x2, 0x6, 0x201, 0x0, 0x6000, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}]}, 0x48}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000240)={r1}) 57.547241595s ago: executing program 5 (id=12939): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) socket$l2tp6(0xa, 0x2, 0x73) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0xfffe, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff274, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x10002) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x2, 0x1, 0x8, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x1946}, 0x100000, 0x0, 0x0, 0x9, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r4, &(0x7f0000000080)={0x0, 0x8000000, &(0x7f0000000680)=[{&(0x7f0000000000)="5c00000014006b05c84e21000ab16d6e230675f802000000440002005817d30461bc24eeb556a705251e6182149a36c23d3b48dfd8cdbf9367b098fa51f60a64c9f408000000e786a6d0bdd70000b6c0504bb9189d9193e9bd1c1b78", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xaa}, 0x94) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000a80)={0x2, 0x3, 0x0, 0x3, 0x8, 0x0, 0x70bd2c, 0x25dfdbfb, [@sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}]}, 0x40}, 0x1, 0x7}, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) sendmsg$NFT_MSG_GETTABLE(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x1, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x7}, [@NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x804) 57.483107344s ago: executing program 9 (id=12940): openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x807, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b26, &(0x7f0000000000)={'wlan1\x00', @random="0202000400"}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f39138e486dd6349080006"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0763707573740153646370750806"], 0x12) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$nl_route(0x10, 0x3, 0x0) 57.353660196s ago: executing program 7 (id=12941): sendmsg$rds(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000240)=""/112, 0x70}], 0x1, &(0x7f0000000900)=[@fadd={0x58, 0x114, 0x6, {{0xef7, 0x4}, &(0x7f00000002c0)=0x3, &(0x7f0000000380)=0x14a3, 0x0, 0x2, 0x2, 0x5ce, 0x62}}, @rdma_args={0x48, 0x114, 0x1, {{0xa, 0x6}, {&(0x7f0000000600)=""/193, 0xc1}, &(0x7f0000000540)=[{0x0}], 0x1, 0x64, 0x4}}, @zcopy_cookie={0x18, 0x114, 0xc, 0xa}, @rdma_args={0x48, 0x114, 0x1, {{0x68e1, 0xfffffffb}, {0x0}, &(0x7f0000000580), 0x0, 0x10, 0x2}}, @fadd={0x58, 0x114, 0x6, {{0x6}, &(0x7f0000000880)=0x6, &(0x7f00000008c0)=0x29, 0x8, 0x9, 0xffffffffffffffce, 0xc, 0x8, 0xfff}}], 0x158, 0x24044000}, 0x20040040) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1802000080100000000000000400000085000000b500000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x8, 0x830b}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = socket$kcm(0x10, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x2a, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000b50000008200000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8a00fe00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000bf91000000000000b7020000010000008500000085000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(r3, &(0x7f0000000080)={0x0, 0x74, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509c5bb", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000ac0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\b\x00\x00\x00', @ANYRES32, @ANYBLOB="2d6a6a5c1c01988f4bf629e1c81dbcfdd12ff5869fc96d9313b37277d6ad0c17b35d378cc54f5fddb7fd297814b18640b3214e772b9e70c18c4dadb800b7af295bb9ac0ea61865a4bc0ed746c6e036646e", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x20) r5 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r5, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) sendmsg$inet(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0x2ee0}], 0x13, 0x0, 0x0, 0x10000000}, 0x12cd) 57.113304577s ago: executing program 4 (id=12942): perf_event_open(0x0, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0xa) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x9, 0x0, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0xa, 0x1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x4000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000710033000000000095000300"], 0x0, 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'vlan1\x00', @random="010000201000"}) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'vlan0\x00', @random="010000201000"}) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) sendmsg(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdfe}, 0x8800) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0500000003f01f006600", @ANYRES32, @ANYRES32], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x38) syz_open_procfs$namespace(0x0, &(0x7f0000000780)='ns/pid_for_children\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) socket$kcm(0x22, 0x2, 0x21) socket$kcm(0x11, 0x200000000000002, 0x300) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4048886) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r2, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r2, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x1943}, 0xa720, 0x2, 0x0, 0x8, 0x1, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000001700000095"], &(0x7f00000005c0)='GPL\x00', 0x8, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r3, 0x4000000, 0x2000, 0x2000, &(0x7f0000000040)="976d9023d56482cd284a63da539706d7009be646625bd75b025352ebe557df463106baeed6c2d75549b140f143fb8bb67bfe5b308b8d05758115c7ad", &(0x7f0000000180)=""/114, 0x0, 0x0, 0xd8, 0xc4, &(0x7f0000000400)="cf2240e6919817e49555d221b4e6c6ba11c4d974ddab2318db7b52cee499399a00be4b71119246d7bca28cc8346eb84414e45f3f4633f4acb77bf8cc38c4c16fe035905db79cdc0be634a915662c4cac58ae94706f86ea320f339c21399b5bb7607044916c63c528ab4149718d6215a9a3749113c268e49b2b9dae91ed804e5ac5d4ec7ac9c5fd67a76f9a2b06f7304f6e81221a751008e786e1edde82cf1ecb76cb4cd71cf781ea3a19b917a1e215b1a6c7ee605b32b91eaae38517fde4303d5f2b1e63e9e52ae4b197fd72de1f71801e1f9f1369d1f530", &(0x7f0000000280)="bf049fd184f7b03c21d9bcddc4eef9ebb6a0da3eb91c56454e873dd7336ccf21a1eeb8da7adf80d6e06ef46c7f36222fadaed2103c286468b3f44adee51445bd1bedf8fcc1c0b9fdc8b3829b1bf0c9d2d409cdecb12ad033e299c029331993ae9760345bf7feb91ee96b0eee19454ad3dbce5019b68c114ff1921a9b4665744c7784ac6736101a70592d83c448a84c31ec60bb901d96ea99471d823ee523318878ee704a8d9502b566cad45587cb74ea8259c1c0a926fc09499395b2db5af40bb6f4c526", 0x0, 0x8000}, 0x24) 1.649517421s ago: executing program 47 (id=12939): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) socket$l2tp6(0xa, 0x2, 0x73) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0xfffe, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff274, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x10002) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x2, 0x1, 0x8, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x1946}, 0x100000, 0x0, 0x0, 0x9, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r4, &(0x7f0000000080)={0x0, 0x8000000, &(0x7f0000000680)=[{&(0x7f0000000000)="5c00000014006b05c84e21000ab16d6e230675f802000000440002005817d30461bc24eeb556a705251e6182149a36c23d3b48dfd8cdbf9367b098fa51f60a64c9f408000000e786a6d0bdd70000b6c0504bb9189d9193e9bd1c1b78", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, 0x0, 0x0, 0x1001, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xaa}, 0x94) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000a80)={0x2, 0x3, 0x0, 0x3, 0x8, 0x0, 0x70bd2c, 0x25dfdbfb, [@sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}]}, 0x40}, 0x1, 0x7}, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) sendmsg$NFT_MSG_GETTABLE(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x1, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x7}, [@NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x804) 438.574176ms ago: executing program 48 (id=12941): sendmsg$rds(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000240)=""/112, 0x70}], 0x1, &(0x7f0000000900)=[@fadd={0x58, 0x114, 0x6, {{0xef7, 0x4}, &(0x7f00000002c0)=0x3, &(0x7f0000000380)=0x14a3, 0x0, 0x2, 0x2, 0x5ce, 0x62}}, @rdma_args={0x48, 0x114, 0x1, {{0xa, 0x6}, {&(0x7f0000000600)=""/193, 0xc1}, &(0x7f0000000540)=[{0x0}], 0x1, 0x64, 0x4}}, @zcopy_cookie={0x18, 0x114, 0xc, 0xa}, @rdma_args={0x48, 0x114, 0x1, {{0x68e1, 0xfffffffb}, {0x0}, &(0x7f0000000580), 0x0, 0x10, 0x2}}, @fadd={0x58, 0x114, 0x6, {{0x6}, &(0x7f0000000880)=0x6, &(0x7f00000008c0)=0x29, 0x8, 0x9, 0xffffffffffffffce, 0xc, 0x8, 0xfff}}], 0x158, 0x24044000}, 0x20040040) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1802000080100000000000000400000085000000b500000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x8, 0x830b}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = socket$kcm(0x10, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x2a, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000b50000008200000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8a00fe00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000bf91000000000000b7020000010000008500000085000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(r3, &(0x7f0000000080)={0x0, 0x74, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509c5bb", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000ac0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\b\x00\x00\x00', @ANYRES32, @ANYBLOB="2d6a6a5c1c01988f4bf629e1c81dbcfdd12ff5869fc96d9313b37277d6ad0c17b35d378cc54f5fddb7fd297814b18640b3214e772b9e70c18c4dadb800b7af295bb9ac0ea61865a4bc0ed746c6e036646e", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x20) r5 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r5, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) sendmsg$inet(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0x2ee0}], 0x13, 0x0, 0x0, 0x10000000}, 0x12cd) 104.712209ms ago: executing program 49 (id=12940): openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x807, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b26, &(0x7f0000000000)={'wlan1\x00', @random="0202000400"}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f39138e486dd6349080006"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0763707573740153646370750806"], 0x12) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socket$nl_route(0x10, 0x3, 0x0) 0s ago: executing program 50 (id=12942): perf_event_open(0x0, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0xa) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x9, 0x0, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0xa, 0x1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x4000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000710033000000000095000300"], 0x0, 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'vlan1\x00', @random="010000201000"}) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'vlan0\x00', @random="010000201000"}) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) sendmsg(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdfe}, 0x8800) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0500000003f01f006600", @ANYRES32, @ANYRES32], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x38) syz_open_procfs$namespace(0x0, &(0x7f0000000780)='ns/pid_for_children\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) socket$kcm(0x22, 0x2, 0x21) socket$kcm(0x11, 0x200000000000002, 0x300) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4048886) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r2, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r2, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x1943}, 0xa720, 0x2, 0x0, 0x8, 0x1, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000f2ffffff0000000000000000850000001700000095"], &(0x7f00000005c0)='GPL\x00', 0x8, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r3, 0x4000000, 0x2000, 0x2000, &(0x7f0000000040)="976d9023d56482cd284a63da539706d7009be646625bd75b025352ebe557df463106baeed6c2d75549b140f143fb8bb67bfe5b308b8d05758115c7ad", &(0x7f0000000180)=""/114, 0x0, 0x0, 0xd8, 0xc4, &(0x7f0000000400)="cf2240e6919817e49555d221b4e6c6ba11c4d974ddab2318db7b52cee499399a00be4b71119246d7bca28cc8346eb84414e45f3f4633f4acb77bf8cc38c4c16fe035905db79cdc0be634a915662c4cac58ae94706f86ea320f339c21399b5bb7607044916c63c528ab4149718d6215a9a3749113c268e49b2b9dae91ed804e5ac5d4ec7ac9c5fd67a76f9a2b06f7304f6e81221a751008e786e1edde82cf1ecb76cb4cd71cf781ea3a19b917a1e215b1a6c7ee605b32b91eaae38517fde4303d5f2b1e63e9e52ae4b197fd72de1f71801e1f9f1369d1f530", &(0x7f0000000280)="bf049fd184f7b03c21d9bcddc4eef9ebb6a0da3eb91c56454e873dd7336ccf21a1eeb8da7adf80d6e06ef46c7f36222fadaed2103c286468b3f44adee51445bd1bedf8fcc1c0b9fdc8b3829b1bf0c9d2d409cdecb12ad033e299c029331993ae9760345bf7feb91ee96b0eee19454ad3dbce5019b68c114ff1921a9b4665744c7784ac6736101a70592d83c448a84c31ec60bb901d96ea99471d823ee523318878ee704a8d9502b566cad45587cb74ea8259c1c0a926fc09499395b2db5af40bb6f4c526", 0x0, 0x8000}, 0x24) kernel console output (not intermixed with test programs): e type 2 has an invalid length. [ 1892.336945][T12360] netlink: 'syz.5.11236': attribute type 29 has an invalid length. [ 1892.565408][T12370] bridge0: port 2(bridge_slave_1) entered disabled state [ 1892.572765][T12370] bridge0: port 1(bridge_slave_0) entered disabled state [ 1892.609541][T12370] bridge0: left promiscuous mode [ 1892.616122][T12374] netlink: 'syz.5.11241': attribute type 25 has an invalid length. [ 1892.721265][T12365] netlink: 'syz.4.11239': attribute type 16 has an invalid length. [ 1893.503242][T12398] netlink: 'syz.9.11248': attribute type 2 has an invalid length. [ 1893.514600][T12398] __nla_validate_parse: 6 callbacks suppressed [ 1893.514630][T12398] netlink: 14 bytes leftover after parsing attributes in process `syz.9.11248'. [ 1893.544710][T12401] netlink: 28 bytes leftover after parsing attributes in process `syz.4.11250'. [ 1893.546280][T12400] netlink: 44 bytes leftover after parsing attributes in process `syz.5.11249'. [ 1893.655134][T12401] netlink: 1 bytes leftover after parsing attributes in process `syz.4.11250'. [ 1893.906680][T12419] bridge0: port 2(bridge_slave_1) entered blocking state [ 1893.913917][T12419] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1893.921507][T12419] bridge0: port 1(bridge_slave_0) entered blocking state [ 1893.928722][T12419] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1893.965810][T12419] bridge0: entered promiscuous mode [ 1894.115001][T12427] netlink: 28 bytes leftover after parsing attributes in process `syz.7.11259'. [ 1894.147010][T12429] netlink: 28 bytes leftover after parsing attributes in process `syz.5.11260'. [ 1894.178414][T12427] netlink: 1 bytes leftover after parsing attributes in process `syz.7.11259'. [ 1894.230484][T12429] netlink: 1 bytes leftover after parsing attributes in process `syz.5.11260'. [ 1894.422849][T12443] netlink: 44 bytes leftover after parsing attributes in process `syz.9.11263'. [ 1894.539142][T12448] netlink: 28 bytes leftover after parsing attributes in process `syz.5.11266'. [ 1897.930809][T12501] delete_channel: no stack [ 1898.174532][T12519] netlink: 'syz.8.11289': attribute type 29 has an invalid length. [ 1898.676617][T12537] __nla_validate_parse: 9 callbacks suppressed [ 1898.676639][T12537] netlink: 14 bytes leftover after parsing attributes in process `syz.8.11294'. [ 1898.804613][T12546] netlink: 28 bytes leftover after parsing attributes in process `syz.5.11299'. [ 1899.666648][T12565] netlink: 28 bytes leftover after parsing attributes in process `syz.7.11303'. [ 1900.536427][T12575] netlink: 28 bytes leftover after parsing attributes in process `syz.4.11307'. [ 1900.612534][T12576] netlink: 44 bytes leftover after parsing attributes in process `syz.8.11306'. [ 1900.677451][T12580] netlink: 28 bytes leftover after parsing attributes in process `syz.9.11308'. [ 1900.733683][T12575] netlink: 1 bytes leftover after parsing attributes in process `syz.4.11307'. [ 1900.772649][T12580] netlink: 1 bytes leftover after parsing attributes in process `syz.9.11308'. [ 1900.903191][T12591] FAULT_INJECTION: forcing a failure. [ 1900.903191][T12591] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1900.916591][T12591] CPU: 0 UID: 0 PID: 12591 Comm: syz.8.11311 Not tainted syzkaller #0 PREEMPT(full) [ 1900.916616][T12591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 1900.916627][T12591] Call Trace: [ 1900.916635][T12591] [ 1900.916643][T12591] dump_stack_lvl+0xe8/0x150 [ 1900.916669][T12591] should_fail_ex+0x412/0x560 [ 1900.916694][T12591] _copy_from_iter+0x1d3/0x1670 [ 1900.916722][T12591] ? trace_kmem_cache_alloc+0x1f/0xb0 [ 1900.916748][T12591] ? __pfx__copy_from_iter+0x10/0x10 [ 1900.916768][T12591] ? __build_skb_around+0x22d/0x3c0 [ 1900.916790][T12591] ? __alloc_skb+0x193/0x390 [ 1900.916808][T12591] ? netlink_sendmsg+0x650/0xb40 [ 1900.916827][T12591] ? skb_put+0x11b/0x210 [ 1900.916848][T12591] netlink_sendmsg+0x6c0/0xb40 [ 1900.916874][T12591] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1900.916895][T12591] ? aa_sock_msg_perm+0xf1/0x1b0 [ 1900.916917][T12591] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 1900.916937][T12591] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1900.916953][T12591] ____sys_sendmsg+0xa68/0xad0 [ 1900.916986][T12591] ? __might_fault+0xaf/0x130 [ 1900.917014][T12591] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1900.917043][T12591] ? import_iovec+0x73/0xa0 [ 1900.917068][T12591] ___sys_sendmsg+0x2a5/0x360 [ 1900.917088][T12591] ? __lock_acquire+0x6b5/0x2cf0 [ 1900.917113][T12591] ? __pfx____sys_sendmsg+0x10/0x10 [ 1900.917165][T12591] ? __fget_files+0x2a/0x420 [ 1900.917183][T12591] ? __fget_files+0x3a0/0x420 [ 1900.917209][T12591] __x64_sys_sendmsg+0x1bd/0x2a0 [ 1900.917232][T12591] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 1900.917250][T12591] ? perf_trace_preemptirq_template+0xab/0x340 [ 1900.917277][T12591] ? __pfx_ksys_write+0x10/0x10 [ 1900.917310][T12591] do_syscall_64+0xe2/0xf80 [ 1900.917328][T12591] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1900.917343][T12591] ? trace_irq_disable+0x37/0x100 [ 1900.917358][T12591] ? clear_bhb_loop+0x60/0xb0 [ 1900.917377][T12591] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1900.917393][T12591] RIP: 0033:0x7fe749b9aeb9 [ 1900.917409][T12591] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1900.917424][T12591] RSP: 002b:00007fe74aa6a028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1900.917442][T12591] RAX: ffffffffffffffda RBX: 00007fe749e15fa0 RCX: 00007fe749b9aeb9 [ 1900.917453][T12591] RDX: 0000000000000000 RSI: 0000200000000340 RDI: 0000000000000003 [ 1900.917464][T12591] RBP: 00007fe74aa6a090 R08: 0000000000000000 R09: 0000000000000000 [ 1900.917475][T12591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1900.917485][T12591] R13: 00007fe749e16038 R14: 00007fe749e15fa0 R15: 00007ffe1433d8a8 [ 1900.917513][T12591] [ 1901.612883][T12602] netlink: 14 bytes leftover after parsing attributes in process `syz.4.11314'. [ 1901.994736][T12614] netlink: 14 bytes leftover after parsing attributes in process `syz.8.11317'. [ 1904.784271][T12620] netlink: 28 bytes leftover after parsing attributes in process `syz.9.11320'. [ 1904.851280][T12625] netlink: 28 bytes leftover after parsing attributes in process `syz.5.11322'. [ 1905.032248][T12633] netlink: 28 bytes leftover after parsing attributes in process `syz.7.11325'. [ 1905.682825][T12652] netlink: 28 bytes leftover after parsing attributes in process `syz.7.11332'. [ 1906.797403][T12662] netlink: 'syz.9.11334': attribute type 2 has an invalid length. [ 1906.834775][T12664] netlink: 28 bytes leftover after parsing attributes in process `syz.8.11336'. [ 1906.996246][T12670] netlink: 7 bytes leftover after parsing attributes in process `syz.9.11338'. [ 1907.020807][T12670] netlink: 7 bytes leftover after parsing attributes in process `syz.9.11338'. [ 1907.788693][T12691] netlink: 28 bytes leftover after parsing attributes in process `syz.5.11344'. [ 1908.178078][T12697] netlink: 12 