last executing test programs: 11m34.249787524s ago: executing program 32 (id=52): perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xc2ba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x970, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x1, 0x8, 0x0, 0xa956, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, &(0x7f0000000040), 0xcf) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x5e6c68b2ec608327, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000d0ff00000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006408000000000001180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200000800e65d7e0a000000000000850000000600000095"], &(0x7f0000000180)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0xc}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x14869, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mkdir(0x0, 0x0) socket$kcm(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0xfffd, 0x0, 0x6f6}, 0x0, 0x0, 0xffffffffffffffff, 0x1b) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x400000000000}, 0x0, 0x0, 0x0, 0x2, 0xf61}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="d800000018007b7be00212ba0d0505040a003f00000f040b067c55a1bc0009001e0006990300000015000500fe800000000000000300014002000c0901ac04000bd67f6f94007100a007a290457f0189b3162700e06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04fb95cae8c9010000730d7a5005ccca262f3d40fad95667e04adcdf63cc1f215ce3bb9ad8ffd5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd601edef3d93452a92307f00000e97031e9f05e9f16e0700000004000000", 0xd8}], 0x1, 0x0, 0x0, 0x2663}, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8b1a, &(0x7f0000000000)={'wlan1\x00', @random="0000230c1100"}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x5411, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000b40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8b04, &(0x7f0000000000)={'wlan1\x00', @random="0200"}) 11m32.684364671s ago: executing program 33 (id=67): r0 = socket$kcm(0x11, 0x2, 0x0) sendmsg$sock(r0, &(0x7f00000000c0)={&(0x7f0000000100)=@tipc=@name={0x1e, 0x2, 0x3, {{0x42, 0x2}, 0x2}}, 0x80, 0x0}, 0x40010) 11m32.524779309s ago: executing program 34 (id=68): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x7}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}]}, @NFT_MSG_NEWSETELEM={0x14, 0xc, 0xa, 0x101, 0x0, 0x0, {0x7}}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x84}}}, 0x98}}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r1 = socket$kcm(0x2, 0x1, 0x84) recvmsg$kcm(r1, &(0x7f0000000a00)={&(0x7f0000000540)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000800)=[{&(0x7f00000005c0)=""/200, 0xc8}, {&(0x7f00000006c0)=""/29, 0x1d}, {&(0x7f0000000700)=""/25, 0x19}, {&(0x7f0000000900)=""/74, 0x4a}], 0x4, &(0x7f0000000980)=""/106, 0x6a}, 0x40000101) 11m29.918799744s ago: executing program 35 (id=76): r0 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r0, &(0x7f00000005c0)={&(0x7f0000000380)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)="ba7f", 0x2}], 0x9}, 0x0) 11m8.485839284s ago: executing program 36 (id=152): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000080)="1c0000006d0081044e81f782db1f4cb9041c1d08", 0x14}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001300)={r1, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x16, &(0x7f0000001340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_val={0x18, 0x7, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x621}, @exit, @map_idx={0x18, 0xa, 0x5, 0x0, 0x6}, @exit, @call={0x85, 0x0, 0x0, 0xa9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000012c0)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x9}, 0x10}, 0x94) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@phonet={0x23, 0x0, 0x0, 0xd}, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000080)="27050200160014000600002f86dd", 0x5ea}], 0x1}, 0x0) 10m8.484352924s ago: executing program 37 (id=563): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket(0x10, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xa}, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9008, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x7, 0x1, 0x9, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1e00000002000000ff7f00001f0000000401b662", @ANYRES32, @ANYBLOB="04000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000003000000050000000b00"/24, @ANYRES32, @ANYBLOB], 0x50) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.kill\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0), 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000300)=0xfff) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e00000010008188040f80ec59acbc0413a1810039000000000bf0ffffff00000e000a000f000000028002002d1f", 0x2e}], 0x1}, 0x800) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_xfrm(r4, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x37, 0x0, @val=@iter={&(0x7f0000000240)=@task={0xffffffffffffffff, 0xffffffffffffffff}, 0x10}}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffe3a}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$nl_route_sched(r2, 0x0, 0x4000000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x702, 0xe, 0xff0f, &(0x7f0000000540)="e460334470b8d480eb20c15286dd", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) setsockopt$sock_attach_bpf(r0, 0x1, 0x3d, &(0x7f00000009c0), 0x4) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r0, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)={0x58, 0x140c, 0x2, 0x70bd2c, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_CQN={0x8, 0x3d, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_RES_CQN={0x8, 0x3d, 0x2}, @RDMA_NLDEV_ATTR_RES_CQN={0x8, 0x3d, 0x1}, @RDMA_NLDEV_ATTR_RES_CQN={0x8, 0x3d, 0x3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_RES_CQN={0x8, 0x3d, 0x3}]}, 0x58}, 0x1, 0x0, 0x0, 0x800}, 0x0) 9m56.898100114s ago: executing program 38 (id=611): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'dvmrp0\x00', 0x2}) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r1}, 0x10) socket$kcm(0xa, 0x5, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d2f, 0x10, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1e00"/20, @ANYRES32=0x1], 0x48) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26, 0x0, 0x1}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="1800001900000000020000000000000018400000020000000000000000000000950000000000000095"], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r2, 0x8, 0x0, 0x0, 0x14, &(0x7f0000000600), 0x10}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xf, &(0x7f0000000d40)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = socket$kcm(0x15, 0x7, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0xc, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000010008188e6b62aa73772cc9f1ba1f848480000005e140602000000000e000a000f000000028000001294", 0x2e}], 0x1}, 0x0) r5 = socket$kcm(0x2, 0x922000000001, 0x106) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x7ff0, 0x82, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0xc, &(0x7f00000002c0)=r6, 0x4) sendmsg$inet(r3, &(0x7f0000001180)={&(0x7f0000000000)={0xa, 0xffff, @empty}, 0x10, 0x0, 0x0, &(0x7f00000011c0)=ANY=[], 0x6b}, 0x0) 9m56.85130287s ago: executing program 39 (id=609): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x4, &(0x7f0000000180)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0x1, 0x0, 0x20}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'dvmrp0\x00', 0x2}) r1 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x1, 0x4, 0x6d, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x8010, 0x0, 0x0, 0x0, 0x40001}, 0x0, 0x4000000000000200, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x3}, 0x6000, 0x0, 0x4, 0x6, 0x0, 0x2000000a, 0xfffc, 0x0, 0x101}, 0x0, 0x1, 0xffffffffffffffff, 0xd) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000082a30753934d6b3eec0fb3e9f70000000000000000089500190000000000"], &(0x7f00000003c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000140)='contention_end\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1b"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) ioctl$SIOCSIFHWADDR(r3, 0x8946, &(0x7f0000000040)={'veth0_vlan\x00', @random='\x00\x00\x00\x00\x00 '}) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x7, 0x8, 0x8, 0x5, 0x0, 0x1, 0x6048, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000080), 0x3}, 0x800, 0x3c, 0x1, 0x8, 0x100, 0x4, 0x400, 0x0, 0x1ff, 0x0, 0xf}, 0x0, 0x10, r1, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000dc0)="5c00000014006b02c84e21000af32c6e0a0601000100000044000100fec00e000000004e0033df090e8497b1ed90d3d376bd5f6ffe5aa677b1c6f99b214460bc24f65ee2f308ff9d4f5a60eab556a705251e618294010000003b48df", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x80000) r5 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYRES64=r5], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x7}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x4, 0x20000000}, 0x10}, 0x94) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000dc0)="5c00000014006b02c84e21000af32c6e0a0601000100000044000100fe800e000000004e0033df090e8497b1ed90d3d376bd5f6ffe5aa677b1c6f99b214460bc24f65ee2f308ff9d4f5a60eab556a705251e618294010000003b48df", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x80000) 9m22.068488373s ago: executing program 40 (id=791): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x1, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, 0x2, 0x6, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4800}, 0x10) 9m19.583641055s ago: executing program 41 (id=792): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x2a, &(0x7f0000000100), 0xffffffffffffff8b) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xd, 0x3}, 0x828, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_config_ext={0xff, 0x4}, 0x100410, 0x200, 0x2, 0x1, 0x9, 0x1000009, 0x8, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x3ffffffe}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @generic={0xc6, 0x8}, @initr0, @exit, @exit]}, &(0x7f00000001c0)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x8}, 0x94) 9m15.862153247s ago: executing program 42 (id=809): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)={0x24, 0x2c, 0x107, 0x70bd28, 0x25dfdbff, {0x3, 0x7c}, [@nested={0x8, 0x1, 0x0, 0x1, [@nested={0x4, 0xdd}]}, @nested={0x8, 0x2, 0x0, 0x1, [@nested={0x4, 0x1}]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc000}, 0x400c010) (async) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)={0x24, 0x2c, 0x107, 0x70bd28, 0x25dfdbff, {0x3, 0x7c}, [@nested={0x8, 0x1, 0x0, 0x1, [@nested={0x4, 0xdd}]}, @nested={0x8, 0x2, 0x0, 0x1, [@nested={0x4, 0x1}]}]}, 0x24}, 0x1, 0x0, 0x0, 0xc000}, 0x400c010) socketpair(0x15, 0xa, 0xcea, &(0x7f0000000400)) (async) socketpair(0x15, 0xa, 0xcea, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r1, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000540)={&(0x7f00000006c0)={0x88, 0x1403, 0x206, 0x70bd2c, 0x25dfdbfd, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'dvmrp0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'bridge0\x00'}}]}, 0x88}, 0x1, 0x0, 0x0, 0x814}, 0x4080) (async) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r1, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000540)={&(0x7f00000006c0)={0x88, 0x1403, 0x206, 0x70bd2c, 0x25dfdbfd, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'dvmrp0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'bridge0\x00'}}]}, 0x88}, 0x1, 0x0, 0x0, 0x814}, 0x4080) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x115905, 0x4, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x1, 0xffffffffffffffff, 0x1) (async) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x115905, 0x4, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x1, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback=0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback=0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000001680)=ANY=[@ANYBLOB="1800000000030000000000000000000095"], &(0x7f0000001700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000}, 0x94) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='kmem_cache_free\x00', r7}, 0x18) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r8, 0x69, &(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f00000005c0)=""/50, 0x32}}, 0x10) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r8, 0x69, &(0x7f0000000580)={0x0, 0x0, 0x0, &(0x7f00000005c0)=""/50, 0x32}}, 0x10) ioctl$SIOCSIFHWADDR(r6, 0x89fe, &(0x7f0000000680)={'ip6gre0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2e}}) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x7, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x4, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$inet(0xffffffffffffffff, 0x0, 0x8850) socket$nl_xfrm(0x10, 0x3, 0x6) r9 = socket$kcm(0x2, 0x200000000000001, 0x0) r10 = socket$kcm(0x28, 0x1, 0x0) setsockopt$sock_attach_bpf(r10, 0x28, 0x12, 0x0, 0x0) (async) setsockopt$sock_attach_bpf(r10, 0x28, 0x12, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x5452, &(0x7f0000000100)) r11 = socket$kcm(0x2b, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r11, 0x894b, &(0x7f0000000140)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r11, 0x894b, &(0x7f0000000140)) sendmsg$inet(r9, 0x0, 0x3000c0c0) (async) sendmsg$inet(r9, 0x0, 0x3000c0c0) 9m15.86204636s ago: executing program 43 (id=811): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x80002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x9549, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x10, 0xffff}, 0x11efa, 0x4, 0x0, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0xfffffffffffffc7d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NFNL_MSG_ACCT_DEL(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x2c, 0x3, 0x7, 0x3, 0x0, 0x0, {0x7, 0x0, 0x8}, [@NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x40d4840b}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0xffffffffffffffff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) 8m42.383359318s ago: executing program 44 (id=812): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="05000000040000000400000004"], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x58, &(0x7f0000000000)={0x0, 0x0}}, 0x10) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = getpid() bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000180)={r4, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f00000002c0)='./cgroup/cgroup.procs\x00', &(0x7f0000000300)=[0x0], 0x0, 0x0, 0x1, 0x0, r5}}, 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r1, 0x9ab7}, 0xc) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff}, [@ldst={0x1, 0x0, 0x4, 0x9, 0x1, 0x30}]}, &(0x7f0000000080)='syzkaller\x00'}, 0x94) r6 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[], 0xfe33) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20008890) socket$nl_netfilter(0x10, 0x3, 0xc) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r7) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$netlink(0x10, 0x3, 0x0) r9 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, r9, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$nl_xfrm(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@flushpolicy={0x10, 0x1d, 0x1}, 0x10}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x0, 0x11, &(0x7f0000000140)=@framed={{0x18, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@jmp={0x5, 0x0, 0xa, 0x7, 0x4, 0x30, 0x1}, @snprintf]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffa}, 0x90) r10 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r10, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="600000002c000d190a762d7f089e", 0xfca2}, {&(0x7f0000000280)="68cabf2dfb58fc0a1d6b689866f05d490d010088a8ffff0200258f2e4409b8f9e6aaeb88bea123dc2c6726e89b1ae2f6e8bcb5ee52dcd7298d39093c510293bca0b646a3ce904f6e6b788b3204c233e60ddc", 0x52}], 0x2}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0xffffffffffffff9a, &(0x7f0000000180)={&(0x7f0000000700)={0x130, 0x12, 0x200, 0xfffffffe, 0x25dfdbfe, {0x1b, 0x7c}, [@nested={0x0, 0x8c, 0x0, 0x1, [@nested={0x0, 0x68, 0x0, 0x1, [@nested={0x0, 0x6e}, @nested={0x0, 0x91}, @generic="dd0d29ee8bdfb5db8ca56993de077bbfe63af12cdf230817ae9f1829edd7b3ac926dfaa33ec2e256e7ad8dea51ff2f12b6289dddaac17bb950718810249eb901597450fe88d76aa16017881dbfded527169e8caeb9ed5a69c43ae597e38a8525400562d15157a249184a53cdb4f0e29601232ae00f96d313c8d365f2b34c7f0a9c16d234a3c09db7732695f2efd44f864673a4e2d33ec261daf132b556484c62d4b30a1e795f075f4e78a482614360b16fee48dde30e77d0b5113fc9df6cdbb2d649c50875bbdb81749d9ead3f3cf2c842bc07", @nested={0x0, 0x116, 0x0, 0x1, [@typed={0x0, 0xa9, 0x0, 0x0, @str='\'}1\x00'}, @generic="e0a7e0771218042e9ac3a4cef7563632776e77b1724f6c4d5c17c6dd8592bad9b13f1b6c786900b2ea2466ebd40d148a88bb81f341a015b31d2e9a632c651b11abe699fd862cdf972d798cb524ed2183194249555cedb2fdebb38101dbd32b37dde2010f0ad32b4ba5783f393d921a46be7351a741c515fd25424a9d8d03b5fdad34c813e2157157d5e5a54d398700490656c37f44489b1cb2d08c59843a4d9c8ef8f0d152971de0e20dcf482e4371bd76e2daa79a024794863c72819ad3dad72ea5d18c8af0adc6469473798666962751b39913082a05f664afee50f1c367ee79539e18142a3fe288", @generic="5777c39a1f6bfb17dfe6a090ec98334aa2e7b17236345486e111d4cb9703e5d1d6f990f12020311c35", @nested={0x0, 0xb9, 0x0, 0x1, [@generic="db01498a210f5eb6d0a4b163a0e4c73d1fd148040e6a45c82be2abbb4805b768df8a0bf0402edc0b064d0fbfd216b5eaa87c536dd96c817f78bbc7db16be61c403c40ead5e3a0e10513a0335477b3565b96bb16beab468655615615331", @nested={0x0, 0xc1}]}]}]}, @typed={0x0, 0x151}, @typed={0x0, 0x169, 0x0, 0x0, @pid=r5}, @typed={0x0, 0x8c, 0x0, 0x0, @binary="9391f98e4b"}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x4008051}, 0x24040091) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x15, 0x17, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000b5b43e9aa0cf969b", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b70300000000000085000000a0000000bf0900000000000026090600000003e7040000000600000018010000786c6c2500000000002020207d9af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000014000000060000005c93000000000000b5030200020000008500000000000000b7000000000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 8m6.461261009s ago: executing program 45 (id=860): socket$nl_generic(0x10, 0x3, 0x10) r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x103b85, 0x0, 0x0, 0x8, 0x7fff, 0x7ffffffc}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xf}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000080)="5c00000011006bec9e3be35c6e17aa31076b876c0d000000ba090000160af3653c001ac00400020208000200030001002c000000eab556a705251e618294ff0051f60a84c9f4d4938037e786a6d0000300002700000000ffffc6c953", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 7m34.398444315s ago: executing program 46 (id=994): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0xa, 0x5, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x240008c5}, 0x4008840) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/29], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x8, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="8c0000000906010200000000000000000200ffff08000940"], 0x8c}, 0x1, 0x0, 0x0, 0x10000182}, 0x4000080) sendmsg$nl_generic(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000003700"], 0x1c}, 0x1, 0x0, 0x0, 0x4048011}, 0xc000) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1d, 0x4, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, [@call={0x85, 0x0, 0x0, 0xc1}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000880)=ANY=[@ANYBLOB="5c0000000201010200000000000000000a0008000c00198008000100aa0000003c0001802c00018014000300ff01000000000000000000000000000114000400fc0000000000000000000000000000000c000280040001"], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x8020) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000005c0)={&(0x7f0000000440)="a00c2fcfb0b9a9ed05f6ed52efe96f1070f223f93da197df602f98ea3cbf1d8b07329cf7383d946e9b5b5c09e82ec16be4f78e69ca960f23d510096d1d2a5a8f7e26ad882f1664430f1c60e0bda7b928d4b040da9ba296be9eb9e0ea2cc31ad396aea506b224470dafb1afccd71c8df0c101930773c57d9167f9b41aa9cb12f0703ecb18950c6d1315b785ec3bd39b4488b096f26af40de293ecf87c5167de6b0fe14220c6b15407bf36b81de8812d8411703fbf", &(0x7f0000000340)=""/123, &(0x7f0000000280)="ac800a5154a7df6858f5c472fb7e34a6b345", &(0x7f0000000500)="e438bf8d91da58dfa4dcfae559741e3341b048ab7927e3342ad9cf93e4858b109065a4bc8d2c6ea16e89395125b87655aa761895c461835da692e2ba3660cf2547626de73e50626974443a7783613cd71282215045f852671a083d1f87a45eca2f3437af451e9811c8b5fe4bb07e3f938546959708dd55c2ede32606e3a7faf519", 0x3, r5, 0x4}, 0x38) 6m34.593028692s ago: executing program 8 (id=1713): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7}, 0x10828, 0x0, 0x0, 0x2, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@ip_retopts={{0x34, 0x0, 0x7, {[@timestamp_addr={0x44, 0x24, 0x23, 0x1, 0x9, [{@empty, 0xe}, {@multicast2, 0x7}, {@multicast1, 0x774}, {@broadcast, 0x9}]}]}}}], 0x38}, 0x0) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) r1 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)={0x50, 0x1401, 0x1, 0x70bd2c, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x50}}, 0x24040041) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x140070, 0x0) 6m30.982980766s ago: executing program 8 (id=1721): bpf$MAP_CREATE(0x0, 0x0, 0x48) socket$kcm(0x2, 0x200000000000001, 0x106) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80031, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ce2, 0x1946}, 0xc820, 0x200000, 0x0, 0x6, 0x7ffb, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000009b00)={0x0, 0x84}, 0x1, 0x0, 0x0, 0x4000850}, 0x80d1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) close(0x3) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x3, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x2, 0x0, 0x0, 0x20000004, 0x0, 0x0, 0x0, 0xfffffffd}, [@call={0x85, 0x0, 0x0, 0x2f}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000}, 0x94) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x7}, 0x94) close(r2) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) syz_clone(0x982a8100, 0x0, 0x9, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001700)={{}, 0x0, 0x0}, 0x20) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x60}}, 0x4000) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="54000000090601020000000000000000020000000900020073797a310000000005000100070000002c0007800c00018008000140ac1414aa0500070084000000060004404e0a00000c00028008000140"], 0x54}, 0x1, 0x0, 0x0, 0x10000082}, 0x80) 6m21.091229559s ago: executing program 47 (id=1695): r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x42804}, 0x84) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) r1 = getpid() r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000000002, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x80000002}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$sock(0xffffffffffffffff, 0x0, 0x6008801) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x100600, 0x1, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$AUDIT_GET_FEATURE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x3fb, 0x100, 0x70bd2b, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x20000085) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="1400000024000179320026bd7000fedbdf270601"], 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) r6 = socket$kcm(0xa, 0x2, 0x88) sendmsg$inet(r6, 0x0, 0x8000) sendmsg$sock(r6, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x4000004) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) close(0xffffffffffffffff) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x400c080}, 0x0) syz_clone(0xae12ee80, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x13}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="160000000000000004000000ffff000000000000", @ANYRES32=0x1, @ANYBLOB="00fa29d99d775285901e00009b6cbc000000000000c13e29a46f90bba2d049da8682", @ANYRES16=r5, @ANYBLOB="8c88f18eb66c195a4335c8b6725c8de9b1aac19f28c36206ed0f948eb057c2c9c253705f410d25c0aa7075cdb5bc6120cf88d5a42e69", @ANYBLOB="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", @ANYRES16], 0x48) perf_event_open$cgroup(&(0x7f0000000540)={0x2, 0x80, 0xe, 0xa, 0x0, 0x5, 0x0, 0x2, 0x9f81c, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe66, 0x0, @perf_bp={&(0x7f0000000240), 0x1}, 0x10e28, 0xaba, 0x0, 0x8, 0x6, 0x7, 0xf, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x2, r4, 0xc) bpf$BPF_GET_MAP_INFO(0x3, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8923, &(0x7f0000000000)={'vlan0\x00', @remote}) socket$qrtr(0x2a, 0x2, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001800010324bd7002fadbdfdd4a"], 0x14}}, 0x8854) 6m15.59767668s ago: executing program 48 (id=1721): bpf$MAP_CREATE(0x0, 0x0, 0x48) socket$kcm(0x2, 0x200000000000001, 0x106) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80031, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ce2, 0x1946}, 0xc820, 0x200000, 0x0, 0x6, 0x7ffb, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000009b00)={0x0, 0x84}, 0x1, 0x0, 0x0, 0x4000850}, 0x80d1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) close(0x3) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x3, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x2, 0x0, 0x0, 0x20000004, 0x0, 0x0, 0x0, 0xfffffffd}, [@call={0x85, 0x0, 0x0, 0x2f}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000}, 0x94) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x7}, 0x94) close(r2) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) syz_clone(0x982a8100, 0x0, 0x9, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001700)={{}, 0x0, 0x0}, 0x20) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x60}}, 0x4000) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="54000000090601020000000000000000020000000900020073797a310000000005000100070000002c0007800c00018008000140ac1414aa0500070084000000060004404e0a00000c00028008000140"], 0x54}, 0x1, 0x0, 0x0, 0x10000082}, 0x80) 6m1.483606634s ago: executing program 49 (id=1774): r0 = getpid() r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39a0, 0x0, @perf_config_ext={0x2, 0x1}, 0x0, 0x0, 0x0, 0x4, 0x2, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x80000000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYRESOCT=r2, @ANYBLOB, @ANYRES32, @ANYBLOB="000000000000000000ea00"/28], 0x50) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x10001, r3, 0x4}, 0x38) syz_open_procfs$namespace(0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0xa0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x400000000008, 0x8000008}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)}, 0x804) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x37) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000400)=ANY=[], 0x10) socket$can_j1939(0x1d, 0x2, 0x7) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r6, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r6, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000640)=@newqdisc={0x48, 0x24, 0xf0b, 0x70bd2e, 0x0, {0x0, 0x0, 0x12, r7, {}, {0xffff, 0xffff}, {0x2}}, [@qdisc_kind_options=@q_hhf={{0x8}, {0x1c, 0x2, [@TCA_HHF_QUANTUM={0x8, 0x2, 0x400}, @TCA_HHF_HH_FLOWS_LIMIT={0x8, 0x3, 0x7}, @TCA_HHF_BACKLOG_LIMIT={0x8, 0x1, 0x1}]}}]}, 0x48}, 0x1, 0x0, 0x0, 0x8004001}, 0x0) 2m36.784520221s ago: executing program 50 (id=3174): socket$kcm(0x2b, 0x1, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x48000) socket$nl_generic(0x10, 0x3, 0x10) socket$inet(0x2, 0x2, 0x1) socket$kcm(0xa, 0x1, 0x106) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x4b, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) recvmsg$can_bcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)}, 0x10022) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0xf242, 0x2, 0xfffffffc, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xe1) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r4 = openat$cgroup_devices(r3, &(0x7f0000000080)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r4, &(0x7f0000000000)=ANY=[@ANYBLOB='b ', @ANYRESDEC], 0xc) openat$pidfd(0xffffffffffffff9c, &(0x7f0000002a80), 0x2af47a5434cd239e, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x4000014) 2m32.45614804s ago: executing program 51 (id=3203): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x13, 0x5, &(0x7f0000000800)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095", @ANYRESOCT, @ANYRES8, @ANYRES64, @ANYBLOB="0d080689dff7336869e21df187d65887fdd902110991"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x58, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffeb7, 0x0, 0x0, 0x0, 0x7f}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1946}, 0x100, 0x0, 0x0, 0x8, 0x1, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0xa) (async) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1946}, 0x100, 0x0, 0x0, 0x8, 0x1, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, 0x1406, 0x206, 0x70bd2d, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x7}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x58}, 0x1, 0x0, 0x0, 0x20008010}, 0x2000c840) (async) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, 0x1406, 0x206, 0x70bd2d, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x7}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x58}, 0x1, 0x0, 0x0, 0x20008010}, 0x2000c840) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000005, 0x0) (async) r4 = socket$kcm(0x2, 0x1000000000000005, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8000000000000000, 0x1109, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000440)}, 0x30, 0x6, 0xfffffffe, 0x9, 0x7, 0x0, 0x0, 0x0, 0xfffffff7}, 0x0, 0xc, 0xffffffffffffffff, 0x3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_netfilter(0x10, 0x3, 0xc) (async) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_PROTOCOL(r5, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x1, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x801}, 0x24000040) r6 = perf_event_open(0x0, 0x0, 0xb, 0xffffffffffffffff, 0x2) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) r8 = socket$nl_rdma(0x10, 0x3, 0x14) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="38000000031401002abd7000ffdbdf250900020073797a310000e011080041007278650014003300626f6e645f736c6176655f3000000000"], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x50) sendmsg$inet(r4, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000004c0)='.', 0x1}], 0x1}, 0x0) (async) sendmsg$inet(r4, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000004c0)='.', 0x1}], 0x1}, 0x0) sendmsg$inet(r4, &(0x7f0000000600)={&(0x7f0000000100)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="20000000000000008400000002000000948404"], 0x20}, 0x4800) socket$nl_netfilter(0x10, 0x3, 0xc) (async) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r9, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000540)=ANY=[@ANYBLOB="40000000020900070000000000000000020000060c0004800a000140000000400904010073797a30000000000900010073797a31000000000800054000000006205b76112765ea3a0fa7e57c1af72b659c9521c9778330d95632e6bfed5bf3bba1cfff6b0f4f6ebce98f6939ef9037a23c550b3b65f2d995861ac3639b9fd1b25bcd0d2c2e58841b53a873767dad5211ebddc1b36168e5ea106fd179b273bd573dbf07f8be82c04552b0ffae15"], 0x40}, 0x1, 0x0, 0x0, 0x404c0d1}, 0xc850) bpf$BPF_PROG_WITH_BTFID_LOAD(0x13, &(0x7f0000000680)=@bpf_lsm={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x6, 0xc, &(0x7f00000008c0)=ANY=[@ANYRESDEC=r5], 0x0, 0x1, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2m28.998601718s ago: executing program 52 (id=3220): r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x10, &(0x7f0000000200), 0x4) 2m12.713508619s ago: executing program 6 (id=3388): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETRULE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="20000000190a01020000000000000000000000000900010073797a300000001c"], 0x20}}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async, rerun: 64) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) (rerun: 64) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) ioctl$SIOCSIFHWADDR(r4, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) (async, rerun: 32) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="06000000040000001810000089"], 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000380)={r6, &(0x7f0000000100), 0x0}, 0x20) (async) sendmsg$kcm(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="d8000000180081054e81f782db44b904021d005c06007c09e8fe55a10a0015400500142603600e1208000b0000000401a8001600a400074002000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360d070100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffec", 0xbd}, {&(0x7f0000000080)="dd4289470cce256876f2c9b17d97b68f2726ed8a10148545240f9f", 0x1b}], 0x2}, 0x410) 2m6.052057341s ago: executing program 6 (id=3401): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x1, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/29], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$kcm(0x1e, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f00000008c0), 0x43) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000000)=""/59, 0x3b}], 0x1}, 0x80) r3 = socket$kcm(0x1e, 0x5, 0x0) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f00000008c0), 0x43) r4 = socket$kcm(0x1e, 0x4, 0x0) close(r2) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f00000008c0), 0x43) write$cgroup_subtree(r4, &(0x7f0000000040)=ANY=[], 0xfdef) 2m5.887888517s ago: executing program 6 (id=3404): r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000012c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2}, 0x94) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000100)=@hci={0x1f, 0x0, 0x5}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000040)="2703022b590241c90000002f1eafbcf706e105000000894f000f1102ee1680ca82973d2bd4b8bf4a8291a14b8a34f90186cee844000000080000000019b0fb0bba", 0x41}, {&(0x7f0000000440)="63f805d7649496db72959832930469edc7b7d050139bf7ada33cc9e37eed1153ecb716cdb8981cd819af0b33254465cc904b7b31789d65c0e0d3333ce2ef36205dd154e363bcadf8f2ea93f45503c6d9fd8dfe5a638cfeb9f79c930a4d18260e5a08ffd35ed8371cff78119319b2b62c7cd9378c73ae90c801681f55ef26cb0000000000000000", 0x87}, {&(0x7f0000000280)="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", 0x1a1}, {&(0x7f0000000180)="6fe4dd9eeba3271dc700b581440284", 0xfe69}], 0x4}, 0x0) 2m5.637824455s ago: executing program 6 (id=3410): r0 = gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000280)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {r0, 0xee01, 0xee00}}}], 0x20, 0x800}, 0x40800) 2m5.427576094s ago: executing program 6 (id=3412): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) socket$kcm(0x2, 0x5, 0x84) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x4004) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x140070, &(0x7f0000000340)={[], [{@subj_type={'subj_type', 0x3d, 'syz1\x00'}}]}) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0}, 0x0, 0x2, 0xfffffffe, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x1e, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0x1c, &(0x7f0000000300)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1000}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9, 0xfe00}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x8}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x6, 0x1, 0xb, 0x8, 0x9}, {0x4, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x8, 0x2, 0x0, r0}, {}, {0x46, 0x0, 0x0, 0x76}}], {{}, {0x6, 0x0, 0x7, 0x8}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg=0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2m5.075561601s ago: executing program 6 (id=3416): r0 = socket$kcm(0x10, 0x2, 0x4) r1 = getpid() r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910000000000000cb041818100100009500740000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0xe4}, 0x48) socket$key(0xf, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000002600)="89000000120081ae08060cdc030000007f1be3f74001000000e2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c00014006040400000400009bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x44) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x0}, 0x10) close(0x3) 1m49.794614394s ago: executing program 53 (id=3416): r0 = socket$kcm(0x10, 0x2, 0x4) r1 = getpid() r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910000000000000cb041818100100009500740000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0xe4}, 0x48) socket$key(0xf, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000002600)="89000000120081ae08060cdc030000007f1be3f74001000000e2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c00014006040400000400009bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x44) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x0}, 0x10) close(0x3) 1m39.50177167s ago: executing program 8 (id=3525): r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)}, 0x4) socket$kcm(0x10, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="b00000000001010400000000000000000a0000003c0001802c0001801400030000000000000000000000ffff0000000014000400ff0100000000"], 0xb0}}, 0x74800) socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x7f5a, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000040)={0x0, 0xf0, &(0x7f00000044c0)={&(0x7f0000000080)={0x60, 0x2, 0x6, 0x1f, 0x0, 0x0, {0x7}, [@IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x11}, @IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xc8f}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}]}, 0x60}}, 0x20004000) 1m39.075961181s ago: executing program 8 (id=3641): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x40810) recvmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1}, 0x10100) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xd18c9b35, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030036000b05d25a806c8c6f94f90224fc60100005000a000200053582c137153e37000c0980fc0b10000300", 0x33fe0}], 0x1}, 0x0) 1m38.170780417s ago: executing program 8 (id=3657): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x4004) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x8c, &(0x7f0000000040)='./file0\x00', 0x0, 0x140070, &(0x7f0000000340)={[], [{@subj_type={'subj_type', 0x3d, 'syz1\x00'}}]}) socket$nl_netfilter(0x10, 0x3, 0xc) 1m37.979976724s ago: executing program 8 (id=3658): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7feffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = socket$kcm(0x2d, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000340)={r0}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000240)={r1}) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x11, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000ffffffff000000000000000085000000a8000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000580)="d8001c00180081064e81f782db44fd56170d12a0b9b545c7", 0x18}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e3, &(0x7f0000000180)={r0, r4}) 1m37.26349014s ago: executing program 3 (id=3665): r0 = getpid() r1 = perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x80, 0x8, 0x1, 0x61, 0x80, 0x0, 0x1, 0xad8c, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x10000, 0x4, 0x101, 0x4, 0x8001, 0x3, 0x1, 0x0, 0x0, 0x0, 0x10000}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x1946}, 0x0, 0x201, 0x0, 0x7, 0x7fff, 0x7fffffff, 0xffff}, r0, 0xffffffffffffffff, r1, 0xa) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SIGNAL_INFO(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3f2, 0x400, 0x70bd26, 0x25dfdbfe, "", ["", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x800}, 0x8000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1}, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0xfc}}, 0x0) r5 = socket$kcm(0xa, 0x922000000003, 0x11) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3400000040000701fcffffff00000100017c0000040042800c0001800600060065580000100002800c0003800800"], 0x34}, 0x1, 0x0, 0x0, 0x4048011}, 0xc000) sendmsg$kcm(r5, &(0x7f0000000000)={&(0x7f00000007c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1, 0x5, 0x4}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000900)="f4", 0x1}], 0x1}, 0x2404081c) r7 = socket$nl_audit(0x10, 0x3, 0x9) r8 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="8011000042000701feffffff00000020017c000004"], 0x1180}, 0x1, 0x0, 0x0, 0xc000}, 0xc000) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x20, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x10001}}, &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xb269}, 0x94) r9 = getpid() r10 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, r9, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r10, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4280, 0x0, 0x40000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffffff}) socket$kcm(0x10, 0x2, 0x0) r11 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r11, 0x29, 0x24, &(0x7f0000000080), 0x4) r12 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r12, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)={0x10, 0x1405, 0xc7751771d8e9a79, 0x70bd2a, 0x25dfdbfc}, 0x10}, 0x1, 0x0, 0x0, 0x4008090}, 0x8000) sendmsg$kcm(r11, &(0x7f0000000000)={&(0x7f00000007c0)=@l2tp6={0xa, 0x0, 0x108, @private2={0xfc, 0x2, '\x00', 0x1}, 0x3, 0x1}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000100)="f400090006132c259653e0380000ad6f9124514325af8107003324c27994cc0a00"/44, 0x2c}, {&(0x7f0000000540)="a15327403cff0911ee8215b2eaa044946dccf1936f3a93fc4e22914def53e694146f4f39ee6e26", 0x27}], 0x2}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000140)=ANY=[], 0xfe41) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r13) perf_event_open(&(0x7f0000000480)={0xa, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xc}, 0x100000, 0x3, 0x0, 0x0, 0x2000000ffff, 0x656ee910, 0x2, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) 1m37.009910232s ago: executing program 3 (id=3669): r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$can_bcm(0x1d, 0x2, 0x2) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0xfd, 0x0, 0x4, 0x0, 0x4d31, 0x1115e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x10000000008, 0x830b}, 0x10001, 0x2, 0xfffffffe, 0x9, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async) r2 = getpid() (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r4) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r6 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r6, 0x29, 0x49, &(0x7f0000000000)=r5, 0x4) (async) r7 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x8}, 0xc02, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r3) (async, rerun: 32) perf_event_open(0x0, r2, 0xb, r7, 0x2) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b04, &(0x7f0000000000)={'wlan1\x00', @random="0200130300"}) (async) sendmsg$nl_generic(r0, 0x0, 0x4008094) (async) socket$kcm(0xa, 0x3, 0x87) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000011008108090f9becdb4cb92e264831371600000069bd6efb2502eaf60d002700020400bf050005001201", 0x2e}], 0x1}, 0x4040004) (async, rerun: 32) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x81200, 0x0) (rerun: 32) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) (async) ioctl$TUNATTACHFILTER(r9, 0x401054d5, 0x0) (async) close(0xffffffffffffffff) (async) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x7) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 1m36.800115847s ago: executing program 3 (id=3672): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000017000095"], &(0x7f0000000300)='syzkaller\x00'}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d2f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030025000b12d25a80648c2594f90224fc60100c034002bf0900053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x600300) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r0}, 0x10) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x28, 0x1, 0x0, 0x4, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x85b}, 0x5214, 0x32, 0x43a1bd76, 0x7, 0x9, 0x3, 0x2, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={@ifindex, 0x2f, 0x1, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x6, &(0x7f0000000300)={0x7fffffffefff}, 0x10) syz_clone(0x0, &(0x7f0000000840)="8b0773cda2f846a143357b193dceb6ec9c315bedd436e5cba50f4ffeebfcab792b324a9b9154eb394500e4ead1265ab777dbf909067a53b979c6ad6702fa6316573bfa6c387071147cd4401f1573f621980f98f972e92893f62736da09ae748501fd8337afcb45cfeb7c1350a071bddcb5c118a7ae0925bbd3c2beb9b5ac92582f95ee209669fc2642028cf22cef5f3c54ce373a893a4a4c411b8baa6ac2a9a952d1becbb49c", 0xa6, &(0x7f0000000240), 0x0, &(0x7f0000000a40)="2e395a3dfb67cf42f498e7138875d771f6c533a61e1648bba1652c13df3e57505c2c0cf3ca75f60742265de1a29275dc939efc6d5f697fc9562b24c381a9b179bb5bf8299f1fe02da503055b9e065760b4b93a633e5fc218c7d06d487508f2b5ed9494c68d9754ad07d852fe7b908025a5386304d8183ac19f28f0894cfe3aab9b662ae1ea519eaeb5e961f5336ed1f0aff91da8389ecc3d82") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x91, 0x0, 0x5, 0x400000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000300), 0x8}, 0x100, 0x0, 0x0, 0x7, 0x6, 0x0, 0x3, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000480)='GPL\x00'}, 0x94) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848290000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x80) 1m36.522900277s ago: executing program 3 (id=3674): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, @perf_config_ext={0xd, 0x9}, 0x104101, 0x4, 0x0, 0x1, 0x6, 0x4, 0x3}, 0x0, 0x1, 0xffffffffffffffff, 0x8) socket$kcm(0x10, 0x2, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8910, &(0x7f0000000080)) 1m36.312112899s ago: executing program 3 (id=3676): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x4004) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x140070, &(0x7f0000000340)={[], [{@subj_type={'subj_type', 0x3d, 'syz1\x00'}}]}) (fail_nth: 4) socket$nl_netfilter(0x10, 0x3, 0xc) 1m36.06153411s ago: executing program 3 (id=3678): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x6, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="180200000400000000000000000000008500000041000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000700000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) 1m22.72404175s ago: executing program 54 (id=3658): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7feffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = socket$kcm(0x2d, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000340)={r0}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000240)={r1}) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x11, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000ffffffff000000000000000085000000a8000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000580)="d8001c00180081064e81f782db44fd56170d12a0b9b545c7", 0x18}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e3, &(0x7f0000000180)={r0, r4}) 1m20.582733799s ago: executing program 55 (id=3678): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x6, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="180200000400000000000000000000008500000041000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000700000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) 41.795994302s ago: executing program 2 (id=4186): r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = perf_event_open$cgroup(&(0x7f0000000100)={0x3, 0x80, 0x0, 0x7f, 0xb, 0x2, 0x0, 0x8, 0x40001, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext={0x7fffffff, 0x5}, 0x100811, 0x0, 0x5, 0x5, 0x4e3, 0x77, 0x71, 0x0, 0xbabe, 0x0, 0x9}, 0xffffffffffffffff, 0xe, r0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)={0x24, 0x5e, 0xe25, 0x0, 0x3, "", [@typed={0x8, 0x77, 0x0, 0x0, @uid}, @nested={0xc, 0x146, 0x0, 0x1, [@typed={0x8, 0x1, 0x0, 0x0, @u32=0x4}]}]}, 0x24}], 0x1}, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x48, 0x180000000, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, r1, 0xa) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0x1946}, 0x0, 0x4, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r6 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r6, 0x6, 0x2, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r7, 0x29, 0x38, 0x0, 0x52) sendmsg$IPSET_CMD_SAVE(0xffffffffffffffff, 0x0, 0x20080010) socket$key(0xf, 0x3, 0x2) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0x10) sendmsg$NFT_MSG_GETCHAIN(r5, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x3c, 0x4, 0xa, 0x101, 0x0, 0x0, {0x0, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffb}, @NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'batadv_slave_1\x00'}]}, @NFTA_CHAIN_POLICY={0x8}]}, 0x3c}}, 0x4010) r9 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(r9, 0x10e, 0x4, 0x0, 0x0) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01040000000000000000010000000900010073797a30000000002c000000030a01020000000000000000010000000900010073797a30000000000900030073797a310000000080010000060a01040000000000000000010000000900020073797a310000000038000480340001800c00010062697477697365002400028008000340000000040800024000000000080006400000000008000140000000000900010073797a30"], 0x1f4}}, 0x0) 41.587893934s ago: executing program 2 (id=4189): socket$nl_generic(0x10, 0x3, 0x10) r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x103b85, 0x0, 0x0, 0x8, 0x7fff, 0x7ffffffc}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e50200"/32], &(0x7f0000000280)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xf}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)='syzkaller\x00', 0x5, 0xfd90, &(0x7f0000000300)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f3, 0x10, &(0x7f0000000080), 0xfffffffffffffc79}, 0x48) 40.742364452s ago: executing program 2 (id=4192): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7feffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7feffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$key(0xf, 0x3, 0x2) getpid() bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xf}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) (async) socket$kcm(0x11, 0x200000000000002, 0x300) r0 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r0, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @loopback={0x0, 0xac14140c}, 0x4}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000140)="8bcd", 0x2}], 0x1, 0x0, 0x0, 0x900}, 0x60) 40.491982963s ago: executing program 2 (id=4199): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1a, 0xe, &(0x7f0000000b80)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="22000000040000001000"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r0, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000643200007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007041af64090aac40d6600000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b705000008"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) 40.367446772s ago: executing program 2 (id=4202): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x4004) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0xf6ff, &(0x7f0000000040)='./file0\x00', 0x0, 0x140070, &(0x7f0000000340)={[], [{@subj_type={'subj_type', 0x3d, 'syz1\x00'}}]}) socket$nl_netfilter(0x10, 0x3, 0xc) 40.184626033s ago: executing program 2 (id=4204): socket$kcm(0x11, 0x200000000000002, 0x300) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x8}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000000fe80)={0x0, 0x0, &(0x7f000000fe40)={&(0x7f0000000540)=ANY=[@ANYBLOB="ac0000002100090027bd7000fbdbdf25200100000000000000000000000000017f0000010000000000000000000000004e2200014e2200060000a080", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="b16b6e00000000000a0010008000001d240000a050"], 0xac}, 0x1, 0x0, 0x0, 0x882}, 0x4000000) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x2000, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0x2, 0x1, 0x84) socket$kcm(0x2, 