bytes leftover after parsing attributes in process `syz.9.11346'. [ 1908.251847][T12697] netlink: 'syz.9.11346': attribute type 1 has an invalid length. [ 1908.283511][T12697] netlink: 4 bytes leftover after parsing attributes in process `syz.9.11346'. [ 1908.947071][T12709] netlink: 'syz.8.11349': attribute type 2 has an invalid length. [ 1909.300684][T12640] Set syz1 is full, maxelem 65536 reached [ 1911.489808][T12733] !yz!: rxe_newlink: already configured on team_slave_0 [ 1911.508797][T12735] __nla_validate_parse: 1 callbacks suppressed [ 1911.508827][T12735] netlink: 28 bytes leftover after parsing attributes in process `syz.4.11357'. [ 1911.668647][T12740] openvswitch: netlink: IP tunnel dst address not specified [ 1911.911474][T12744] netlink: 'syz.9.11362': attribute type 2 has an invalid length. [ 1911.926838][T12744] netlink: 14 bytes leftover after parsing attributes in process `syz.9.11362'. [ 1915.066021][T12750] netlink: 'syz.7.11363': attribute type 29 has an invalid length. [ 1915.447709][T12771] netlink: 16 bytes leftover after parsing attributes in process `syz.9.11373'. [ 1915.621602][T12760] netlink: 'syz.5.11368': attribute type 10 has an invalid length. [ 1918.489475][T12784] delete_channel: no stack [ 1918.854648][T12788] delete_channel: no stack [ 1919.390015][T12804] delete_channel: no stack [ 1919.969265][T12820] netlink: 16 bytes leftover after parsing attributes in process `syz.4.11384'. [ 1920.115937][T12823] netlink: 28 bytes leftover after parsing attributes in process `syz.5.11387'. [ 1923.790485][T12859] netlink: 28 bytes leftover after parsing attributes in process `syz.7.11397'. [ 1923.860273][T12863] netlink: 16 bytes leftover after parsing attributes in process `syz.8.11398'. [ 1924.856572][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 1924.863019][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 1924.881920][T12878] delete_channel: no stack [ 1925.200604][T12902] netlink: 16 bytes leftover after parsing attributes in process `syz.5.11413'. [ 1927.859521][T12907] netlink: 28 bytes leftover after parsing attributes in process `syz.8.11414'. [ 1927.943475][T12907] netlink: 1 bytes leftover after parsing attributes in process `syz.8.11414'. [ 1927.990021][T12912] netlink: 28 bytes leftover after parsing attributes in process `syz.5.11416'. [ 1928.009906][T12915] netlink: 14 bytes leftover after parsing attributes in process `syz.4.11415'. [ 1928.087770][T12913] netlink: 28 bytes leftover after parsing attributes in process `syz.7.11417'. [ 1928.406231][T12926] bridge0: port 1(bridge_slave_0) entered disabled state [ 1928.447788][T12926] bridge0: left promiscuous mode [ 1928.493097][T12927] netlink: 132 bytes leftover after parsing attributes in process `syz.8.11419'. [ 1928.601760][T12926] netlink: 'syz.8.11419': attribute type 16 has an invalid length. [ 1930.062199][T12949] netlink: 16 bytes leftover after parsing attributes in process `syz.7.11427'. [ 1932.487216][T12965] netlink: 28 bytes leftover after parsing attributes in process `syz.4.11434'. [ 1932.548242][T12965] netlink: 1 bytes leftover after parsing attributes in process `syz.4.11434'. [ 1932.634464][T12972] netlink: 28 bytes leftover after parsing attributes in process `syz.7.11436'. [ 1933.081024][T12980] netlink: 16 bytes leftover after parsing attributes in process `syz.5.11439'. [ 1933.314203][T12988] netlink: 28 bytes leftover after parsing attributes in process `syz.4.11443'. [ 1933.351077][T12988] netlink: 1 bytes leftover after parsing attributes in process `syz.4.11443'. [ 1933.625570][T12998] netlink: 28 bytes leftover after parsing attributes in process `syz.4.11448'. [ 1933.683438][T12996] netlink: 28 bytes leftover after parsing attributes in process `syz.8.11446'. [ 1933.750188][T12998] netlink: 1 bytes leftover after parsing attributes in process `syz.4.11448'. [ 1934.013077][T13006] netlink: 8 bytes leftover after parsing attributes in process `syz.5.11451'. [ 1934.366991][T13023] netlink: 'syz.4.11457': attribute type 29 has an invalid length. [ 1934.560506][T13030] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 1934.625776][T13026] openvswitch: netlink: IP tunnel dst address not specified [ 1936.167638][T13076] netlink: 'syz.4.11476': attribute type 2 has an invalid length. [ 1936.235867][T13079] FAULT_INJECTION: forcing a failure. [ 1936.235867][T13079] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1936.348294][T13079] CPU: 0 UID: 0 PID: 13079 Comm: syz.7.11478 Not tainted syzkaller #0 PREEMPT(full) [ 1936.348319][T13079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 1936.348330][T13079] Call Trace: [ 1936.348338][T13079] [ 1936.348345][T13079] dump_stack_lvl+0xe8/0x150 [ 1936.348371][T13079] should_fail_ex+0x412/0x560 [ 1936.348398][T13079] _copy_from_user+0x2d/0xb0 [ 1936.348415][T13079] inet6_ioctl+0x1ac/0x2e0 [ 1936.348433][T13079] ? __pfx_inet6_ioctl+0x10/0x10 [ 1936.348446][T13079] ? tomoyo_path_number_perm+0x219/0x630 [ 1936.348476][T13079] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 1936.348506][T13079] sock_do_ioctl+0x101/0x320 [ 1936.348526][T13079] ? __pfx_sock_do_ioctl+0x10/0x10 [ 1936.348561][T13079] sock_ioctl+0x5c6/0x7f0 [ 1936.348580][T13079] ? __pfx_sock_ioctl+0x10/0x10 [ 1936.348600][T13079] ? __fget_files+0x2a/0x420 [ 1936.348617][T13079] ? __fget_files+0x3a0/0x420 [ 1936.348633][T13079] ? __fget_files+0x2a/0x420 [ 1936.348654][T13079] ? bpf_lsm_file_ioctl+0x9/0x20 [ 1936.348674][T13079] ? __pfx_sock_ioctl+0x10/0x10 [ 1936.348690][T13079] __se_sys_ioctl+0xfc/0x170 [ 1936.348713][T13079] do_syscall_64+0xe2/0xf80 [ 1936.348732][T13079] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1936.348747][T13079] ? trace_irq_disable+0x37/0x100 [ 1936.348763][T13079] ? clear_bhb_loop+0x60/0xb0 [ 1936.348783][T13079] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1936.348799][T13079] RIP: 0033:0x7f56c899aeb9 [ 1936.348814][T13079] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1936.348828][T13079] RSP: 002b:00007f56c98ed028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1936.348846][T13079] RAX: ffffffffffffffda RBX: 00007f56c8c15fa0 RCX: 00007f56c899aeb9 [ 1936.348859][T13079] RDX: 0000200000000000 RSI: 000000000000890b RDI: 0000000000000003 [ 1936.348870][T13079] RBP: 00007f56c98ed090 R08: 0000000000000000 R09: 0000000000000000 [ 1936.348880][T13079] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1936.348889][T13079] R13: 00007f56c8c16038 R14: 00007f56c8c15fa0 R15: 00007fff1ce014e8 [ 1936.348921][T13079] [ 1936.448292][T13082] FAULT_INJECTION: forcing a failure. [ 1936.448292][T13082] name failslab, interval 1, probability 0, space 0, times 0 [ 1936.638805][T13082] CPU: 0 UID: 0 PID: 13082 Comm: syz.8.11479 Not tainted syzkaller #0 PREEMPT(full) [ 1936.638835][T13082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 1936.638845][T13082] Call Trace: [ 1936.638853][T13082] [ 1936.638862][T13082] dump_stack_lvl+0xe8/0x150 [ 1936.638887][T13082] should_fail_ex+0x412/0x560 [ 1936.638914][T13082] should_failslab+0xa8/0x100 [ 1936.638935][T13082] __kmalloc_cache_noprof+0x83/0x6e0 [ 1936.638954][T13082] ? tipc_group_create+0xa1/0x500 [ 1936.638980][T13082] tipc_group_create+0xa1/0x500 [ 1936.639008][T13082] tipc_sk_join+0x256/0x6a0 [ 1936.639025][T13082] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 1936.639050][T13082] ? __pfx_tipc_sk_join+0x10/0x10 [ 1936.639071][T13082] ? __local_bh_enable_ip+0xd0/0x130 [ 1936.639093][T13082] tipc_setsockopt+0x73e/0x990 [ 1936.639117][T13082] ? __pfx_tipc_setsockopt+0x10/0x10 [ 1936.639134][T13082] ? __fget_files+0x2a/0x420 [ 1936.639149][T13082] ? aa_sock_opt_perm+0xff/0x1a0 [ 1936.639173][T13082] ? bpf_lsm_socket_setsockopt+0x9/0x20 [ 1936.639197][T13082] ? __pfx_tipc_setsockopt+0x10/0x10 [ 1936.639216][T13082] do_sock_setsockopt+0x17c/0x1b0 [ 1936.639243][T13082] __x64_sys_setsockopt+0x13d/0x1b0 [ 1936.639270][T13082] do_syscall_64+0xe2/0xf80 [ 1936.639288][T13082] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1936.639304][T13082] ? clear_bhb_loop+0x60/0xb0 [ 1936.639325][T13082] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1936.639340][T13082] RIP: 0033:0x7fe749b9aeb9 [ 1936.639355][T13082] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1936.639369][T13082] RSP: 002b:00007fe74aa6a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1936.639387][T13082] RAX: ffffffffffffffda RBX: 00007fe749e15fa0 RCX: 00007fe749b9aeb9 [ 1936.639399][T13082] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000006 [ 1936.639410][T13082] RBP: 00007fe74aa6a090 R08: 0000000000000043 R09: 0000000000000000 [ 1936.639420][T13082] R10: 00002000000008c0 R11: 0000000000000246 R12: 0000000000000001 [ 1936.639430][T13082] R13: 00007fe749e16038 R14: 00007fe749e15fa0 R15: 00007ffe1433d8a8 [ 1936.639463][T13082] [ 1937.453613][ T5825] Bluetooth: hci4: ISO packet for unknown connection handle 37 [ 1938.402361][T13131] netlink: 'syz.7.11491': attribute type 2 has an invalid length. [ 1938.411860][T13131] __nla_validate_parse: 13 callbacks suppressed [ 1938.411889][T13131] netlink: 14 bytes leftover after parsing attributes in process `syz.7.11491'. [ 1938.741978][T13146] netlink: 'syz.4.11496': attribute type 10 has an invalid length. [ 1938.766627][T13153] netlink: 7 bytes leftover after parsing attributes in process `syz.5.11498'. [ 1938.817520][T13148] netlink: 28 bytes leftover after parsing attributes in process `syz.7.11497'. [ 1939.063146][T13153] netlink: 7 bytes leftover after parsing attributes in process `syz.5.11498'. [ 1939.723511][T13161] netlink: 'syz.8.11501': attribute type 29 has an invalid length. [ 1939.848824][T13165] netlink: 'syz.4.11503': attribute type 29 has an invalid length. [ 1940.001706][T13172] FAULT_INJECTION: forcing a failure. [ 1940.001706][T13172] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1940.018752][T13170] !yz!: rxe_newlink: already configured on team_slave_0 [ 1940.044331][T13174] netlink: 'syz.4.11507': attribute type 2 has an invalid length. [ 1940.052261][T13172] CPU: 0 UID: 0 PID: 13172 Comm: syz.9.11506 Not tainted syzkaller #0 PREEMPT(full) [ 1940.052285][T13172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 1940.052296][T13172] Call Trace: [ 1940.052304][T13172] [ 1940.052312][T13172] dump_stack_lvl+0xe8/0x150 [ 1940.052340][T13172] should_fail_ex+0x412/0x560 [ 1940.052366][T13172] _copy_from_user+0x2d/0xb0 [ 1940.052383][T13172] ___sys_sendmsg+0x1c6/0x360 [ 1940.052404][T13172] ? __lock_acquire+0x6b5/0x2cf0 [ 1940.052429][T13172] ? __pfx____sys_sendmsg+0x10/0x10 [ 1940.052489][T13172] ? __fget_files+0x2a/0x420 [ 1940.052506][T13172] ? __fget_files+0x3a0/0x420 [ 1940.052534][T13172] __x64_sys_sendmsg+0x1bd/0x2a0 [ 1940.052557][T13172] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 1940.052598][T13172] ? __pfx_ksys_write+0x10/0x10 [ 1940.052633][T13172] do_syscall_64+0xe2/0xf80 [ 1940.052650][T13172] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1940.052666][T13172] ? trace_irq_disable+0x37/0x100 [ 1940.052682][T13172] ? clear_bhb_loop+0x60/0xb0 [ 1940.052701][T13172] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1940.052716][T13172] RIP: 0033:0x7fdbbf79aeb9 [ 1940.052732][T13172] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1940.052745][T13172] RSP: 002b:00007fdbc0700028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1940.052762][T13172] RAX: ffffffffffffffda RBX: 00007fdbbfa15fa0 RCX: 00007fdbbf79aeb9 [ 1940.052773][T13172] RDX: 0000000000048004 RSI: 0000200000003a80 RDI: 0000000000000003 [ 1940.052784][T13172] RBP: 00007fdbc0700090 R08: 0000000000000000 R09: 0000000000000000 [ 1940.052794][T13172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1940.052803][T13172] R13: 00007fdbbfa16038 R14: 00007fdbbfa15fa0 R15: 00007fff63ee3418 [ 1940.052834][T13172] [ 1940.137580][T13170] openvswitch: netlink: IP tunnel dst address not specified [ 1940.249065][T13178] netlink: 14 bytes leftover after parsing attributes in process `syz.4.11507'. [ 1940.472265][T13176] delete_channel: no stack [ 1940.503037][T13186] netlink: 28 bytes leftover after parsing attributes in process `syz.5.11511'. [ 1940.538297][T13181] netlink: 92 bytes leftover after parsing attributes in process `syz.9.11509'. [ 1940.638413][T13191] netlink: 'syz.4.11512': attribute type 2 has an invalid length. [ 1940.701176][T13191] netlink: 14 bytes leftover after parsing attributes in process `syz.4.11512'. [ 1940.733005][T13190] netlink: 88 bytes leftover after parsing attributes in process `syz.8.11513'. [ 1940.744005][T13193] netlink: 28 bytes leftover after parsing attributes in process `syz.7.11514'. [ 1941.076775][T13207] netlink: 'syz.4.11519': attribute type 1 has an invalid length. [ 1941.492930][T13220] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 1941.603455][ T6036] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 1941.613638][ T6036] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 1941.629534][ T6036] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 1941.637770][ T6036] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 1941.646307][ T6036] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 1941.664465][T13220] openvswitch: netlink: IP tunnel dst address not specified [ 1941.707348][T13223] lo speed is unknown, defaulting to 1000 [ 1943.063001][T16507] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1943.227256][T13263] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 1943.365931][T16507] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1943.379749][T13261] openvswitch: netlink: IP tunnel dst address not specified [ 1943.427709][T13268] __nla_validate_parse: 10 callbacks suppressed [ 1943.427728][T13268] netlink: 28 bytes leftover after parsing attributes in process `syz.4.11539'. [ 1943.576785][T16507] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1943.606102][T13268] netlink: 1 bytes leftover after parsing attributes in process `syz.4.11539'. [ 1943.656704][T13223] chnl_net:caif_netlink_parms(): no params data found [ 1943.684536][T13279] netlink: 4 bytes leftover after parsing attributes in process `syz.9.11542'. [ 1943.724924][ T6036] Bluetooth: hci2: command tx timeout [ 1943.760385][T16507] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1944.025229][T13223] bridge0: port 1(bridge_slave_0) entered blocking state [ 1944.033100][T13223] bridge0: port 1(bridge_slave_0) entered disabled state [ 1944.040551][T13223] bridge_slave_0: entered allmulticast mode [ 1944.059322][T13223] bridge_slave_0: entered promiscuous mode [ 1944.203049][T13223] bridge0: port 2(bridge_slave_1) entered blocking state [ 1944.210606][T13223] bridge0: port 2(bridge_slave_1) entered disabled state [ 1944.225364][T13223] bridge_slave_1: entered allmulticast mode [ 1944.268921][T13223] bridge_slave_1: entered promiscuous mode [ 1944.365388][T16507] bridge_slave_1: left allmulticast mode [ 1944.371235][T16507] bridge_slave_1: left promiscuous mode [ 1944.376991][T16507] bridge0: port 2(bridge_slave_1) entered disabled state [ 1944.403926][T16507] bridge0: port 1(bridge_slave_0) entered disabled state [ 1944.440233][T13297] netlink: 16 bytes leftover after parsing attributes in process `syz.7.11545'. [ 1945.245577][T13310] netlink: 44 bytes leftover after parsing attributes in process `syz.9.11549'. [ 1945.369944][T16507] team0: Port device geneve1 removed [ 1945.490445][T13223] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1945.550143][T16507] : left promiscuous mode [ 1945.572004][T13314] netlink: 'syz.8.11550': attribute type 1 has an invalid length. [ 1945.731557][T13316] netlink: 4 bytes leftover after parsing attributes in process `syz.7.11551'. [ 1945.752386][T13223] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1945.798155][ T6036] Bluetooth: hci2: command tx timeout [ 1946.080940][T13223] team0: Port device team_slave_0 added [ 1946.116012][T13223] team0: Port device team_slave_1 added [ 1946.212292][T13319] netlink: 28 bytes leftover after parsing attributes in process `syz.8.11552'. [ 1946.325774][T13223] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1946.377176][T13223] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1946.420126][T13223] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1946.653858][T13223] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1946.663379][T13223] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1946.690176][T13321] delete_channel: no stack [ 1946.750053][T13223] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1947.026052][T13223] hsr_slave_0: entered promiscuous mode [ 1947.042592][T13223] hsr_slave_1: entered promiscuous mode [ 1947.109434][T13223] debugfs: 'hsr0' already exists in 'hsr' [ 1947.116985][T13223] Cannot create hsr debugfs directory [ 1947.316719][T13358] netlink: 16 bytes leftover after parsing attributes in process `syz.9.11560'. [ 1947.740400][T13363] netlink: 'syz.9.11562': attribute type 10 has an invalid length. [ 1947.879986][ T6036] Bluetooth: hci2: command tx timeout [ 1948.050029][T16507] hsr_slave_0: left promiscuous mode [ 1948.057763][T16507] hsr_slave_1: left promiscuous mode [ 1948.090447][T16507] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1948.110194][T16507] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1948.147563][T16507] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1948.168077][T16507] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1948.304678][T16507] veth0_macvtap: left promiscuous mode [ 1948.338109][T16507] veth1_vlan: left promiscuous mode [ 1948.355217][T16507] veth0_vlan: left promiscuous mode [ 1948.586156][T13405] netlink: 16 bytes leftover after parsing attributes in process `syz.8.11571'. [ 1949.065339][T16507] team0 (unregistering): Port device team_slave_1 removed [ 1949.111848][T16507] team0 (unregistering): Port device team_slave_0 removed [ 1949.120367][T16504] smc: removing ib device !yz! [ 1949.519347][ T1148] smc: removing ib device syz1 [ 1949.524768][T13375] netlink: 28 bytes leftover after parsing attributes in process `syz.9.11566'. [ 1949.541766][T13388] netlink: 'syz.4.11569': attribute type 29 has an invalid length. [ 1949.560929][T20735] lo speed is unknown, defaulting to 1000 [ 1949.566698][T20735] syz1: Port: 1 Link DOWN [ 1949.958387][ T6036] Bluetooth: hci2: command tx timeout [ 1950.699899][T13423] netlink: 'syz.9.11578': attribute type 10 has an invalid length. [ 1950.744643][T13434] netlink: 'syz.7.11579': attribute type 29 has an invalid length. [ 1950.934078][T13449] netlink: 132 bytes leftover after parsing attributes in process `syz.8.11582'. [ 1951.163602][T13445] netlink: 'syz.8.11582': attribute type 16 has an invalid length. [ 1951.542333][T13460] netlink: 16 bytes leftover after parsing attributes in process `syz.9.11583'. [ 1951.778667][T13223] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 1954.427715][T13223] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 1954.615929][T13223] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 1954.695655][T13223] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 1955.188547][T13494] netlink: 'syz.8.11593': attribute type 2 has an invalid length. [ 1955.227670][T13223] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1955.249841][T13497] netlink: 14 bytes leftover after parsing attributes in process `syz.8.11593'. [ 1955.321074][T13223] 8021q: adding VLAN 0 to HW filter on device team0 [ 1955.381689][T16504] bridge0: port 1(bridge_slave_0) entered blocking state [ 1955.388904][T16504] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1955.435004][ T1148] bridge0: port 2(bridge_slave_1) entered blocking state [ 1955.442231][ T1148] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1955.703602][T13512] netlink: 16 bytes leftover after parsing attributes in process `syz.9.11596'. [ 1955.803623][T13514] netlink: 'syz.8.11595': attribute type 10 has an invalid length. [ 1956.380741][T13223] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1956.653528][T13524] netlink: 'syz.7.11598': attribute type 10 has an invalid length. [ 1957.340630][T13570] netlink: 16 bytes leftover after parsing attributes in process `syz.8.11608'. [ 1957.453040][T13223] veth0_vlan: entered promiscuous mode [ 1957.512369][T13223] veth1_vlan: entered promiscuous mode [ 1957.580684][T13223] veth0_macvtap: entered promiscuous mode [ 1957.609823][T13223] veth1_macvtap: entered promiscuous mode [ 1957.661509][T13223] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1957.729007][T13223] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1957.828787][T16507] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1957.849259][T16507] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1957.858835][T16507] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1957.875528][T16507] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1957.955072][T13585] netlink: 'syz.4.11612': attribute type 29 has an invalid length. [ 1958.086085][T16507] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1958.110534][T16507] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1958.296329][T16504] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1958.334984][T16504] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1958.606076][T13612] openvswitch: netlink: IP tunnel dst address not specified [ 1958.789713][T13616] netlink: 1 bytes leftover after parsing attributes in process `syz.8.11620'. [ 1958.938914][T13624] bridge0: entered promiscuous mode [ 1958.945570][T13624] bridge0: entered allmulticast mode [ 1960.127051][T13606] infiniband !yz!: set down [ 1960.148098][T13606] infiniband !yz!: added team_slave_0 [ 1960.165484][T13660] netlink: 28 bytes leftover after parsing attributes in process `syz.5.11630'. [ 1960.204125][T13606] workqueue: Failed to create a rescuer kthread for wq "ib_mad1": -EINTR [ 1960.214944][T13606] infiniband !yz!: Couldn't open port 1 [ 1960.498368][T13606] RDS/IB: !yz!: added [ 1960.556871][T13606] smc: adding ib device !yz! with port count 1 [ 1960.588184][T13606] smc: ib device !yz! port 1 has no pnetid [ 1960.661695][T13666] netlink: 1 bytes leftover after parsing attributes in process `syz.5.11630'. [ 1960.713535][T13650] delete_channel: no stack [ 1960.922524][T13683] bridge0: port 2(bridge_slave_1) entered blocking state [ 1960.929744][T13683] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1960.937241][T13683] bridge0: port 1(bridge_slave_0) entered blocking state [ 1960.944415][T13683] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1960.987183][T13683] bridge0: entered promiscuous mode [ 1961.517577][T13707] netlink: 1 bytes leftover after parsing attributes in process `syz.5.11643'. [ 1962.240956][T13724] bridge0: port 1(bridge_slave_0) entered blocking state [ 1962.248211][T13724] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1962.256259][T13724] bridge0: entered promiscuous mode [ 1962.264789][T13720] openvswitch: netlink: IP tunnel dst address not specified [ 1962.594617][T13736] netlink: 1 bytes leftover after parsing attributes in process `syz.8.11655'. [ 1962.684136][T13731] netlink: 'syz.7.11651': attribute type 10 has an invalid length. [ 1963.704920][T13762] netlink: 28 bytes leftover after parsing attributes in process `syz.5.11663'. [ 1964.363266][T13782] netlink: 'syz.5.11668': attribute type 29 has an invalid length. [ 1964.756242][T13794] netlink: 28 bytes leftover after parsing attributes in process `syz.4.11674'. [ 1965.252420][T13804] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 1965.368289][T13805] openvswitch: netlink: IP tunnel dst address not specified [ 1965.404990][T13807] netlink: 28 bytes leftover after parsing attributes in process `syz.8.11678'. [ 1965.468737][T13807] netlink: 1 bytes leftover after parsing attributes in process `syz.8.11678'. [ 1965.618988][T13816] netlink: 28 bytes leftover after parsing attributes in process `syz.7.11681'. [ 1965.734689][T13816] netlink: 1 bytes leftover after parsing attributes in process `syz.7.11681'. [ 1965.950210][T13828] netlink: 'syz.5.11684': attribute type 29 has an invalid length. [ 1966.268099][T13845] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 1966.290667][T13845] openvswitch: netlink: IP tunnel dst address not specified [ 1966.461395][T13849] netlink: 'syz.4.11693': attribute type 2 has an invalid length. [ 1966.488776][T13849] netlink: 14 bytes leftover after parsing attributes in process `syz.4.11693'. [ 1966.618895][T13859] netlink: 28 bytes leftover after parsing attributes in process `syz.8.11696'. [ 1966.761632][T13859] netlink: 1 bytes leftover after parsing attributes in process `syz.8.11696'. [ 1967.201019][T13874] netlink: 'syz.5.11702': attribute type 29 has an invalid length. [ 1967.451380][T13891] netlink: 'syz.8.11708': attribute type 2 has an invalid length. [ 1967.470251][T13891] netlink: 14 bytes leftover after parsing attributes in process `syz.8.11708'. [ 1967.636341][T13896] netlink: 28 bytes leftover after parsing attributes in process `syz.4.11710'. [ 1967.699227][T13896] netlink: 1 bytes leftover after parsing attributes in process `syz.4.11710'. [ 1968.236884][T13911] delete_channel: no stack [ 1969.235767][T13932] netlink: 28 bytes leftover after parsing attributes in process `syz.4.11724'. [ 1969.328230][T13936] netlink: 28 bytes leftover after parsing attributes in process `syz.5.11727'. [ 1969.565893][T13941] netlink: 28 bytes leftover after parsing attributes in process `syz.8.11728'. [ 1971.167754][T13979] __nla_validate_parse: 3 callbacks suppressed [ 1971.167785][T13979] netlink: 28 bytes leftover after parsing attributes in process `syz.8.11740'. [ 1971.933216][T13989] delete_channel: no stack [ 1972.473308][T14019] netlink: 28 bytes leftover after parsing attributes in process `syz.9.11755'. [ 1972.555995][T14019] netlink: 1 bytes leftover after parsing attributes in process `syz.9.11755'. [ 1972.606069][T14021] delete_channel: no stack [ 1973.690262][T14084] netlink: 'syz.4.11778': attribute type 2 has an invalid length. [ 1973.738321][T14084] netlink: 14 bytes leftover after parsing attributes in process `syz.4.11778'. [ 1973.788883][T14080] delete_channel: no stack [ 1975.395102][T14128] netlink: 4 bytes leftover after parsing attributes in process `syz.9.11793'. [ 1975.435784][T14130] bridge0: port 2(bridge_slave_1) entered disabled state [ 1975.443763][T14130] bridge0: port 1(bridge_slave_0) entered disabled state [ 1975.513364][T14130] bridge0: left promiscuous mode [ 1975.754998][T14125] netlink: 'syz.5.11791': attribute type 16 has an invalid length. [ 1975.823904][T14138] netlink: 16 bytes leftover after parsing attributes in process `syz.4.11796'. [ 1975.835055][T14141] netlink: 4 bytes leftover after parsing attributes in process `syz.9.11795'. [ 1977.223903][T14162] bridge0: port 2(bridge_slave_1) entered disabled state [ 1977.231294][T14162] bridge0: port 1(bridge_slave_0) entered disabled state [ 1977.288324][T14162] bridge0: left promiscuous mode [ 1977.336560][T14162] netlink: 132 bytes leftover after parsing attributes in process `syz.7.11805'. [ 1977.386880][T14162] netlink: 'syz.7.11805': attribute type 16 has an invalid length. [ 1977.679018][T14173] netlink: 28 bytes leftover after parsing attributes in process `syz.4.11808'. [ 1977.757568][T14176] netlink: 32 bytes leftover after parsing attributes in process `syz.7.11809'. [ 1978.198343][T14184] netlink: 132 bytes leftover after parsing attributes in process `syz.5.11807'. [ 1978.222332][T14184] netlink: 'syz.5.11807': attribute type 16 has an invalid length. [ 1978.510408][T14177] netlink: 1 bytes leftover after parsing attributes in process `syz.4.11808'. [ 1978.810357][T14195] netlink: 28 bytes leftover after parsing attributes in process `syz.8.11814'. [ 1979.173394][T14207] netlink: 28 bytes leftover after parsing attributes in process `syz.9.11820'. [ 1979.342457][T14214] netlink: 16 bytes leftover after parsing attributes in process `syz.7.11821'. [ 1979.451285][T14216] netlink: 'syz.5.11822': attribute type 2 has an invalid length. [ 1979.460454][T14216] netlink: 14 bytes leftover after parsing attributes in process `syz.5.11822'. [ 1979.692133][T14218] netlink: 28 bytes leftover after parsing attributes in process `syz.8.11825'. [ 1979.773218][T14229] bridge0: port 2(bridge_slave_1) entered disabled state [ 1979.780513][T14229] bridge0: port 1(bridge_slave_0) entered disabled state [ 1979.827699][T14233] netlink: 'syz.4.11823': attribute type 16 has an invalid length. [ 1979.839620][T14229] bridge0: left promiscuous mode [ 1980.181135][T14241] netlink: 'syz.7.11830': attribute type 2 has an invalid length. [ 1980.500363][T14249] netlink: 'syz.7.11834': attribute type 29 has an invalid length. [ 1980.589581][T14256] netlink: 'syz.4.11837': attribute type 2 has an invalid length. [ 1981.367664][T14280] netlink: 'syz.7.11846': attribute type 2 has an invalid length. [ 1981.624642][T14291] netlink: 'syz.5.11851': attribute type 2 has an invalid length. [ 1982.456589][T14328] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 1982.488545][T14328] openvswitch: netlink: IP tunnel dst address not specified [ 1983.485718][T14351] netlink: 'syz.4.11869': attribute type 10 has an invalid length. [ 1983.682789][T14368] __nla_validate_parse: 14 callbacks suppressed [ 1983.682808][T14368] netlink: 28 bytes leftover after parsing attributes in process `syz.5.11874'. [ 1983.845236][T14365] netlink: 'syz.9.11871': attribute type 29 has an invalid length. [ 1983.860471][T14370] netlink: 1 bytes leftover after parsing attributes in process `syz.5.11874'. [ 1984.909951][T14400] netlink: 16 bytes leftover after parsing attributes in process `syz.9.11884'. [ 1985.854246][T14440] netlink: 28 bytes leftover after parsing attributes in process `syz.5.11900'. [ 1985.972988][T14447] netlink: 16 bytes leftover after parsing attributes in process `syz.4.11899'. [ 1986.219874][T14455] netlink: 7 bytes leftover after parsing attributes in process `syz.4.11905'. [ 1986.254272][T14451] netlink: 'syz.9.11903': attribute type 10 has an invalid length. [ 1986.292252][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 1986.298664][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 1986.530151][T14467] netlink: 28 bytes leftover after parsing attributes in process `syz.9.11909'. [ 1986.794848][T14473] netlink: 'syz.8.11911': attribute type 29 has an invalid length. [ 1987.279606][T14488] bridge0: port 2(bridge_slave_1) entered blocking state [ 1987.286872][T14488] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1987.294546][T14488] bridge0: port 1(bridge_slave_0) entered blocking state [ 1987.301707][T14488] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1987.311163][T14488] bridge0: entered promiscuous mode [ 1987.330306][T14489] netlink: 16 bytes leftover after parsing attributes in process `syz.7.11916'. [ 1987.514497][T14495] netlink: 7 bytes leftover after parsing attributes in process `syz.4.11920'. [ 1987.534910][T14493] netlink: 28 bytes leftover after parsing attributes in process `syz.5.11918'. [ 1987.619540][T14492] netlink: 'syz.7.11919': attribute type 10 has an invalid length. [ 1988.658087][T14523] delete_channel: no stack [ 1988.716362][T14530] netlink: 'syz.8.11934': attribute type 2 has an invalid length. [ 1988.856925][T14539] __nla_validate_parse: 3 callbacks suppressed [ 1988.856959][T14539] netlink: 28 bytes leftover after parsing attributes in process `syz.9.11937'. [ 1989.356355][T14562] FAULT_INJECTION: forcing a failure. [ 1989.356355][T14562] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1989.372561][T14562] CPU: 1 UID: 0 PID: 14562 Comm: syz.4.11944 Not tainted syzkaller #0 PREEMPT(full) [ 1989.372587][T14562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 1989.372599][T14562] Call Trace: [ 1989.372606][T14562] [ 1989.372614][T14562] dump_stack_lvl+0xe8/0x150 [ 1989.372640][T14562] should_fail_ex+0x412/0x560 [ 1989.372666][T14562] _copy_to_user+0x31/0xb0 [ 1989.372684][T14562] simple_read_from_buffer+0xe1/0x170 [ 1989.372706][T14562] proc_fail_nth_read+0x1bb/0x230 [ 1989.372731][T14562] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1989.372756][T14562] ? rw_verify_area+0x2a6/0x4d0 [ 1989.372777][T14562] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1989.372799][T14562] vfs_read+0x20c/0xa70 [ 1989.372817][T14562] ? fdget_pos+0x246/0x320 [ 1989.372838][T14562] ? __pfx___mutex_lock+0x10/0x10 [ 1989.372858][T14562] ? __pfx_vfs_read+0x10/0x10 [ 1989.372878][T14562] ? __fget_files+0x2a/0x420 [ 1989.372897][T14562] ? __fget_files+0x3a0/0x420 [ 1989.372912][T14562] ? __fget_files+0x2a/0x420 [ 1989.372936][T14562] ksys_read+0x150/0x270 [ 1989.372958][T14562] ? __pfx_ksys_read+0x10/0x10 [ 1989.372990][T14562] do_syscall_64+0xe2/0xf80 [ 1989.373007][T14562] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1989.373022][T14562] ? trace_irq_disable+0x37/0x100 [ 1989.373037][T14562] ? clear_bhb_loop+0x60/0xb0 [ 1989.373057][T14562] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1989.373073][T14562] RIP: 0033:0x7f2c1b15b78e [ 1989.373089][T14562] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1989.373104][T14562] RSP: 002b:00007f2c1bfeefe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1989.373121][T14562] RAX: ffffffffffffffda RBX: 00007f2c1bfef6c0 RCX: 00007f2c1b15b78e [ 1989.373133][T14562] RDX: 000000000000000f RSI: 00007f2c1bfef0a0 RDI: 0000000000000004 [ 1989.373143][T14562] RBP: 00007f2c1bfef090 R08: 0000000000000000 R09: 0000000000000000 [ 1989.373153][T14562] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1989.373163][T14562] R13: 00007f2c1b416038 R14: 00007f2c1b415fa0 R15: 00007ffd111bbae8 [ 1989.373189][T14562] [ 1989.682771][T14572] netlink: 763 bytes leftover after parsing attributes in process `syz.9.11945'. [ 1989.771659][T14576] netlink: 16 bytes leftover after parsing attributes in process `syz.7.11948'. [ 1990.283490][T14591] delete_channel: no stack [ 1990.456487][T14605] !yz!: rxe_newlink: already configured on team_slave_0 [ 1990.499538][T14605] openvswitch: netlink: IP tunnel dst address not specified [ 1993.125232][T14624] netlink: 16 bytes leftover after parsing attributes in process `syz.4.11962'. [ 1993.409536][T14634] netlink: 'syz.9.11968': attribute type 29 has an invalid length. [ 1993.419848][T14631] delete_channel: no stack [ 1993.566352][T14639] netlink: 28 bytes leftover after parsing attributes in process `syz.4.11970'. [ 1993.586787][T14641] netlink: 28 bytes leftover after parsing attributes in process `syz.7.11971'. [ 1993.613847][T14639] netlink: 1 bytes leftover after parsing attributes in process `syz.4.11970'. [ 1993.699990][T14641] netlink: 1 bytes leftover after parsing attributes in process `syz.7.11971'. [ 1993.961494][T14650] netlink: 16 bytes leftover after parsing attributes in process `syz.8.11974'. [ 1994.059981][T14654] netlink: 28 bytes leftover after parsing attributes in process `syz.5.11975'. [ 1994.462324][T14664] netlink: 'syz.7.11980': attribute type 2 has an invalid length. [ 1994.489457][T14664] netlink: 14 bytes leftover after parsing attributes in process `syz.7.11980'. [ 1994.513042][T14668] netlink: 'syz.5.11981': attribute type 10 has an invalid length. [ 1994.663624][T14673] openvswitch: netlink: IP tunnel dst address not specified [ 1994.933123][T14690] netlink: 6 bytes leftover after parsing attributes in process `syz.5.11988'. [ 1996.601875][T14706] netlink: 'syz.9.11995': attribute type 2 has an invalid length. [ 1996.620004][T14706] netlink: 14 bytes leftover after parsing attributes in process `syz.9.11995'. [ 1996.660528][T14704] netlink: 8 bytes leftover after parsing attributes in process `syz.5.11994'. [ 1996.724871][T14709] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 1996.829665][T14709] openvswitch: netlink: IP tunnel dst address not specified [ 1996.875632][T14713] netlink: 56 bytes leftover after parsing attributes in process `syz.7.11996'. [ 1996.943991][T14715] netlink: 'syz.5.11999': attribute type 7 has an invalid length. [ 1997.399111][T14728] netlink: 'syz.8.12002': attribute type 10 has an invalid length. [ 1997.419007][T14728] netlink: 65015 bytes leftover after parsing attributes in process `syz.8.12002'. [ 1997.861040][T14744] Set syz1 is full, maxelem 65536 reached [ 1998.162243][T14751] netlink: 8 bytes leftover after parsing attributes in process `syz.9.12009'. [ 1999.100244][T14755] netlink: 'syz.4.12010': attribute type 29 has an invalid length. [ 1999.632375][T14768] netlink: 'syz.9.12015': attribute type 10 has an invalid length. [ 2000.337321][T14786] netlink: 28 bytes leftover after parsing attributes in process `syz.7.12020'. [ 2000.517595][T14787] netlink: 1 bytes leftover after parsing attributes in process `syz.7.12020'. [ 2000.590559][T14792] netlink: 28 bytes leftover after parsing attributes in process `syz.8.12022'. [ 2000.711175][T14795] netlink: 1 bytes leftover after parsing attributes in process `syz.8.12022'. [ 2001.017311][T14803] netlink: 'syz.7.12025': attribute type 29 has an invalid length. [ 2001.341678][T14816] netlink: 4 bytes leftover after parsing attributes in process `syz.7.12030'. [ 2001.511918][T14825] netlink: 28 bytes leftover after parsing attributes in process `syz.4.12031'. [ 2001.578706][T14825] netlink: 1 bytes leftover after parsing attributes in process `syz.4.12031'. [ 2001.820222][T14831] netlink: 28 bytes leftover after parsing attributes in process `syz.7.12036'. [ 2001.908559][T14831] netlink: 1 bytes leftover after parsing attributes in process `syz.7.12036'. [ 2002.387219][T14842] netlink: 28 bytes leftover after parsing attributes in process `syz.7.12040'. [ 2003.493860][T14862] netlink: 'syz.4.12047': attribute type 10 has an invalid length. [ 2003.659420][T14876] nr0: port 1(hsr0) entered blocking state [ 2003.665637][T14876] nr0: port 1(hsr0) entered disabled state [ 2003.673534][T14876] hsr0: entered allmulticast mode [ 2003.679007][T14876] hsr_slave_0: entered allmulticast mode [ 2003.684668][T14876] hsr_slave_1: entered allmulticast mode [ 2003.710968][T14876] hsr0: entered promiscuous mode [ 2005.021252][T14901] netlink: 'syz.5.12061': attribute type 2 has an invalid length. [ 2005.653287][T14939] netlink: 'syz.9.12074': attribute type 29 has an invalid length. [ 2005.828183][T14943] __nla_validate_parse: 10 callbacks suppressed [ 2005.828201][T14943] netlink: 7 bytes leftover after parsing attributes in process `syz.8.12077'. [ 2005.852928][T14943] netlink: 116 bytes leftover after parsing attributes in process `syz.8.12077'. [ 2005.930753][T14947] netlink: 28 bytes leftover after parsing attributes in process `syz.5.12076'. [ 2005.971989][T14947] netlink: 1 bytes leftover after parsing attributes in process `syz.5.12076'. [ 2006.101329][T14956] netlink: 4 bytes leftover after parsing attributes in process `syz.5.12081'. [ 2006.430925][T14956] lo: entered promiscuous mode [ 2006.594348][T14962] netlink: 'syz.7.12083': attribute type 2 has an invalid length. [ 2006.781615][T14974] netlink: 40 bytes leftover after parsing attributes in process `syz.7.12088'. [ 2006.798602][T14975] netlink: 14 bytes leftover after parsing attributes in process `syz.4.12084'. [ 2006.836603][T14974] bridge0: port 2(bridge_slave_1) entered blocking state [ 2006.843839][T14974] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2006.851429][T14974] bridge0: port 1(bridge_slave_0) entered blocking state [ 2006.858625][T14974] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2006.872591][T14974] bridge0: entered promiscuous mode [ 2006.954007][T14981] netlink: 28 bytes leftover after parsing attributes in process `syz.9.12089'. [ 2007.043020][T14987] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 2007.055072][T14987] openvswitch: netlink: IP tunnel dst address not specified [ 2007.153582][T14988] netlink: 1 bytes leftover after parsing attributes in process `syz.9.12089'. [ 2007.261051][T14993] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 2007.272694][T14993] openvswitch: netlink: IP tunnel dst address not specified [ 2007.504906][T15005] netlink: 4 bytes leftover after parsing attributes in process `syz.4.12097'. [ 2007.875564][T15016] FAULT_INJECTION: forcing a failure. [ 2007.875564][T15016] name failslab, interval 1, probability 0, space 0, times 0 [ 2007.908055][T15016] CPU: 0 UID: 0 PID: 15016 Comm: syz.7.12103 Not tainted syzkaller #0 PREEMPT(full) [ 2007.908079][T15016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 2007.908089][T15016] Call Trace: [ 2007.908095][T15016] [ 2007.908102][T15016] dump_stack_lvl+0xe8/0x150 [ 2007.908129][T15016] should_fail_ex+0x412/0x560 [ 2007.908153][T15016] should_failslab+0xa8/0x100 [ 2007.908173][T15016] kmem_cache_alloc_node_noprof+0x8b/0x6f0 [ 2007.908195][T15016] ? __alloc_skb+0x193/0x390 [ 2007.908213][T15016] ? __alloc_skb+0x1d7/0x390 [ 2007.908228][T15016] ? __local_bh_enable_ip+0xd0/0x130 [ 2007.908246][T15016] ? __alloc_skb+0x193/0x390 [ 2007.908264][T15016] __alloc_skb+0x1d7/0x390 [ 2007.908286][T15016] pfkey_sendmsg+0x212/0x1120 [ 2007.908301][T15016] ? unwind_next_frame+0xa5/0x23c0 [ 2007.908330][T15016] ? __pfx_pfkey_sendmsg+0x10/0x10 [ 2007.908344][T15016] ? aa_sk_perm+0x15a/0x960 [ 2007.908363][T15016] ? aa_sk_perm+0x82d/0x960 [ 2007.908384][T15016] ? __pfx_aa_sk_perm+0x10/0x10 [ 2007.908398][T15016] ? tomoyo_socket_sendmsg_permission+0x1e0/0x300 [ 2007.908423][T15016] ? aa_sock_msg_perm+0xf1/0x1b0 [ 2007.908444][T15016] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 2007.908460][T15016] ? __pfx_pfkey_sendmsg+0x10/0x10 [ 2007.908473][T15016] ____sys_sendmsg+0xa68/0xad0 [ 2007.908492][T15016] ? __might_fault+0xaf/0x130 [ 2007.908517][T15016] ? __pfx_____sys_sendmsg+0x10/0x10 [ 2007.908543][T15016] ? import_iovec+0x73/0xa0 [ 2007.908566][T15016] ___sys_sendmsg+0x2a5/0x360 [ 2007.908584][T15016] ? __lock_acquire+0x6b5/0x2cf0 [ 2007.908605][T15016] ? __pfx____sys_sendmsg+0x10/0x10 [ 2007.908653][T15016] ? __fget_files+0x2a/0x420 [ 2007.908668][T15016] ? __fget_files+0x3a0/0x420 [ 2007.908693][T15016] __x64_sys_sendmsg+0x1bd/0x2a0 [ 2007.908714][T15016] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 2007.908742][T15016] ? __pfx_ksys_write+0x10/0x10 [ 2007.908775][T15016] do_syscall_64+0xe2/0xf80 [ 2007.908793][T15016] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2007.908809][T15016] ? trace_irq_disable+0x37/0x100 [ 2007.908824][T15016] ? clear_bhb_loop+0x60/0xb0 [ 2007.908844][T15016] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2007.908860][T15016] RIP: 0033:0x7f56c899aeb9 [ 2007.908876][T15016] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2007.908890][T15016] RSP: 002b:00007f56c98ed028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2007.908918][T15016] RAX: ffffffffffffffda RBX: 00007f56c8c15fa0 RCX: 00007f56c899aeb9 [ 2007.908930][T15016] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000008 [ 2007.908940][T15016] RBP: 00007f56c98ed090 R08: 0000000000000000 R09: 0000000000000000 [ 2007.908951][T15016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2007.908961][T15016] R13: 00007f56c8c16038 R14: 00007f56c8c15fa0 R15: 00007fff1ce014e8 [ 2007.908989][T15016] [ 2008.914062][T15042] !yz!: rxe_newlink: already configured on team_slave_0 [ 2009.025753][T15034] openvswitch: netlink: IP tunnel dst address not specified [ 2009.190112][T15051] netlink: 'syz.9.12111': attribute type 2 has an invalid length. [ 2009.395072][T15059] netlink: 'syz.7.12114': attribute type 29 has an invalid length. [ 2013.047535][T15106] __nla_validate_parse: 1 callbacks suppressed [ 2013.047554][T15106] netlink: 28 bytes leftover after parsing attributes in process `syz.5.12128'. [ 2013.111134][T15108] netlink: 28 bytes leftover after parsing attributes in process `syz.4.12129'. [ 2013.162215][T15102] netlink: 'syz.9.12126': attribute type 2 has an invalid length. [ 2013.283113][T15106] netlink: 1 bytes leftover after parsing attributes in process `syz.5.12128'. [ 2014.151655][T15132] netlink: 'syz.4.12134': attribute type 29 has an invalid length. [ 2014.868903][T15135] netlink: 4 bytes leftover after parsing attributes in process `syz.4.12136'. [ 2015.283111][T15156] netlink: 28 bytes leftover after parsing attributes in process `syz.4.12142'. [ 2015.362074][T15156] netlink: 1 bytes leftover after parsing attributes in process `syz.4.12142'. [ 2015.491194][T15164] netlink: 28 bytes leftover after parsing attributes in process `syz.4.12146'. [ 2015.512642][T15164] netlink: 1 bytes leftover after parsing attributes in process `syz.4.12146'. [ 2015.516972][T15165] netlink: 16 bytes leftover after parsing attributes in process `syz.7.12144'. [ 2015.840713][T15171] netlink: 7 bytes leftover after parsing attributes in process `syz.7.12148'. [ 2018.095866][T15224] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 2018.105540][T15224] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 2018.114938][T15224] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 2018.124333][T15224] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 2018.133724][T15224] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 2018.142984][T15224] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 2018.153205][T15224] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 2018.162691][T15224] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 2018.171940][T15224] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 2018.181719][T15224] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 2018.413411][T15236] __nla_validate_parse: 5 callbacks suppressed [ 2018.413433][T15236] netlink: 4 bytes leftover after parsing attributes in process `syz.5.12166'. [ 2018.464867][T15237] netlink: 'syz.9.12165': attribute type 2 has an invalid length. [ 2020.505101][T15256] netlink: 'syz.5.12169': attribute type 29 has an invalid length. [ 2020.653819][T15263] netlink: 14 bytes leftover after parsing attributes in process `syz.7.12173'. [ 2020.696416][T15266] netlink: 16 bytes leftover after parsing attributes in process `syz.9.12172'. [ 2020.754347][T15270] netlink: 28 bytes leftover after parsing attributes in process `syz.4.12176'. [ 2020.845554][T15278] netlink: 7 bytes leftover after parsing attributes in process `syz.7.12178'. [ 2020.860792][T15278] netlink: 108 bytes leftover after parsing attributes in process `syz.7.12178'. [ 2020.882825][T15270] netlink: 1 bytes leftover after parsing attributes in process `syz.4.12176'. [ 2020.932404][T15279] netlink: 'syz.8.12177': attribute type 29 has an invalid length. [ 2022.208995][T15310] netlink: 16 bytes leftover after parsing attributes in process `syz.7.12189'. [ 2022.311311][T15306] netlink: 'syz.9.12188': attribute type 2 has an invalid length. [ 2022.593821][T15319] netlink: 7 bytes leftover after parsing attributes in process `syz.4.12192'. [ 2022.661338][T15319] netlink: 108 bytes leftover after parsing attributes in process `syz.4.12192'. [ 2023.407417][T15330] netlink: 'syz.9.12195': attribute type 29 has an invalid length. [ 2023.494473][T15324] delete_channel: no stack [ 2023.925874][T15350] netlink: 16 bytes leftover after parsing attributes in process `syz.7.12203'. [ 2024.165263][T15356] netlink: 28 bytes leftover after parsing attributes in process `syz.5.12206'. [ 2024.342360][T15356] netlink: 1 bytes leftover after parsing attributes in process `syz.5.12206'. [ 2024.648291][T15364] netlink: 7 bytes leftover after parsing attributes in process `syz.9.12208'. [ 2024.657758][T15364] netlink: 108 bytes leftover after parsing attributes in process `syz.9.12208'. [ 2024.758053][T15359] netlink: 'syz.8.12209': attribute type 2 has an invalid length. [ 2024.859769][T15347] delete_channel: no stack [ 2026.344345][T15398] netlink: 16 bytes leftover after parsing attributes in process `syz.9.12217'. [ 2028.662424][T15415] netlink: 28 bytes leftover after parsing attributes in process `syz.9.12222'. [ 2029.189939][T15431] netlink: 7 bytes leftover after parsing attributes in process `syz.9.12227'. [ 2029.203008][T15431] netlink: 108 bytes leftover after parsing attributes in process `syz.9.12227'. [ 2029.463834][T15441] netlink: 16 bytes leftover after parsing attributes in process `syz.9.12232'. [ 2030.048309][T15473] netlink: 7 bytes leftover after parsing attributes in process `syz.9.12242'. [ 2030.057724][T15473] netlink: 108 bytes leftover after parsing attributes in process `syz.9.12242'. [ 2032.595176][T15491] netlink: 16 bytes leftover after parsing attributes in process `syz.7.12246'. [ 2032.951371][T15507] netlink: 7 bytes leftover after parsing attributes in process `syz.8.12254'. [ 2032.971564][T15507] netlink: 108 bytes leftover after parsing attributes in process `syz.8.12254'. [ 2033.223334][T15515] netlink: 28 bytes leftover after parsing attributes in process `syz.7.12255'. [ 2033.276593][T15515] netlink: 1 bytes leftover after parsing attributes in process `syz.7.12255'. [ 2036.243287][T15538] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 2036.451824][T15538] net_ratelimit: 3319 callbacks suppressed [ 2036.451851][T15538] openvswitch: netlink: IP tunnel dst address not specified [ 2037.114973][T15544] netlink: 'syz.9.12269': attribute type 2 has an invalid length. [ 2039.091535][T15597] FAULT_INJECTION: forcing a failure. [ 2039.091535][T15597] name failslab, interval 1, probability 0, space 0, times 0 [ 2039.122492][T15597] CPU: 1 UID: 0 PID: 15597 Comm: syz.7.12285 Not tainted syzkaller #0 PREEMPT(full) [ 2039.122517][T15597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 2039.122527][T15597] Call Trace: [ 2039.122535][T15597] [ 2039.122545][T15597] dump_stack_lvl+0xe8/0x150 [ 2039.122575][T15597] should_fail_ex+0x412/0x560 [ 2039.122613][T15597] should_failslab+0xa8/0x100 [ 2039.122637][T15597] __kmalloc_cache_noprof+0x83/0x6e0 [ 2039.122658][T15597] ? bpf_init_fs_context+0x54/0x240 [ 2039.122695][T15597] bpf_init_fs_context+0x54/0x240 [ 2039.122725][T15597] alloc_fs_context+0x9e3/0xd60 [ 2039.122773][T15597] do_new_mount+0x179/0xa50 [ 2039.122789][T15597] ? apparmor_capable+0x137/0x1a0 [ 2039.122821][T15597] ? security_capable+0x7e/0x2c0 [ 2039.122840][T15597] ? __pfx_do_new_mount+0x10/0x10 [ 2039.122861][T15597] ? ns_capable+0x89/0xe0 [ 2039.122882][T15597] ? path_mount+0x690/0x10e0 [ 2039.122930][T15597] __se_sys_mount+0x31d/0x420 [ 2039.122963][T15597] ? __pfx___se_sys_mount+0x10/0x10 [ 2039.122999][T15597] ? __x64_sys_mount+0x20/0xc0 [ 2039.123025][T15597] do_syscall_64+0xe2/0xf80 [ 2039.123043][T15597] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2039.123061][T15597] ? clear_bhb_loop+0x60/0xb0 [ 2039.123084][T15597] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2039.123099][T15597] RIP: 0033:0x7f56c899aeb9 [ 2039.123116][T15597] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2039.123129][T15597] RSP: 002b:00007f56c98ed028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2039.123146][T15597] RAX: ffffffffffffffda RBX: 00007f56c8c15fa0 RCX: 00007f56c899aeb9 [ 2039.123158][T15597] RDX: 00002000000002c0 RSI: 0000200000000240 RDI: 0000000000000000 [ 2039.123169][T15597] RBP: 00007f56c98ed090 R08: 0000000000000000 R09: 0000000000000000 [ 2039.123180][T15597] R10: 0000000002000000 R11: 0000000000000246 R12: 0000000000000002 [ 2039.123190][T15597] R13: 00007f56c8c16038 R14: 00007f56c8c15fa0 R15: 00007fff1ce014e8 [ 2039.123245][T15597] [ 2039.369653][T15601] netlink: 28 bytes leftover after parsing attributes in process `syz.9.12287'. [ 2039.406169][T15607] netlink: 14 bytes leftover after parsing attributes in process `syz.5.12286'. [ 2039.662900][T15615] netlink: 'syz.8.12292': attribute type 10 has an invalid length. [ 2039.672798][T15615] netlink: 156 bytes leftover after parsing attributes in process `syz.8.12292'. [ 2039.724764][T15618] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 2039.796788][T15607] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2039.809568][T15607] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2039.824012][T15607] bond0 (unregistering): Released all slaves [ 2039.850609][T15601] netlink: 1 bytes leftover after parsing attributes in process `syz.9.12287'. [ 2040.270691][T15631] netlink: 'syz.5.12297': attribute type 2 has an invalid length. [ 2040.732625][T15642] netlink: 1 bytes leftover after parsing attributes in process `syz.9.12300'. [ 2041.020542][T15650] netlink: 1 bytes leftover after parsing attributes in process `syz.8.12303'. [ 2041.039382][T15652] netlink: 28 bytes leftover after parsing attributes in process `syz.4.12306'. [ 2041.090548][T15652] netlink: 1 bytes leftover after parsing attributes in process `syz.4.12306'. [ 2041.422401][T15657] netlink: 'syz.5.12307': attribute type 10 has an invalid length. [ 2041.598695][T15665] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 2041.671835][T15665] openvswitch: netlink: IP tunnel dst address not specified [ 2041.714559][T15671] netlink: 28 bytes leftover after parsing attributes in process `syz.8.12312'. [ 2041.771976][T15671] netlink: 1 bytes leftover after parsing attributes in process `syz.8.12312'. [ 2042.163983][T15681] netlink: 'syz.8.12317': attribute type 2 has an invalid length. [ 2042.404680][T15687] netlink: 'syz.5.12319': attribute type 2 has an invalid length. [ 2043.034769][T15712] netlink: 'syz.8.12327': attribute type 21 has an invalid length. [ 2043.055166][T15712] netlink: 'syz.8.12327': attribute type 5 has an invalid length. [ 2043.985679][T15728] netlink: 'syz.4.12334': attribute type 2 has an invalid length. [ 2044.415333][T15751] __nla_validate_parse: 10 callbacks suppressed [ 2044.415386][T15751] netlink: 1 bytes leftover after parsing attributes in process `syz.8.12343'. [ 2044.741724][T15766] netlink: 28 bytes leftover after parsing attributes in process `syz.4.12347'. [ 2044.886470][T15770] netlink: 1 bytes leftover after parsing attributes in process `syz.4.12347'. [ 2047.638793][T15777] netlink: 4432 bytes leftover after parsing attributes in process `syz.7.12351'. [ 2047.742866][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 2047.749386][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 2047.998554][T15781] netlink: 'syz.9.12353': attribute type 2 has an invalid length. [ 2048.858137][T15788] delete_channel: no stack [ 2052.368354][T15833] netlink: 14 bytes leftover after parsing attributes in process `syz.8.12370'. [ 2052.530432][T15840] netlink: 16 bytes leftover after parsing attributes in process `syz.4.12371'. [ 2052.658884][T15842] netlink: 'syz.9.12373': attribute type 29 has an invalid length. [ 2053.608213][T15867] netlink: 'syz.4.12384': attribute type 2 has an invalid length. [ 2053.814283][T15871] netlink: 'syz.9.12385': attribute type 2 has an invalid length. [ 2054.186248][T15879] netlink: 'syz.8.12387': attribute type 10 has an invalid length. [ 2054.614556][T15882] delete_channel: no stack [ 2054.664942][T15901] FAULT_INJECTION: forcing a failure. [ 2054.664942][T15901] name failslab, interval 1, probability 0, space 0, times 0 [ 2054.688297][T15901] CPU: 0 UID: 0 PID: 15901 Comm: syz.5.12394 Not tainted syzkaller #0 PREEMPT(full) [ 2054.688321][T15901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 2054.688331][T15901] Call Trace: [ 2054.688339][T15901] [ 2054.688347][T15901] dump_stack_lvl+0xe8/0x150 [ 2054.688371][T15901] should_fail_ex+0x412/0x560 [ 2054.688397][T15901] should_failslab+0xa8/0x100 [ 2054.688417][T15901] __kmalloc_cache_noprof+0x83/0x6e0 [ 2054.688433][T15901] ? ip_set_pernet+0x23/0x240 [ 2054.688453][T15901] ? ip_set_pernet+0x23/0x240 [ 2054.688470][T15901] ? ip_set_create+0x391/0x1a40 [ 2054.688496][T15901] ip_set_create+0x391/0x1a40 [ 2054.688520][T15901] ? rcu_is_watching+0x15/0xb0 [ 2054.688546][T15901] ? __pfx_ip_set_create+0x10/0x10 [ 2054.688601][T15901] nfnetlink_rcv_msg+0xc00/0x12c0 [ 2054.688622][T15901] ? unwind_get_return_address+0x4d/0x90 [ 2054.688649][T15901] ? nfnetlink_rcv_msg+0x229/0x12c0 [ 2054.688687][T15901] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 2054.688745][T15901] ? perf_trace_preemptirq_template+0xab/0x340 [ 2054.688770][T15901] netlink_rcv_skb+0x232/0x4b0 [ 2054.688789][T15901] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 2054.688813][T15901] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 2054.688840][T15901] ? bpf_lsm_capable+0x9/0x20 [ 2054.688859][T15901] ? security_capable+0x7e/0x2c0 [ 2054.688885][T15901] nfnetlink_rcv+0x2c0/0x27b0 [ 2054.688915][T15901] ? __local_bh_enable_ip+0xd0/0x130 [ 2054.688932][T15901] ? lockdep_hardirqs_on+0x7a/0x110 [ 2054.688949][T15901] ? __dev_queue_xmit+0x274/0x3850 [ 2054.688968][T15901] ? __local_bh_enable_ip+0xd0/0x130 [ 2054.688982][T15901] ? __dev_queue_xmit+0x274/0x3850 [ 2054.689000][T15901] ? __dev_queue_xmit+0x1e6c/0x3850 [ 2054.689019][T15901] ? __x64_sys_sendmsg+0x1bd/0x2a0 [ 2054.689050][T15901] ? __dev_queue_xmit+0x274/0x3850 [ 2054.689072][T15901] ? __pfx_nfnetlink_rcv+0x10/0x10 [ 2054.689099][T15901] ? __pfx___dev_queue_xmit+0x10/0x10 [ 2054.689127][T15901] ? ref_tracker_free+0x693/0x840 [ 2054.689145][T15901] ? __copy_skb_header+0xa3/0x4a0 [ 2054.689167][T15901] ? __pfx_ref_tracker_free+0x10/0x10 [ 2054.689184][T15901] ? __skb_clone+0x63/0x7a0 [ 2054.689208][T15901] ? __skb_clone+0x483/0x7a0 [ 2054.689235][T15901] ? skb_clone+0x246/0x3a0 [ 2054.689258][T15901] ? __netlink_deliver_tap+0x807/0x850 [ 2054.689275][T15901] ? netlink_deliver_tap+0x2e/0x1b0 [ 2054.689297][T15901] ? netlink_deliver_tap+0x2e/0x1b0 [ 2054.689321][T15901] netlink_unicast+0x80f/0x9b0 [ 2054.689352][T15901] ? __pfx_netlink_unicast+0x10/0x10 [ 2054.689373][T15901] ? __alloc_skb+0x193/0x390 [ 2054.689391][T15901] ? netlink_sendmsg+0x650/0xb40 [ 2054.689406][T15901] ? skb_put+0x11b/0x210 [ 2054.689428][T15901] netlink_sendmsg+0x813/0xb40 [ 2054.689455][T15901] ? __pfx_netlink_sendmsg+0x10/0x10 [ 2054.689476][T15901] ? aa_sock_msg_perm+0xf1/0x1b0 [ 2054.689497][T15901] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 2054.689516][T15901] ? __pfx_netlink_sendmsg+0x10/0x10 [ 2054.689532][T15901] ____sys_sendmsg+0xa68/0xad0 [ 2054.689552][T15901] ? __might_fault+0xaf/0x130 [ 2054.689580][T15901] ? __pfx_____sys_sendmsg+0x10/0x10 [ 2054.689609][T15901] ? import_iovec+0x73/0xa0 [ 2054.689641][T15901] ___sys_sendmsg+0x2a5/0x360 [ 2054.689660][T15901] ? __lock_acquire+0x6b5/0x2cf0 [ 2054.689684][T15901] ? __pfx____sys_sendmsg+0x10/0x10 [ 2054.689738][T15901] ? __fget_files+0x2a/0x420 [ 2054.689755][T15901] ? __fget_files+0x3a0/0x420 [ 2054.689782][T15901] __x64_sys_sendmsg+0x1bd/0x2a0 [ 2054.689805][T15901] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 2054.689823][T15901] ? perf_trace_preemptirq_template+0xab/0x340 [ 2054.689848][T15901] ? __pfx_ksys_write+0x10/0x10 [ 2054.689879][T15901] do_syscall_64+0xe2/0xf80 [ 2054.689895][T15901] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2054.689910][T15901] ? trace_irq_disable+0x37/0x100 [ 2054.689925][T15901] ? clear_bhb_loop+0x60/0xb0 [ 2054.689942][T15901] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2054.689956][T15901] RIP: 0033:0x7fec2359aeb9 [ 2054.689972][T15901] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2054.689985][T15901] RSP: 002b:00007fec244ac028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2054.690004][T15901] RAX: ffffffffffffffda RBX: 00007fec23815fa0 RCX: 00007fec2359aeb9 [ 2054.690014][T15901] RDX: 0000000000000000 RSI: 0000200000000100 RDI: 0000000000000003 [ 2054.690023][T15901] RBP: 00007fec244ac090 R08: 0000000000000000 R09: 0000000000000000 [ 2054.690032][T15901] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2054.690041][T15901] R13: 00007fec23816038 R14: 00007fec23815fa0 R15: 00007ffd42094dc8 [ 2054.690067][T15901] [ 2055.216025][T15910] netlink: 28 bytes leftover after parsing attributes in process `syz.4.12397'. [ 2055.887603][T15916] netlink: 'syz.5.12398': attribute type 2 has an invalid length. [ 2056.012290][T15922] netlink: 'syz.4.12401': attribute type 2 has an invalid length. [ 2056.482427][T15937] FAULT_INJECTION: forcing a failure. [ 