0x1, 0x84) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000380)={&(0x7f0000000040)="b64b6779e728a585fc6d831c9c111ee3bf867c7fa20663508d961b5b0bc1d4eded804b", 0x0, 0x0, 0x0}, 0x38) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x20, 0x140f, 0x10, 0x70bd27, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) r4 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r4, &(0x7f0000000080)={&(0x7f0000000140)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0x0) 33.832154433s ago: executing program 1 (id=4245): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x100}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01063d0000000000000028000000280000000200000000000000000000030000020000000200000000000000010000000000000104"], 0x0, 0x42}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd63"], 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0xff00, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 33.392475212s ago: executing program 1 (id=4246): perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0xc0992, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x8, 0x3}, 0x0, 0x0, 0x7, 0x5, 0x402, 0x7ffffffc, 0x404, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x1, 0x0, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x2, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x100810, 0x0, 0x100, 0x3}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) (async) r0 = gettid() perf_event_open(0x0, r0, 0x9, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r1, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000001c80)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4400000001090300000000000000200007000008300002002c00018014000300ff01000000000000000000000000000114000900000034bf7117bed6d2f5fffe880000000000000000000000000001"], 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x4) (async) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r2, 0xf, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="1aff00", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES64=0x0], 0x20) r3 = perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000090000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYBLOB='\x00'/15], 0x50) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) (async) close(0xffffffffffffffff) (async) sendmsg$NFT_MSG_GETOBJ(r1, 0x0, 0x40801) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3d) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) socketpair(0x1, 0x800, 0x40000, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) socket$kcm(0xa, 0x2, 0x73) r6 = perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x3ff, 0x104000, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x2, 0xa}, 0x100000, 0x0, 0x0, 0x4, 0x2, 0x7fffffff, 0x0, 0x0, 0x1}, 0x0, 0x5, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8001c00180081064e81f782db44b9b545c7910006007c09e8fe55a10a0017", 0x1f}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="d8000000210081044e81f7d28344b904020000", 0x2}], 0x1}, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0700000004000000000900000100000028"], 0x50) 32.937152548s ago: executing program 1 (id=4247): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r2, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r2, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000840)=@newqdisc={0x40, 0x24, 0xf0b, 0x70bd2e, 0x0, {0x0, 0x0, 0x12, r3, {}, {0xffff, 0xffff}, {0x2}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x10, 0x2, [@TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME={0x5, 0x8, 0xfffffffffffffc08}]}}]}, 0x40}, 0x1, 0x0, 0x0, 0x8004001}, 0x0) fstat(r0, &(0x7f0000000180)) r4 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={0x0, 0xb}, 0xbafa, 0xff, 0x1, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x23}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000005c0)='kfree_skb\x00', r6}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) 32.530805295s ago: executing program 1 (id=4251): r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f00000007c0)=@l2tp6={0xa, 0x0, 0x108, @remote, 0x3, 0x1}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000100)="f400090006132c259653e0380000ad6f9124514325af8107003324c27994cc", 0x1f}], 0x1}, 0x0) 32.333786548s ago: executing program 1 (id=4253): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, 0x0, 0x4004) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x140070, &(0x7f0000000340)={[], [{@subj_type={'subj_type', 0x3d, 'syz1\x00'}}]}) (fail_nth: 8) socket$nl_netfilter(0x10, 0x3, 0xc) 31.959242018s ago: executing program 1 (id=4254): socket$nl_generic(0x10, 0x3, 0x10) r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x103b85, 0x0, 0x0, 0x8, 0x7fff, 0x7ffffffc}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xf}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000080)="5c00000011006bec9e3be35c6e17aa31076b876c0d000000ba090000160af3653c001ac00400020208000200030001002c000000eab556a705251e618294ff0051f60a84c9f4d4938037e786a6d000030000000000fe0fffffc6c953", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 23.13260823s ago: executing program 56 (id=4204): socket$kcm(0x11, 0x200000000000002, 0x300) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x8}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000000fe80)={0x0, 0x0, &(0x7f000000fe40)={&(0x7f0000000540)=ANY=[@ANYBLOB="ac0000002100090027bd7000fbdbdf25200100000000000000000000000000017f0000010000000000000000000000004e2200014e2200060000a080", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="b16b6e00000000000a0010008000001d240000a050"], 0xac}, 0x1, 0x0, 0x0, 0x882}, 0x4000000) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x2000, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0x2, 0x1, 0x84) socket$kcm(0x2, 0x1, 0x84) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000380)={&(0x7f0000000040)="b64b6779e728a585fc6d831c9c111ee3bf867c7fa20663508d961b5b0bc1d4eded804b", 0x0, 0x0, 0x0}, 0x38) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x20, 0x140f, 0x10, 0x70bd27, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) r4 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r4, &(0x7f0000000080)={&(0x7f0000000140)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0x0) 16.813569586s ago: executing program 57 (id=4254): socket$nl_generic(0x10, 0x3, 0x10) r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x103b85, 0x0, 0x0, 0x8, 0x7fff, 0x7ffffffc}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xf}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000080)="5c00000011006bec9e3be35c6e17aa31076b876c0d000000ba090000160af3653c001ac00400020208000200030001002c000000eab556a705251e618294ff0051f60a84c9f4d4938037e786a6d000030000000000fe0fffffc6c953", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 4.891887782s ago: executing program 0 (id=4330): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x74, 0xd, 0x0, 0x0, 0x0, 0x2, 0x201, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeffffffd, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x9, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r0, &(0x7f0000000600)={&(0x7f00000001c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000640)="80", 0x26892}], 0x1}, 0xfc) (fail_nth: 29) 4.432294314s ago: executing program 4 (id=4405): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000004000)=ANY=[@ANYBLOB="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"], &(0x7f00000003c0)='syzkaller\x00'}, 0x51) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000a40)={0xa4, 0x0, 0x2, 0x401, 0x0, 0x0, {0xa}, [@CTA_EXPECT_MASK={0x3c, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}]}, @CTA_EXPECT_TUPLE={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASTER={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}]}]}, 0xa4}}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x35451d7003000c0b, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$TUNSETOWNER(r5, 0x400454cc, 0x0) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="6c0000000b060108000000000000000002000002050001000700000044000780"], 0x6c}, 0x1, 0x0, 0x0, 0x48}, 0x4800) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000200)=ANY=[@ANYBLOB="2000000076001f03000000000800000008000100ffffffff08000a"], 0x20}], 0x1}, 0x0) ioctl$TUNSETGROUP(r4, 0x400454ce, 0xee01) close(0x3) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000780)='blkio.bfq.io_queued_recursive\x00', 0x275a, 0x0) socket$kcm(0x29, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x2a, &(0x7f0000000100)=r7, 0x4) recvmsg$unix(r1, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x10002) write$cgroup_int(r2, &(0x7f0000000480)=0x3, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000, &(0x7f0000000640)="b9ff03076844268cb89e14f088a847e08906200060000021000aac141440e0", 0x0, 0x11, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x48) 4.336772613s ago: executing program 5 (id=4409): r0 = socket$kcm(0x11, 0x3, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000012c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2}, 0x94) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000100)=@hci={0x1f, 0x0, 0x5}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000040)="2703022b590241c90000002f1eafbcf706e105000000894f000f1102ee1680ca82973d2bd4b8bf4a8291a14b8a34f90186cee844000000080000000019b0fb0bba", 0x41}, {&(0x7f0000000440)="63f805d7649496db72959832930469edc7b7d050139bf7ada33cc9e37eed1153ecb716cdb8981cd819af0b33254465cc904b7b31789d65c0e0d3333ce2ef36205dd154e363bcadf8f2ea93f45503c6d9fd8dfe5a638cfeb9f79c930a4d18260e5a08ffd35ed8371cff78119319b2b62c7cd9378c73ae90c801681f55ef26cb0000000000000000", 0x87}, {&(0x7f0000000280)="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", 0x1a1}, {&(0x7f0000000180)="6fe4dd9eeba3271d", 0x8}], 0x4}, 0x0) 4.252780094s ago: executing program 0 (id=4410): socket$kcm(0x11, 0x20000000000000a, 0x300) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000080000000000000000000080850000000f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000725e850000000100000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$key(0xf, 0x3, 0x2) socket$kcm(0x2, 0x5, 0x84) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x12, 0x1, 0x8, 0x2}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x94) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x0, 0xe, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee68886dd", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 4.252185647s ago: executing program 9 (id=4411): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x4000005) socketpair(0xb, 0x2, 0x99e1, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000380)='\x00\x00\x00\x00') perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x5, 0x4, 0x2c, 0x0, 0x0, 0x26e, 0x1000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10d1, 0x4, @perf_config_ext={0x454, 0x9}, 0x600, 0x100400001, 0x1, 0x5, 0x47a, 0x8, 0x3, 0x0, 0x9, 0x0, 0xffffffffffff7fff}, 0x0, 0x4, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) close(r3) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0xf, 0x3, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r4, 0x84, 0xb, &(0x7f0000000040), 0x2) sendmsg$inet(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="92", 0x1}], 0x1}, 0x0) recvmsg$kcm(r4, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x14001) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x7}}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELCHAIN={0x2c, 0x5, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x2000}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x74}}, 0x8050) 4.221798076s ago: executing program 7 (id=4412): r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x0, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1a, 0xe, &(0x7f0000000b80)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="22000000040000001000"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r1}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x10, &(0x7f0000000100)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) 4.185207863s ago: executing program 5 (id=4413): socket$kcm(0x11, 0x200000000000002, 0x300) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x8}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000000fe80)={0x0, 0x0, &(0x7f000000fe40)={&(0x7f0000000540)=ANY=[@ANYBLOB="ac0000002100090027bd7000fbdbdf25200100000000000000000000000000017f0000010000000000000000000000004e2200014e2200060000a080", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="b16b6e00000000000a0010008000001d240000a050"], 0xac}, 0x1, 0x0, 0x0, 0x882}, 0x4000000) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x2000, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0x2, 0x1, 0x84) socket$kcm(0x2, 0x1, 0x84) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000380)={&(0x7f0000000040)="b64b6779e728a585fc6d831c9c111ee3bf867c7fa20663508d961b5b0bc1d4eded804b84c8ee0b", 0x0, 0x0, 0x0}, 0x38) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, 0x0, 0x4000000) r4 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r4, &(0x7f0000000080)={&(0x7f0000000140)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, 0x0, 0x0, &(0x7f0000000100)}, 0x0) 3.977357771s ago: executing program 7 (id=4414): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) 1.216317315s ago: executing program 9 (id=4415): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101, 0x7}, 0x114905, 0x4, 0x9, 0x9, 0x5}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') 1.143456577s ago: executing program 4 (id=4416): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x80002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x40) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a74000000060a0b0400000000000000000200000048000480440001800a0001006d61746368000000340002801800030003000300a7906e8f58c2052fade1bc2c62cdeb7508000240000000000d00010064657667726f7570000000000900010073797a30000000000900020073797a32"], 0x9c}}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4d32, 0xa0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x400000000008}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x80, 0x81}, 0x0, 0x6, 0xffffffffffffffff, 0xa) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000400)=ANY=[@ANYBLOB="1400000010000100f7000000000000000500000a44000000090a010400006000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc08000340000000144c0000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a3100000000200003801c0000800c00018006000100d10300000c000440000000000000000114000000110001"], 0xb8}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) 1.142441819s ago: executing program 7 (id=4417): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x9}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT_BATCH(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)={0x14, 0x3, 0x3, 0x101}, 0x14}, 0x1, 0x0, 0x0, 0x24040080}, 0x8000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000300009116144f782db44b904021d080005000000e8fe55a1180015000600142603600e120900210000000401a8001600a400014006", 0x39}], 0x1}, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r4 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r4, 0x6, 0xe, &(0x7f0000000600), 0x4) socket$nl_route(0x10, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x40, 0x0, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8001, 0xc}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r5, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63f580fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0xfe, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0xf5, 0x7}, 0x10481a, 0x0, 0x0, 0x6, 0x4, 0x0, 0xf792, 0x0, 0xffffffff, 0x0, 0x2000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r7, &(0x7f00000004c0)=ANY=[], 0xfdef) 1.092384944s ago: executing program 5 (id=4418): socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a3f000000a3f500950004000000010045"], 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)) (fail_nth: 2) 1.051500172s ago: executing program 0 (id=4419): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x1948}, 0x100, 0x0, 0x0, 0x8, 0x9, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = gettid() r1 = perf_event_open(0x0, r0, 0x1, 0xffffffffffffffff, 0x8) socket$kcm(0xa, 0x1, 0x106) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x7f) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) getpid() sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20044080) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0xc000) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x9, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0x14, 0x0, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r3, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x2404c854) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000780)={0x0, 0xff1f, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="200000002400070128bd70000000e6ff027c00000c0001"], 0x58}, 0x1, 0x0, 0x0, 0x4048011}, 0x8010) 837.450968ms ago: executing program 9 (id=4420): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff000000000200000009000100"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000b40)={{0x14}, [@NFT_MSG_NEWSET={0x3c, 0x12, 0xa, 0x9, 0x0, 0x0, {0x2}, [@NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}], {0x14}}, 0x64}}, 0x0) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000880)=ANY=[@ANYBLOB="28000000150a01020000000000000000000000000900010073797a30"], 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x24040808) 722.983368ms ago: executing program 9 (id=4421): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={{0x14, 0x10, 0x1, 0xffffffff}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWRULE={0x54, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @last={{0x9}, @val={0x4}}}, {0x14, 0x1, 0x0, 0x1, @reject={{0xb}, @val={0x4}}}]}]}], {0x14}}, 0xc8}}, 0x0) 648.395248ms ago: executing program 5 (id=4422): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100003020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x18000000000002a0, 0x11, 0x0, &(0x7f0000000240)="b9e203076008008cb89e08f00800511d08", 0x0, 0xfffffdff, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 647.977671ms ago: executing program 9 (id=4423): r0 = socket$kcm(0x11, 0x3, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000012c0)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000ffffffff7a0af0fff8ffff5979a4f0ff00000000b7060000ffffffff2d6405000000000065040400014741001404000001007d60b7030000000000006a0a00fe40000900850000001f000000b70000000004000095000000000000006623848adf1dc9a764ab51a064e0ff0c9b27a26293fddf0180000071ff31f1622271d5518193e09483c5a020c334f8c76334d8ce8303b01ddaa52e8756ad60a07d6f27c125e16d02409819180179714ed0a6e1f0f755d8583da60f27c162dbba0706002ac9170f50f2568836077b7f711a18ebf608d87b885297b6a79819782748b376358c33c9f53bfd989b1ca58949a54d5827df14feecea46408a05d572077f1252fbb72c3d099c501bc4ded6fca17a3447222c95edb47b77aafa63b9dd5fa5c53e9c37251709f1ff7f0000f07bf7f53ce129a9ecd3b4dd15100f2b450f98526a0d8cac7c97fc2f64015306a1bd7e43fe1ca8345710fb6379b4c53cf55eefb4c0974486a8d25a363adbd83b49e13fbd1777b27020bd9b8cff3f48c9411670c34f23ab8caf7851b290feb3045a1b622f20c4383a0280f040de7667f8b1d08428353b1c358ebe73af41e5b5b924275cb1749289b44e9728e7a73f148ac8206afe120c1437490d99000000110000fdffffffffffffffaf580278e1342aabd1b623f6c4f128858e4eb6b42f2173184c2b99b645f6ec0e14e5d7c95a0008000000f30f6c0000000000ff0000b8f5001a1d2a34dc0973ec302bc23211d3e3b6e6dad65a51e5497a3419cece48c38126247b27113ad4c7915c8f82c333a7b350802f0311807010d1ed50c18411aa6900daccc02f4ba4b078f07e41f781eee222c7d071d5a94d82ca9a0846c1af59cee16639b4970f8f0a82c6a712fd5722d637d406160ffaffffffb4e0bde6749aa52c408b74251914c5ff01000000000000b69ebcd8eee623e51dbb1f1b548c91a6825c0686fdc16be1cbb72c217fda18bd746253ca66093daf35923300b600000013887ad6d2d440fedce51a3aa57b00ac376e0a4649a8a84e1d293a6b109c5e59b366bca5cc3d936c53d4a48c05099e6fc36d5aa23bff8cce0600fcff00000300a568a8532623d12b40b50ac26f2e8255470a04bfbe7acb581b90991d965a01d1f84cb6b973558e1e3f8118c77ccf0b3c6eb6443870004da10c75723b65f83769ad1f0e4ef6b9ef1cec23264fd8fdac6264af1cb467020bdc12b797b6c156c439105829d2ae1c45f7cfa40df68fd36a03353a55e68ec7c01bd5a2028a8fc107007f3deb1f200abe1f753754678dae8b4e3ba3d086d4b95dfc5817e3dafae2d38b522f942cc750399d90296171fdb1e05882f8a4b8fbd219ccac3a895828b4f22b6527ce31ceb02b7b2b44925129677b7b3d2f8e7792c7827862eae80134552f0b076b168394f8417f25cc82ae04007193cbe69de8bf35e4bebd15412426b2e20ab1f05fc44ae9ae094c1b81d3ef947692b44d2afb09c7498d357836f03e8a7c392e535694a3ead2de11e6b1781e2a018c0ada7bc7f0eb2d678f23c07ac341fda2e563ee95085742f5fee9f95f4741b226e428d20b00bc140000e4b2f5efd0a0b1ceba000830ba8634b5aa26bdbe91614e92fae3c7349531df9bf4c01ebf5d8eb7d53e5f30647661623fbdb3f60033fc32f68ea86a2df1e76fe27dfdff1cf9194849c4cc0da9533e5983693e526a7dc0d8728f3b573ca4427bdb44df9341e9b8050e896598a156c935c800436a312e7ae3c011e46851ac599f0427729ab9c55ae0ab4c0000000000000000000000000000c87bcc2ac5aed9247b51d92e0993af4beaf1f3f47dcdfab9165f98155d93e383d6b85158b54675c1585037508c1e9461a1c3d1a6e2402045cae150a7016f1a90716eebbdf6afc4414d900be0bdf19f4a273f44f4357380b4387f1c8b104f0e406b2f04e5ed88631be6411f9927fe9f83412b7c5a676ceec8b454ebf6481c98e86b6933a02daea0b4ec0be5b3d916bd70208b4588626c277648475002e2c62681bd07331422a6e47bbd40857d52c4894944fae5c500000000000000ff00000000de784314b8fd419216b48d0f353c11ae185749fa9ac7dfa16bc5c23a23f74b17a7f1b2d799480f33faa3537a910d6ca02f48b0e69beb1119f106ea59195dbc72e17a5dc8c3d131d82f067e29dc39665dff39fb6347b374aaaf6e65efde3fc6202bf29ccfcb08caf18d668a462493aa82e76affba9c9af31d1c23237aa6eccfadfaf794bb1004c07b21ac6ed77718098b2f722bd05fea3561b86b2838a8de5b4f91d6aba95dc9f4464a024be4d0d8d04f5023e7e19e503624d39a43c7b310de519b4073f300022fee47803989b7e916254e0fb9e1c8b07d8a4b8b692a75a32e6ed2caeaa7c258c47fe6143cd9e90b801eff78cd4e402374e0e4ca07b7f17254e3d2f0a2a1bac6fde8a15e3ef3588065524d41966fb3915e804c53201efee751ec294584d23d9008bdf046f55c030ab941a0b87234a30900000000000068133c76770d5e7dabcc48d47685404cc540535ed70df75c24660d85f9c9a245185c7da217d1c3743db85db67b9b8a8f00af02367429f6f0b53c169c4356751bf68745dbde055e1722ae256ae53ae637a1431855d16dfa91d82a021a4b2dbb50bf6d59fdd0c9bc84cd7d544de2523b6ce8aaeb94bfba75079f7455204ccca02bd389d8409b2effe9b88e301ac4fe28752386a0678a3f54b2bdf56f927ddd6b0ac98b2b505f668597455ada51ba95ab852b49373a11ff31dcd82474b51498f65e0601bcdd23acb4c01bcd2f3e1ad378d14c07d923087d3518369710b70ffb0b523dc4f00f275c381fe1c091e478b04d5e4a9f75b4072acb005a83c25625ab7a351a68977177e27a1bf11211"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2}, 0x94) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000100)=@hci={0x1f, 0x0, 0x5}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000040)="2703022b590241c90000002f1eafbcf706e105000000894f000f1102ee1680ca82973d2bd4b8bf4a8291a14b8a34f90186cee844000000080000000019b0fb0bba", 0x41}, {&(0x7f0000000440)="63f805d7649496db72959832930469edc7b7d050139bf7ada33cc9e37eed1153ecb716cdb8981cd819af0b33254465cc904b7b31789d65c0e0d3333ce2ef36205dd154e363bcadf8f2ea93f45503c6d9fd8dfe5a638cfeb9f79c930a4d18260e5a08ffd35ed8371cff78119319b2b62c7cd9378c73ae90c801681f55ef26cb0000000000000000", 0x87}, {&(0x7f0000000280)="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", 0x1a1}, {&(0x7f0000000180)="6fe4dd9eeba3271d", 0x8}], 0x4}, 0x0) 644.616287ms ago: executing program 4 (id=4424): socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x4, @perf_bp={0x0, 0xf}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000280)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0xa, &(0x7f0000000040)=@framed={{0x18, 0x7, 0x0, 0x0, 0x500}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @exit]}, &(0x7f0000000000)='GPL\x00'}, 0x94) socket$kcm(0x10, 0x400000002, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a3c000000090a010400000000000000000a0000040900010073797a3100000000080005400000000209000200737997310000000008000a40fffffffc14000000110001"], 0x64}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000000) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000c80)={0x2c, 0xa, 0xa, 0x5, 0x0, 0x0, {0xa, 0x0, 0x9}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24048014}, 0x4000) 633.678497ms ago: executing program 7 (id=4425): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) socket$kcm(0x2b, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x94) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0xec2, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x4, 0x2, 0xfffff271, 0x9, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x28, 0x34, 0x9, 0x0, 0x0, {0x1}, [@nested={0xc, 0x1, 0x0, 0x1, [@typed={0x6, 0x0, 0x0, 0x0, @str='\x05G'}]}, @typed={0x8, 0x2, 0x0, 0x0, @u32}]}, 0x28}}, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8905, &(0x7f0000002280)={'wlan0\x00', @random="2b0100004ec6"}) 554.25965ms ago: executing program 0 (id=4426): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000001700"], &(0x7f0000000300)='syzkaller\x00'}, 0x94) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030025000b12d25a80648c2594f90224fc60100c034002bf0900053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x600300) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={@ifindex, 0x2f, 0x1, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) syz_clone(0x0, &(0x7f0000000840)="8b0773cda2f846a143357b193dceb6ec9c315bedd436e5cba50f4ffeebfcab792b324a9b9154eb394500e4ead1265ab777dbf909067a53b979c6ad6702fa6316573bfa6c387071147cd4401f1573f621980f98f972e92893f62736da09ae748501fd8337afcb45cfeb7c1350a071bddcb5c118a7ae0925bbd3c2beb9b5ac92582f95ee209669fc2642028cf22cef5f3c54ce373a893a4a4c411b8baa6ac2a9a952d1becbb49c", 0xa6, &(0x7f0000000240), 0x0, &(0x7f0000000a40)="2e395a3dfb67cf42f498e7138875d771f6c533a61e1648bba1652c13df3e57505c2c0cf3ca75f60742265de1a29275dc939efc6d5f697fc9562b24c381a9b179bb5bf8299f1fe02da503055b9e065760b4b93a633e5fc218c7d06d487508f2b5ed9494c68d9754ad07d852fe7b908025a5386304d8183ac19f28f0894cfe3aab9b662ae1ea519eaeb5e961f5336ed1f0aff91da8389ecc3d82") perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x91, 