2056.482427][T15937] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2056.504773][T15937] CPU: 1 UID: 0 PID: 15937 Comm: syz.9.12405 Not tainted syzkaller #0 PREEMPT(full) [ 2056.504797][T15937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 2056.504807][T15937] Call Trace: [ 2056.504814][T15937] [ 2056.504822][T15937] dump_stack_lvl+0xe8/0x150 [ 2056.504847][T15937] should_fail_ex+0x412/0x560 [ 2056.504874][T15937] _copy_to_user+0x31/0xb0 [ 2056.504894][T15937] simple_read_from_buffer+0xe1/0x170 [ 2056.504917][T15937] proc_fail_nth_read+0x1bb/0x230 [ 2056.504944][T15937] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 2056.504970][T15937] ? rw_verify_area+0x2a6/0x4d0 [ 2056.504992][T15937] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 2056.505016][T15937] vfs_read+0x20c/0xa70 [ 2056.505036][T15937] ? fdget_pos+0x246/0x320 [ 2056.505060][T15937] ? __pfx___mutex_lock+0x10/0x10 [ 2056.505080][T15937] ? __pfx_vfs_read+0x10/0x10 [ 2056.505104][T15937] ? __fget_files+0x2a/0x420 [ 2056.505127][T15937] ? __fget_files+0x3a0/0x420 [ 2056.505143][T15937] ? __fget_files+0x2a/0x420 [ 2056.505169][T15937] ksys_read+0x150/0x270 [ 2056.505193][T15937] ? __pfx_ksys_read+0x10/0x10 [ 2056.505226][T15937] do_syscall_64+0xe2/0xf80 [ 2056.505243][T15937] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2056.505258][T15937] ? trace_irq_disable+0x37/0x100 [ 2056.505274][T15937] ? clear_bhb_loop+0x60/0xb0 [ 2056.505294][T15937] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2056.505309][T15937] RIP: 0033:0x7fdbbf75b78e [ 2056.505325][T15937] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 2056.505337][T15937] RSP: 002b:00007fdbc06defe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2056.505354][T15937] RAX: ffffffffffffffda RBX: 00007fdbc06df6c0 RCX: 00007fdbbf75b78e [ 2056.505366][T15937] RDX: 000000000000000f RSI: 00007fdbc06df0a0 RDI: 0000000000000005 [ 2056.505376][T15937] RBP: 00007fdbc06df090 R08: 0000000000000000 R09: 0000000000000000 [ 2056.505384][T15937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2056.505394][T15937] R13: 00007fdbbfa16128 R14: 00007fdbbfa16090 R15: 00007fff63ee3418 [ 2056.505425][T15937] [ 2056.898469][T15954] netlink: 28 bytes leftover after parsing attributes in process `syz.5.12411'. [ 2056.970429][T15956] netlink: 14 bytes leftover after parsing attributes in process `syz.7.12408'. [ 2057.474112][T15968] netlink: 'syz.9.12417': attribute type 2 has an invalid length. [ 2057.744689][T15977] netlink: 28 bytes leftover after parsing attributes in process `syz.5.12419'. [ 2058.157544][T15991] netlink: 1 bytes leftover after parsing attributes in process `syz.5.12424'. [ 2058.234559][T15995] netlink: 28 bytes leftover after parsing attributes in process `syz.4.12425'. [ 2058.306557][T15993] netlink: 1 bytes leftover after parsing attributes in process `syz.8.12426'. [ 2059.500591][T16016] netlink: 'syz.5.12433': attribute type 2 has an invalid length. [ 2059.695025][T16024] netlink: 7 bytes leftover after parsing attributes in process `syz.8.12436'. [ 2059.734370][T16024] netlink: 108 bytes leftover after parsing attributes in process `syz.8.12436'. [ 2059.766752][T16028] netlink: 6 bytes leftover after parsing attributes in process `syz.4.12435'. [ 2059.849138][T16029] netlink: 1 bytes leftover after parsing attributes in process `syz.7.12438'. [ 2060.590647][T16034] netlink: 'syz.8.12439': attribute type 10 has an invalid length. [ 2060.598724][T16036] netlink: 'syz.5.12440': attribute type 10 has an invalid length. [ 2060.687580][T16036] team0 (unregistering): Port device team_slave_0 removed [ 2060.703253][T16036] team0 (unregistering): Port device team_slave_1 removed [ 2061.063772][T16055] netlink: 28 bytes leftover after parsing attributes in process `syz.4.12447'. [ 2061.114473][T16055] netlink: 1 bytes leftover after parsing attributes in process `syz.4.12447'. [ 2061.332601][T16052] netlink: 'syz.7.12446': attribute type 2 has an invalid length. [ 2061.625421][T16076] netlink: 'syz.7.12455': attribute type 29 has an invalid length. [ 2061.675567][T16075] netlink: 'syz.8.12456': attribute type 29 has an invalid length. [ 2062.394752][T16105] netlink: 'syz.4.12467': attribute type 2 has an invalid length. [ 2064.733064][T16110] __nla_validate_parse: 2 callbacks suppressed [ 2064.733085][T16110] netlink: 28 bytes leftover after parsing attributes in process `syz.7.12468'. [ 2064.796966][T16110] netlink: 1 bytes leftover after parsing attributes in process `syz.7.12468'. [ 2064.890896][T16118] FAULT_INJECTION: forcing a failure. [ 2064.890896][T16118] name failslab, interval 1, probability 0, space 0, times 0 [ 2064.932092][T16118] CPU: 1 UID: 0 PID: 16118 Comm: syz.5.12473 Not tainted syzkaller #0 PREEMPT(full) [ 2064.932117][T16118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 2064.932127][T16118] Call Trace: [ 2064.932135][T16118] [ 2064.932143][T16118] dump_stack_lvl+0xe8/0x150 [ 2064.932171][T16118] should_fail_ex+0x412/0x560 [ 2064.932197][T16118] should_failslab+0xa8/0x100 [ 2064.932217][T16118] kmem_cache_alloc_noprof+0x87/0x6e0 [ 2064.932239][T16118] ? nf_ct_pernet+0x45/0x270 [ 2064.932261][T16118] ? nf_ct_pernet+0x45/0x270 [ 2064.932280][T16118] ? __nf_conntrack_alloc+0x81/0x3e0 [ 2064.932304][T16118] __nf_conntrack_alloc+0x81/0x3e0 [ 2064.932331][T16118] ctnetlink_new_conntrack+0x5c8/0x22a0 [ 2064.932362][T16118] ? rcu_is_watching+0x15/0xb0 [ 2064.932380][T16118] ? __pfx_ctnetlink_new_conntrack+0x10/0x10 [ 2064.932399][T16118] ? trace_contention_end+0x39/0x100 [ 2064.932417][T16118] ? __mutex_lock+0x319/0x1300 [ 2064.932435][T16118] ? __pfx___nla_validate_parse+0x10/0x10 [ 2064.932460][T16118] ? unwind_next_frame+0xa5/0x23c0 [ 2064.932482][T16118] ? is_bpf_text_address+0x26/0x2b0 [ 2064.932499][T16118] ? lock_acquire+0x106/0x330 [ 2064.932517][T16118] ? nfnetlink_rcv_msg+0xa6e/0x12c0 [ 2064.932567][T16118] nfnetlink_rcv_msg+0xc00/0x12c0 [ 2064.932588][T16118] ? unwind_get_return_address+0x4d/0x90 [ 2064.932606][T16118] ? nfnetlink_rcv_msg+0x229/0x12c0 [ 2064.932646][T16118] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 2064.932697][T16118] ? trace_call_bpf+0xc2/0xb70 [ 2064.932726][T16118] ? trace_call_bpf+0x7d0/0xb70 [ 2064.932744][T16118] ? perf_trace_preemptirq_template+0x268/0x340 [ 2064.932771][T16118] netlink_rcv_skb+0x232/0x4b0 [ 2064.932791][T16118] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 2064.932815][T16118] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 2064.932843][T16118] ? bpf_lsm_capable+0x9/0x20 [ 2064.932863][T16118] ? security_capable+0x7e/0x2c0 [ 2064.932889][T16118] nfnetlink_rcv+0x2c0/0x27b0 [ 2064.932920][T16118] ? __local_bh_enable_ip+0xd0/0x130 [ 2064.932937][T16118] ? lockdep_hardirqs_on+0x7a/0x110 [ 2064.932954][T16118] ? __dev_queue_xmit+0x274/0x3850 [ 2064.932975][T16118] ? __local_bh_enable_ip+0xd0/0x130 [ 2064.932989][T16118] ? __dev_queue_xmit+0x274/0x3850 [ 2064.933009][T16118] ? __dev_queue_xmit+0x1e6c/0x3850 [ 2064.933028][T16118] ? __x64_sys_sendmsg+0x1bd/0x2a0 [ 2064.933058][T16118] ? __dev_queue_xmit+0x274/0x3850 [ 2064.933080][T16118] ? __pfx_nfnetlink_rcv+0x10/0x10 [ 2064.933108][T16118] ? __pfx___dev_queue_xmit+0x10/0x10 [ 2064.933137][T16118] ? ref_tracker_free+0x693/0x840 [ 2064.933154][T16118] ? __copy_skb_header+0xa3/0x4a0 [ 2064.933177][T16118] ? __pfx_ref_tracker_free+0x10/0x10 [ 2064.933194][T16118] ? __skb_clone+0x63/0x7a0 [ 2064.933218][T16118] ? __skb_clone+0x483/0x7a0 [ 2064.933246][T16118] ? skb_clone+0x246/0x3a0 [ 2064.933270][T16118] ? __netlink_deliver_tap+0x807/0x850 [ 2064.933287][T16118] ? netlink_deliver_tap+0x2e/0x1b0 [ 2064.933310][T16118] ? netlink_deliver_tap+0x2e/0x1b0 [ 2064.933336][T16118] netlink_unicast+0x80f/0x9b0 [ 2064.933367][T16118] ? __pfx_netlink_unicast+0x10/0x10 [ 2064.933388][T16118] ? __alloc_skb+0x193/0x390 [ 2064.933407][T16118] ? netlink_sendmsg+0x650/0xb40 [ 2064.933422][T16118] ? skb_put+0x11b/0x210 [ 2064.933445][T16118] netlink_sendmsg+0x813/0xb40 [ 2064.933471][T16118] ? __pfx_netlink_sendmsg+0x10/0x10 [ 2064.933493][T16118] ? aa_sock_msg_perm+0xf1/0x1b0 [ 2064.933513][T16118] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 2064.933530][T16118] ? __pfx_netlink_sendmsg+0x10/0x10 [ 2064.933547][T16118] ____sys_sendmsg+0xa68/0xad0 [ 2064.933567][T16118] ? __might_fault+0xaf/0x130 [ 2064.933595][T16118] ? __pfx_____sys_sendmsg+0x10/0x10 [ 2064.933624][T16118] ? import_iovec+0x73/0xa0 [ 2064.933651][T16118] ___sys_sendmsg+0x2a5/0x360 [ 2064.933670][T16118] ? __lock_acquire+0x6b5/0x2cf0 [ 2064.933694][T16118] ? __pfx____sys_sendmsg+0x10/0x10 [ 2064.933759][T16118] ? __fget_files+0x2a/0x420 [ 2064.933776][T16118] ? __fget_files+0x3a0/0x420 [ 2064.933804][T16118] __x64_sys_sendmsg+0x1bd/0x2a0 [ 2064.933828][T16118] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 2064.933858][T16118] ? __pfx_ksys_write+0x10/0x10 [ 2064.933892][T16118] do_syscall_64+0xe2/0xf80 [ 2064.933910][T16118] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2064.933926][T16118] ? trace_irq_disable+0x37/0x100 [ 2064.933941][T16118] ? clear_bhb_loop+0x60/0xb0 [ 2064.933960][T16118] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2064.933976][T16118] RIP: 0033:0x7fec2359aeb9 [ 2064.933992][T16118] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2064.934006][T16118] RSP: 002b:00007fec244ac028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2064.934024][T16118] RAX: ffffffffffffffda RBX: 00007fec23815fa0 RCX: 00007fec2359aeb9 [ 2064.934037][T16118] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000003 [ 2064.934048][T16118] RBP: 00007fec244ac090 R08: 0000000000000000 R09: 0000000000000000 [ 2064.934058][T16118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2064.934069][T16118] R13: 00007fec23816038 R14: 00007fec23815fa0 R15: 00007ffd42094dc8 [ 2064.934098][T16118] [ 2065.441175][ T5825] Bluetooth: hci2: command 0x0406 tx timeout [ 2066.025439][T16153] FAULT_INJECTION: forcing a failure. [ 2066.025439][T16153] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2066.043964][T16153] CPU: 1 UID: 0 PID: 16153 Comm: syz.9.12486 Not tainted syzkaller #0 PREEMPT(full) [ 2066.043989][T16153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 2066.044000][T16153] Call Trace: [ 2066.044007][T16153] [ 2066.044015][T16153] dump_stack_lvl+0xe8/0x150 [ 2066.044041][T16153] should_fail_ex+0x412/0x560 [ 2066.044067][T16153] _copy_from_user+0x2d/0xb0 [ 2066.044085][T16153] bpf_test_init+0xd8/0x150 [ 2066.044108][T16153] bpf_prog_test_run_skb+0x375/0x1d50 [ 2066.044133][T16153] ? __fget_files+0x2a/0x420 [ 2066.044155][T16153] ? __fget_files+0x2a/0x420 [ 2066.044171][T16153] ? __fget_files+0x3a0/0x420 [ 2066.044187][T16153] ? __fget_files+0x2a/0x420 [ 2066.044211][T16153] ? __pfx_bpf_prog_test_run_skb+0x10/0x10 [ 2066.044229][T16153] bpf_prog_test_run+0x2c7/0x340 [ 2066.044253][T16153] __sys_bpf+0x5cb/0x920 [ 2066.044273][T16153] ? __pfx___sys_bpf+0x10/0x10 [ 2066.044308][T16153] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2066.044327][T16153] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2066.044346][T16153] ? __pfx_ksys_write+0x10/0x10 [ 2066.044377][T16153] __x64_sys_bpf+0x7c/0x90 [ 2066.044408][T16153] do_syscall_64+0xe2/0xf80 [ 2066.044426][T16153] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2066.044441][T16153] ? trace_irq_disable+0x37/0x100 [ 2066.044457][T16153] ? clear_bhb_loop+0x60/0xb0 [ 2066.044477][T16153] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2066.044493][T16153] RIP: 0033:0x7fdbbf79aeb9 [ 2066.044509][T16153] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2066.044523][T16153] RSP: 002b:00007fdbc0700028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2066.044541][T16153] RAX: ffffffffffffffda RBX: 00007fdbbfa15fa0 RCX: 00007fdbbf79aeb9 [ 2066.044554][T16153] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 2066.044564][T16153] RBP: 00007fdbc0700090 R08: 0000000000000000 R09: 0000000000000000 [ 2066.044575][T16153] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2066.044585][T16153] R13: 00007fdbbfa16038 R14: 00007fdbbfa15fa0 R15: 00007fff63ee3418 [ 2066.044617][T16153] [ 2066.274027][T16156] netlink: 28 bytes leftover after parsing attributes in process `syz.7.12485'. [ 2066.347262][T16156] netlink: 1 bytes leftover after parsing attributes in process `syz.7.12485'. [ 2066.389036][T16154] netlink: 'syz.5.12482': attribute type 2 has an invalid length. [ 2066.536065][T16168] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 2066.776386][T16165] openvswitch: netlink: IP tunnel dst address not specified [ 2067.372945][T16198] netlink: 28 bytes leftover after parsing attributes in process `syz.8.12501'. [ 2067.443034][T16198] netlink: 1 bytes leftover after parsing attributes in process `syz.8.12501'. [ 2067.464424][T16201] netlink: 28 bytes leftover after parsing attributes in process `syz.4.12502'. [ 2067.566023][T16201] netlink: 1 bytes leftover after parsing attributes in process `syz.4.12502'. [ 2067.587355][T16205] netlink: 1 bytes leftover after parsing attributes in process `syz.9.12503'. [ 2067.918319][T16211] netlink: 1 bytes leftover after parsing attributes in process `syz.7.12507'. [ 2068.246429][ T6036] Bluetooth: hci4: unexpected event 0x0b length: 15 > 11 [ 2068.779074][T16241] netlink: 'syz.4.12516': attribute type 29 has an invalid length. [ 2069.777303][T16265] delete_channel: no stack [ 2069.836386][T16259] delete_channel: no stack [ 2069.938126][T16278] __nla_validate_parse: 6 callbacks suppressed [ 2069.938156][T16278] netlink: 14 bytes leftover after parsing attributes in process `syz.4.12529'. [ 2070.004330][T16281] netlink: 28 bytes leftover after parsing attributes in process `syz.8.12527'. [ 2070.073036][T16285] netlink: 'syz.7.12530': attribute type 29 has an invalid length. [ 2070.775342][T16302] netlink: 'syz.7.12535': attribute type 10 has an invalid length. [ 2070.959500][T16307] delete_channel: no stack [ 2071.135982][T16321] netlink: 14 bytes leftover after parsing attributes in process `syz.8.12541'. [ 2071.921475][T16339] netlink: 4 bytes leftover after parsing attributes in process `syz.8.12549'. [ 2072.050063][T16338] netlink: 'syz.5.12548': attribute type 10 has an invalid length. [ 2072.078940][T16332] delete_channel: no stack [ 2072.878987][T16366] netlink: 'syz.5.12556': attribute type 2 has an invalid length. [ 2073.955934][T16381] netlink: 1 bytes leftover after parsing attributes in process `syz.4.12562'. [ 2074.142884][T16378] delete_channel: no stack [ 2074.846943][T16406] netlink: 'syz.4.12570': attribute type 2 has an invalid length. [ 2074.920975][T16389] delete_channel: no stack [ 2075.409392][T16409] netlink: 'syz.9.12571': attribute type 2 has an invalid length. [ 2075.920539][T16425] netlink: 28 bytes leftover after parsing attributes in process `syz.4.12577'. [ 2076.023477][T16425] netlink: 1 bytes leftover after parsing attributes in process `syz.4.12577'. [ 2076.223027][T16426] delete_channel: no stack [ 2077.397646][T16450] netlink: 'syz.5.12585': attribute type 2 has an invalid length. [ 2078.940322][T16438] delete_channel: no stack [ 2079.420291][T16473] netlink: 1 bytes leftover after parsing attributes in process `syz.9.12594'. [ 2079.559694][T16485] netlink: 28 bytes leftover after parsing attributes in process `syz.5.12595'. [ 2081.814074][T16492] delete_channel: no stack [ 2082.575878][T16518] netlink: 16 bytes leftover after parsing attributes in process `syz.9.12606'. [ 2082.946567][T16522] netlink: 'syz.8.12608': attribute type 2 has an invalid length. [ 2083.257184][T16530] sch_fq: defrate 3 ignored. [ 2083.262782][T16533] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 2083.357214][T16537] netlink: 1 bytes leftover after parsing attributes in process `syz.8.12613'. [ 2084.076919][T16542] netlink: 4 bytes leftover after parsing attributes in process `syz.4.12615'. [ 2086.376932][T16547] netlink: 'syz.4.12616': attribute type 2 has an invalid length. [ 2087.900169][T16556] delete_channel: no stack [ 2088.017722][ T30] audit: type=1107 audit(1770440881.206:9): pid=16569 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='Ê7¤Ìj«COï­·•Á·måðA;i)E÷ùI ê±óžÔ_Xš]ÝF&™Õ,L¾sÁüx–]#ü…±FñÞàqsŽü r2^' [ 2088.031573][T16575] netlink: 'syz.8.12624': attribute type 10 has an invalid length. [ 2088.045596][T16567] netlink: 8 bytes leftover after parsing attributes in process `syz.5.12622'. [ 2088.066650][T16575] netlink: 55 bytes leftover after parsing attributes in process `syz.8.12624'. [ 2088.157045][T16578] netlink: 4 bytes leftover after parsing attributes in process `syz.9.12626'. [ 2091.045208][T16612] netlink: 'syz.7.12637': attribute type 29 has an invalid length. [ 2091.260834][T16618] netlink: 'syz.5.12639': attribute type 2 has an invalid length. [ 2091.265436][T16626] netlink: 'syz.8.12638': attribute type 10 has an invalid length. [ 2091.372771][T16622] delete_channel: no stack [ 2091.461497][T16635] netlink: 4 bytes leftover after parsing attributes in process `syz.7.12644'. [ 2091.475552][T16636] netlink: 12 bytes leftover after parsing attributes in process `syz.9.12643'. [ 2091.514588][T16626] team0 (unregistering): Port device team_slave_0 removed [ 2091.540653][T16641] netlink: 28 bytes leftover after parsing attributes in process `syz.9.12643'. [ 2094.097369][T16636] netlink: 12 bytes leftover after parsing attributes in process `syz.9.12643'. [ 2094.100871][T16626] team0 (unregistering): Port device team_slave_1 removed [ 2094.131271][T16630] netlink: 60 bytes leftover after parsing attributes in process `syz.8.12638'. [ 2094.228161][T16636] netlink: 12 bytes leftover after parsing attributes in process `syz.9.12643'. [ 2094.373288][T16657] netlink: 188 bytes leftover after parsing attributes in process `syz.4.12647'. [ 2094.393040][T16658] netlink: 7 bytes leftover after parsing attributes in process `syz.7.12646'. [ 2094.428679][T16658] netlink: 108 bytes leftover after parsing attributes in process `syz.7.12646'. [ 2094.534189][T16666] netlink: 64 bytes leftover after parsing attributes in process `syz.9.12650'. [ 2094.566529][T16656] netlink: 'syz.8.12649': attribute type 19 has an invalid length. [ 2094.585060][T16656] netlink: 40 bytes leftover after parsing attributes in process `syz.8.12649'. [ 2094.609262][T16654] netlink: 'syz.5.12648': attribute type 10 has an invalid length. [ 2095.018655][T16675] delete_channel: no stack [ 2095.114736][T16686] netlink: 4 bytes leftover after parsing attributes in process `syz.4.12657'. [ 2096.009702][T16691] netlink: 64 bytes leftover after parsing attributes in process `syz.9.12658'. [ 2097.380556][T16717] delete_channel: no stack [ 2098.006573][T16747] FAULT_INJECTION: forcing a failure. [ 2098.006573][T16747] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2098.042366][T16747] CPU: 0 UID: 0 PID: 16747 Comm: syz.9.12677 Not tainted syzkaller #0 PREEMPT(full) [ 2098.042390][T16747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 2098.042400][T16747] Call Trace: [ 2098.042408][T16747] [ 2098.042415][T16747] dump_stack_lvl+0xe8/0x150 [ 2098.042441][T16747] should_fail_ex+0x412/0x560 [ 2098.042467][T16747] _copy_from_user+0x2d/0xb0 [ 2098.042483][T16747] ___sys_sendmsg+0x1c6/0x360 [ 2098.042504][T16747] ? __lock_acquire+0x6b5/0x2cf0 [ 2098.042530][T16747] ? __pfx____sys_sendmsg+0x10/0x10 [ 2098.042588][T16747] ? __fget_files+0x2a/0x420 [ 2098.042606][T16747] ? __fget_files+0x3a0/0x420 [ 2098.042633][T16747] __x64_sys_sendmsg+0x1bd/0x2a0 [ 2098.042658][T16747] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 2098.042690][T16747] ? __pfx_ksys_write+0x10/0x10 [ 2098.042724][T16747] do_syscall_64+0xe2/0xf80 [ 2098.042741][T16747] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2098.042756][T16747] ? trace_irq_disable+0x37/0x100 [ 2098.042770][T16747] ? clear_bhb_loop+0x60/0xb0 [ 2098.042789][T16747] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2098.042805][T16747] RIP: 0033:0x7fdbbf79aeb9 [ 2098.042820][T16747] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2098.042834][T16747] RSP: 002b:00007fdbc0700028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2098.042851][T16747] RAX: ffffffffffffffda RBX: 00007fdbbfa15fa0 RCX: 00007fdbbf79aeb9 [ 2098.042863][T16747] RDX: 0000000000000080 RSI: 00002000000002c0 RDI: 0000000000000003 [ 2098.042874][T16747] RBP: 00007fdbc0700090 R08: 0000000000000000 R09: 0000000000000000 [ 2098.042884][T16747] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2098.042893][T16747] R13: 00007fdbbfa16038 R14: 00007fdbbfa15fa0 R15: 00007fff63ee3418 [ 2098.042924][T16747] [ 2098.338402][T16759] netlink: 'syz.4.12681': attribute type 2 has an invalid length. [ 2098.506532][T16763] netlink: 'syz.9.12680': attribute type 29 has an invalid length. [ 2099.433432][T16805] __nla_validate_parse: 10 callbacks suppressed [ 2099.433452][T16805] netlink: 7 bytes leftover after parsing attributes in process `syz.7.12698'. [ 2099.459835][T16805] netlink: 108 bytes leftover after parsing attributes in process `syz.7.12698'. [ 2101.737301][T16836] netlink: 28 bytes leftover after parsing attributes in process `syz.9.12711'. [ 2101.793507][T16836] netlink: 1 bytes leftover after parsing attributes in process `syz.9.12711'. [ 2102.104941][T16846] netlink: 'syz.4.12710': attribute type 2 has an invalid length. [ 2102.623246][T16853] FAULT_INJECTION: forcing a failure. [ 2102.623246][T16853] name failslab, interval 1, probability 0, space 0, times 0 [ 2102.638008][T16853] CPU: 0 UID: 0 PID: 16853 Comm: syz.9.12715 Not tainted syzkaller #0 PREEMPT(full) [ 2102.638031][T16853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 2102.638040][T16853] Call Trace: [ 2102.638047][T16853] [ 2102.638054][T16853] dump_stack_lvl+0xe8/0x150 [ 2102.638078][T16853] should_fail_ex+0x412/0x560 [ 2102.638101][T16853] should_failslab+0xa8/0x100 [ 2102.638121][T16853] __kmalloc_noprof+0xde/0x7e0 [ 2102.638138][T16853] ? bpf_test_init+0x9f/0x150 [ 2102.638153][T16853] ? perf_trace_preemptirq_template+0xab/0x340 [ 2102.638176][T16853] bpf_test_init+0x9f/0x150 [ 2102.638196][T16853] bpf_prog_test_run_skb+0x375/0x1d50 [ 2102.638219][T16853] ? __fget_files+0x2a/0x420 [ 2102.638239][T16853] ? __fget_files+0x2a/0x420 [ 2102.638255][T16853] ? __fget_files+0x3a0/0x420 [ 2102.638279][T16853] ? __fget_files+0x2a/0x420 [ 2102.638301][T16853] ? __pfx_bpf_prog_test_run_skb+0x10/0x10 [ 2102.638319][T16853] bpf_prog_test_run+0x2c7/0x340 [ 2102.638340][T16853] __sys_bpf+0x5cb/0x920 [ 2102.638358][T16853] ? __pfx___sys_bpf+0x10/0x10 [ 2102.638389][T16853] ? do_syscall_64+0x9f/0xf80 [ 2102.638407][T16853] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2102.638425][T16853] ? __pfx_ksys_write+0x10/0x10 [ 2102.638454][T16853] __x64_sys_bpf+0x7c/0x90 [ 2102.638476][T16853] do_syscall_64+0xe2/0xf80 [ 2102.638493][T16853] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2102.638509][T16853] ? clear_bhb_loop+0x60/0xb0 [ 2102.638527][T16853] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2102.638542][T16853] RIP: 0033:0x7fdbbf79aeb9 [ 2102.638557][T16853] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2102.638570][T16853] RSP: 002b:00007fdbc0700028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2102.638588][T16853] RAX: ffffffffffffffda RBX: 00007fdbbfa15fa0 RCX: 00007fdbbf79aeb9 [ 2102.638600][T16853] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 2102.638610][T16853] RBP: 00007fdbc0700090 R08: 0000000000000000 R09: 0000000000000000 [ 2102.638620][T16853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2102.638629][T16853] R13: 00007fdbbfa16038 R14: 00007fdbbfa15fa0 R15: 00007fff63ee3418 [ 2102.638657][T16853] [ 2103.146805][T16871] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 2103.635030][T16876] netlink: 28 bytes leftover after parsing attributes in process `syz.5.12725'. [ 2103.670370][T16879] netlink: 1 bytes leftover after parsing attributes in process `syz.5.12725'. [ 2103.827557][T16884] netlink: 'syz.5.12727': attribute type 2 has an invalid length. [ 2104.158079][T16890] netlink: 'syz.9.12730': attribute type 2 has an invalid length. [ 2104.483401][T16897] netlink: 1 bytes leftover after parsing attributes in process `syz.5.12732'. [ 2104.884919][T16917] netlink: 56 bytes leftover after parsing attributes in process `syz.5.12739'. [ 2105.173696][ T6036] Bluetooth: hci3: unexpected event 0x0b length: 15 > 11 [ 2105.726026][T16944] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 2105.785036][T16939] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 2106.795785][T16968] netlink: 8 bytes leftover after parsing attributes in process `syz.9.12753'. [ 2106.918795][ T6036] Bluetooth: hci0: unexpected event 0x0b length: 15 > 11 [ 2107.019269][T16981] netlink: 8 bytes leftover after parsing attributes in process `syz.5.12757'. [ 2107.028879][T16980] netlink: 6 bytes leftover after parsing attributes in process `syz.9.12756'. [ 2107.936615][T16991] netlink: 4 bytes leftover after parsing attributes in process `syz.4.12759'. [ 2108.048806][T16996] netlink: 596 bytes leftover after parsing attributes in process `syz.9.12762'. [ 2108.427246][T17012] netlink: 8 bytes leftover after parsing attributes in process `syz.8.12766'. [ 2108.836831][T17021] netlink: 6 bytes leftover after parsing attributes in process `syz.4.12768'. [ 2109.125072][T17019] netlink: 'syz.8.12767': attribute type 2 has an invalid length. [ 2109.166613][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 2109.173049][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 2109.393712][T17036] netlink: 14 bytes leftover after parsing attributes in process `syz.8.12773'. [ 2109.624523][T17048] netlink: 8 bytes leftover after parsing attributes in process `syz.7.12777'. [ 2110.448985][T17054] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 2110.636640][T17053] delete_channel: no stack [ 2110.686879][T17072] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 2110.697542][T17072] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 2110.715568][T17072] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 2110.728762][T17072] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 2110.740255][T17072] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 2111.196295][T17087] netlink: 36 bytes leftover after parsing attributes in process `syz.5.12790'. [ 2111.223791][T17089] openvswitch: netlink: IP tunnel dst address not specified [ 2111.264453][T17087] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 2111.308538][T17092] delete_channel: no stack [ 2111.469852][T17096] netlink: 14 bytes leftover after parsing attributes in process `syz.8.12793'. [ 2111.644691][T17070] chnl_net:caif_netlink_parms(): no params data found [ 2111.952015][T17070] bridge0: port 1(bridge_slave_0) entered blocking state [ 2111.971468][T17070] bridge0: port 1(bridge_slave_0) entered disabled state [ 2111.979954][T17070] bridge_slave_0: entered allmulticast mode [ 2111.988899][T17070] bridge_slave_0: entered promiscuous mode [ 2112.004087][T17070] bridge0: port 2(bridge_slave_1) entered blocking state [ 2112.015168][T17070] bridge0: port 2(bridge_slave_1) entered disabled state [ 2112.022577][T17070] bridge_slave_1: entered allmulticast mode [ 2112.030582][T17070] bridge_slave_1: entered promiscuous mode [ 2112.093856][T17131] netlink: 1 bytes leftover after parsing attributes in process `syz.9.12801'. [ 2112.122601][T17070] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2112.149089][T17070] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2112.213223][T17070] team0: Port device team_slave_0 added [ 2112.245629][T17070] team0: Port device team_slave_1 added [ 2112.599146][T17070] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2112.610514][T17134] netlink: 'syz.8.12802': attribute type 2 has an invalid length. [ 2112.619154][T17070] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2112.657357][T17070] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2112.700037][T17137] openvswitch: netlink: IP tunnel dst address not specified [ 2112.754676][T17070] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2112.767916][ T6036] Bluetooth: hci1: command tx timeout [ 2112.792382][T17070] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2112.821454][T17070] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2113.006406][T17139] netlink: 28 bytes leftover after parsing attributes in process `syz.9.12804'. [ 2113.028321][T17140] delete_channel: no stack [ 2113.062986][T17070] hsr_slave_0: entered promiscuous mode [ 2113.070554][T17070] hsr_slave_1: entered promiscuous mode [ 2113.078515][T17142] netlink: 1 bytes leftover after parsing attributes in process `syz.8.12805'. [ 2113.097593][T17139] netlink: 1 bytes leftover after parsing attributes in process `syz.9.12804'. [ 2113.284246][T17150] delete_channel: no stack [ 2113.339930][T17153] netlink: 28 bytes leftover after parsing attributes in process `syz.8.12810'. [ 2113.415240][T17157] netlink: 60 bytes leftover after parsing attributes in process `syz.5.12811'. [ 2113.434074][T17153] netlink: 1 bytes leftover after parsing attributes in process `syz.8.12810'. [ 2114.005938][T17070] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2114.125981][T17070] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2114.275074][T17070] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2114.291905][T17167] delete_channel: no stack [ 2114.329427][T17172] netlink: 'syz.4.12817': attribute type 29 has an invalid length. [ 2114.385342][T17070] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2114.588371][T17070] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 2114.610539][T17070] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 2114.629040][T17070] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 2114.641220][T17070] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 2114.739699][T17070] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2114.765171][T17070] 8021q: adding VLAN 0 to HW filter on device team0 [ 2114.797271][ T6083] bridge0: port 1(bridge_slave_0) entered blocking state [ 2114.804510][ T6083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2114.870047][ T6036] Bluetooth: hci1: command tx timeout [ 2114.886768][T16506] bridge0: port 2(bridge_slave_1) entered blocking state [ 2114.894027][T16506] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2114.953330][T17194] __nla_validate_parse: 8 callbacks suppressed [ 2114.953362][T17194] netlink: 28 bytes leftover after parsing attributes in process `syz.9.12823'. [ 2115.044761][T17193] delete_channel: no stack [ 2115.257575][T17205] openvswitch: netlink: IP tunnel dst address not specified [ 2115.371397][T17070] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2115.408680][T17217] netlink: 'syz.8.12831': attribute type 2 has an invalid length. [ 2115.444533][T17219] netlink: 7 bytes leftover after parsing attributes in process `syz.5.12832'. [ 2115.463040][T17219] netlink: 108 bytes leftover after parsing attributes in process `syz.5.12832'. [ 2115.589523][T17224] FAULT_INJECTION: forcing a failure. [ 2115.589523][T17224] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2115.620955][T17224] CPU: 0 UID: 0 PID: 17224 Comm: syz.9.12833 Not tainted syzkaller #0 PREEMPT(full) [ 2115.620979][T17224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 2115.620989][T17224] Call Trace: [ 2115.620996][T17224] [ 2115.621004][T17224] dump_stack_lvl+0xe8/0x150 [ 2115.621033][T17224] should_fail_ex+0x412/0x560 [ 2115.621061][T17224] _copy_to_user+0x31/0xb0 [ 2115.621080][T17224] simple_read_from_buffer+0xe1/0x170 [ 2115.621112][T17224] proc_fail_nth_read+0x1bb/0x230 [ 2115.621138][T17224] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 2115.621165][T17224] ? rw_verify_area+0x2a6/0x4d0 [ 2115.621186][T17224] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 2115.621210][T17224] vfs_read+0x20c/0xa70 [ 2115.621229][T17224] ? fdget_pos+0x246/0x320 [ 2115.621252][T17224] ? __pfx___mutex_lock+0x10/0x10 [ 2115.621272][T17224] ? __pfx_vfs_read+0x10/0x10 [ 2115.621296][T17224] ? __fget_files+0x2a/0x420 [ 2115.621319][T17224] ? __fget_files+0x3a0/0x420 [ 2115.621335][T17224] ? __fget_files+0x2a/0x420 [ 2115.621363][T17224] ksys_read+0x150/0x270 [ 2115.621388][T17224] ? __pfx_ksys_read+0x10/0x10 [ 2115.621423][T17224] do_syscall_64+0xe2/0xf80 [ 2115.621441][T17224] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2115.621457][T17224] ? trace_irq_disable+0x37/0x100 [ 2115.621472][T17224] ? clear_bhb_loop+0x60/0xb0 [ 2115.621493][T17224] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2115.621508][T17224] RIP: 0033:0x7fdbbf75b78e [ 2115.621525][T17224] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 2115.621539][T17224] RSP: 002b:00007fdbc06fffe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2115.621558][T17224] RAX: ffffffffffffffda RBX: 00007fdbc07006c0 RCX: 00007fdbbf75b78e [ 2115.621570][T17224] RDX: 000000000000000f RSI: 00007fdbc07000a0 RDI: 0000000000000005 [ 2115.621581][T17224] RBP: 00007fdbc0700090 R08: 0000000000000000 R09: 0000000000000000 [ 2115.621591][T17224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2115.621601][T17224] R13: 00007fdbbfa16038 R14: 00007fdbbfa15fa0 R15: 00007fff63ee3418 [ 2115.621634][T17224] [ 2116.063839][T17234] netlink: 28 bytes leftover after parsing attributes in process `syz.4.12837'. [ 2116.103058][T17070] veth0_vlan: entered promiscuous mode [ 2116.115216][T17070] veth1_vlan: entered promiscuous mode [ 2116.149187][T17070] veth0_macvtap: entered promiscuous mode [ 2116.157641][T17225] delete_channel: no stack [ 2116.161958][T17070] veth1_macvtap: entered promiscuous mode [ 2116.170251][T17234] netlink: 1 bytes leftover after parsing attributes in process `syz.4.12837'. [ 2116.205249][T17070] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2116.221550][T17070] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2116.235961][T16506] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2116.249546][T16506] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2116.268765][T16506] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2116.277685][T16506] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2116.308923][T17238] netlink: 28 bytes leftover after parsing attributes in process `syz.9.12838'. [ 2116.335821][ T6036] Bluetooth: hci6: unexpected event 0x0b length: 15 > 11 [ 2116.364191][T17238] netlink: 1 bytes leftover after parsing attributes in process `syz.9.12838'. [ 2116.442647][T17244] netlink: 28 bytes leftover after parsing attributes in process `syz.4.12840'. [ 2116.481347][ T6083] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2116.491103][ T6083] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2116.545992][T17244] openvswitch: netlink: IP tunnel dst address not specified [ 2116.621579][ T13] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2116.637330][ T13] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2116.781760][T17254] FAULT_INJECTION: forcing a failure. [ 2116.781760][T17254] name failslab, interval 1, probability 0, space 0, times 0 [ 2116.820313][T17254] CPU: 1 UID: 0 PID: 17254 Comm: syz.4.12843 Not tainted syzkaller #0 PREEMPT(full) [ 2116.820338][T17254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 2116.820348][T17254] Call Trace: [ 2116.820355][T17254] [ 2116.820364][T17254] dump_stack_lvl+0xe8/0x150 [ 2116.820390][T17254] should_fail_ex+0x412/0x560 [ 2116.820415][T17254] should_failslab+0xa8/0x100 [ 2116.820435][T17254] __kmalloc_cache_noprof+0x83/0x6e0 [ 2116.820452][T17254] ? bpf_offload_find_netdev+0x676/0x770 [ 2116.820469][T17254] ? bpf_offload_find_netdev+0xde/0x770 [ 2116.820486][T17254] ? nsim_bpf+0x6e2/0xd20 [ 2116.820509][T17254] nsim_bpf+0x6e2/0xd20 [ 2116.820534][T17254] bpf_map_offload_map_alloc+0x3d1/0x720 [ 2116.820559][T17254] ? __pfx_bpf_map_offload_map_alloc+0x10/0x10 [ 2116.820587][T17254] ? array_map_alloc_check+0x269/0x380 [ 2116.820612][T17254] map_create+0xafd/0x16a0 [ 2116.820632][T17254] ? security_bpf+0x7e/0x2d0 [ 2116.820653][T17254] __sys_bpf+0x65b/0x920 [ 2116.820672][T17254] ? __pfx___sys_bpf+0x10/0x10 [ 2116.820711][T17254] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2116.820730][T17254] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 2116.820748][T17254] ? __pfx_ksys_write+0x10/0x10 [ 2116.820778][T17254] __x64_sys_bpf+0x7c/0x90 [ 2116.820802][T17254] do_syscall_64+0xe2/0xf80 [ 2116.820819][T17254] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2116.820834][T17254] ? trace_irq_disable+0x37/0x100 [ 2116.820849][T17254] ? clear_bhb_loop+0x60/0xb0 [ 2116.820869][T17254] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2116.820885][T17254] RIP: 0033:0x7f2c1b19aeb9 [ 2116.820901][T17254] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2116.820915][T17254] RSP: 002b:00007f2c1bfef028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2116.820933][T17254] RAX: ffffffffffffffda RBX: 00007f2c1b415fa0 RCX: 00007f2c1b19aeb9 [ 2116.820945][T17254] RDX: 0000000000000050 RSI: 00002000000000c0 RDI: 0000000000000000 [ 2116.820955][T17254] RBP: 00007f2c1bfef090 R08: 0000000000000000 R09: 0000000000000000 [ 2116.820966][T17254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2116.820976][T17254] R13: 00007f2c1b416038 R14: 00007f2c1b415fa0 R15: 00007ffd111bbae8 [ 2116.821006][T17254] [ 2117.066088][ T6036] Bluetooth: hci1: command tx timeout [ 2117.170396][T17072] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 2117.181786][T17072] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 2117.229732][T17072] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 2117.243884][T17072] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 2117.269328][T17072] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 2117.666061][T17264] netlink: 'syz.9.12846': attribute type 10 has an invalid length. [ 2117.799990][ T6036] Bluetooth: hci2: unexpected event 0x0b length: 15 > 11 [ 2118.036797][T17268] netlink: 'syz.7.12848': attribute type 10 has an invalid length. [ 2118.164984][T17268] bond0: (slave netdevsim0): Enslaving as an active interface with an up link [ 2118.351789][T17283] netlink: 28 bytes leftover after parsing attributes in process `syz.9.12851'. [ 2118.411743][T17283] netlink: 1 bytes leftover after parsing attributes in process `syz.9.12851'. [ 2118.828778][T17288] netlink: 'syz.4.12853': attribute type 2 has an invalid length. [ 2119.077904][ T6036] Bluetooth: hci1: command tx timeout [ 2119.133311][ T13] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2119.310210][ T13] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2119.333096][ T6036] Bluetooth: hci3: command tx timeout [ 2119.516347][ T13] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2119.546624][T17308] netlink: 'syz.5.12860': attribute type 10 has an invalid length. [ 2119.711114][ T13] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2120.004785][T17330] __nla_validate_parse: 2 callbacks suppressed [ 2120.004808][T17330] netlink: 1 bytes leftover after parsing attributes in process `syz.7.12865'. [ 2120.029857][T17259] chnl_net:caif_netlink_parms(): no params data found [ 2120.386474][T17259] bridge0: port 1(bridge_slave_0) entered blocking state [ 2120.404746][T17259] bridge0: port 1(bridge_slave_0) entered disabled state [ 2120.424947][T17259] bridge_slave_0: entered allmulticast mode [ 2120.443568][T17259] bridge_slave_0: entered promiscuous mode [ 2120.463465][T17259] bridge0: port 2(bridge_slave_1) entered blocking state [ 2120.473926][T17259] bridge0: port 2(bridge_slave_1) entered disabled state [ 2120.481602][T17259] bridge_slave_1: entered allmulticast mode [ 2120.494346][T17259] bridge_slave_1: entered promiscuous mode [ 2120.504732][ T13] bridge_slave_1: left allmulticast mode [ 2120.513674][ T13] bridge_slave_1: left promiscuous mode [ 2120.520726][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 2120.531826][ T13] bridge_slave_0: left allmulticast mode [ 2120.537490][ T13] bridge_slave_0: left promiscuous mode [ 2120.543929][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 2120.554380][ T13] hsr0: left allmulticast mode [ 2120.559254][ T13] hsr_slave_0: left allmulticast mode [ 2120.564648][ T13] hsr_slave_1: left allmulticast mode [ 2120.571070][ T13] hsr0: left promiscuous mode [ 2120.575883][ T13] nr0: port 1(hsr0) entered disabled state [ 2120.926476][T17365] netlink: 16 bytes leftover after parsing attributes in process `syz.5.12876'. [ 2121.006919][T17353] netlink: 28 bytes leftover after parsing attributes in process `syz.9.12874'. [ 2121.017181][T17355] netlink: 1 bytes leftover after parsing attributes in process `syz.9.12874'. [ 2121.029862][T17364] netlink: 28 bytes leftover after parsing attributes in process `syz.7.12877'. [ 2121.098443][T17259] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2121.107558][ T13] : left promiscuous mode [ 2121.164645][T17259] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2121.214002][T17370] netlink: 28 bytes leftover after parsing attributes in process `syz.4.12878'. [ 2121.278799][T17370] netlink: 1 bytes leftover after parsing attributes in process `syz.4.12878'. [ 2121.291759][T17259] team0: Port device team_slave_0 added [ 2121.330425][T17259] team0: Port device team_slave_1 added [ 2121.366947][T17376] netlink: 16 bytes leftover after parsing attributes in process `syz.7.12879'. [ 2121.401873][ T6036] Bluetooth: hci3: command tx timeout [ 2121.435101][T17375] netlink: 28 bytes leftover after parsing attributes in process `syz.9.12880'. [ 2121.486232][T17259] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2121.500419][T17259] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2121.532266][T17259] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2121.594791][T17259] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2121.602007][T17259] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2121.717628][T17259] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2121.962385][T17259] hsr_slave_0: entered promiscuous mode [ 2121.985751][T17259] hsr_slave_1: entered promiscuous mode [ 2122.010913][T17259] debugfs: 'hsr0' already exists in 'hsr' [ 2122.028083][T17259] Cannot create hsr debugfs directory [ 2122.194920][T17394] netlink: 14 bytes leftover after parsing attributes in process `syz.5.12886'. [ 2122.222769][T17403] FAULT_INJECTION: forcing a failure. [ 2122.222769][T17403] name failslab, interval 1, probability 0, space 0, times 0 [ 2122.305453][T17403] CPU: 1 UID: 0 PID: 17403 Comm: syz.4.12885 Not tainted syzkaller #0 PREEMPT(full) [ 2122.305478][T17403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 2122.305489][T17403] Call Trace: [ 2122.305496][T17403] [ 2122.305504][T17403] dump_stack_lvl+0xe8/0x150 [ 2122.305531][T17403] should_fail_ex+0x412/0x560 [ 2122.305559][T17403] should_failslab+0xa8/0x100 [ 2122.305580][T17403] __kmalloc_noprof+0xde/0x7e0 [ 2122.305596][T17403] ? kfree+0x4d/0x650 [ 2122.305613][T17403] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 2122.305639][T17403] tomoyo_realpath_from_path+0xe3/0x5d0 [ 2122.305660][T17403] ? tomoyo_domain+0xd7/0x130 [ 2122.305687][T17403] ? tomoyo_path_number_perm+0x219/0x630 [ 2122.305706][T17403] tomoyo_path_number_perm+0x246/0x630 [ 2122.305729][T17403] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 2122.305746][T17403] ? __lock_acquire+0x6b5/0x2cf0 [ 2122.305813][T17403] ? __fget_files+0x2a/0x420 [ 2122.305835][T17403] ? __fget_files+0x2a/0x420 [ 2122.305851][T17403] ? __fget_files+0x3a0/0x420 [ 2122.305867][T17403] ? __fget_files+0x2a/0x420 [ 2122.305889][T17403] security_file_ioctl+0xc3/0x2a0 [ 2122.305910][T17403] __se_sys_ioctl+0x47/0x170 [ 2122.305936][T17403] do_syscall_64+0xe2/0xf80 [ 2122.305953][T17403] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2122.305968][T17403] ? trace_irq_disable+0x37/0x100 [ 2122.305982][T17403] ? clear_bhb_loop+0x60/0xb0 [ 2122.306003][T17403] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2122.306016][T17403] RIP: 0033:0x7f2c1b19aeb9 [ 2122.306031][T17403] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2122.306044][T17403] RSP: 002b:00007f2c1bfce028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2122.306064][T17403] RAX: ffffffffffffffda RBX: 00007f2c1b416090 RCX: 00007f2c1b19aeb9 [ 2122.306075][T17403] RDX: 00002000000000c0 RSI: 00000000401054d5 RDI: 0000000000000003 [ 2122.306086][T17403] RBP: 00007f2c1bfce090 R08: 0000000000000000 R09: 0000000000000000 [ 2122.306095][T17403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2122.306105][T17403] R13: 00007f2c1b416128 R14: 00007f2c1b416090 R15: 00007ffd111bbae8 [ 2122.306136][T17403] [ 2122.306170][T17403] ERROR: Out of memory at tomoyo_realpath_from_path. [ 2122.310948][T17409] FAULT_INJECTION: forcing a failure. [ 2122.310948][T17409] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2122.632531][T17409] CPU: 0 UID: 0 PID: 17409 Comm: syz.7.12888 Not tainted syzkaller #0 PREEMPT(full) [ 2122.632556][T17409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 2122.632566][T17409] Call Trace: [ 2122.632574][T17409] [ 2122.632582][T17409] dump_stack_lvl+0xe8/0x150 [ 2122.632608][T17409] should_fail_ex+0x412/0x560 [ 2122.632635][T17409] _copy_from_user+0x2d/0xb0 [ 2122.632652][T17409] ___sys_sendmsg+0x1c6/0x360 [ 2122.632673][T17409] ? __lock_acquire+0x6b5/0x2cf0 [ 2122.632699][T17409] ? __pfx____sys_sendmsg+0x10/0x10 [ 2122.632744][T17409] ? __fget_files+0x2a/0x420 [ 2122.632777][T17409] ? __fget_files+0x2a/0x420 [ 2122.632793][T17409] ? __fget_files+0x3a0/0x420 [ 2122.632822][T17409] __x64_sys_sendmsg+0x1bd/0x2a0 [ 2122.632846][T17409] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 2122.632865][T17409] ? perf_trace_preemptirq_template+0xab/0x340 [ 2122.632893][T17409] ? __pfx_ksys_write+0x10/0x10 [ 2122.632929][T17409] do_syscall_64+0xe2/0xf80 [ 2122.632946][T17409] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2122.632961][T17409] ? trace_irq_disable+0x37/0x100 [ 2122.632976][T17409] ? clear_bhb_loop+0x60/0xb0 [ 2122.633005][T17409] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2122.633021][T17409] RIP: 0033:0x7f2910b9aeb9 [ 2122.633037][T17409] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 2122.633051][T17409] RSP: 002b:00007f2911a7e028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2122.633070][T17409] RAX: ffffffffffffffda RBX: 00007f2910e15fa0 RCX: 00007f2910b9aeb9 [ 2122.633082][T17409] RDX: 0000000000000010 RSI: 0000200000000180 RDI: 0000000000000004 [ 2122.633092][T17409] RBP: 00007f2911a7e090 R08: 0000000000000000 R09: 0000000000000000 [ 2122.633103][T17409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2122.633113][T17409] R13: 00007f2910e16038 R14: 00007f2910e15fa0 R15: 00007ffcb2079b68 [ 2122.633146][T17409] [ 2122.922037][ T13] hsr_slave_0: left promiscuous mode [ 2122.956789][ T13] hsr_slave_1: left promiscuous mode [ 2122.966065][ T13] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2122.975266][ T13] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2122.983896][ T13] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2122.991683][ T13] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2123.012405][ T13] veth0_macvtap: left promiscuous mode [ 2123.018659][ T13] veth1_vlan: left promiscuous mode [ 2123.024007][ T13] veth0_vlan: left promiscuous mode [ 2123.478275][ T6036] Bluetooth: hci3: command tx timeout [ 2125.553779][T17411] __nla_validate_parse: 1 callbacks suppressed [ 2125.553795][T17411] netlink: 28 bytes leftover after parsing attributes in process `syz.9.12889'. [ 2125.575841][ T6036] Bluetooth: hci3: command tx timeout [ 2125.583558][T17427] bridge0: entered promiscuous mode [ 2125.589902][T17427] bridge0: entered allmulticast mode [ 2126.001300][T17442] netlink: 28 bytes leftover after parsing attributes in process `syz.7.12900'. [ 2126.110047][T17442] netlink: 1 bytes leftover after parsing attributes in process `syz.7.12900'. [ 2126.890744][T17259] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 2126.907594][T17259] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 2126.992296][T17259] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 2127.015868][T17259] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 2127.048162][T17482] netlink: 'syz.9.12909': attribute type 2 has an invalid length. [ 2127.062410][T17483] netlink: 14 bytes leftover after parsing attributes in process `syz.5.12908'. [ 2127.862720][T17259] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2127.951716][T17259] 8021q: adding VLAN 0 to HW filter on device team0 [ 2128.266522][T10334] bridge0: port 1(bridge_slave_0) entered blocking state [ 2128.274012][T10334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2128.313865][T10334] bridge0: port 2(bridge_slave_1) entered blocking state [ 2128.321363][T10334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2128.357557][T17517] bridge0: port 2(bridge_slave_1) entered blocking state [ 2128.365036][T17517] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2128.373219][T17517] bridge0: port 1(bridge_slave_0) entered blocking state [ 2128.380720][T17517] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2128.397051][T17517] bridge0: entered promiscuous mode [ 2129.147054][T17544] netlink: 'syz.7.12921': attribute type 2 has an invalid length. [ 2129.454600][T17259] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2130.155140][T17560] openvswitch: netlink: Unexpected mask (mask=240040, allowed=10048) [ 2132.810004][T17582] netlink: 'syz.4.12930': attribute type 29 has an invalid length. [ 2133.294233][T17259] veth0_vlan: entered promiscuous mode [ 2133.341483][T17259] veth1_vlan: entered promiscuous mode [ 2133.496241][T17259] veth0_macvtap: entered promiscuous mode [ 2133.540156][T17259] veth1_macvtap: entered promiscuous mode [ 2133.570779][T17259] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2133.592129][T17259] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2133.607336][ T50] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2133.657445][ T50] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2133.695087][ T50] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2133.738553][ T50] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2133.823708][ T50] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2133.841817][ T50] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2134.207374][T17617] netlink: 'syz.5.12939': attribute type 2 has an invalid length. [ 2189.349182][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 2189.355604][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 2189.626362][T17629] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2189.899105][T17629] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2191.383698][T17540] bridge_slave_1: left allmulticast mode [ 2191.398443][T17072] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 2191.409516][T17072] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 2191.417531][T17072] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 2191.437778][T17540] bridge_slave_1: left promiscuous mode [ 2191.443621][T17540] bridge0: port 2(bridge_slave_1) entered disabled state [ 2191.473884][T17072] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 2191.508212][T17072] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 2191.604350][ T5825] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 2191.621461][ T5825] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 2191.629618][ T5825] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 2191.637557][ T5825] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 2191.645398][ T5825] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 2191.687037][T17540] bridge_slave_0: left allmulticast mode [ 2191.727760][T17540] bridge_slave_0: left promiscuous mode [ 2191.733569][T17540] bridge0: port 1(bridge_slave_0) entered disabled state [ 2191.859903][ T6036] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 2191.870307][ T6036] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 2191.878825][ T6036] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 2191.888785][ T6036] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 2191.919596][ T6036] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 2192.009740][ T5825] Bluetooth: hci8: unexpected cc 0x0c03 length: 249 > 1 [ 2192.033805][ T5825] Bluetooth: hci8: unexpected cc 0x1003 length: 249 > 9 [ 2192.064579][ T5825] Bluetooth: hci8: unexpected cc 0x1001 length: 249 > 9 [ 2192.079110][ T5825] Bluetooth: hci8: unexpected cc 0x0c23 length: 249 > 4 [ 2192.099349][ T5825] Bluetooth: hci8: unexpected cc 0x0c38 length: 249 > 2 [ 2192.240703][ T6036] Bluetooth: hci9: unexpected cc 0x0c03 length: 249 > 1 [ 2192.313049][ T6036] Bluetooth: hci9: unexpected cc 0x1003 length: 249 > 9 [ 2192.328195][ T6036] Bluetooth: hci9: unexpected cc 0x1001 length: 249 > 9 [ 2192.341960][ T6036] Bluetooth: hci9: unexpected cc 0x0c23 length: 249 > 4 [ 2192.359122][ T6036] Bluetooth: hci9: unexpected cc 0x0c38 length: 249 > 2 [ 2193.638655][ T5825] Bluetooth: hci5: command tx timeout [ 2193.717993][ T5825] Bluetooth: hci6: command tx timeout [ 2193.738525][T17648] chnl_net:caif_netlink_parms(): no params data found [ 2193.916094][T17648] bridge0: port 1(bridge_slave_0) entered blocking state [ 2193.923416][T17648] bridge0: port 1(bridge_slave_0) entered disabled state [ 2193.934410][T17648] bridge_slave_0: entered allmulticast mode [ 2193.942607][T17648] bridge_slave_0: entered promiscuous mode [ 2193.955257][T17648] bridge0: port 2(bridge_slave_1) entered blocking state [ 2193.958446][ T5825] Bluetooth: hci7: command tx timeout [ 2193.970113][T17648] bridge0: port 2(bridge_slave_1) entered disabled state [ 2193.977373][T17648] bridge_slave_1: entered allmulticast mode [ 2193.985081][T17648] bridge_slave_1: entered promiscuous mode [ 2194.047461][T17645] chnl_net:caif_netlink_parms(): no params data found [ 2194.068259][T17648] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2194.093998][T17648] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2194.198168][ T5825] Bluetooth: hci8: command tx timeout [ 2194.241867][T17648] team0: Port device team_slave_0 added [ 2194.256824][T17648] team0: Port device team_slave_1 added [ 2194.437813][ T5825] Bluetooth: hci9: command tx timeout [ 2194.510402][T17540] hsr_slave_0: left promiscuous mode [ 2194.516238][T17540] hsr_slave_1: left promiscuous mode [ 2194.522659][T17540] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2194.530381][T17540] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2194.538322][T17540] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2194.546023][T17540] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2194.561536][T17540] veth0_macvtap: left promiscuous mode [ 2194.567118][T17540] veth1_vlan: left promiscuous mode [ 2194.572554][T17540] veth0_vlan: left promiscuous mode [ 2195.050936][T17540] team0 (unregistering): Port device team_slave_1 removed [ 2195.096404][T17540] team0 (unregistering): Port device team_slave_0 removed [ 2195.468351][T17648] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2195.475341][T17648] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2195.503432][T17648] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2195.519900][T17645] bridge0: port 1(bridge_slave_0) entered blocking state [ 2195.527097][T17645] bridge0: port 1(bridge_slave_0) entered disabled state [ 2195.536084][T17645] bridge_slave_0: entered allmulticast mode [ 2195.543486][T17645] bridge_slave_0: entered promiscuous mode [ 2195.575664][T17648] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2195.582983][T17648] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2195.609123][T17648] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2195.629901][T17645] bridge0: port 2(bridge_slave_1) entered blocking state [ 2195.637152][T17645] bridge0: port 2(bridge_slave_1) entered disabled state [ 2195.648219][T17645] bridge_slave_1: entered allmulticast mode [ 2195.655722][T17645] bridge_slave_1: entered promiscuous mode [ 2195.718280][ T5825] Bluetooth: hci5: command tx timeout [ 2195.765719][T17645] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2195.778405][T17645] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2195.797849][ T5825] Bluetooth: hci6: command tx timeout [ 2195.879744][T17648] hsr_slave_0: entered promiscuous mode [ 2195.886714][T17648] hsr_slave_1: entered promiscuous mode [ 2195.894223][T17648] debugfs: 'hsr0' already exists in 'hsr' [ 2195.901279][T17648] Cannot create hsr debugfs directory [ 2195.916232][T17645] team0: Port device team_slave_0 added [ 2195.925639][T17645] team0: Port device team_slave_1 added [ 2196.007527][T17645] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2196.019313][T17645] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2196.037961][ T5825] Bluetooth: hci7: command tx timeout [ 2196.048432][T17645] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2196.082078][T17655] chnl_net:caif_netlink_parms(): no params data found [ 2196.141371][T17645] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2196.148414][T17645] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2196.176895][T17645] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2196.279942][ T5825] Bluetooth: hci8: command tx timeout [ 2196.316710][T17645] hsr_slave_0: entered promiscuous mode [ 2196.323483][T17645] hsr_slave_1: entered promiscuous mode [ 2196.330861][T17645] debugfs: 'hsr0' already exists in 'hsr' [ 2196.336593][T17645] Cannot create hsr debugfs directory [ 2196.410179][T17662] chnl_net:caif_netlink_parms(): no params data found [ 2196.513700][T17540] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2196.517868][ T5825] Bluetooth: hci9: command tx timeout [ 2196.546433][T17655] bridge0: port 1(bridge_slave_0) entered blocking state [ 2196.553732][T17655] bridge0: port 1(bridge_slave_0) entered disabled state [ 2196.561300][T17655] bridge_slave_0: entered allmulticast mode [ 2196.569397][T17655] bridge_slave_0: entered promiscuous mode [ 2196.595156][T17657] chnl_net:caif_netlink_parms(): no params data found [ 2196.607367][T17655] bridge0: port 2(bridge_slave_1) entered blocking state [ 2196.615556][T17655] bridge0: port 2(bridge_slave_1) entered disabled state [ 2196.623064][T17655] bridge_slave_1: entered allmulticast mode [ 2196.630474][T17655] bridge_slave_1: entered promiscuous mode [ 2196.700632][T17540] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2196.755439][T17655] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2196.803826][T17662] bridge0: port 1(bridge_slave_0) entered blocking state [ 2196.811213][T17662] bridge0: port 1(bridge_slave_0) entered disabled state [ 2196.818603][T17662] bridge_slave_0: entered allmulticast mode [ 2196.825512][T17662] bridge_slave_0: entered promiscuous mode [ 2196.834538][T17655] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2196.883109][T17540] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2196.896866][T17662] bridge0: port 2(bridge_slave_1) entered blocking state [ 2196.905407][T17662] bridge0: port 2(bridge_slave_1) entered disabled state [ 2196.913318][T17662] bridge_slave_1: entered allmulticast mode [ 2196.920541][T17662] bridge_slave_1: entered promiscuous mode [ 2196.983389][T17540] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2197.000947][T17655] team0: Port device team_slave_0 added [ 2197.113471][T17662] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2197.134093][T17662] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2197.145045][T17655] team0: Port device team_slave_1 added [ 2197.289789][T17657] bridge0: port 1(bridge_slave_0) entered blocking state [ 2197.297029][T17657] bridge0: port 1(bridge_slave_0) entered disabled state [ 2197.305338][T17657] bridge_slave_0: entered allmulticast mode [ 2197.314834][T17657] bridge_slave_0: entered promiscuous mode [ 