0x0, 0x5, 0x400000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000300), 0x8}, 0x100, 0x0, 0x0, 0x7, 0x6, 0x0, 0x3, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0x4, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000480)='GPL\x00'}, 0x94) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848290000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x80) 504.53466ms ago: executing program 9 (id=4427): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x4000005) socketpair(0xb, 0x2, 0x99e1, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000380)='\x00\x00\x00\x00') perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x5, 0x4, 0x2c, 0x0, 0x0, 0x26e, 0x1000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x10d1, 0x4, @perf_config_ext={0x454, 0x9}, 0x600, 0x100400001, 0x1, 0x5, 0x47a, 0x8, 0x3, 0x0, 0x9, 0x0, 0xffffffffffff7fff}, 0x0, 0x4, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) close(r3) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0xf, 0x3, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r4, 0x84, 0xb, &(0x7f0000000040), 0x2) sendmsg$inet(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000900)=[{&(0x7f00000001c0)="92", 0x1}], 0x1}, 0x0) recvmsg$kcm(r4, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x14001) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x7}}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELCHAIN={0x2c, 0x5, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x2000}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x74}}, 0x8050) 503.86148ms ago: executing program 5 (id=4428): socket$kcm(0x11, 0x200000000000002, 0x300) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x8}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000000fe80)={0x0, 0x0, &(0x7f000000fe40)={&(0x7f0000000540)=ANY=[@ANYBLOB="ac0000002100090027bd7000fbdbdf25200100000000000000000000000000017f0000010000000000000000000000004e2200014e2200060000a080", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="b16b6e00000000000a0010008000001d240000a050"], 0xac}, 0x1, 0x0, 0x0, 0x882}, 0x4000000) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r1) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x2000, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0x2, 0x1, 0x84) socket$kcm(0x2, 0x1, 0x84) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000380)={&(0x7f0000000040)="b64b6779e728a585fc6d831c9c111ee3bf867c7fa20663508d961b5b0bc1d4eded804b84c8ee0b", 0x0, 0x0, 0x0}, 0x38) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, 0x0, 0x4000000) r4 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r4, &(0x7f0000000080)={&(0x7f0000000140)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, 0x0, 0x0, &(0x7f0000000100)}, 0x0) 494.167682ms ago: executing program 4 (id=4429): bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000200)={0x8}, 0x8) syz_clone(0x800000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000080)) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001100)=ANY=[@ANYBLOB="12000000040000"], 0x50) r1 = bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r3, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r3, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000002700)=@newqdisc={0x3c, 0x24, 0xf0b, 0x70bd2c, 0x0, {0x0, 0x0, 0x12, r4, {}, {0xffff, 0xffff}, {0x2, 0xc}}, [@qdisc_kind_options=@q_red={{0x8}, {0x10, 0x2, [@TCA_RED_FLAGS={0xc, 0x4, {0xf, 0xc}}]}}]}, 0x3c}}, 0x4000010) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000001080)={r1, 0xffffffffffffffff, 0x4}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0xb770b3f6ef8f772, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x73, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x100, 0x0, 0x0, 0x8, 0x1, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830b}, 0x0, 0x2, 0xfffffffe, 0x0, 0x51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000080000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x4, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0xfffffffe}, [@call={0x85, 0x0, 0x0, 0x28}, @call={0x85, 0x0, 0x0, 0xa0}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfcc0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x0, 0x7, 0x0, &(0x7f0000000900)="e02742e8680d85", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="02000000040000000800000001000000"], 0x50) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x28, 0x2c, 0x107, 0x70bd2b, 0x25dfdbff, {0x6, 0x7c}, [@nested={0x8, 0x1, 0x0, 0x1, [@nested={0x4, 0xdd}]}, @nested={0x9, 0x3, 0x0, 0x1, [@generic="f9f91f547c"]}]}, 0x28}}, 0xc010) 368.418131ms ago: executing program 7 (id=4430): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101, 0x7}, 0x114905, 0x4, 0x9, 0x9, 0x5}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff274, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') 171.275474ms ago: executing program 4 (id=4431): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a3000000000090003007379"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000b40)={{0x14}, [@NFT_MSG_NEWSET={0x3c, 0x12, 0xa, 0x9, 0x0, 0x0, {0x2}, [@NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}], {0x14}}, 0x64}}, 0x0) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000880)=ANY=[@ANYBLOB="28000000150a01020000000000000000000000000900010073797a30"], 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x24040808) 121.964109ms ago: executing program 0 (id=4432): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x11, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000ffffffff000000000000000085000000a8000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000000000000850000006d00000095"], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x4, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x565}, {{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x6}, {}, {0x85, 0x0, 0x0, 0x44}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0xc4}}}, &(0x7f0000000980)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0xfffffffffffffc5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78a152b7, 0x0, 0x0, 0x2}, 0x48) 112.012957ms ago: executing program 5 (id=4433): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x2000002, 0xe, 0x20, &(0x7f0000000200)="df33c9f7b9a60000000000000000", 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{0x1}, &(0x7f0000000140), &(0x7f0000000300)=r0}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)}, 0x1f00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc4, 0x0, @perf_bp={&(0x7f00000001c0), 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0xf5ff}, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r3, 0x0, 0x2d, 0x0, 0x88) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x2000001946}, 0x100, 0x0, 0x0, 0x8, 0x1, 0x7fffffff, 0x4, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x4, 0x830d}, 0x8080, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, r5, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000b000000000000001ca39636994b1b4737c741d7505076b5291d8e35224cd5aca0c1e447acfbdf02be08000000000045b0f364f928d098c50ed507031c648c4ed71dfdce530f5987a363e6afb8cc1bdf73d5bf3864b24b3381d0d186d279f256984e3ea2efedf44c1fb890917fab0000000000000010c6067632a8ed029fc22758f6ea3b80339f2552dbf79833fc358a62d5fb29b44c77f2aa3da20360667d4066046970ba42aba0791d9a5e22b5f2bc010711a07006b45ec6473fd7f881205e8b1513d47deb903742caa0a5f46613f4a58798f772b2e975d72da8e3"], 0xe) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1b, 0x10, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa10000000000000701000000feffffbfa40000000000000704000000feffffb702000008000000182300005c38f9166d119d783f0bb4f859ae6b6ed635fbd630573cb1a997180b1a209aa3002d290f753723a36a0e1ea9c19d4c40b6df1c335e16f8cb1d7e2ed5230b0ccda51b6c92a86eab523da5e4333182dd3f115eae4cc9d2d71a4c276815035af496e74eb5d6301111b468eaad96eebdde71666b88289420f1d030d8c0b541ff9bac19ae062a07635b027ac2eb", @ANYRES8=r3, @ANYBLOB="d700010000000000b70100000800000085000000c500000095ff7f0000000000"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r4) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000180)={0x3, &(0x7f00000000c0)=[{0x8, 0x5, 0x49, 0x2c}, {0x9, 0x8, 0x6, 0x2}, {0x1750, 0xd0, 0x0, 0x80000001}]}) sendmsg$inet(r2, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x48000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1e, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d1000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], &(0x7f0000000200)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41100, 0x22, '\x00', 0x0, @sk_lookup=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0xff}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$kcm(0x2, 0x3, 0x106) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, 0x0, 0x0) 58.568523ms ago: executing program 7 (id=4434): r0 = socket$kcm(0x10, 0x2, 0x4) close(r0) socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="6000000068007f089e", 0x9}, {&(0x7f0000000640)="68cabf2dfb58fc021d6b689866f05d48000b00000000000000258f2e6400b8f9e6aaeb88bea123dc2c6726e89b0ce24f89a565ee52dcd729cd3909bc510293bca0b646a3ce904f6e6b788b3204c233e60ddc36024aa400", 0x57}], 0x2}, 0x0) (fail_nth: 2) 50.478116ms ago: executing program 4 (id=4435): openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.stat\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) unlink(0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000200)=0xef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001080)=ANY=[@ANYBLOB="140000001800010324bd70c6695752af3d"], 0x14}}, 0x0) socket$kcm(0x2, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0200000004000000080000000c00000000000000", @ANYRES32, @ANYBLOB="41b9d561371adf18c88fbb00"/21, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r2 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x1403, 0x1, 0x70bd28, 0x25dfdbfc}, 0x10}, 0xfe, 0x0, 0x0, 0x4000}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfa6f}, 0x114815, 0x4, 0x20, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) sendmsg$nl_generic(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001800290200000000ffdbdf250a00000008000000040000000400088008001e0067"], 0x28}}, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0x400c78, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r6 = getpid() perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x2085, 0x0, 0x0, 0x8, 0x7fff, 0x7ffffffc}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="062c363329c1d3506a546d60e13b72350dee80dd2975665dc49e2f372a3b512ee2cdd9871c12c793895dd0fdf69bdfea8cee0691d09344749ff0213a1068e3bbe471ceb9ee53d70af24712f786bafbda6a45ac590a1166d05a1d3b362ccc55ddf8d0f303463f15ec22895230554ac8ced108559a52251d997754fde2282b4b38263f8818fdff001353a93d4ef7445b53b09890a9b18434ae24c39f52e616643af451443e3386b7a90644c289adcada495e022b1f882215c41a207dd14310c854b7264745f8830a13915731fcc526732247dbeb54d96243712a81875546e27db2bf39a8a550ec926a45f5630a9882411d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0xffffffff}, 0x8, 0x10, &(0x7f0000000340), 0x10}, 0x94) 0s ago: executing program 0 (id=4436): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x43451) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000730000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000000)='syzkaller\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='contention_begin\x00', r1}, 0x18) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x10c1c, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ac0)={0x6, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1005, 0x0, 0x0, 0x0, 0xa8000}, [@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}, {0x85, 0x0, 0x0, 0xc8}}]}, &(0x7f00000005c0)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x8}, 0x94) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x4000010) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000000)='percpu_alloc_percpu\x00'}, 0x18) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd42"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0xb68, 0x4, &(0x7f0000000000)='%', 0x0, 0xd01, 0x80040000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110c230000) r4 = socket$key(0xf, 0x3, 0x2) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/user\x00') ioctl$TUNSETIFF(r5, 0xb701, 0x0) sendmsg$key(r4, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="02180000100000000000000000000000030006000000000002004e23000000000000000000000000080012000000000000000000000000001700000000000000000000000000000002000000000000000000000000000000fe800000000000000000000000000000030005000000000002"], 0x80}}, 0x2) ioctl$TUNSETOFFLOAD(r2, 0x40107446, 0xf0ff1f00000000) kernel console output (not intermixed with test programs): bytes leftover after parsing attributes in process `syz.3.3505'. [ 678.122078][T16561] netlink: 'syz.9.3506': attribute type 3 has an invalid length. [ 678.150946][T16561] netlink: 199836 bytes leftover after parsing attributes in process `syz.9.3506'. [ 678.575793][T16565] netlink: 'syz.9.3506': attribute type 10 has an invalid length. [ 678.687560][T16554] wlan1 speed is unknown, defaulting to 1000 [ 678.696485][T16565] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 678.744623][T16565] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 678.809781][T16565] bond0: (slave batadv_slave_0): Enslaving as an active interface with an up link [ 678.866786][T16554] erspan0 speed is unknown, defaulting to 1000 [ 678.914207][T16578] netlink: 'syz.3.3510': attribute type 1 has an invalid length. [ 679.074268][T16581] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 679.090413][T16581] netlink: 4456 bytes leftover after parsing attributes in process `syz.9.3511'. [ 679.162814][ T30] audit: type=1107 audit(1768913484.427:11): pid=16579 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 679.604756][T16588] netlink: zone id is out of range [ 679.624967][T16588] netlink: zone id is out of range [ 679.657066][T16588] netlink: set zone limit has 8 unknown bytes [ 679.929997][T16593] ÿÿÿÿÿÿ: renamed from vlan1 (while UP) [ 680.301648][T16604] netlink: 8 bytes leftover after parsing attributes in process `syz.9.3520'. [ 680.344166][T16604] netlink: 8 bytes leftover after parsing attributes in process `syz.9.3520'. [ 680.385726][T16604] netlink: 112 bytes leftover after parsing attributes in process `syz.9.3520'. [ 680.503012][T16608] netlink: 'syz.2.3523': attribute type 10 has an invalid length. [ 680.530770][ T30] audit: type=1107 audit(1768913485.797:12): pid=16610 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 680.834728][T16608] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 681.109067][T16608] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 681.198744][T16614] bond0: entered promiscuous mode [ 681.203835][T16614] bond_slave_0: entered promiscuous mode [ 681.267024][ T8374] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 681.275917][ T8374] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 681.283685][ T8374] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 681.292707][ T8374] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 681.332594][ T8374] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 681.379462][T16614] bond_slave_1: entered promiscuous mode [ 681.435523][T16614] batadv0: entered promiscuous mode [ 681.554006][T16624] wlan1 speed is unknown, defaulting to 1000 [ 681.581373][T16624] erspan0 speed is unknown, defaulting to 1000 [ 681.894529][T16642] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 682.137012][T16634] wlan1 speed is unknown, defaulting to 1000 [ 682.170784][T16648] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 682.183815][T16648] netlink: 4456 bytes leftover after parsing attributes in process `syz.2.3537'. [ 682.206396][ T6051] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 682.275468][T16651] netlink: 8 bytes leftover after parsing attributes in process `syz.9.3536'. [ 682.284802][T16634] erspan0 speed is unknown, defaulting to 1000 [ 682.285060][T16651] netlink: 8 bytes leftover after parsing attributes in process `syz.9.3536'. [ 682.303698][T16651] netlink: 112 bytes leftover after parsing attributes in process `syz.9.3536'. [ 682.388247][ T6051] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 682.567347][ T6051] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 682.819429][T16674] siw: device registration error -23 [ 682.837776][T16677] FAULT_INJECTION: forcing a failure. [ 682.837776][T16677] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 682.853557][T16677] CPU: 1 UID: 0 PID: 16677 Comm: syz.2.3546 Not tainted syzkaller #0 PREEMPT(full) [ 682.853583][T16677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 682.853594][T16677] Call Trace: [ 682.853601][T16677] [ 682.853609][T16677] dump_stack_lvl+0xe8/0x150 [ 682.853637][T16677] should_fail_ex+0x412/0x560 [ 682.853662][T16677] _copy_from_user+0x2d/0xb0 [ 682.853684][T16677] __sys_bpf+0x229/0x950 [ 682.853710][T16677] ? __pfx___sys_bpf+0x10/0x10 [ 682.853746][T16677] ? do_syscall_64+0x9f/0xf80 [ 682.853767][T16677] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 682.853789][T16677] ? __pfx_ksys_write+0x10/0x10 [ 682.853815][T16677] __x64_sys_bpf+0x7c/0x90 [ 682.853835][T16677] do_syscall_64+0xe2/0xf80 [ 682.853853][T16677] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 682.853868][T16677] ? trace_irq_disable+0x37/0x100 [ 682.853897][T16677] ? clear_bhb_loop+0x60/0xb0 [ 682.853917][T16677] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 682.853931][T16677] RIP: 0033:0x7f8a8719acb9 [ 682.853947][T16677] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 682.853960][T16677] RSP: 002b:00007f8a8801c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 682.853978][T16677] RAX: ffffffffffffffda RBX: 00007f8a87415fa0 RCX: 00007f8a8719acb9 [ 682.853990][T16677] RDX: 0000000000000048 RSI: 0000200000000040 RDI: 000000000000000a [ 682.853999][T16677] RBP: 00007f8a8801c090 R08: 0000000000000000 R09: 0000000000000000 [ 682.854010][T16677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 682.854019][T16677] R13: 00007f8a87416038 R14: 00007f8a87415fa0 R15: 00007ffedbc02838 [ 682.854049][T16677] [ 683.043431][ T6051] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 683.063228][T16679] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 683.155725][T16624] chnl_net:caif_netlink_parms(): no params data found [ 683.416270][ T8374] Bluetooth: hci5: command tx timeout [ 683.468817][T16624] bridge0: port 1(bridge_slave_0) entered blocking state [ 683.476567][T16624] bridge0: port 1(bridge_slave_0) entered disabled state [ 683.497565][T16624] bridge_slave_0: entered allmulticast mode [ 683.505608][T16624] bridge_slave_0: entered promiscuous mode [ 683.550586][T16695] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 683.602042][T16624] bridge0: port 2(bridge_slave_1) entered blocking state [ 683.619224][T16624] bridge0: port 2(bridge_slave_1) entered disabled state [ 683.636628][T16624] bridge_slave_1: entered allmulticast mode [ 683.653459][T16624] bridge_slave_1: entered promiscuous mode [ 683.734933][ T6051] bridge_slave_1: left allmulticast mode [ 683.740619][ T6051] bridge_slave_1: left promiscuous mode [ 683.772455][ T6051] bridge0: port 2(bridge_slave_1) entered disabled state [ 683.803343][ T6051] bridge_slave_0: left allmulticast mode [ 683.828140][ T6051] bridge_slave_0: left promiscuous mode [ 683.834001][ T6051] bridge0: port 1(bridge_slave_0) entered disabled state [ 683.860695][T16706] siw: device registration error -23 [ 683.892479][T16709] netlink: 'syz.9.3560': attribute type 3 has an invalid length. [ 683.905802][T16709] __nla_validate_parse: 1 callbacks suppressed [ 683.905834][T16709] netlink: 199836 bytes leftover after parsing attributes in process `syz.9.3560'. [ 684.000711][T16713] netlink: 'syz.9.3560': attribute type 10 has an invalid length. [ 684.249383][ T6051] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 684.261614][ T6051] bond_slave_0: left promiscuous mode [ 684.272790][ T6051] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 684.282508][ T6051] bond_slave_1: left promiscuous mode [ 684.291947][ T6051] bond0 (unregistering): (slave batadv0): Releasing backup interface [ 684.301632][ T6051] batadv0: left promiscuous mode [ 684.309143][ T6051] bond0 (unregistering): Released all slaves [ 684.324220][T16624] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 684.376233][T12105] erspan0 speed is unknown, defaulting to 1000 [ 684.384602][T12105] infiniband syz2: ib_query_port failed (-19) [ 684.418605][T16624] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 684.532697][T16624] team0: Port device team_slave_0 added [ 684.586865][T16624] team0: Port device team_slave_1 added [ 684.680801][T16736] netlink: 92 bytes leftover after parsing attributes in process `syz.7.3570'. [ 684.707796][T16624] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 684.714783][T16624] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 684.790006][T16624] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 684.810133][T16624] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 684.817571][T16624] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 684.829796][T16744] netlink: 'syz.9.3573': attribute type 3 has an invalid length. [ 684.870696][T16744] netlink: 199836 bytes leftover after parsing attributes in process `syz.9.3573'. [ 684.888676][T16624] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 685.163173][T16624] hsr_slave_0: entered promiscuous mode [ 685.164520][T16744] netlink: 'syz.9.3573': attribute type 10 has an invalid length. [ 685.191272][T16754] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3575'. [ 685.196252][T16624] hsr_slave_1: entered promiscuous mode [ 685.197086][T16624] debugfs: 'hsr0' already exists in 'hsr' [ 685.197109][T16624] Cannot create hsr debugfs directory [ 685.369967][T16759] netlink: 104 bytes leftover after parsing attributes in process `syz.2.3576'. [ 685.425907][T16763] netlink: 'syz.9.3578': attribute type 10 has an invalid length. [ 685.505775][ T8374] Bluetooth: hci5: command tx timeout [ 685.651673][T16763] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 685.690767][T16763] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 685.758733][T16771] bond0: entered promiscuous mode [ 685.774081][T16771] bond_slave_0: entered promiscuous mode [ 685.801339][T16771] bond_slave_1: entered promiscuous mode [ 685.812911][T16771] batadv_slave_0: entered promiscuous mode [ 685.819850][T16771] batadv0: entered promiscuous mode [ 686.188231][T16787] netlink: 24 bytes leftover after parsing attributes in process `syz.3.3584'. [ 686.294767][T16624] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 686.296393][T16792] netlink: 12 bytes leftover after parsing attributes in process `syz.7.3586'. [ 686.344422][T16624] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 686.442656][ T6051] hsr_slave_0: left promiscuous mode [ 686.475042][ T6051] hsr_slave_1: left promiscuous mode [ 686.488443][ T6051] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 686.503535][ T6051] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 686.518888][ T6051] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 686.530838][ T6051] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 686.544358][ T6051] veth1_macvtap: left allmulticast mode [ 686.555677][ T6051] veth1_macvtap: left promiscuous mode [ 686.561199][ T30] audit: type=1107 audit(1768913491.827:13): pid=16804 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 686.573947][ T6051] veth0_macvtap: left promiscuous mode [ 686.579665][ T6051] veth1_vlan: left allmulticast mode [ 686.603547][ T6051] veth1_vlan: left promiscuous mode [ 687.524112][T16822] FAULT_INJECTION: forcing a failure. [ 687.524112][T16822] name failslab, interval 1, probability 0, space 0, times 0 [ 687.537289][T16822] CPU: 0 UID: 0 PID: 16822 Comm: syz.7.3596 Not tainted syzkaller #0 PREEMPT(full) [ 687.537315][T16822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 687.537326][T16822] Call Trace: [ 687.537335][T16822] [ 687.537343][T16822] dump_stack_lvl+0xe8/0x150 [ 687.537373][T16822] should_fail_ex+0x412/0x560 [ 687.537400][T16822] should_failslab+0xa8/0x100 [ 687.537425][T16822] kmem_cache_alloc_node_noprof+0x8b/0x6f0 [ 687.537453][T16822] ? __alloc_skb+0x193/0x390 [ 687.537476][T16822] ? __alloc_skb+0x1d7/0x390 [ 687.537494][T16822] ? __local_bh_enable_ip+0xd0/0x130 [ 687.537515][T16822] ? __alloc_skb+0x193/0x390 [ 687.537536][T16822] __alloc_skb+0x1d7/0x390 [ 687.537562][T16822] netlink_sendmsg+0x5d4/0xb40 [ 687.537590][T16822] ? __pfx_netlink_sendmsg+0x10/0x10 [ 687.537610][T16822] ? aa_file_perm+0x12d/0x1630 [ 687.537626][T16822] ? aa_sock_msg_perm+0xf1/0x1b0 [ 687.537651][T16822] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 687.537668][T16822] ? __pfx_netlink_sendmsg+0x10/0x10 [ 687.537686][T16822] __sock_sendmsg+0x21c/0x270 [ 687.537709][T16822] ____sys_sendmsg+0x4d7/0x810 [ 687.537733][T16822] ? __pfx_perf_trace_lock+0x10/0x10 [ 687.537762][T16822] ? __pfx_____sys_sendmsg+0x10/0x10 [ 687.537796][T16822] ? import_iovec+0x73/0xa0 [ 687.537823][T16822] ___sys_sendmsg+0x2a5/0x360 [ 687.537845][T16822] ? __lock_acquire+0x6b5/0x2cf0 [ 687.537867][T16822] ? __pfx____sys_sendmsg+0x10/0x10 [ 687.537914][T16822] ? __fget_files+0x2a/0x420 [ 687.537952][T16822] ? __fget_files+0x2a/0x420 [ 687.537972][T16822] ? __fget_files+0x3a0/0x420 [ 687.538012][T16822] __x64_sys_sendmsg+0x1bd/0x2a0 [ 687.538038][T16822] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 687.538073][T16822] ? __pfx_ksys_write+0x10/0x10 [ 687.538105][T16822] do_syscall_64+0xe2/0xf80 [ 687.538128][T16822] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 687.538146][T16822] ? trace_irq_disable+0x37/0x100 [ 687.538167][T16822] ? clear_bhb_loop+0x60/0xb0 [ 687.538189][T16822] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 687.538206][T16822] RIP: 0033:0x7f12e259acb9 [ 687.538224][T16822] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 687.538239][T16822] RSP: 002b:00007f12e34ed028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 687.538259][T16822] RAX: ffffffffffffffda RBX: 00007f12e2815fa0 RCX: 00007f12e259acb9 [ 687.538273][T16822] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000003 [ 687.538284][T16822] RBP: 00007f12e34ed090 R08: 0000000000000000 R09: 0000000000000000 [ 687.538295][T16822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 687.538306][T16822] R13: 00007f12e2816038 R14: 00007f12e2815fa0 R15: 00007fff90750f38 [ 687.538339][T16822] [ 687.595244][ T8374] Bluetooth: hci5: command tx timeout [ 687.910860][T16824] netlink: 24 bytes leftover after parsing attributes in process `syz.7.3597'. [ 687.969234][ T6051] team0 (unregistering): Port device team_slave_1 removed [ 688.007725][ T6051] team0 (unregistering): Port device team_slave_0 removed [ 688.241024][T16833] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3601'. [ 688.477890][T16844] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3603'. [ 688.597233][T16624] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 688.613488][T16624] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 688.753453][ T30] audit: type=1107 audit(1768913494.017:14): pid=16856 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 688.967533][T16624] 8021q: adding VLAN 0 to HW filter on device bond0 [ 689.010885][T16864] __nla_validate_parse: 1 callbacks suppressed [ 689.010909][T16864] netlink: 24 bytes leftover after parsing attributes in process `syz.2.3608'. [ 689.060781][T16624] 8021q: adding VLAN 0 to HW filter on device team0 [ 689.109647][ T3941] bridge0: port 1(bridge_slave_0) entered blocking state [ 689.116841][ T3941] bridge0: port 1(bridge_slave_0) entered forwarding state [ 689.146645][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 689.153821][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 689.707772][T16624] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 689.768852][T16892] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3617'. [ 689.857686][T16892] netlink: 5 bytes leftover after parsing attributes in process `syz.2.3617'. [ 689.861144][T16901] netlink: 'syz.3.3619': attribute type 1 has an invalid length. [ 689.879329][T16901] netlink: 'syz.3.3619': attribute type 4 has an invalid length. [ 689.896081][ T8374] Bluetooth: hci5: command tx timeout [ 689.920245][T16904] netlink: 'syz.3.3619': attribute type 1 has an invalid length. [ 689.940751][T16901] netlink: 9462 bytes leftover after parsing attributes in process `syz.3.3619'. [ 689.994884][T16904] netlink: 'syz.3.3619': attribute type 4 has an invalid length. [ 690.036648][T16904] netlink: 9462 bytes leftover after parsing attributes in process `syz.3.3619'. [ 690.080991][T16907] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 690.242133][T16624] veth0_vlan: entered promiscuous mode [ 690.251681][T16921] netlink: 'syz.7.3624': attribute type 3 has an invalid length. [ 690.274082][T16624] veth1_vlan: entered promiscuous mode [ 690.283403][T16921] netlink: 199836 bytes leftover after parsing attributes in process `syz.7.3624'. [ 690.344568][T16624] veth0_macvtap: entered promiscuous mode [ 690.345440][T16921] netlink: 'syz.7.3624': attribute type 10 has an invalid length. [ 690.363090][T16921] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 690.406504][T16921] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 690.438644][T16921] bond0: (slave batadv_slave_0): Enslaving as an active interface with an up link [ 690.474289][T16624] veth1_macvtap: entered promiscuous mode [ 690.502884][T16624] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 690.523634][T16624] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 690.548876][ T60] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 690.561204][ T60] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 690.581499][T16930] netlink: 'syz.3.3627': attribute type 8 has an invalid length. [ 690.593854][ T60] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 690.604318][ T60] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 690.770573][ T60] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 690.800522][ T60] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 690.841169][ T60] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 690.858644][ T60] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 690.919277][ T30] audit: type=1107 audit(1768913496.187:15): pid=16941 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 691.046528][T16946] netlink: 96 bytes leftover after parsing attributes in process `syz.8.3525'. [ 691.058723][T16946] netlink: 12 bytes leftover after parsing attributes in process `syz.8.3525'. [ 691.130833][T16952] openvswitch: netlink: Key type 220 is out of range max 32 [ 691.494611][T16970] netlink: 209852 bytes leftover after parsing attributes in process `syz.8.3641'. [ 691.858626][T16984] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 691.873935][T16984] netlink: 4456 bytes leftover after parsing attributes in process `syz.7.3647'. [ 692.170756][ T30] audit: type=1107 audit(1768913497.437:16): pid=16997 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 692.211740][ T30] audit: type=1107 audit(1768913497.477:17): pid=17000 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 692.548062][T17010] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 693.296166][T17031] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 693.445171][ T30] audit: type=1107 audit(1768913498.707:18): pid=17032 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 693.490385][T17035] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 693.738709][T17047] netlink: 'syz.3.3672': attribute type 3 has an invalid length. [ 693.881554][T17047] netlink: 'syz.3.3672': attribute type 10 has an invalid length. [ 694.089233][T17059] __nla_validate_parse: 5 callbacks suppressed [ 694.089256][T17059] netlink: 4456 bytes leftover after parsing attributes in process `syz.9.3675'. [ 694.198603][T17061] FAULT_INJECTION: forcing a failure. [ 694.198603][T17061] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 694.228882][T17061] CPU: 1 UID: 0 PID: 17061 Comm: syz.3.3676 Not tainted syzkaller #0 PREEMPT(full) [ 694.228909][T17061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 694.228922][T17061] Call Trace: [ 694.228931][T17061] [ 694.228939][T17061] dump_stack_lvl+0xe8/0x150 [ 694.228971][T17061] should_fail_ex+0x412/0x560 [ 694.228998][T17061] strncpy_from_user+0x36/0x2b0 [ 694.229022][T17061] getname_flags+0xf2/0x540 [ 694.229050][T17061] user_path_at+0x24/0x60 [ 694.229068][T17061] __se_sys_mount+0x2dc/0x420 [ 694.229100][T17061] ? __pfx___se_sys_mount+0x10/0x10 [ 694.229129][T17061] ? __x64_sys_mount+0x20/0xc0 [ 694.229154][T17061] do_syscall_64+0xe2/0xf80 [ 694.229178][T17061] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 694.229196][T17061] ? trace_irq_disable+0x37/0x100 [ 694.229219][T17061] ? clear_bhb_loop+0x60/0xb0 [ 694.229242][T17061] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 694.229260][T17061] RIP: 0033:0x7f97b899acb9 [ 694.229279][T17061] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 694.229295][T17061] RSP: 002b:00007f97b982f028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 694.229316][T17061] RAX: ffffffffffffffda RBX: 00007f97b8c15fa0 RCX: 00007f97b899acb9 [ 694.229331][T17061] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000000 [ 694.229343][T17061] RBP: 00007f97b982f090 R08: 0000200000000340 R09: 0000000000000000 [ 694.229355][T17061] R10: 0000000000140070 R11: 0000000000000246 R12: 0000000000000001 [ 694.229367][T17061] R13: 00007f97b8c16038 R14: 00007f97b8c15fa0 R15: 00007ffcdca081e8 [ 694.229398][T17061] [ 694.820960][T17074] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 694.834764][T17074] netlink: 4456 bytes leftover after parsing attributes in process `syz.2.3679'. [ 695.251554][T17087] netlink: 4456 bytes leftover after parsing attributes in process `syz.9.3687'. [ 696.363481][T17110] netlink: 284 bytes leftover after parsing attributes in process `syz.2.3696'. [ 696.440196][T17112] netlink: 92 bytes leftover after parsing attributes in process `syz.9.3697'. [ 696.751529][T17119] netlink: 4456 bytes leftover after parsing attributes in process `syz.7.3700'. [ 697.256030][T17137] netlink: 96 bytes leftover after parsing attributes in process `syz.7.3704'. [ 697.265354][T17137] netlink: 12 bytes leftover after parsing attributes in process `syz.7.3704'. [ 698.107479][T17145] netlink: 288 bytes leftover after parsing attributes in process `syz.2.3710'. [ 698.249586][T17147] syzkaller0: entered promiscuous mode [ 698.258509][T17147] syzkaller0: entered allmulticast mode [ 699.098247][T17156] netlink: 48 bytes leftover after parsing attributes in process `syz.2.3713'. [ 701.421212][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 701.428972][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 701.899319][T17167] netlink: 4 bytes leftover after parsing attributes in process `syz.7.3717'. [ 701.967003][T17170] netlink: 8 bytes leftover after parsing attributes in process `syz.9.3718'. [ 702.942453][T17185] netlink: 60 bytes leftover after parsing attributes in process `syz.7.3723'. [ 702.954545][T17185] netlink: 60 bytes leftover after parsing attributes in process `syz.7.3723'. [ 702.988266][T17185] netlink: 60 bytes leftover after parsing attributes in process `syz.7.3723'. [ 703.878687][T17209] netlink: 'syz.7.3734': attribute type 33 has an invalid length. [ 703.886752][T17209] netlink: 152 bytes leftover after parsing attributes in process `syz.7.3734'. [ 704.219142][T17220] netlink: 'syz.7.3738': attribute type 3 has an invalid length. [ 704.263159][T17220] netlink: 199836 bytes leftover after parsing attributes in process `syz.7.3738'. [ 704.308936][T17222] netlink: 96 bytes leftover after parsing attributes in process `syz.9.3739'. [ 704.337273][T17225] netlink: 52 bytes leftover after parsing attributes in process `syz.2.3740'. [ 704.385786][T17224] netlink: 'syz.7.3738': attribute type 10 has an invalid length. [ 704.532526][T17229] netlink: 'syz.2.3740': attribute type 10 has an invalid length. [ 704.566363][T17229] netlink: 40 bytes leftover after parsing attributes in process `syz.2.3740'. [ 704.596260][T17229] dummy0: entered promiscuous mode [ 704.601891][T17229] dummy0: entered allmulticast mode [ 704.647345][T17229] bridge0: port 3(dummy0) entered blocking state [ 704.656721][T17229] bridge0: port 3(dummy0) entered disabled state [ 704.688220][T17229] bridge0: port 3(dummy0) entered blocking state [ 704.695176][T17229] bridge0: port 3(dummy0) entered forwarding state [ 704.764191][T17235] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 704.802275][T17235] netlink: 4456 bytes leftover after parsing attributes in process `syz.7.3743'. [ 704.981075][T17237] netlink: 60 bytes leftover after parsing attributes in process `syz.9.3744'. [ 705.023137][T17237] netlink: 60 bytes leftover after parsing attributes in process `syz.9.3744'. [ 705.056021][T17237] netlink: 60 bytes leftover after parsing attributes in process `syz.9.3744'. [ 705.548810][T17255] netlink: 'syz.2.3752': attribute type 4 has an invalid length. [ 705.557078][T17253] netlink: 'syz.7.3751': attribute type 33 has an invalid length. [ 705.557131][T17253] netlink: 152 bytes leftover after parsing attributes in process `syz.7.3751'. [ 705.570096][T17255] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3752'. [ 705.790659][T17261] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 706.229529][T17271] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 706.672352][T17281] ÿÿÿÿÿÿ: renamed from vlan1 (while UP) [ 706.725166][T17283] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 706.998618][T17292] netlink: zone id is out of range [ 707.003780][T17292] netlink: zone id is out of range [ 707.044742][T17292] netlink: set zone limit has 8 unknown bytes [ 707.085378][T17295] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 707.552804][ T30] audit: type=1107 audit(1768913512.817:19): pid=17301 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 708.014337][ T30] audit: type=1107 audit(1768913513.277:20): pid=17308 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 708.065294][T17313] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 708.074790][ T5837] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 708.092400][ T5837] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 708.104804][ T5837] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 708.113244][ T5837] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 708.649878][T17325] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 708.709173][T17312] chnl_net:caif_netlink_parms(): no params data found [ 709.295801][T17338] __nla_validate_parse: 10 callbacks suppressed [ 709.295823][T17338] netlink: 4 bytes leftover after parsing attributes in process `syz.7.3779'. [ 709.591312][ T6051] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 709.763841][T17312] bridge0: port 1(bridge_slave_0) entered blocking state [ 709.793700][T17312] bridge0: port 1(bridge_slave_0) entered disabled state [ 709.835761][T17312] bridge_slave_0: entered allmulticast mode [ 709.851994][T17312] bridge_slave_0: entered promiscuous mode [ 709.899785][T17312] bridge0: port 2(bridge_slave_1) entered blocking state [ 709.947071][T17312] bridge0: port 2(bridge_slave_1) entered disabled state [ 709.974935][T17312] bridge_slave_1: entered allmulticast mode [ 710.012244][T17312] bridge_slave_1: entered promiscuous mode [ 710.145072][ T5837] Bluetooth: hci0: command tx timeout [ 710.279131][ T8374] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 710.298576][ T8374] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 710.308162][ T8374] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 710.317878][ T8374] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 710.325819][ T8374] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 710.668056][T17354] FAULT_INJECTION: forcing a failure. [ 710.668056][T17354] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 710.697140][T17354] CPU: 1 UID: 0 PID: 17354 Comm: syz.9.3785 Not tainted syzkaller #0 PREEMPT(full) [ 710.697170][T17354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 710.697183][T17354] Call Trace: [ 710.697192][T17354] [ 710.697201][T17354] dump_stack_lvl+0xe8/0x150 [ 710.697235][T17354] should_fail_ex+0x412/0x560 [ 710.697264][T17354] _copy_to_user+0x31/0xb0 [ 710.697292][T17354] simple_read_from_buffer+0xe1/0x170 [ 710.697324][T17354] proc_fail_nth_read+0x1bb/0x230 [ 710.697354][T17354] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 710.697380][T17354] ? rw_verify_area+0x2a6/0x4d0 [ 710.697401][T17354] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 710.697424][T17354] vfs_read+0x20c/0xa70 [ 710.697443][T17354] ? fdget_pos+0x246/0x320 [ 710.697473][T17354] ? __pfx___mutex_lock+0x10/0x10 [ 710.697499][T17354] ? __pfx_vfs_read+0x10/0x10 [ 710.697521][T17354] ? __fget_files+0x2a/0x420 [ 710.697549][T17354] ? __fget_files+0x3a0/0x420 [ 710.697571][T17354] ? __fget_files+0x2a/0x420 [ 710.697605][T17354] ksys_read+0x150/0x270 [ 710.697629][T17354] ? __pfx_ksys_read+0x10/0x10 [ 710.697663][T17354] do_syscall_64+0xe2/0xf80 [ 710.697686][T17354] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 710.697704][T17354] ? trace_irq_disable+0x37/0x100 [ 710.697728][T17354] ? clear_bhb_loop+0x60/0xb0 [ 710.697752][T17354] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 710.697769][T17354] RIP: 0033:0x7f146d15b58e [ 710.697788][T17354] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 710.697805][T17354] RSP: 002b:00007f146df6efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 710.697827][T17354] RAX: ffffffffffffffda RBX: 00007f146df6f6c0 RCX: 00007f146d15b58e [ 710.697841][T17354] RDX: 000000000000000f RSI: 00007f146df6f0a0 RDI: 0000000000000004 [ 710.697854][T17354] RBP: 00007f146df6f090 R08: 0000000000000000 R09: 0000000000000000 [ 710.697865][T17354] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 710.697877][T17354] R13: 00007f146d416038 R14: 00007f146d415fa0 R15: 00007fff9c2df928 [ 710.697918][T17354] [ 711.367625][ T6051] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 711.549227][ T6051] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 711.691944][T17358] netlink: 8 bytes leftover after parsing attributes in process `syz.9.3787'. [ 711.702059][T17358] netlink: 8 bytes leftover after parsing attributes in process `syz.9.3787'. [ 711.818549][T17312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 711.913023][T17362] netlink: zone id is out of range [ 711.918442][T17362] netlink: zone id is out of range [ 711.924134][T17362] netlink: set zone limit has 8 unknown bytes [ 712.121109][ T6051] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 712.166541][T17364] netlink: 'syz.2.3789': attribute type 10 has an invalid length. [ 712.167567][T17312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 712.215064][ T5837] Bluetooth: hci0: command tx timeout [ 712.352767][T17312] team0: Port device team_slave_0 added [ 712.375230][ T5837] Bluetooth: hci5: command tx timeout [ 712.409280][T17312] team0: Port device team_slave_1 added [ 712.510259][T17312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 712.518174][T17312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 712.544619][T17312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 712.558643][T17312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 712.565706][T17312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 712.591675][T17312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 712.773262][ T6051] bridge_slave_1: left allmulticast mode [ 712.787739][ T6051] bridge_slave_1: left promiscuous mode [ 712.793547][ T6051] bridge0: port 2(bridge_slave_1) entered disabled state [ 712.826437][ T6051] bridge_slave_0: left allmulticast mode [ 712.835082][ T6051] bridge_slave_0: left promiscuous mode [ 712.852884][T17393] netlink: zone id is out of range [ 712.858685][T17393] netlink: zone id is out of range [ 712.858907][ T6051] bridge0: port 1(bridge_slave_0) entered disabled state [ 712.864304][T17393] netlink: set zone limit has 8 unknown bytes [ 713.473264][ T6051] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 713.494440][ T6051] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 713.510306][ T6051] bond0 (unregistering): Released all slaves [ 713.613268][T17400] netlink: 'syz.7.3800': attribute type 8 has an invalid length. [ 713.706440][T17312] hsr_slave_0: entered promiscuous mode [ 713.712794][T17312] hsr_slave_1: entered promiscuous mode [ 713.782262][T17348] chnl_net:caif_netlink_parms(): no params data found [ 713.815448][T17411] FAULT_INJECTION: forcing a failure. [ 713.815448][T17411] name failslab, interval 1, probability 0, space 0, times 0 [ 713.839921][T17411] CPU: 0 UID: 0 PID: 17411 Comm: syz.7.3803 Not tainted syzkaller #0 PREEMPT(full) [ 713.839950][T17411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 713.839963][T17411] Call Trace: [ 713.839971][T17411] [ 713.839980][T17411] dump_stack_lvl+0xe8/0x150 [ 713.840012][T17411] should_fail_ex+0x412/0x560 [ 713.840040][T17411] should_failslab+0xa8/0x100 [ 713.840066][T17411] kmem_cache_alloc_noprof+0x87/0x6e0 [ 713.840097][T17411] ? getname_flags+0xb7/0x540 [ 713.840119][T17411] ? __pfx_handle_mm_fault+0x10/0x10 [ 713.840148][T17411] getname_flags+0xb7/0x540 [ 713.840174][T17411] do_sys_openat2+0xca/0x220 [ 713.840202][T17411] ? __pfx_do_sys_openat2+0x10/0x10 [ 713.840228][T17411] ? exc_page_fault+0x6a/0xc0 [ 713.840254][T17411] ? do_user_addr_fault+0xc7c/0x1360 [ 713.840278][T17411] __x64_sys_openat+0x138/0x170 [ 713.840307][T17411] do_syscall_64+0xe2/0xf80 [ 713.840329][T17411] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 713.840347][T17411] ? trace_irq_disable+0x37/0x100 [ 713.840370][T17411] ? clear_bhb_loop+0x60/0xb0 [ 713.840392][T17411] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 713.840411][T17411] RIP: 0033:0x7f12e255b58e [ 713.840429][T17411] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 713.840446][T17411] RSP: 002b:00007f12e34ecec8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 713.840468][T17411] RAX: ffffffffffffffda RBX: 00007f12e34ed6c0 RCX: 00007f12e255b58e [ 713.840482][T17411] RDX: 0000000000000002 RSI: 00007f12e34ecf90 RDI: ffffffffffffff9c [ 713.840496][T17411] RBP: 00007f12e34ed090 R08: 0000000000000000 R09: 0000000000000000 [ 713.840508][T17411] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 713.840520][T17411] R13: 00007f12e2816038 R14: 00007f12e2815fa0 R15: 00007fff90750f38 [ 713.840554][T17411] [ 714.116161][T17417] netlink: 96 bytes leftover after parsing attributes in process `syz.7.3806'. [ 714.185198][T17421] netlink: 'syz.2.3805': attribute type 1 has an invalid length. [ 714.295151][ T5837] Bluetooth: hci0: command tx timeout [ 714.339106][T17427] netlink: 'syz.9.3807': attribute type 8 has an invalid length. [ 714.355634][T17427] netlink: 48 bytes leftover after parsing attributes in process `syz.9.3807'. [ 714.380294][ T6051] hsr_slave_0: left promiscuous mode [ 714.399431][ T6051] hsr_slave_1: left promiscuous mode [ 714.406439][ T6051] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 714.414029][ T6051] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 714.423048][ T6051] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 714.431580][ T6051] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 714.455079][ T5837] Bluetooth: hci5: command tx timeout [ 714.492406][ T6051] veth1_macvtap: left promiscuous mode [ 714.498451][ T6051] veth0_macvtap: left promiscuous mode [ 714.511147][ T6051] veth1_vlan: left promiscuous mode [ 714.518232][ T6051] veth0_vlan: left promiscuous mode [ 714.759321][T17442] netlink: 'syz.9.3812': attribute type 3 has an invalid length. [ 714.767562][T17442] netlink: 132 bytes leftover after parsing attributes in process `syz.9.3812'. [ 715.351457][T17451] openvswitch: netlink: Unexpected mask (mask=440, allowed=10048) [ 715.394779][ T6051] team0 (unregistering): Port device team_slave_1 removed [ 715.438649][ T6051] team0 (unregistering): Port device team_slave_0 removed [ 715.754781][T17440] ÿÿÿÿÿÿ: renamed from vlan1 (while UP) [ 715.779682][T17348] bridge0: port 1(bridge_slave_0) entered blocking state [ 715.805713][T17348] bridge0: port 1(bridge_slave_0) entered disabled state [ 715.817128][T17348] bridge_slave_0: entered allmulticast mode [ 715.825021][T17348] bridge_slave_0: entered promiscuous mode [ 715.848635][T17348] bridge0: port 2(bridge_slave_1) entered blocking state [ 715.856208][T17348] bridge0: port 2(bridge_slave_1) entered disabled state [ 715.863458][T17348] bridge_slave_1: entered allmulticast mode [ 715.871703][T17348] bridge_slave_1: entered promiscuous mode [ 715.947291][T17348] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 715.968793][T17456] netlink: 96 bytes leftover after parsing attributes in process `syz.2.3816'. [ 715.980063][T17348] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 716.134336][T17348] team0: Port device team_slave_0 added [ 716.148983][T17348] team0: Port device team_slave_1 added [ 716.273217][T17348] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 716.300437][T17348] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 716.351760][T17348] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 716.375187][ T5837] Bluetooth: hci0: command tx timeout [ 716.395664][T17348] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 716.403092][T17348] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 716.429674][T17348] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 716.534978][ T5837] Bluetooth: hci5: command tx timeout [ 716.562463][T17348] hsr_slave_0: entered promiscuous mode [ 716.569141][T17348] hsr_slave_1: entered promiscuous mode [ 716.575907][T17348] debugfs: 'hsr0' already exists in 'hsr' [ 716.581841][T17348] Cannot create hsr debugfs directory [ 716.590536][T17472] netlink: 'syz.2.3821': attribute type 33 has an invalid length. [ 716.616925][T17472] netlink: 152 bytes leftover after parsing attributes in process `syz.2.3821'. [ 716.869451][ T6051] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 716.873468][T17488] netlink: 96 bytes leftover after parsing attributes in process `syz.2.3826'. [ 717.066925][ T6051] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 717.226985][ T6051] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 717.298391][T17312] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 717.346803][ T6051] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 717.365435][T17312] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 717.373334][T17505] netlink: 92 bytes leftover after parsing attributes in process `syz.7.3832'. [ 717.399918][T17312] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 717.428310][T17312] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 717.636967][T17519] netlink: 12 bytes leftover after parsing attributes in process `syz.7.3835'. [ 717.694577][ T6051] bridge_slave_1: left allmulticast mode [ 717.707673][ T6051] bridge_slave_1: left promiscuous mode [ 717.726407][ T6051] bridge0: port 2(bridge_slave_1) entered disabled state [ 717.738759][ T6051] bridge_slave_0: left allmulticast mode [ 717.745382][ T6051] bridge_slave_0: left promiscuous mode [ 717.752269][ T6051] bridge0: port 1(bridge_slave_0) entered disabled state [ 717.801567][T17519] netlink: 5 bytes leftover after parsing attributes in process `syz.7.3835'. [ 718.064769][ T6051] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 718.073684][ T6051] bond_slave_0: left promiscuous mode [ 718.081263][ T6051] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 718.090203][ T6051] bond_slave_1: left promiscuous mode [ 718.099549][ T6051] bond0 (unregistering): (slave batadv_slave_0): Releasing backup interface [ 718.108970][ T6051] batadv_slave_0: left promiscuous mode [ 718.117429][ T6051] bond0 (unregistering): (slave batadv0): Releasing backup interface [ 718.126344][ T6051] batadv0: left promiscuous mode [ 718.133159][ T6051] bond0 (unregistering): Released all slaves [ 718.343640][T17348] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 718.432128][T17348] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 718.470588][T17348] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 718.625082][ T5837] Bluetooth: hci5: command tx timeout [ 718.667148][ T30] audit: type=1107 audit(1768913523.937:21): pid=17548 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 718.844656][T17348] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 718.990676][T17560] netlink: zone id is out of range [ 718.996155][T17560] netlink: zone id is out of range [ 719.002420][T17560] netlink: set zone limit has 8 unknown bytes [ 719.037661][T17561] netlink: 4 bytes leftover after parsing attributes in process `syz.7.3845'. [ 719.053005][ T6051] hsr_slave_0: left promiscuous mode [ 719.085932][ T6051] hsr_slave_1: left promiscuous mode [ 719.092896][ T6051] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 719.101609][ T6051] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 719.150810][ T6051] veth1_macvtap: left promiscuous mode [ 719.156965][ T6051] veth0_macvtap: left promiscuous mode [ 719.162696][ T6051] veth1_vlan: left promiscuous mode [ 719.168148][ T6051] veth0_vlan: left promiscuous mode [ 720.325797][ T6051] team0 (unregistering): Port device team_slave_1 removed [ 720.390208][ T6051] team0 (unregistering): Port device team_slave_0 removed [ 720.554657][T17579] netlink: 92 bytes leftover after parsing attributes in process `syz.7.3852'. [ 720.745113][T17565] netlink: 60 bytes leftover after parsing attributes in process `syz.9.3847'. [ 720.814596][T17312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 720.903948][T17586] netlink: 96 bytes leftover after parsing attributes in process `syz.9.3855'. [ 720.922401][T17312] 8021q: adding VLAN 0 to HW filter on device team0 [ 720.970653][ T8218] bridge0: port 1(bridge_slave_0) entered blocking state [ 720.977923][ T8218] bridge0: port 1(bridge_slave_0) entered forwarding state [ 721.048912][ T8218] bridge0: port 2(bridge_slave_1) entered blocking state [ 721.056133][ T8218] bridge0: port 2(bridge_slave_1) entered forwarding state [ 721.064264][T17589] netlink: 'syz.7.3856': attribute type 3 has an invalid length. [ 721.109518][T17589] netlink: 199836 bytes leftover after parsing attributes in process `syz.7.3856'. [ 721.198036][T17348] 8021q: adding VLAN 0 to HW filter on device bond0 [ 721.241541][T17591] erspan0 speed is unknown, defaulting to 1000 [ 721.248274][T17591] erspan0 speed is unknown, defaulting to 1000 [ 721.318331][T17591] erspan0 speed is unknown, defaulting to 1000 [ 721.343986][T17348] 8021q: adding VLAN 0 to HW filter on device team0 [ 721.723853][T17597] netlink: 4 bytes leftover after parsing attributes in process `syz.9.3858'. [ 721.738919][ T1161] bridge0: port 1(bridge_slave_0) entered blocking state [ 721.746363][ T1161] bridge0: port 1(bridge_slave_0) entered forwarding state [ 721.842162][ T1161] bridge0: port 2(bridge_slave_1) entered blocking state [ 721.849654][ T1161] bridge0: port 2(bridge_slave_1) entered forwarding state [ 721.988473][T17591] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 722.175374][T17591] erspan0 speed is unknown, defaulting to 1000 [ 722.213586][T17589] netlink: 'syz.7.3856': attribute type 10 has an invalid length. [ 722.229340][T17591] erspan0 speed is unknown, defaulting to 1000 [ 722.284788][T17591] erspan0 speed is unknown, defaulting to 1000 [ 722.323234][T17591] erspan0 speed is unknown, defaulting to 1000 [ 722.332701][T17591] erspan0 speed is unknown, defaulting to 1000 [ 722.413238][T17312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 722.511656][T17612] netlink: 92 bytes leftover after parsing attributes in process `syz.9.3861'. [ 722.782044][T17348] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 722.835876][T17626] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 722.856978][T17626] netlink: 4456 bytes leftover after parsing attributes in process `syz.9.3864'. [ 722.928177][T17629] netlink: 96 bytes leftover after parsing attributes in process `syz.2.3866'. [ 722.956602][T17348] veth0_vlan: entered promiscuous mode [ 722.968004][T17312] veth0_vlan: entered promiscuous mode [ 722.989959][T17348] veth1_vlan: entered promiscuous mode [ 723.010328][T17312] veth1_vlan: entered promiscuous mode [ 723.101142][T17348] veth0_macvtap: entered promiscuous mode [ 723.128587][T17348] veth1_macvtap: entered promiscuous mode [ 723.210922][T17312] veth0_macvtap: entered promiscuous mode [ 723.246812][T17312] veth1_macvtap: entered promiscuous mode [ 723.271720][T17348] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 723.344493][T17348] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 723.378734][T17312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 723.395774][ T5973] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 723.413409][ T5973] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 723.424507][T17312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 723.431998][T17643] netlink: 92 bytes leftover after parsing attributes in process `syz.9.3872'. [ 723.446408][ T5973] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 723.463253][ T5973] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 723.484688][ T13] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 723.506176][ T13] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 723.516247][ T13] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 723.540531][ T13] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 723.629749][ T50] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 723.638043][ T50] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 723.687734][ T13] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 723.690035][T17647] netlink: 'syz.9.3873': attribute type 10 has an invalid length. [ 723.703436][ T13] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 723.759994][ T13] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 723.769107][ T13] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 723.779198][ T13] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 723.788129][ T13] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 723.903958][T17649] netlink: 'syz.1.3783': attribute type 10 has an invalid length. [ 723.942053][ T30] audit: type=1107 audit(1768913529.207:22): pid=17651 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 723.977030][T17649] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 724.013507][T17649] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 724.063742][T17654] bond0: entered promiscuous mode [ 724.074113][T17657] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 724.086676][T17657] netlink: 4456 bytes leftover after parsing attributes in process `syz.4.3875'. [ 724.096094][T17654] bond_slave_0: entered promiscuous mode [ 724.102104][T17654] bond_slave_1: entered promiscuous mode [ 724.115546][T17654] batadv0: entered promiscuous mode [ 724.172635][T17659] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 724.565435][T17674] netlink: 'syz.2.3882': attribute type 3 has an invalid length. [ 725.649856][T17674] netlink: 'syz.2.3882': attribute type 10 has an invalid length. [ 725.667286][T17674] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 725.687577][T17674] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 725.700101][T17674] batadv_slave_0: entered promiscuous mode [ 725.713148][T17693] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 725.723866][T17693] __nla_validate_parse: 5 callbacks suppressed [ 725.723884][T17693] netlink: 4456 bytes leftover after parsing attributes in process `syz.4.3887'. [ 725.754510][T17674] bond0: (slave batadv_slave_0): Enslaving as an active interface with an up link [ 725.902119][T17702] netlink: 96 bytes leftover after parsing attributes in process `syz.2.3892'. [ 726.067037][T17707] netlink: 92 bytes leftover after parsing attributes in process `syz.1.3894'. [ 726.726384][T17734] netlink: 272 bytes leftover after parsing attributes in process `syz.4.3903'. [ 726.998542][T17744] netlink: 126588 bytes leftover after parsing attributes in process `syz.7.3908'. [ 727.015824][T17744] netlink: 'syz.7.3908': attribute type 29 has an invalid length. [ 727.036309][T17744] netlink: 'syz.7.3908': attribute type 29 has an invalid length. [ 727.107679][T17739] netlink: 96 bytes leftover after parsing attributes in process `syz.9.3906'. [ 727.519776][T17761] ÿÿÿÿÿÿ: renamed from vlan1 (while UP) [ 727.883152][T17777] netlink: 40 bytes leftover after parsing attributes in process `syz.4.3922'. [ 727.987816][T17781] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3922'. [ 728.298249][ T30] audit: type=1107 audit(1768913533.567:23): pid=17784 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 728.566009][T17799] netlink: 'syz.9.3930': attribute type 10 has an invalid length. [ 728.586014][T17797] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 728.587448][T17795] netlink: 'syz.4.3929': attribute type 1 has an invalid length. [ 728.593506][T17797] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 728.618839][T17795] netlink: 'syz.4.3929': attribute type 4 has an invalid length. [ 728.634986][T17795] netlink: 9462 bytes leftover after parsing attributes in process `syz.4.3929'. [ 728.662648][T17798] netlink: 'syz.4.3929': attribute type 1 has an invalid length. [ 728.693512][T17798] netlink: 'syz.4.3929': attribute type 4 has an invalid length. [ 728.706871][T17797] bond0: (slave batadv0): Releasing backup interface [ 728.717049][T17798] netlink: 9462 bytes leftover after parsing attributes in process `syz.4.3929'. [ 728.718044][T17797] batadv0 (unregistering): left promiscuous mode [ 728.782744][T17801] ÿÿÿÿÿÿ: renamed from vlan1 (while UP) [ 728.887036][T17812] FAULT_INJECTION: forcing a failure. [ 728.887036][T17812] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 728.900444][T17812] CPU: 0 UID: 0 PID: 17812 Comm: syz.1.3936 Not tainted syzkaller #0 PREEMPT(full) [ 728.900472][T17812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 728.900484][T17812] Call Trace: [ 728.900493][T17812] [ 728.900502][T17812] dump_stack_lvl+0xe8/0x150 [ 728.900534][T17812] should_fail_ex+0x412/0x560 [ 728.900561][T17812] _copy_from_user+0x2d/0xb0 [ 728.900588][T17812] ___sys_sendmsg+0x1c6/0x360 [ 728.900613][T17812] ? __lock_acquire+0x6b5/0x2cf0 [ 728.900637][T17812] ? __pfx____sys_sendmsg+0x10/0x10 [ 728.900696][T17812] ? __fget_files+0x2a/0x420 [ 728.900719][T17812] ? __fget_files+0x3a0/0x420 [ 728.900751][T17812] __x64_sys_sendmsg+0x1bd/0x2a0 [ 728.900780][T17812] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 728.900813][T17812] ? __pfx_ksys_write+0x10/0x10 [ 728.900846][T17812] do_syscall_64+0xe2/0xf80 [ 728.900877][T17812] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 728.900895][T17812] ? trace_irq_disable+0x37/0x100 [ 728.900919][T17812] ? clear_bhb_loop+0x60/0xb0 [ 728.900941][T17812] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 728.900959][T17812] RIP: 0033:0x7f28d839acb9 [ 728.900977][T17812] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 728.900993][T17812] RSP: 002b:00007f28d65f6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 728.901015][T17812] RAX: ffffffffffffffda RBX: 00007f28d8615fa0 RCX: 00007f28d839acb9 [ 728.901029][T17812] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 728.901041][T17812] RBP: 00007f28d65f6090 R08: 0000000000000000 R09: 0000000000000000 [ 728.901054][T17812] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 728.901066][T17812] R13: 00007f28d8616038 R14: 00007f28d8615fa0 R15: 00007fffbeca7c18 [ 728.901097][T17812] [ 729.106628][ T30] audit: type=1107 audit(1768913534.367:24): pid=17806 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 730.136429][T17854] nbd: couldn't find a device at index 2147483646 [ 730.172697][T17861] siw: device registration error -23 [ 730.400952][T17863] netlink: 'syz.7.3952': attribute type 1 has an invalid length. [ 730.409050][T17863] netlink: 'syz.7.3952': attribute type 4 has an invalid length. [ 730.421219][T17863] netlink: 'syz.7.3952': attribute type 1 has an invalid length. [ 730.907383][T17881] __nla_validate_parse: 3 callbacks suppressed [ 730.907420][T17881] netlink: 210020 bytes leftover after parsing attributes in process `syz.2.3958'. [ 730.952386][T17881] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3958'. [ 731.001312][T17889] netlink: 8 bytes leftover after parsing attributes in process `syz.7.3961'. [ 731.030084][T17889] netlink: 8 bytes leftover after parsing attributes in process `syz.7.3961'. [ 731.203048][ T30] audit: type=1107 audit(1768913536.467:25): pid=17898 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 732.308873][T17949] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3984'. [ 732.318812][T17949] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3984'. [ 732.539655][T17959] netlink: 96 bytes leftover after parsing attributes in process `syz.7.3987'. [ 732.579448][T17961] FAULT_INJECTION: forcing a failure. [ 732.579448][T17961] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 732.604335][T17961] CPU: 1 UID: 0 PID: 17961 Comm: syz.4.3990 Not tainted syzkaller #0 PREEMPT(full) [ 732.604364][T17961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 732.604377][T17961] Call Trace: [ 732.604387][T17961] [ 732.604398][T17961] dump_stack_lvl+0xe8/0x150 [ 732.604439][T17961] should_fail_ex+0x412/0x560 [ 732.604482][T17961] _copy_from_user+0x2d/0xb0 [ 732.604515][T17961] ___sys_sendmsg+0x1c6/0x360 [ 732.604543][T17961] ? __lock_acquire+0x6b5/0x2cf0 [ 732.604581][T17961] ? __pfx____sys_sendmsg+0x10/0x10 [ 732.604687][T17961] ? __fget_files+0x2a/0x420 [ 732.604753][T17961] ? __fget_files+0x2a/0x420 [ 732.604783][T17961] ? __fget_files+0x3a0/0x420 [ 732.604847][T17961] __x64_sys_sendmsg+0x1bd/0x2a0 [ 732.604884][T17961] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 732.604941][T17961] ? __pfx_ksys_write+0x10/0x10 [ 732.605001][T17961] do_syscall_64+0xe2/0xf80 [ 732.605028][T17961] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 732.605049][T17961] ? clear_bhb_loop+0x60/0xb0 [ 732.605079][T17961] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 732.605098][T17961] RIP: 0033:0x7f9c0899acb9 [ 732.605122][T17961] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 732.605139][T17961] RSP: 002b:00007f9c09827028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 732.605160][T17961] RAX: ffffffffffffffda RBX: 00007f9c08c15fa0 RCX: 00007f9c0899acb9 [ 732.605174][T17961] RDX: 0000000000004000 RSI: 0000200000007800 RDI: 0000000000000004 [ 732.605188][T17961] RBP: 00007f9c09827090 R08: 0000000000000000 R09: 0000000000000000 [ 732.605199][T17961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 732.605211][T17961] R13: 00007f9c08c16038 R14: 00007f9c08c15fa0 R15: 00007ffdcb040f58 [ 732.605281][T17961] [ 733.054172][T17969] netlink: 774 bytes leftover after parsing attributes in process `syz.4.3992'. [ 733.101563][T17969] validate_nla: 6 callbacks suppressed [ 733.101586][T17969] netlink: 'syz.4.3992': attribute type 1 has an invalid length. [ 733.160156][T17969] netlink: 10 bytes leftover after parsing attributes in process `syz.4.3992'. [ 733.399225][T17979] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3997'. [ 733.609504][T17989] netlink: 'syz.2.4001': attribute type 4 has an invalid length. [ 733.757656][T17989] sctp: [Deprecated]: syz.2.4001 (pid 17989) Use of struct sctp_assoc_value in delayed_ack socket option. [ 733.757656][T17989] Use struct sctp_sack_info instead [ 733.927615][T17988] delete_channel: no stack [ 734.230206][T18007] FAULT_INJECTION: forcing a failure. [ 734.230206][T18007] name failslab, interval 1, probability 0, space 0, times 0 [ 734.264169][T18007] CPU: 1 UID: 0 PID: 18007 Comm: syz.1.4007 Not tainted syzkaller #0 PREEMPT(full) [ 734.264199][T18007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 734.264212][T18007] Call Trace: [ 734.264221][T18007] [ 734.264230][T18007] dump_stack_lvl+0xe8/0x150 [ 734.264264][T18007] should_fail_ex+0x412/0x560 [ 734.264293][T18007] should_failslab+0xa8/0x100 [ 734.264319][T18007] __kmalloc_noprof+0xde/0x7e0 [ 734.264338][T18007] ? nft_pernet+0x23/0x240 [ 734.264362][T18007] ? nf_tables_newrule+0x152c/0x28b0 [ 734.264391][T18007] nf_tables_newrule+0x152c/0x28b0 [ 734.264432][T18007] ? __pfx_nf_tables_newrule+0x10/0x10 [ 734.264452][T18007] ? nfnl_pernet+0x23/0x240 [ 734.264495][T18007] ? nfnl_pernet+0x23/0x240 [ 734.264531][T18007] ? __nla_parse+0x40/0x60 [ 734.264560][T18007] nfnetlink_rcv+0x1240/0x27b0 [ 734.264626][T18007] ? __pfx_nfnetlink_rcv+0x10/0x10 [ 734.264670][T18007] ? ref_tracker_free+0x693/0x840 [ 734.264727][T18007] ? __netlink_deliver_tap+0x807/0x850 [ 734.264754][T18007] ? netlink_deliver_tap+0x2e/0x1b0 [ 734.264801][T18007] netlink_unicast+0x80f/0x9b0 [ 734.264834][T18007] ? __pfx_netlink_unicast+0x10/0x10 [ 734.264857][T18007] ? __alloc_skb+0x193/0x390 [ 734.264888][T18007] ? netlink_sendmsg+0x650/0xb40 [ 734.264904][T18007] ? skb_put+0x11b/0x210 [ 734.264932][T18007] netlink_sendmsg+0x813/0xb40 [ 734.264950][T18007] ? irqentry_exit+0x59c/0x620 [ 734.264984][T18007] ? __pfx_netlink_sendmsg+0x10/0x10 [ 734.265015][T18007] ? __pfx_netlink_sendmsg+0x10/0x10 [ 734.265034][T18007] __sock_sendmsg+0x21c/0x270 [ 734.265060][T18007] ____sys_sendmsg+0x4d7/0x810 [ 734.265084][T18007] ? lockdep_hardirqs_on+0x7a/0x110 [ 734.265117][T18007] ? __pfx_____sys_sendmsg+0x10/0x10 [ 734.265154][T18007] ? import_iovec+0x73/0xa0 [ 734.265183][T18007] ___sys_sendmsg+0x2a5/0x360 [ 734.265207][T18007] ? __lock_acquire+0x6b5/0x2cf0 [ 734.265232][T18007] ? __pfx____sys_sendmsg+0x10/0x10 [ 734.265284][T18007] ? __fget_files+0x2a/0x420 [ 734.265322][T18007] ? __fget_files+0x2a/0x420 [ 734.265343][T18007] ? __fget_files+0x3a0/0x420 [ 734.265377][T18007] __x64_sys_sendmsg+0x1bd/0x2a0 [ 734.265406][T18007] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 734.265459][T18007] do_syscall_64+0xe2/0xf80 [ 734.265483][T18007] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 734.265502][T18007] ? clear_bhb_loop+0x60/0xb0 [ 734.265525][T18007] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 734.265544][T18007] RIP: 0033:0x7f28d839acb9 [ 734.265562][T18007] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 734.265578][T18007] RSP: 002b:00007f28d65f6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 734.265599][T18007] RAX: ffffffffffffffda RBX: 00007f28d8615fa0 RCX: 00007f28d839acb9 [ 734.265613][T18007] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000007 [ 734.265625][T18007] RBP: 00007f28d65f6090 R08: 0000000000000000 R09: 0000000000000000 [ 734.265637][T18007] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 734.265648][T18007] R13: 00007f28d8616038 R14: 00007f28d8615fa0 R15: 00007fffbeca7c18 [ 734.265685][T18007] [ 734.597155][T18009] FAULT_INJECTION: forcing a failure. [ 734.597155][T18009] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 734.610615][T18009] CPU: 1 UID: 0 PID: 18009 Comm: syz.2.4009 Not tainted syzkaller #0 PREEMPT(full) [ 734.610645][T18009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 734.610657][T18009] Call Trace: [ 734.610666][T18009] [ 734.610674][T18009] dump_stack_lvl+0xe8/0x150 [ 734.610707][T18009] should_fail_ex+0x412/0x560 [ 734.610736][T18009] _copy_from_user+0x2d/0xb0 [ 734.610763][T18009] get_user_ifreq+0x6b/0x180 [ 734.610788][T18009] sock_ioctl+0x704/0x7f0 [ 734.610810][T18009] ? __pfx_sock_ioctl+0x10/0x10 [ 734.610833][T18009] ? __fget_files+0x3a0/0x420 [ 734.610857][T18009] ? __fget_files+0x2a/0x420 [ 734.610893][T18009] ? bpf_lsm_file_ioctl+0x9/0x20 [ 734.610917][T18009] ? __pfx_sock_ioctl+0x10/0x10 [ 734.610937][T18009] __se_sys_ioctl+0xfc/0x170 [ 734.610961][T18009] do_syscall_64+0xe2/0xf80 [ 734.610986][T18009] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 734.611005][T18009] ? trace_irq_disable+0x37/0x100 [ 734.611028][T18009] ? clear_bhb_loop+0x60/0xb0 [ 734.611052][T18009] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 734.611070][T18009] RIP: 0033:0x7f8a8719acb9 [ 734.611089][T18009] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 734.611106][T18009] RSP: 002b:00007f8a8801c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 734.611128][T18009] RAX: ffffffffffffffda RBX: 00007f8a87415fa0 RCX: 00007f8a8719acb9 [ 734.611143][T18009] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000004 [ 734.611156][T18009] RBP: 00007f8a8801c090 R08: 0000000000000000 R09: 0000000000000000 [ 734.611169][T18009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 734.611181][T18009] R13: 00007f8a87416038 R14: 00007f8a87415fa0 R15: 00007ffedbc02838 [ 734.611218][T18009] [ 735.631060][T18049] FAULT_INJECTION: forcing a failure. [ 735.631060][T18049] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 735.695132][T18049] CPU: 0 UID: 0 PID: 18049 Comm: syz.7.4024 Not tainted syzkaller #0 PREEMPT(full) [ 735.695162][T18049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 735.695174][T18049] Call Trace: [ 735.695186][T18049] [ 735.695198][T18049] dump_stack_lvl+0xe8/0x150 [ 735.695243][T18049] should_fail_ex+0x412/0x560 [ 735.695294][T18049] _copy_from_user+0x2d/0xb0 [ 735.695333][T18049] ___sys_sendmsg+0x1c6/0x360 [ 735.695363][T18049] ? __lock_acquire+0x6b5/0x2cf0 [ 735.695409][T18049] ? __pfx____sys_sendmsg+0x10/0x10 [ 735.695592][T18049] ? __fget_files+0x2a/0x420 [ 735.695621][T18049] ? __fget_files+0x3a0/0x420 [ 735.695694][T18049] __x64_sys_sendmsg+0x1bd/0x2a0 [ 735.695738][T18049] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 735.695760][T18049] ? perf_trace_preemptirq_template+0xab/0x340 [ 735.695832][T18049] ? __pfx_ksys_write+0x10/0x10 [ 735.695913][T18049] do_syscall_64+0xe2/0xf80 [ 735.695948][T18049] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 735.695966][T18049] ? trace_irq_disable+0x37/0x100 [ 735.695988][T18049] ? clear_bhb_loop+0x60/0xb0 [ 735.696026][T18049] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 735.696046][T18049] RIP: 0033:0x7f12e259acb9 [ 735.696071][T18049] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 735.696087][T18049] RSP: 002b:00007f12e34ed028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 735.696109][T18049] RAX: ffffffffffffffda RBX: 00007f12e2815fa0 RCX: 00007f12e259acb9 [ 735.696124][T18049] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000003 [ 735.696136][T18049] RBP: 00007f12e34ed090 R08: 0000000000000000 R09: 0000000000000000 [ 735.696147][T18049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 735.696158][T18049] R13: 00007f12e2816038 R14: 00007f12e2815fa0 R15: 00007fff90750f38 [ 735.696252][T18049] [ 735.933772][T18055] __nla_validate_parse: 7 callbacks suppressed [ 735.933803][T18055] netlink: 292 bytes leftover after parsing attributes in process `syz.2.4026'. [ 736.967390][T18079] netlink: 5 bytes leftover after parsing attributes in process `syz.1.4035'. [ 737.229612][ T30] audit: type=1107 audit(1768913542.497:26): pid=18095 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 737.510015][T18111] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 737.574218][T18107] siw: device registration error -23 [ 737.845371][T18126] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 737.898851][T18134] netlink: 4 bytes leftover after parsing attributes in process `syz.9.4058'. [ 738.014396][T18142] openvswitch: netlink: Missing key (keys=40, expected=200000) [ 739.028254][T18203] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 739.045365][T18199] netlink: 60 bytes leftover after parsing attributes in process `syz.1.4076'. [ 739.071043][T18199] netlink: 60 bytes leftover after parsing attributes in process `syz.1.4076'. [ 739.097258][T18199] netlink: 60 bytes leftover after parsing attributes in process `syz.1.4076'. [ 739.778423][T18234] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 741.033319][T18277] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 741.146665][T18286] FAULT_INJECTION: forcing a failure. [ 741.146665][T18286] name failslab, interval 1, probability 0, space 0, times 0 [ 741.147827][T18283] netlink: 5 bytes leftover after parsing attributes in process `syz.9.4108'. [ 741.198821][T18286] CPU: 1 UID: 0 PID: 18286 Comm: syz.2.4110 Not tainted syzkaller #0 PREEMPT(full) [ 741.198850][T18286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 741.198863][T18286] Call Trace: [ 741.198872][T18286] [ 741.198881][T18286] dump_stack_lvl+0xe8/0x150 [ 741.198913][T18286] should_fail_ex+0x412/0x560 [ 741.198950][T18286] should_failslab+0xa8/0x100 [ 741.198977][T18286] __kmalloc_cache_node_noprof+0x87/0x6d0 [ 741.199000][T18286] ? __get_vm_area_node+0x13f/0x300 [ 741.199032][T18286] __get_vm_area_node+0x13f/0x300 [ 741.199063][T18286] __vmalloc_node_range_noprof+0x372/0x1730 [ 741.199083][T18286] ? bpf_prog_alloc_no_stats+0x4a/0x4f0 [ 741.199111][T18286] ? irqentry_exit+0x59c/0x620 [ 741.199136][T18286] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 741.199177][T18286] ? irqentry_exit+0x59c/0x620 [ 741.199202][T18286] ? __pfx___vmalloc_node_range_noprof+0x10/0x10 [ 741.199235][T18286] ? bpf_prog_alloc_no_stats+0x4a/0x4f0 [ 741.199257][T18286] __vmalloc_noprof+0xd2/0x120 [ 741.199276][T18286] ? bpf_prog_alloc_no_stats+0x4a/0x4f0 [ 741.199302][T18286] bpf_prog_alloc_no_stats+0x4a/0x4f0 [ 741.199330][T18286] bpf_prog_alloc+0x3c/0x1a0 [ 741.199357][T18286] bpf_prog_load+0x7ba/0x1ae0 [ 741.199392][T18286] ? trace_call_bpf+0x7d0/0xb70 [ 741.199414][T18286] ? __pfx_bpf_prog_load+0x10/0x10 [ 741.199439][T18286] ? __might_fault+0xaf/0x130 [ 741.199483][T18286] ? bpf_lsm_bpf+0x9/0x20 [ 741.199505][T18286] ? security_bpf+0x7e/0x2d0 [ 741.199532][T18286] __sys_bpf+0x618/0x950 [ 741.199558][T18286] ? __pfx___sys_bpf+0x10/0x10 [ 741.199611][T18286] __x64_sys_bpf+0x7c/0x90 [ 741.199634][T18286] do_syscall_64+0xe2/0xf80 [ 741.199657][T18286] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 741.199676][T18286] ? clear_bhb_loop+0x60/0xb0 [ 741.199697][T18286] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 741.199716][T18286] RIP: 0033:0x7f8a8719acb9 [ 741.199734][T18286] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 741.199750][T18286] RSP: 002b:00007f8a8801c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 741.199771][T18286] RAX: ffffffffffffffda RBX: 00007f8a87415fa0 RCX: 00007f8a8719acb9 [ 741.199785][T18286] RDX: 0000000000000094 RSI: 0000200000000ac0 RDI: 0000000000000005 [ 741.199798][T18286] RBP: 00007f8a8801c090 R08: 0000000000000000 R09: 0000000000000000 [ 741.199810][T18286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 741.199822][T18286] R13: 00007f8a87416038 R14: 00007f8a87415fa0 R15: 00007ffedbc02838 [ 741.199852][T18286] [ 741.200017][T18286] syz.2.4110: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=/,mems_allowed=0-1 [ 741.498379][T18286] CPU: 1 UID: 0 PID: 18286 Comm: syz.2.4110 Not tainted syzkaller #0 PREEMPT(full) [ 741.498406][T18286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 741.498418][T18286] Call Trace: [ 741.498426][T18286] [ 741.498434][T18286] dump_stack_lvl+0xe8/0x150 [ 741.498466][T18286] warn_alloc+0x249/0x340 [ 741.498494][T18286] ? __pfx_warn_alloc+0x10/0x10 [ 741.498516][T18286] ? __get_vm_area_node+0x13f/0x300 [ 741.498547][T18286] ? __get_vm_area_node+0x2b5/0x300 [ 741.498579][T18286] __vmalloc_node_range_noprof+0x397/0x1730 [ 741.498602][T18286] ? irqentry_exit+0x59c/0x620 [ 741.498626][T18286] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 741.498667][T18286] ? irqentry_exit+0x59c/0x620 [ 741.498693][T18286] ? __pfx___vmalloc_node_range_noprof+0x10/0x10 [ 741.498724][T18286] ? bpf_prog_alloc_no_stats+0x4a/0x4f0 [ 741.498748][T18286] __vmalloc_noprof+0xd2/0x120 [ 741.498767][T18286] ? bpf_prog_alloc_no_stats+0x4a/0x4f0 [ 741.498793][T18286] bpf_prog_alloc_no_stats+0x4a/0x4f0 [ 741.498821][T18286] bpf_prog_alloc+0x3c/0x1a0 [ 741.498848][T18286] bpf_prog_load+0x7ba/0x1ae0 [ 741.498883][T18286] ? trace_call_bpf+0x7d0/0xb70 [ 741.498904][T18286] ? __pfx_bpf_prog_load+0x10/0x10 [ 741.498927][T18286] ? __might_fault+0xaf/0x130 [ 741.498972][T18286] ? bpf_lsm_bpf+0x9/0x20 [ 741.498993][T18286] ? security_bpf+0x7e/0x2d0 [ 741.499018][T18286] __sys_bpf+0x618/0x950 [ 741.499043][T18286] ? __pfx___sys_bpf+0x10/0x10 [ 741.499097][T18286] __x64_sys_bpf+0x7c/0x90 [ 741.499119][T18286] do_syscall_64+0xe2/0xf80 [ 741.499142][T18286] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 741.499167][T18286] ? clear_bhb_loop+0x60/0xb0 [ 741.499190][T18286] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 741.499208][T18286] RIP: 0033:0x7f8a8719acb9 [ 741.499227][T18286] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 741.499243][T18286] RSP: 002b:00007f8a8801c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 741.499264][T18286] RAX: ffffffffffffffda RBX: 00007f8a87415fa0 RCX: 00007f8a8719acb9 [ 741.499279][T18286] RDX: 0000000000000094 RSI: 0000200000000ac0 RDI: 0000000000000005 [ 741.499290][T18286] RBP: 00007f8a8801c090 R08: 0000000000000000 R09: 0000000000000000 [ 741.499302][T18286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 741.499315][T18286] R13: 00007f8a87416038 R14: 00007f8a87415fa0 R15: 00007ffedbc02838 [ 741.499346][T18286] [ 741.499382][T18286] Mem-Info: [ 741.759477][T18286] active_anon:22574 inactive_anon:0 isolated_anon:0 [ 741.759477][T18286] active_file:22495 inactive_file:40221 isolated_file:0 [ 741.759477][T18286] unevictable:768 dirty:264 writeback:0 [ 741.759477][T18286] slab_reclaimable:7446 slab_unreclaimable:100213 [ 741.759477][T18286] mapped:29791 shmem:1356 pagetables:1235 [ 741.759477][T18286] sec_pagetables:0 bounce:0 [ 741.759477][T18286] kernel_misc_reclaimable:0 [ 741.759477][T18286] free:1288223 free_pcp:14184 free_cma:0 [ 741.809936][T18286] Node 0 active_anon:90296kB inactive_anon:0kB active_file:89980kB inactive_file:160684kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:119164kB dirty:1052kB writeback:0kB shmem:3888kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB kernel_stack:11732kB pagetables:4780kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 741.865102][T18286] Node 1 active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:200kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:1536kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB kernel_stack:64kB pagetables:160kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 741.901022][T18286] Node 0 DMA free:15360kB boost:0kB min:204kB low:252kB high:300kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 741.938604][T18286] lowmem_reserve[]: 0 2497 2498 2498 2498 [ 741.945886][T18286] Node 0 DMA32 free:1243396kB boost:0kB min:34232kB low:42788kB high:51344kB reserved_highatomic:0KB free_highatomic:0KB active_anon:90196kB inactive_anon:0kB active_file:89980kB inactive_file:160684kB unevictable:1536kB writepending:1052kB zspages:0kB present:3129332kB managed:2557036kB mlocked:0kB bounce:0kB free_pcp:49996kB local_pcp:21060kB free_cma:0kB [ 742.003954][T18286] lowmem_reserve[]: 0 0 1 1 1 [ 742.008835][T18286] Node 0 Normal free:0kB boost:0kB min:16kB low:20kB high:24kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:1048580kB managed:1388kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 742.038830][T18286] lowmem_reserve[]: 0 0 0 0 0 [ 742.043601][T18286] Node 1 Normal free:3894136kB boost:0kB min:55652kB low:69564kB high:83476kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:200kB unevictable:1536kB writepending:4kB zspages:0kB present:4194300kB managed:4111100kB mlocked:0kB bounce:0kB free_pcp:7520kB local_pcp:2144kB free_cma:0kB [ 742.079110][T18286] lowmem_reserve[]: 0 0 0 0 0 [ 742.083876][T18286] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 742.148741][T18286] Node 0 DMA32: 4188*4kB (UME) 3536*8kB (UME) 3191*16kB (UME) 2658*32kB (UME) 2111*64kB (UME) 760*128kB (UME) 279*256kB (UME) 181*512kB (UME) 221*1024kB (UME) 107*2048kB (UME) 54*4096kB (UM) = 1244256kB [ 742.208194][T18286] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 742.264334][T18286] Node 1 Normal: 194*4kB (UME) 54*8kB (UME) 48*16kB (UME) 240*32kB (UME) 77*64kB (UME) 19*128kB (UME) 5*256kB (UME) 4*512kB (UME) 3*1024kB (UME) 2*2048kB (UE) 944*4096kB (M) = 3894136kB [ 742.320359][T18286] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 742.336830][T18286] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 742.356621][T18286] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 742.375868][T18286] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 742.398436][T18286] 66200 total pagecache pages [ 742.403160][T18286] 0 pages in swap cache [ 742.424889][T18286] Free swap = 124996kB [ 742.434973][T18286] Total swap = 124996kB [ 742.439147][T18286] 2097051 pages RAM [ 742.453165][T18286] 0 pages HighMem/MovableOnly [ 742.460299][T18286] 425830 pages reserved [ 742.464612][T18286] 0 pages cma reserved [ 742.478905][T18319] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 742.509294][T18319] netlink: 4456 bytes leftover after parsing attributes in process `syz.4.4122'. [ 742.532235][T18320] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4123'. [ 742.571894][T18320] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4123'. [ 742.625349][T18325] netlink: 5 bytes leftover after parsing attributes in process `syz.2.4125'. [ 743.366856][T18352] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 743.386599][T18352] netlink: 4456 bytes leftover after parsing attributes in process `syz.9.4138'. [ 743.608898][T18356] netlink: 5 bytes leftover after parsing attributes in process `syz.1.4139'. [ 743.940915][ T30] audit: type=1107 audit(1768913549.207:27): pid=18375 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 744.257844][T18387] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 744.289598][T18387] netlink: 4456 bytes leftover after parsing attributes in process `syz.4.4152'. [ 745.081207][T18411] netlink: 5 bytes leftover after parsing attributes in process `syz.4.4159'. [ 745.111883][T18409] syzkaller0: entered promiscuous mode [ 745.567681][T18430] FAULT_INJECTION: forcing a failure. [ 745.567681][T18430] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 745.622119][T18430] CPU: 1 UID: 0 PID: 18430 Comm: syz.2.4162 Not tainted syzkaller #0 PREEMPT(full) [ 745.622149][T18430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 745.622161][T18430] Call Trace: [ 745.622170][T18430] [ 745.622178][T18430] dump_stack_lvl+0xe8/0x150 [ 745.622209][T18430] should_fail_ex+0x412/0x560 [ 745.622235][T18430] _copy_from_iter+0x1d3/0x1670 [ 745.622262][T18430] ? trace_kmalloc+0x1f/0xb0 [ 745.622285][T18430] ? __pfx__copy_from_iter+0x10/0x10 [ 745.622305][T18430] ? __build_skb_around+0x22d/0x3c0 [ 745.622329][T18430] ? __alloc_skb+0x193/0x390 [ 745.622349][T18430] ? netlink_sendmsg+0x650/0xb40 [ 745.622364][T18430] ? skb_put+0x11b/0x210 [ 745.622388][T18430] netlink_sendmsg+0x6c0/0xb40 [ 745.622410][T18430] ? __pfx_netlink_sendmsg+0x10/0x10 [ 745.622428][T18430] ? lockdep_hardirqs_on+0x7a/0x110 [ 745.622449][T18430] ? aa_sock_msg_perm+0xf1/0x1b0 [ 745.622475][T18430] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 745.622507][T18430] ? __pfx_netlink_sendmsg+0x10/0x10 [ 745.622522][T18430] __sock_sendmsg+0x21c/0x270 [ 745.622543][T18430] ____sys_sendmsg+0x4d7/0x810 [ 745.622575][T18430] ? __pfx_____sys_sendmsg+0x10/0x10 [ 745.622606][T18430] ? import_iovec+0x73/0xa0 [ 745.622632][T18430] ___sys_sendmsg+0x2a5/0x360 [ 745.622654][T18430] ? __lock_acquire+0x6b5/0x2cf0 [ 745.622676][T18430] ? __pfx____sys_sendmsg+0x10/0x10 [ 745.622725][T18430] ? __fget_files+0x2a/0x420 [ 745.622747][T18430] ? __fget_files+0x3a0/0x420 [ 745.622777][T18430] __x64_sys_sendmsg+0x1bd/0x2a0 [ 745.622802][T18430] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 745.622848][T18430] do_syscall_64+0xe2/0xf80 [ 745.622870][T18430] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 745.622887][T18430] ? clear_bhb_loop+0x60/0xb0 [ 745.622906][T18430] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 745.622923][T18430] RIP: 0033:0x7f8a8719acb9 [ 745.622940][T18430] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 745.622955][T18430] RSP: 002b:00007f8a87ffb028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 745.622975][T18430] RAX: ffffffffffffffda RBX: 00007f8a87416090 RCX: 00007f8a8719acb9 [ 745.622988][T18430] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000009 [ 745.622998][T18430] RBP: 00007f8a87ffb090 R08: 0000000000000000 R09: 0000000000000000 [ 745.623008][T18430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 745.623019][T18430] R13: 00007f8a87416128 R14: 00007f8a87416090 R15: 00007ffedbc02838 [ 745.623048][T18430] [ 746.003475][T18435] netlink: 'syz.7.4165': attribute type 33 has an invalid length. [ 746.025344][T18435] netlink: 152 bytes leftover after parsing attributes in process `syz.7.4165'. [ 746.245337][T18442] netlink: 8 bytes leftover after parsing attributes in process `syz.9.4170'. [ 746.263953][T18442] netlink: 312 bytes leftover after parsing attributes in process `syz.9.4170'. [ 746.567542][ T30] audit: type=1107 audit(1768913551.837:28): pid=18451 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 747.171570][ T30] audit: type=1107 audit(1768913552.437:29): pid=18459 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 748.079788][T18450] netlink: 164 bytes leftover after parsing attributes in process `syz.9.4170'. [ 748.110580][T18463] žÿ: renamed from bond0 [ 748.276387][T18471] netlink: 'syz.1.4178': attribute type 6 has an invalid length. [ 748.705176][ T30] audit: type=1107 audit(1768913553.967:30): pid=18491 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 748.792359][T18494] netlink: 284 bytes leftover after parsing attributes in process `syz.2.4186'. [ 748.910684][T18501] netlink: 126588 bytes leftover after parsing attributes in process `syz.4.4188'. [ 749.149389][T18504] netlink: 'syz.4.4188': attribute type 29 has an invalid length. [ 749.763840][T18511] netlink: 104 bytes leftover after parsing attributes in process `syz.7.4191'. [ 749.953905][T18528] netlink: 8 bytes leftover after parsing attributes in process `syz.9.4197'. [ 749.968743][T18528] netlink: 8 bytes leftover after parsing attributes in process `syz.9.4197'. [ 750.132724][T18524] netlink: 'syz.4.4195': attribute type 10 has an invalid length. [ 750.159734][T18524] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 750.191595][T18524] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 750.256421][T18524] bond0: (slave batadv_slave_0): Enslaving as an active interface with an up link [ 750.387902][T18545] netlink: 12 bytes leftover after parsing attributes in process `syz.9.4201'. [ 750.738311][T18552] netlink: 5 bytes leftover after parsing attributes in process `syz.7.4207'. [ 752.066382][T18599] __nla_validate_parse: 1 callbacks suppressed [ 752.066402][T18599] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4225'. [ 752.146462][T18603] netlink: 60 bytes leftover after parsing attributes in process `syz.7.4227'. [ 752.176723][T18603] netlink: 60 bytes leftover after parsing attributes in process `syz.7.4227'. [ 752.200725][T18603] netlink: 60 bytes leftover after parsing attributes in process `syz.7.4227'. [ 752.390533][T18610] netlink: 'syz.1.4229': attribute type 10 has an invalid length. [ 755.814163][T18625] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 756.003341][T18628] netlink: 'syz.1.4236': attribute type 1 has an invalid length. [ 756.012436][T18628] netlink: 'syz.1.4236': attribute type 4 has an invalid length. [ 756.023808][T18628] netlink: 9462 bytes leftover after parsing attributes in process `syz.1.4236'. [ 756.036239][T18628] netlink: 'syz.1.4236': attribute type 1 has an invalid length. [ 756.044083][T18628] netlink: 'syz.1.4236': attribute type 4 has an invalid length. [ 756.068874][T18628] netlink: 9462 bytes leftover after parsing attributes in process `syz.1.4236'. [ 756.237220][T18633] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 756.428905][T18638] netlink: 20 bytes leftover after parsing attributes in process `syz.9.4241'. [ 756.436708][T18639] netlink: 'syz.1.4240': attribute type 5 has an invalid length. [ 756.455324][T18639] netlink: 44 bytes leftover after parsing attributes in process `syz.1.4240'. [ 756.570507][T18643] netlink: 60 bytes leftover after parsing attributes in process `syz.7.4242'. [ 756.620177][T18643] netlink: 60 bytes leftover after parsing attributes in process `syz.7.4242'. [ 757.057526][T18653] netlink: 'syz.1.4246': attribute type 1 has an invalid length. [ 757.841498][T18660] netlink: 'syz.7.4248': attribute type 10 has an invalid length. [ 757.910909][T18660] team0: Device vxcan1 is of different type [ 758.117251][T18666] __nla_validate_parse: 1 callbacks suppressed [ 758.117300][T18666] netlink: 5 bytes leftover after parsing attributes in process `syz.4.4250'. [ 758.206905][T18674] FAULT_INJECTION: forcing a failure. [ 758.206905][T18674] name failslab, interval 1, probability 0, space 0, times 0 [ 758.254979][T18674] CPU: 0 UID: 0 PID: 18674 Comm: syz.1.4253 Not tainted syzkaller #0 PREEMPT(full) [ 758.255008][T18674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 758.255021][T18674] Call Trace: [ 758.255030][T18674] [ 758.255039][T18674] dump_stack_lvl+0xe8/0x150 [ 758.255073][T18674] should_fail_ex+0x412/0x560 [ 758.255102][T18674] should_failslab+0xa8/0x100 [ 758.255128][T18674] __kmalloc_noprof+0xde/0x7e0 [ 758.255150][T18674] ? tomoyo_encode+0x28b/0x550 [ 758.255174][T18674] ? tomoyo_realpath_from_path+0x5a2/0x5d0 [ 758.255205][T18674] tomoyo_encode+0x28b/0x550 [ 758.255237][T18674] tomoyo_mount_permission+0x4c1/0x9d0 [ 758.255265][T18674] ? tomoyo_mount_permission+0x2b3/0x9d0 [ 758.255289][T18674] ? __pfx_tomoyo_mount_permission+0x10/0x10 [ 758.255378][T18674] security_sb_mount+0xe4/0x320 [ 758.255410][T18674] path_mount+0xbc/0x1000 [ 758.255434][T18674] ? kmem_cache_free+0x195/0x610 [ 758.255453][T18674] ? user_path_at+0x44/0x60 [ 758.255481][T18674] __se_sys_mount+0x31d/0x420 [ 758.255519][T18674] ? __pfx___se_sys_mount+0x10/0x10 [ 758.255551][T18674] ? __x64_sys_mount+0x20/0xc0 [ 758.255577][T18674] do_syscall_64+0xe2/0xf80 [ 758.255602][T18674] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 758.255621][T18674] ? clear_bhb_loop+0x60/0xb0 [ 758.255644][T18674] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 758.255662][T18674] RIP: 0033:0x7f28d839acb9 [ 758.255681][T18674] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 758.255697][T18674] RSP: 002b:00007f28d65f6028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 758.255719][T18674] RAX: ffffffffffffffda RBX: 00007f28d8615fa0 RCX: 00007f28d839acb9 [ 758.255733][T18674] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000000 [ 758.255746][T18674] RBP: 00007f28d65f6090 R08: 0000200000000340 R09: 0000000000000000 [ 758.255758][T18674] R10: 0000000000140070 R11: 0000000000000246 R12: 0000000000000001 [ 758.255769][T18674] R13: 00007f28d8616038 R14: 00007f28d8615fa0 R15: 00007fffbeca7c18 [ 758.255801][T18674] [ 758.772960][T18679] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 758.990284][T18685] netlink: 60 bytes leftover after parsing attributes in process `syz.4.4258'. [ 759.001502][T18682] netlink: 60 bytes leftover after parsing attributes in process `syz.4.4258'. [ 759.011712][T18682] netlink: 60 bytes leftover after parsing attributes in process `syz.4.4258'. [ 759.814922][T17313] Bluetooth: hci1: command 0x0406 tx timeout [ 760.206856][T18713] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 760.357029][T18715] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 761.237712][T18738] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 761.385806][ T30] audit: type=1107 audit(1768913566.637:31): pid=18740 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 762.077158][T18750] FAULT_INJECTION: forcing a failure. [ 762.077158][T18750] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 762.113535][T18750] CPU: 0 UID: 0 PID: 18750 Comm: syz.9.4280 Not tainted syzkaller #0 PREEMPT(full) [ 762.113564][T18750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 762.113577][T18750] Call Trace: [ 762.113586][T18750] [ 762.113595][T18750] dump_stack_lvl+0xe8/0x150 [ 762.113628][T18750] should_fail_ex+0x412/0x560 [ 762.113657][T18750] _copy_to_user+0x31/0xb0 [ 762.113686][T18750] put_user_ifreq+0x6a/0xc0 [ 762.113708][T18750] sock_do_ioctl+0x26d/0x320 [ 762.113732][T18750] ? __pfx_sock_do_ioctl+0x10/0x10 [ 762.113748][T18750] ? __mutex_unlock_slowpath+0x1bd/0x7d0 [ 762.113794][T18750] sock_ioctl+0x5c6/0x7f0 [ 762.113817][T18750] ? __pfx_sock_ioctl+0x10/0x10 [ 762.113836][T18750] ? __fget_files+0x2a/0x420 [ 762.113860][T18750] ? __fget_files+0x3a0/0x420 [ 762.113882][T18750] ? __fget_files+0x2a/0x420 [ 762.113910][T18750] ? bpf_lsm_file_ioctl+0x9/0x20 [ 762.113933][T18750] ? __pfx_sock_ioctl+0x10/0x10 [ 762.113952][T18750] __se_sys_ioctl+0xfc/0x170 [ 762.113976][T18750] do_syscall_64+0xe2/0xf80 [ 762.113999][T18750] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 762.114018][T18750] ? trace_irq_disable+0x37/0x100 [ 762.114041][T18750] ? clear_bhb_loop+0x60/0xb0 [ 762.114065][T18750] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 762.114083][T18750] RIP: 0033:0x7f146d19acb9 [ 762.114102][T18750] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 762.114119][T18750] RSP: 002b:00007f146df6f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 762.114140][T18750] RAX: ffffffffffffffda RBX: 00007f146d415fa0 RCX: 00007f146d19acb9 [ 762.114155][T18750] RDX: 0000200000000080 RSI: 0000000000008910 RDI: 0000000000000006 [ 762.114167][T18750] RBP: 00007f146df6f090 R08: 0000000000000000 R09: 0000000000000000 [ 762.114186][T18750] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 762.114197][T18750] R13: 00007f146d416038 R14: 00007f146d415fa0 R15: 00007fff9c2df928 [ 762.114232][T18750] [ 762.568051][T18757] FAULT_INJECTION: forcing a failure. [ 762.568051][T18757] name failslab, interval 1, probability 0, space 0, times 0 [ 762.614991][T18757] CPU: 0 UID: 0 PID: 18757 Comm: syz.7.4283 Not tainted syzkaller #0 PREEMPT(full) [ 762.615021][T18757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 762.615032][T18757] Call Trace: [ 762.615041][T18757] [ 762.615050][T18757] dump_stack_lvl+0xe8/0x150 [ 762.615081][T18757] should_fail_ex+0x412/0x560 [ 762.615109][T18757] should_failslab+0xa8/0x100 [ 762.615142][T18757] kmem_cache_alloc_noprof+0x87/0x6e0 [ 762.615172][T18757] ? security_file_alloc+0x34/0x310 [ 762.615199][T18757] security_file_alloc+0x34/0x310 [ 762.615221][T18757] init_file+0x93/0x2f0 [ 762.615248][T18757] alloc_empty_file+0x6e/0x1d0 [ 762.615273][T18757] path_openat+0x11e/0x3e20 [ 762.615302][T18757] ? stack_trace_save+0xa9/0x100 [ 762.615331][T18757] ? __pfx_stack_trace_save+0x10/0x10 [ 762.615361][T18757] ? __pfx_filemap_map_pages+0x10/0x10 [ 762.615383][T18757] ? kasan_save_track+0x4f/0x80 [ 762.615400][T18757] ? kasan_save_track+0x3e/0x80 [ 762.615416][T18757] ? __kasan_slab_alloc+0x6c/0x80 [ 762.615435][T18757] ? kmem_cache_alloc_noprof+0x370/0x6e0 [ 762.615459][T18757] ? getname_flags+0xb7/0x540 [ 762.615478][T18757] ? do_sys_openat2+0xca/0x220 [ 762.615502][T18757] ? __pfx_path_openat+0x10/0x10 [ 762.615523][T18757] ? __lock_acquire+0x6b5/0x2cf0 [ 762.615555][T18757] do_filp_open+0x22d/0x490 [ 762.615577][T18757] ? __pfx_do_filp_open+0x10/0x10 [ 762.615616][T18757] ? _raw_spin_unlock+0x28/0x50 [ 762.615636][T18757] ? alloc_fd+0x64b/0x6c0 [ 762.615670][T18757] do_sys_openat2+0x12f/0x220 [ 762.615697][T18757] ? __pfx_do_sys_openat2+0x10/0x10 [ 762.615723][T18757] ? exc_page_fault+0x6a/0xc0 [ 762.615754][T18757] __x64_sys_openat+0x138/0x170 [ 762.615783][T18757] do_syscall_64+0xe2/0xf80 [ 762.615805][T18757] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 762.615823][T18757] ? trace_irq_disable+0x37/0x100 [ 762.615844][T18757] ? clear_bhb_loop+0x60/0xb0 [ 762.615863][T18757] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 762.615880][T18757] RIP: 0033:0x7f12e255b58e [ 762.615898][T18757] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 762.615913][T18757] RSP: 002b:00007f12e34ecec8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 762.615934][T18757] RAX: ffffffffffffffda RBX: 00007f12e34ed6c0 RCX: 00007f12e255b58e [ 762.615948][T18757] RDX: 0000000000000002 RSI: 00007f12e34ecf90 RDI: ffffffffffffff9c [ 762.615959][T18757] RBP: 00007f12e34ed090 R08: 0000000000000000 R09: 0000000000000000 [ 762.615972][T18757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 762.615983][T18757] R13: 00007f12e2816038 R14: 00007f12e2815fa0 R15: 00007fff90750f38 [ 762.616013][T18757] [ 762.945362][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 762.952039][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 763.405975][T18767] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 767.229359][T18762] Bluetooth: hci4: command 0x0406 tx timeout [ 767.235603][ T5837] Bluetooth: hci2: command 0x0406 tx timeout [ 767.794635][T17313] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 767.804545][T17313] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 767.826093][T17313] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 767.846675][T17313] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 767.855839][T17313] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 768.028151][T18781] erspan0 speed is unknown, defaulting to 1000 [ 768.278215][T18790] netlink: 'syz.7.4296': attribute type 1 has an invalid length. [ 768.296878][T18790] netlink: 'syz.7.4296': attribute type 4 has an invalid length. [ 768.335728][T18793] netlink: 'syz.7.4296': attribute type 1 has an invalid length. [ 768.343496][T18793] netlink: 'syz.7.4296': attribute type 4 has an invalid length. [ 768.353367][T18790] netlink: 9462 bytes leftover after parsing attributes in process `syz.7.4296'. [ 768.417356][T18793] netlink: 9462 bytes leftover after parsing attributes in process `syz.7.4296'. [ 768.451600][ T30] audit: type=1107 audit(1768913573.717:32): pid=18797 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 768.641497][T18781] chnl_net:caif_netlink_parms(): no params data found [ 768.896770][T18781] bridge0: port 1(bridge_slave_0) entered blocking state [ 768.914501][T18781] bridge0: port 1(bridge_slave_0) entered disabled state [ 768.929746][T18781] bridge_slave_0: entered allmulticast mode [ 768.940414][T18781] bridge_slave_0: entered promiscuous mode [ 768.950154][T18781] bridge0: port 2(bridge_slave_1) entered blocking state [ 768.957872][T18781] bridge0: port 2(bridge_slave_1) entered disabled state [ 768.966017][T18781] bridge_slave_1: entered allmulticast mode [ 768.977153][T18781] bridge_slave_1: entered promiscuous mode [ 769.051375][T18781] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 769.078803][T18781] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 769.181434][T18781] team0: Port device team_slave_0 added [ 769.198388][T18781] team0: Port device team_slave_1 added [ 769.318439][T18781] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 769.325461][T18781] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 769.394892][T18781] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 769.427773][T18781] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 769.456716][T18781] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 