2197.343154][T17655] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2197.350422][T17655] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2197.377486][T17655] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2197.420529][T17657] bridge0: port 2(bridge_slave_1) entered blocking state [ 2197.438005][T17657] bridge0: port 2(bridge_slave_1) entered disabled state [ 2197.446578][T17657] bridge_slave_1: entered allmulticast mode [ 2197.455903][T17657] bridge_slave_1: entered promiscuous mode [ 2197.503051][T17662] team0: Port device team_slave_0 added [ 2197.516745][T17662] team0: Port device team_slave_1 added [ 2197.524311][T17655] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2197.531348][T17655] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2197.557304][T17655] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2197.650134][T17657] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2197.661280][T17662] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2197.668463][T17662] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2197.694954][T17662] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2197.710313][T17662] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2197.717286][T17662] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2197.744546][T17662] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2197.762762][T17655] hsr_slave_0: entered promiscuous mode [ 2197.769513][T17655] hsr_slave_1: entered promiscuous mode [ 2197.775957][T17655] debugfs: 'hsr0' already exists in 'hsr' [ 2197.782643][T17655] Cannot create hsr debugfs directory [ 2197.792066][T17657] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2197.814315][ T5825] Bluetooth: hci5: command tx timeout [ 2197.877941][ T5825] Bluetooth: hci6: command tx timeout [ 2197.944718][T17662] hsr_slave_0: entered promiscuous mode [ 2197.952061][T17662] hsr_slave_1: entered promiscuous mode [ 2197.959423][T17662] debugfs: 'hsr0' already exists in 'hsr' [ 2197.965185][T17662] Cannot create hsr debugfs directory [ 2198.023743][T17657] team0: Port device team_slave_0 added [ 2198.097341][T17657] team0: Port device team_slave_1 added [ 2198.117933][ T5825] Bluetooth: hci7: command tx timeout [ 2198.254543][T17657] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2198.262688][T17657] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2198.301202][T17657] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2198.336610][T17657] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2198.344357][T17657] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 2198.370711][ T5825] Bluetooth: hci8: command tx timeout [ 2198.378936][T17657] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2198.584422][T17657] hsr_slave_0: entered promiscuous mode [ 2198.591862][T17657] hsr_slave_1: entered promiscuous mode [ 2198.599053][T17657] debugfs: 'hsr0' already exists in 'hsr' [ 2198.604804][T17657] Cannot create hsr debugfs directory [ 2198.606794][ T5825] Bluetooth: hci9: command tx timeout [ 2198.861235][T17540] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2198.954488][T17540] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2199.039367][T17540] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2199.102769][T17540] bond0: (slave netdevsim0): Releasing backup interface [ 2199.120287][T17540] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2199.307544][T17540] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2199.405161][T17540] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2199.501953][T17540] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2199.580684][T17540] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2199.758494][T17540] bridge_slave_1: left allmulticast mode [ 2199.764185][T17540] bridge_slave_1: left promiscuous mode [ 2199.771982][T17540] bridge0: port 2(bridge_slave_1) entered disabled state [ 2199.783213][T17540] bridge_slave_0: left allmulticast mode [ 2199.789903][T17540] bridge_slave_0: left promiscuous mode [ 2199.795681][T17540] bridge0: port 1(bridge_slave_0) entered disabled state [ 2199.808317][T17540] bridge_slave_1: left allmulticast mode [ 2199.814111][T17540] bridge_slave_1: left promiscuous mode [ 2199.821895][T17540] bridge0: port 2(bridge_slave_1) entered disabled state [ 2199.832718][T17540] bridge_slave_0: left allmulticast mode [ 2199.838696][T17540] bridge_slave_0: left promiscuous mode [ 2199.844433][T17540] bridge0: port 1(bridge_slave_0) entered disabled state [ 2199.857142][T17540] bridge_slave_1: left allmulticast mode [ 2199.862988][T17540] bridge_slave_1: left promiscuous mode [ 2199.871145][T17540] bridge0: port 2(bridge_slave_1) entered disabled state [ 2199.883588][ T5825] Bluetooth: hci5: command tx timeout [ 2199.893811][T17540] bridge_slave_0: left allmulticast mode [ 2199.904750][T17540] bridge_slave_0: left promiscuous mode [ 2199.910929][T17540] bridge0: port 1(bridge_slave_0) entered disabled state [ 2199.923176][T17540] bridge_slave_1: left allmulticast mode [ 2199.929047][T17540] bridge_slave_1: left promiscuous mode [ 2199.934796][T17540] bridge0: port 2(bridge_slave_1) entered disabled state [ 2199.944857][T17540] bridge_slave_0: left allmulticast mode [ 2199.950686][T17540] bridge_slave_0: left promiscuous mode [ 2199.956438][T17540] bridge0: port 1(bridge_slave_0) entered disabled state [ 2199.962274][ T5825] Bluetooth: hci6: command tx timeout [ 2200.201610][ T5825] Bluetooth: hci7: command tx timeout [ 2200.441214][ T5825] Bluetooth: hci8: command tx timeout [ 2200.492023][T17540] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2200.505562][T17540] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2200.516765][T17540] bond0 (unregistering): Released all slaves [ 2200.682713][ T5825] Bluetooth: hci9: command tx timeout [ 2201.047765][T17540] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2201.058339][T17540] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2201.068311][T17540] bond0 (unregistering): Released all slaves [ 2202.252895][T17645] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 2202.337570][T17645] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 2202.355924][T17645] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 2202.406709][T17645] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 2202.938306][T17645] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2202.991166][T17645] 8021q: adding VLAN 0 to HW filter on device team0 [ 2203.019611][T17655] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 2203.110986][T17655] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 2203.150825][ T1148] bridge0: port 1(bridge_slave_0) entered blocking state [ 2203.157991][ T1148] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2203.283482][T17655] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 2203.303381][T17629] bridge0: port 2(bridge_slave_1) entered blocking state [ 2203.310596][T17629] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2203.323535][T17655] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 2203.454149][T17540] hsr_slave_0: left promiscuous mode [ 2203.460146][T17540] hsr_slave_1: left promiscuous mode [ 2203.465947][T17540] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2203.473687][T17540] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2203.487599][T17540] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2203.495358][T17540] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2203.505874][T17540] hsr_slave_0: left promiscuous mode [ 2203.512385][T17540] hsr_slave_1: left promiscuous mode [ 2203.518454][T17540] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2203.526098][T17540] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2203.537602][T17540] hsr_slave_0: left promiscuous mode [ 2203.543794][T17540] hsr_slave_1: left promiscuous mode [ 2203.549900][T17540] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2203.557288][T17540] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2203.566349][T17540] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2203.574408][T17540] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2203.588783][T17540] hsr_slave_0: left promiscuous mode [ 2203.594583][T17540] hsr_slave_1: left promiscuous mode [ 2203.600596][T17540] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 2203.608452][T17540] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 2203.616080][T17540] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 2203.623609][T17540] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 2203.660616][T17540] veth1_macvtap: left promiscuous mode [ 2203.666138][T17540] veth0_macvtap: left promiscuous mode [ 2203.672462][T17540] veth1_vlan: left promiscuous mode [ 2203.677883][T17540] veth0_vlan: left promiscuous mode [ 2203.684168][T17540] veth1_macvtap: left promiscuous mode [ 2203.689873][T17540] veth0_macvtap: left promiscuous mode [ 2203.695436][T17540] veth1_vlan: left promiscuous mode [ 2203.700869][T17540] veth0_vlan: left promiscuous mode [ 2203.706995][T17540] veth1_macvtap: left promiscuous mode [ 2203.712584][T17540] veth0_macvtap: left promiscuous mode [ 2203.718454][T17540] veth1_vlan: left promiscuous mode [ 2203.723693][T17540] veth0_vlan: left promiscuous mode [ 2204.301044][T17540] team0 (unregistering): Port device team_slave_1 removed [ 2204.342968][T17540] team0 (unregistering): Port device team_slave_0 removed [ 2205.149756][T17540] team0 (unregistering): Port device team_slave_1 removed [ 2205.193263][T17540] team0 (unregistering): Port device team_slave_0 removed [ 2205.202939][ T50] smc: removing ib device !yz! [ 2205.959165][T17540] team0 (unregistering): Port device team_slave_1 removed [ 2206.002059][T17540] team0 (unregistering): Port device team_slave_0 removed [ 2207.595503][T17655] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2207.861751][T17655] 8021q: adding VLAN 0 to HW filter on device team0 [ 2208.110279][T17645] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2208.120994][T16504] bridge0: port 1(bridge_slave_0) entered blocking state [ 2208.128180][T16504] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2208.147043][T16504] bridge0: port 2(bridge_slave_1) entered blocking state [ 2208.154243][T16504] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2208.168609][T17662] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 2208.552476][T17662] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 2208.714683][T17662] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 2208.741183][T17662] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 2209.214356][T17657] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 2209.269863][T17657] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 2209.299255][T17657] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 2209.358833][T17657] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 2209.434453][T17645] veth0_vlan: entered promiscuous mode [ 2209.486561][T17645] veth1_vlan: entered promiscuous mode [ 2209.524199][T17662] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2209.607554][T17655] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2209.647843][T17648] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 2209.670460][T17648] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 2209.694103][T17662] 8021q: adding VLAN 0 to HW filter on device team0 [ 2209.740195][ T6083] bridge0: port 1(bridge_slave_0) entered blocking state [ 2209.747328][ T6083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2209.772946][ T6083] bridge0: port 2(bridge_slave_1) entered blocking state [ 2209.780154][ T6083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2209.797285][T17648] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 2209.811175][T17648] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 2209.838302][T17645] veth0_macvtap: entered promiscuous mode [ 2209.901783][T17645] veth1_macvtap: entered promiscuous mode [ 2209.979777][T17645] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2210.020117][T17655] veth0_vlan: entered promiscuous mode [ 2210.040387][T17645] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2210.073355][T17655] veth1_vlan: entered promiscuous mode [ 2210.096987][ T1148] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2210.116663][T17657] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2210.180728][ T1148] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2210.200134][ T1148] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2210.236783][T17655] veth0_macvtap: entered promiscuous mode [ 2210.253243][ T1148] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2210.326862][T17657] 8021q: adding VLAN 0 to HW filter on device team0 [ 2210.342668][T17648] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2210.354607][T17655] veth1_macvtap: entered promiscuous mode [ 2210.399617][T17636] bridge0: port 1(bridge_slave_0) entered blocking state [ 2210.406770][T17636] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2210.453049][ T1148] bridge0: port 2(bridge_slave_1) entered blocking state [ 2210.460247][ T1148] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2210.524748][T17648] 8021q: adding VLAN 0 to HW filter on device team0 [ 2210.539088][T17655] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2210.555290][T17662] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2210.592569][T17655] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2210.621401][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 2210.628605][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2210.663591][ T1148] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2210.692787][ T50] bridge0: port 2(bridge_slave_1) entered blocking state [ 2210.699998][ T50] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2210.719538][T17629] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2210.727377][T17629] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2210.743169][ T1148] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2210.752589][ T1148] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2210.790703][ T1148] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2210.830734][T17636] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2210.844476][T17636] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2210.889820][T17648] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2210.920097][T17662] veth0_vlan: entered promiscuous mode [ 2211.005207][T17662] veth1_vlan: entered promiscuous mode [ 2211.014947][T17942] netlink: 7 bytes leftover after parsing attributes in process `syz.8.12844'. [ 2211.059712][T17942] netlink: 108 bytes leftover after parsing attributes in process `syz.8.12844'. [ 2211.125773][T17662] veth0_macvtap: entered promiscuous mode [ 2211.174282][T17662] veth1_macvtap: entered promiscuous mode [ 2211.208317][ T50] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2211.216189][ T50] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2211.249771][T17662] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2211.263604][T17657] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2211.327645][T17662] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2211.354222][ T1148] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2211.366676][ T1148] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2211.417947][T17636] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2211.426734][T17636] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2211.456881][T17636] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2211.485221][T17636] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2211.908551][T17657] veth0_vlan: entered promiscuous mode [ 2211.971167][T17648] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2212.187283][T17964] netlink: 20 bytes leftover after parsing attributes in process `syz.3.12944'. [ 2212.188086][T17657] veth1_vlan: entered promiscuous mode [ 2212.300095][T17636] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2212.340869][T17636] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2212.385067][T17648] veth0_vlan: entered promiscuous mode [ 2212.412497][T17636] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2212.430789][T17636] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2212.446220][T17648] veth1_vlan: entered promiscuous mode [ 2212.509396][T17657] veth0_macvtap: entered promiscuous mode [ 2212.545677][T17657] veth1_macvtap: entered promiscuous mode [ 2212.632280][T17657] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2212.692472][T17657] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2212.723445][T17648] veth0_macvtap: entered promiscuous mode [ 2212.766164][T17636] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2212.800092][T17636] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2212.828909][T17648] veth1_macvtap: entered promiscuous mode [ 2212.852822][T17636] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2212.898218][T17636] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2212.990008][T17648] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2213.033258][T17648] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2213.068333][T16504] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2213.077161][T16504] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2213.079657][T17636] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2213.109682][T17636] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2213.122147][T17540] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2213.134370][T17540] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2213.198258][T16504] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2213.209301][T16504] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2213.291484][T17629] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2213.317028][T17629] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2213.401597][T17636] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2213.414051][T17636] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2232.051442][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 2232.057966][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 2247.456131][T16504] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2247.516804][T16504] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2247.584176][T16504] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2247.623190][T16504] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2247.741459][T16504] bridge_slave_1: left allmulticast mode [ 2247.747898][T16504] bridge_slave_1: left promiscuous mode [ 2247.753816][T16504] bridge0: port 2(bridge_slave_1) entered disabled state [ 2247.764292][T16504] bridge_slave_0: left allmulticast mode [ 2247.770019][T16504] bridge_slave_0: left promiscuous mode [ 2247.775714][T16504] bridge0: port 1(bridge_slave_0) entered disabled state [ 2248.341092][T16504] hsr_slave_0: left promiscuous mode [ 2248.347104][T16504] hsr_slave_1: left promiscuous mode [ 2248.367629][T16504] veth1_macvtap: left promiscuous mode [ 2248.379130][T16504] veth0_macvtap: left promiscuous mode [ 2248.384840][T16504] veth1_vlan: left promiscuous mode [ 2248.390540][T16504] veth0_vlan: left promiscuous mode [ 2248.944990][T16504] team0 (unregistering): Port device team_slave_1 removed [ 2248.993131][T16504] team0 (unregistering): Port device C removed [ 2293.480553][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 2293.486847][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 2316.048920][T17650] Bluetooth: hci8: command 0x0406 tx timeout [ 2316.051313][T18970] Bluetooth: hci7: command 0x0406 tx timeout [ 2316.119904][T17072] Bluetooth: hci9: command 0x0406 tx timeout [ 2316.125951][T17072] Bluetooth: hci5: command 0x0406 tx timeout [ 2316.128787][T18967] Bluetooth: hci6: command 0x0406 tx timeout [ 2354.922559][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 2354.928956][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 2416.360688][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 2416.366981][ T1301] ieee802154 phy1 wpan1: encryption failed: -22