769.510544][T18781] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 769.638409][T18781] hsr_slave_0: entered promiscuous mode [ 769.649866][T18781] hsr_slave_1: entered promiscuous mode [ 769.657926][T18781] debugfs: 'hsr0' already exists in 'hsr' [ 769.663852][T18781] Cannot create hsr debugfs directory [ 769.732475][T18824] netlink: 8 bytes leftover after parsing attributes in process `syz.9.4306'. [ 769.766622][T18824] netlink: 8 bytes leftover after parsing attributes in process `syz.9.4306'. [ 769.776053][T18824] netlink: 112 bytes leftover after parsing attributes in process `syz.9.4306'. [ 769.896540][ T8374] Bluetooth: hci3: command tx timeout [ 770.078323][T18827] netlink: 'syz.7.4307': attribute type 10 has an invalid length. [ 770.349761][T18781] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 770.381461][ T30] audit: type=1107 audit(1768913575.647:33): pid=18838 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 770.421317][T18781] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 770.632403][T18781] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 770.670078][T18841] netlink: 28 bytes leftover after parsing attributes in process `syz.7.4313'. [ 770.736307][T18841] netlink: 28 bytes leftover after parsing attributes in process `syz.7.4313'. [ 770.802751][T18781] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 770.832164][T18844] netlink: 28 bytes leftover after parsing attributes in process `syz.7.4313'. [ 770.851896][T18844] netlink: 28 bytes leftover after parsing attributes in process `syz.7.4313'. [ 771.101889][T18852] netlink: 60 bytes leftover after parsing attributes in process `syz.9.4314'. [ 771.218304][T18781] 8021q: adding VLAN 0 to HW filter on device bond0 [ 771.281607][T18781] 8021q: adding VLAN 0 to HW filter on device team0 [ 771.319131][ T4440] bridge0: port 1(bridge_slave_0) entered blocking state [ 771.326369][ T4440] bridge0: port 1(bridge_slave_0) entered forwarding state [ 771.367866][ T4440] bridge0: port 2(bridge_slave_1) entered blocking state [ 771.375085][ T4440] bridge0: port 2(bridge_slave_1) entered forwarding state [ 771.614696][T18858] netlink: 'syz.4.4317': attribute type 1 has an invalid length. [ 771.635550][T18858] netlink: 'syz.4.4317': attribute type 4 has an invalid length. [ 771.661579][T18858] netlink: 'syz.4.4317': attribute type 1 has an invalid length. [ 771.680222][T18858] netlink: 'syz.4.4317': attribute type 4 has an invalid length. [ 771.975175][ T8374] Bluetooth: hci3: command tx timeout [ 772.055537][T18781] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 772.397680][T18875] netlink: 'syz.4.4323': attribute type 16 has an invalid length. [ 772.697698][ T30] audit: type=1107 audit(1768913577.947:34): pid=18887 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 772.931949][T18875] bridge0: port 2(bridge_slave_1) entered disabled state [ 772.943016][T18875] bridge0: port 1(bridge_slave_0) entered disabled state [ 773.169056][T18894] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 773.602468][T18875] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 773.937996][T17313] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 773.949894][T17313] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 773.958216][T17313] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 773.966577][T17313] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 773.974238][T17313] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 774.054911][ T8374] Bluetooth: hci3: command tx timeout [ 774.162762][ T50] netdevsim netdevsim4 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 774.185013][ T50] netdevsim netdevsim4 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 774.234934][ T50] netdevsim netdevsim4 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 774.277778][ T50] netdevsim netdevsim4 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 774.405653][T18902] erspan0 speed is unknown, defaulting to 1000 [ 774.482354][T18781] veth0_vlan: entered promiscuous mode [ 774.648032][ T4440] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 774.678103][T18781] veth1_vlan: entered promiscuous mode [ 774.747889][ T4440] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 774.839762][ T4440] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 774.875799][T18781] veth0_macvtap: entered promiscuous mode [ 774.979325][ T4440] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 775.012172][T18781] veth1_macvtap: entered promiscuous mode [ 775.054064][T18902] chnl_net:caif_netlink_parms(): no params data found [ 775.071381][ T30] audit: type=1107 audit(1768913580.337:35): pid=18928 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 775.080031][T18931] __nla_validate_parse: 8 callbacks suppressed [ 775.080064][T18931] netlink: 4 bytes leftover after parsing attributes in process `syz.9.4339'. [ 775.298486][T18781] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 775.378268][T18902] bridge0: port 1(bridge_slave_0) entered blocking state [ 775.385879][T18902] bridge0: port 1(bridge_slave_0) entered disabled state [ 775.393709][T18902] bridge_slave_0: entered allmulticast mode [ 775.402665][T18902] bridge_slave_0: entered promiscuous mode [ 775.414733][T18781] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 775.438186][T18902] bridge0: port 2(bridge_slave_1) entered blocking state [ 775.445803][T18902] bridge0: port 2(bridge_slave_1) entered disabled state [ 775.455765][T18902] bridge_slave_1: entered allmulticast mode [ 775.462910][T18902] bridge_slave_1: entered promiscuous mode [ 775.536097][ T50] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 775.555103][ T50] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 775.563843][ T50] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 775.598626][T18902] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 775.609475][ T50] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 775.632216][T18951] validate_nla: 1 callbacks suppressed [ 775.632247][T18951] netlink: 'syz.4.4345': attribute type 46 has an invalid length. [ 775.650088][T18902] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 775.665524][T18951] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4345'. [ 775.714431][ T4440] bridge_slave_1: left allmulticast mode [ 775.720359][ T4440] bridge_slave_1: left promiscuous mode [ 775.726331][ T4440] bridge0: port 2(bridge_slave_1) entered disabled state [ 775.742097][ T4440] bridge_slave_0: left allmulticast mode [ 775.747940][ T4440] bridge_slave_0: left promiscuous mode [ 775.755309][ T4440] bridge0: port 1(bridge_slave_0) entered disabled state [ 775.818472][T18955] netlink: 'syz.9.4344': attribute type 10 has an invalid length. [ 776.047010][T18961] netlink: 'syz.7.4348': attribute type 10 has an invalid length. [ 776.065273][ T8374] Bluetooth: hci2: command tx timeout [ 776.136207][ T8374] Bluetooth: hci3: command tx timeout [ 778.145137][ T8374] Bluetooth: hci2: command tx timeout [ 778.151211][ T4440] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 778.161334][ T4440] bond_slave_0: left promiscuous mode [ 778.168677][ T4440] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 778.177519][ T4440] bond_slave_1: left promiscuous mode [ 778.184482][ T4440] bond0 (unregistering): (slave batadv0): Releasing backup interface [ 778.193231][ T4440] batadv0: left promiscuous mode [ 778.198691][ T4440] bond0 (unregistering): Released all slaves [ 778.211934][T18902] team0: Port device team_slave_0 added [ 778.226206][T18955] team0: Device ipvlan1 failed to register rx_handler [ 778.239401][T18961] netdevsim netdevsim7 netdevsim0: entered promiscuous mode [ 778.347213][T18902] team0: Port device team_slave_1 added [ 778.441383][T18973] netlink: 'syz.4.4352': attribute type 33 has an invalid length. [ 778.461816][T18973] netlink: 152 bytes leftover after parsing attributes in process `syz.4.4352'. [ 778.480900][T18902] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 778.488501][T18902] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 778.515839][T18902] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 778.573510][T18902] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 778.588669][T18902] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 778.619612][T18902] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 778.627071][T18981] siw: device registration error -23 [ 778.765611][T18902] hsr_slave_0: entered promiscuous mode [ 778.787991][T18902] hsr_slave_1: entered promiscuous mode [ 778.811580][T18902] debugfs: 'hsr0' already exists in 'hsr' [ 778.822201][T18902] Cannot create hsr debugfs directory [ 778.832598][ T36] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 778.855733][ T36] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 778.882004][ T4440] hsr_slave_0: left promiscuous mode [ 778.906346][ T4440] hsr_slave_1: left promiscuous mode [ 778.915288][ T4440] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 778.922878][ T4440] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 778.924084][T18988] FAULT_INJECTION: forcing a failure. [ 778.924084][T18988] name failslab, interval 1, probability 0, space 0, times 0 [ 778.943483][T18988] CPU: 1 UID: 0 PID: 18988 Comm: syz.7.4358 Not tainted syzkaller #0 PREEMPT(full) [ 778.943505][T18988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 778.943515][T18988] Call Trace: [ 778.943523][T18988] [ 778.943532][T18988] dump_stack_lvl+0xe8/0x150 [ 778.943563][T18988] should_fail_ex+0x412/0x560 [ 778.943584][T18988] should_failslab+0xa8/0x100 [ 778.943601][T18988] __kmalloc_cache_noprof+0x83/0x6e0 [ 778.943614][T18988] ? sctp_add_bind_addr+0x8c/0x370 [ 778.943629][T18988] sctp_add_bind_addr+0x8c/0x370 [ 778.943641][T18988] sctp_copy_local_addr_list+0x314/0x4f0 [ 778.943655][T18988] ? sctp_copy_local_addr_list+0xa4/0x4f0 [ 778.943666][T18988] ? __pfx_sctp_copy_local_addr_list+0x10/0x10 [ 778.943679][T18988] ? sctp_v4_is_any+0x35/0x60 [ 778.943690][T18988] ? sctp_copy_one_addr+0x93/0x360 [ 778.943702][T18988] sctp_bind_addr_copy+0xb3/0x3c0 [ 778.943713][T18988] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 778.943730][T18988] sctp_connect_new_asoc+0x2ff/0x6b0 [ 778.943746][T18988] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 778.943759][T18988] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 778.943773][T18988] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 778.943785][T18988] ? sctp_endpoint_lookup_assoc+0x7b/0x260 [ 778.943798][T18988] ? bpf_lsm_sctp_bind_connect+0x9/0x20 [ 778.943812][T18988] ? security_sctp_bind_connect+0x7e/0x2c0 [ 778.943827][T18988] sctp_sendmsg+0x1577/0x2920 [ 778.943847][T18988] ? __pfx_sctp_sendmsg+0x10/0x10 [ 778.943859][T18988] ? aa_sk_perm+0x82d/0x960 [ 778.943879][T18988] ? __pfx_aa_sk_perm+0x10/0x10 [ 778.943895][T18988] ? sock_rps_record_flow+0x19/0x400 [ 778.943907][T18988] ? inet_sendmsg+0x2f4/0x370 [ 778.943916][T18988] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 778.943928][T18988] __sock_sendmsg+0x19c/0x270 [ 778.943942][T18988] ____sys_sendmsg+0x4d7/0x810 [ 778.943963][T18988] ? __pfx_____sys_sendmsg+0x10/0x10 [ 778.943982][T18988] ? import_iovec+0x73/0xa0 [ 778.943999][T18988] ___sys_sendmsg+0x2a5/0x360 [ 778.944014][T18988] ? __lock_acquire+0x6b5/0x2cf0 [ 778.944027][T18988] ? __pfx____sys_sendmsg+0x10/0x10 [ 778.944061][T18988] ? __fget_files+0x2a/0x420 [ 778.944076][T18988] ? __fget_files+0x3a0/0x420 [ 778.944095][T18988] __x64_sys_sendmsg+0x1bd/0x2a0 [ 778.944111][T18988] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 778.944131][T18988] ? __pfx_ksys_write+0x10/0x10 [ 778.944149][T18988] do_syscall_64+0xe2/0xf80 [ 778.944164][T18988] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 778.944174][T18988] ? trace_irq_disable+0x37/0x100 [ 778.944188][T18988] ? clear_bhb_loop+0x60/0xb0 [ 778.944201][T18988] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 778.944212][T18988] RIP: 0033:0x7f12e259acb9 [ 778.944223][T18988] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 778.944232][T18988] RSP: 002b:00007f12e34ed028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 778.944245][T18988] RAX: ffffffffffffffda RBX: 00007f12e2815fa0 RCX: 00007f12e259acb9 [ 778.944253][T18988] RDX: 0000000000004000 RSI: 0000200000000200 RDI: 0000000000000003 [ 778.944260][T18988] RBP: 00007f12e34ed090 R08: 0000000000000000 R09: 0000000000000000 [ 778.944267][T18988] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 778.944273][T18988] R13: 00007f12e2816038 R14: 00007f12e2815fa0 R15: 00007fff90750f38 [ 778.944290][T18988] [ 778.945724][ T4440] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 779.287525][ T4440] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 779.308676][ T4440] veth1_macvtap: left promiscuous mode [ 779.314246][ T4440] veth0_macvtap: left promiscuous mode [ 779.320604][ T4440] veth1_vlan: left promiscuous mode [ 779.326980][ T4440] veth0_vlan: left promiscuous mode [ 779.615073][T18997] netlink: 'syz.7.4360': attribute type 10 has an invalid length. [ 779.813453][ T4440] team0 (unregistering): Port device team_slave_1 removed [ 779.853879][ T4440] team0 (unregistering): Port device team_slave_0 removed [ 780.215344][ T8374] Bluetooth: hci2: command tx timeout [ 780.217193][T18991] netlink: 5 bytes leftover after parsing attributes in process `syz.9.4357'. [ 780.283066][ T36] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 780.317067][ T36] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 780.475016][T19004] netlink: 60 bytes leftover after parsing attributes in process `syz.9.4363'. [ 780.512598][T19004] netlink: 60 bytes leftover after parsing attributes in process `syz.9.4363'. [ 780.539385][T19004] netlink: 60 bytes leftover after parsing attributes in process `syz.9.4363'. [ 780.691383][T19016] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 780.759476][T19012] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 780.902811][T19023] netlink: 'syz.4.4371': attribute type 6 has an invalid length. [ 781.217815][T18902] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 781.231891][T18902] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 781.248875][T18902] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 781.272523][T18902] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 781.425634][T18902] 8021q: adding VLAN 0 to HW filter on device bond0 [ 781.468312][T18902] 8021q: adding VLAN 0 to HW filter on device team0 [ 781.506254][ T8215] bridge0: port 1(bridge_slave_0) entered blocking state [ 781.513457][ T8215] bridge0: port 1(bridge_slave_0) entered forwarding state [ 781.621592][ T8374] Bluetooth: hci0: unexpected subevent 0x10 length: 150 > 2 [ 781.682511][ T36] bridge0: port 2(bridge_slave_1) entered blocking state [ 781.689983][ T36] bridge0: port 2(bridge_slave_1) entered forwarding state [ 781.798148][T19059] netlink: 92 bytes leftover after parsing attributes in process `syz.5.4383'. [ 782.283729][T18902] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 782.297995][ T8374] Bluetooth: hci2: command tx timeout [ 782.309450][T19088] netlink: 'syz.7.4391': attribute type 1 has an invalid length. [ 782.339025][T19088] netlink: 'syz.7.4391': attribute type 4 has an invalid length. [ 782.357256][T19090] FAULT_INJECTION: forcing a failure. [ 782.357256][T19090] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 782.365083][T18902] veth0_vlan: entered promiscuous mode [ 782.393854][T18902] veth1_vlan: entered promiscuous mode [ 782.400021][T19088] netlink: 9462 bytes leftover after parsing attributes in process `syz.7.4391'. [ 782.415565][T19090] CPU: 0 UID: 0 PID: 19090 Comm: syz.9.4394 Not tainted syzkaller #0 PREEMPT(full) [ 782.415591][T19090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 782.415604][T19090] Call Trace: [ 782.415611][T19090] [ 782.415620][T19090] dump_stack_lvl+0xe8/0x150 [ 782.415652][T19090] should_fail_ex+0x412/0x560 [ 782.415677][T19090] strncpy_from_user+0x36/0x2b0 [ 782.415702][T19090] getname_flags+0xf2/0x540 [ 782.415724][T19090] ? _copy_from_user+0x94/0xb0 [ 782.415752][T19090] user_path_at+0x24/0x60 [ 782.415772][T19090] __se_sys_mount+0x2dc/0x420 [ 782.415801][T19090] ? __pfx___se_sys_mount+0x10/0x10 [ 782.415830][T19090] ? __x64_sys_mount+0x20/0xc0 [ 782.415854][T19090] do_syscall_64+0xe2/0xf80 [ 782.415876][T19090] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 782.415893][T19090] ? trace_irq_disable+0x37/0x100 [ 782.415926][T19090] ? clear_bhb_loop+0x60/0xb0 [ 782.415948][T19090] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 782.415967][T19090] RIP: 0033:0x7f146d19acb9 [ 782.415985][T19090] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 782.416001][T19090] RSP: 002b:00007f146df6f028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 782.416022][T19090] RAX: ffffffffffffffda RBX: 00007f146d415fa0 RCX: 00007f146d19acb9 [ 782.416036][T19090] RDX: 0000000000000000 RSI: 0000200000000440 RDI: 0000200000000000 [ 782.416049][T19090] RBP: 00007f146df6f090 R08: 0000000000000000 R09: 0000000000000000 [ 782.416061][T19090] R10: 0000000000989046 R11: 0000000000000246 R12: 0000000000000001 [ 782.416072][T19090] R13: 00007f146d416038 R14: 00007f146d415fa0 R15: 00007fff9c2df928 [ 782.416103][T19090] [ 782.428466][T18902] veth0_macvtap: entered promiscuous mode [ 782.621756][T18902] veth1_macvtap: entered promiscuous mode [ 782.649321][T18902] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 782.666496][T18902] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 782.687102][ T3941] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 782.711871][ T3941] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 782.910314][ T3941] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 782.982115][ T3941] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 783.027835][T19095] netlink: 'syz.9.4395': attribute type 1 has an invalid length. [ 783.191883][T19102] netlink: 92 bytes leftover after parsing attributes in process `syz.9.4399'. [ 785.341181][ T12] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 785.375306][ T12] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 785.445513][ T8215] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 785.453375][ T8215] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 785.669283][T19120] FAULT_INJECTION: forcing a failure. [ 785.669283][T19120] name failslab, interval 1, probability 0, space 0, times 0 [ 785.682003][T19120] CPU: 0 UID: 0 PID: 19120 Comm: syz.0.4330 Not tainted syzkaller #0 PREEMPT(full) [ 785.682028][T19120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 785.682040][T19120] Call Trace: [ 785.682049][T19120] [ 785.682054][T19120] dump_stack_lvl+0xe8/0x150 [ 785.682076][T19120] should_fail_ex+0x412/0x560 [ 785.682093][T19120] should_failslab+0xa8/0x100 [ 785.682110][T19120] __kmalloc_cache_noprof+0x83/0x6e0 [ 785.682124][T19120] ? sctp_add_bind_addr+0x8c/0x370 [ 785.682140][T19120] sctp_add_bind_addr+0x8c/0x370 [ 785.682157][T19120] sctp_copy_local_addr_list+0x314/0x4f0 [ 785.682181][T19120] ? sctp_copy_local_addr_list+0xa4/0x4f0 [ 785.682201][T19120] ? __pfx_sctp_copy_local_addr_list+0x10/0x10 [ 785.682226][T19120] ? sctp_v4_is_any+0x35/0x60 [ 785.682241][T19120] ? sctp_copy_one_addr+0x93/0x360 [ 785.682253][T19120] sctp_bind_addr_copy+0xb3/0x3c0 [ 785.682266][T19120] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 785.682284][T19120] sctp_connect_new_asoc+0x2ff/0x6b0 [ 785.682300][T19120] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 785.682317][T19120] ? __local_bh_enable_ip+0xd0/0x130 [ 785.682329][T19120] ? bpf_lsm_sctp_bind_connect+0x9/0x20 [ 785.682342][T19120] ? security_sctp_bind_connect+0x7e/0x2c0 [ 785.682358][T19120] sctp_sendmsg+0x1577/0x2920 [ 785.682379][T19120] ? __pfx_sctp_sendmsg+0x10/0x10 [ 785.682392][T19120] ? aa_sk_perm+0x82d/0x960 [ 785.682413][T19120] ? __pfx_aa_sk_perm+0x10/0x10 [ 785.682429][T19120] ? sock_rps_record_flow+0x19/0x400 [ 785.682442][T19120] ? inet_sendmsg+0x2f4/0x370 [ 785.682455][T19120] __sock_sendmsg+0x19c/0x270 [ 785.682470][T19120] ____sys_sendmsg+0x4d7/0x810 [ 785.682491][T19120] ? __pfx_____sys_sendmsg+0x10/0x10 [ 785.682513][T19120] ? import_iovec+0x73/0xa0 [ 785.682530][T19120] ___sys_sendmsg+0x2a5/0x360 [ 785.682544][T19120] ? __lock_acquire+0x6b5/0x2cf0 [ 785.682558][T19120] ? __pfx____sys_sendmsg+0x10/0x10 [ 785.682586][T19120] ? __fget_files+0x2a/0x420 [ 785.682610][T19120] ? __fget_files+0x2a/0x420 [ 785.682623][T19120] ? __fget_files+0x3a0/0x420 [ 785.682643][T19120] __x64_sys_sendmsg+0x1bd/0x2a0 [ 785.682660][T19120] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 785.682682][T19120] ? __pfx_ksys_write+0x10/0x10 [ 785.682708][T19120] do_syscall_64+0xe2/0xf80 [ 785.682723][T19120] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 785.682733][T19120] ? trace_irq_disable+0x37/0x100 [ 785.682748][T19120] ? clear_bhb_loop+0x60/0xb0 [ 785.682761][T19120] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 785.682771][T19120] RIP: 0033:0x7f785e99acb9 [ 785.682783][T19120] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 785.682792][T19120] RSP: 002b:00007f785f8af028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 785.682804][T19120] RAX: ffffffffffffffda RBX: 00007f785ec16090 RCX: 00007f785e99acb9 [ 785.682813][T19120] RDX: 00000000000000fc RSI: 0000200000000600 RDI: 0000000000000004 [ 785.682819][T19120] RBP: 00007f785f8af090 R08: 0000000000000000 R09: 0000000000000000 [ 785.682826][T19120] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 785.682833][T19120] R13: 00007f785ec16128 R14: 00007f785ec16090 R15: 00007ffcc3cd7ec8 [ 785.682852][T19120] [ 786.489634][T19140] netlink: 92 bytes leftover after parsing attributes in process `syz.5.4413'. [ 789.417084][T19156] FAULT_INJECTION: forcing a failure. [ 789.417084][T19156] name failslab, interval 1, probability 0, space 0, times 0 [ 789.437111][T19156] CPU: 0 UID: 0 PID: 19156 Comm: syz.5.4418 Not tainted syzkaller #0 PREEMPT(full) [ 789.437137][T19156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 789.437150][T19156] Call Trace: [ 789.437158][T19156] [ 789.437166][T19156] dump_stack_lvl+0xe8/0x150 [ 789.437199][T19156] should_fail_ex+0x412/0x560 [ 789.437224][T19156] should_failslab+0xa8/0x100 [ 789.437248][T19156] __kmalloc_noprof+0xde/0x7e0 [ 789.437267][T19156] ? tomoyo_encode+0x28b/0x550 [ 789.437303][T19156] tomoyo_encode+0x28b/0x550 [ 789.437332][T19156] tomoyo_realpath_from_path+0x58d/0x5d0 [ 789.437357][T19156] ? tomoyo_domain+0xd7/0x130 [ 789.437384][T19156] ? tomoyo_path_number_perm+0x219/0x630 [ 789.437406][T19156] tomoyo_path_number_perm+0x246/0x630 [ 789.437431][T19156] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 789.437452][T19156] ? __lock_acquire+0x6b5/0x2cf0 [ 789.437485][T19156] ? __mutex_unlock_slowpath+0x1bd/0x7d0 [ 789.437529][T19156] ? __fget_files+0x2a/0x420 [ 789.437555][T19156] ? __fget_files+0x2a/0x420 [ 789.437577][T19156] ? __fget_files+0x3a0/0x420 [ 789.437598][T19156] ? __fget_files+0x2a/0x420 [ 789.437624][T19156] security_file_ioctl+0xc3/0x2a0 [ 789.437649][T19156] __se_sys_ioctl+0x47/0x170 [ 789.437672][T19156] do_syscall_64+0xe2/0xf80 [ 789.437694][T19156] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 789.437712][T19156] ? trace_irq_disable+0x37/0x100 [ 789.437735][T19156] ? clear_bhb_loop+0x60/0xb0 [ 789.437758][T19156] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 789.437776][T19156] RIP: 0033:0x7fe0da59acb9 [ 789.437794][T19156] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 789.437810][T19156] RSP: 002b:00007fe0d87f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 789.437831][T19156] RAX: ffffffffffffffda RBX: 00007fe0da815fa0 RCX: 00007fe0da59acb9 [ 789.437845][T19156] RDX: 0000200000000080 RSI: 00000000000089f2 RDI: 0000000000000004 [ 789.437857][T19156] RBP: 00007fe0d87f6090 R08: 0000000000000000 R09: 0000000000000000 [ 789.437869][T19156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 789.437880][T19156] R13: 00007fe0da816038 R14: 00007fe0da815fa0 R15: 00007ffe353bbe38 [ 789.437911][T19156] [ 789.437973][T19156] ERROR: Out of memory at tomoyo_realpath_from_path. [ 789.508509][T19160] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4419'. [ 789.644372][T19162] netlink: 12 bytes leftover after parsing attributes in process `syz.9.4420'. [ 789.688295][T19160] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4419'. [ 789.719028][T19162] netlink: 8 bytes leftover after parsing attributes in process `syz.9.4420'. [ 790.086066][T19176] netlink: 92 bytes leftover after parsing attributes in process `syz.5.4428'. [ 790.113845][T19177] netlink: 'syz.0.4426': attribute type 10 has an invalid length. [ 790.122268][T19177] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 790.141499][T19180] netlink: 5 bytes leftover after parsing attributes in process `syz.4.4429'. [ 790.164321][T19177] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 790.282970][T19177] bond0: (slave batadv_slave_0): Enslaving as an active interface with an up link [ 790.342072][T19189] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4431'. [ 790.482008][T19200] FAULT_INJECTION: forcing a failure. [ 790.482008][T19200] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 790.483790][T19200] [ 790.483800][T19200] ====================================================== [ 790.483808][T19200] WARNING: possible circular locking dependency detected [ 790.483831][T19200] syzkaller #0 Not tainted [ 790.483840][T19200] ------------------------------------------------------ [ 790.483848][T19200] syz.7.4434/19200 is trying to acquire lock: [ 790.483858][T19200] ffffffff8e3359a0 (console_owner){-.-.}-{0:0}, at: console_flush_all+0x123/0xb20 [ 790.483912][T19200] [ 790.483912][T19200] but task is already holding lock: [ 790.483919][T19200] ffff8880b863a918 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2a/0x140 [ 790.483960][T19200] [ 790.483960][T19200] which lock already depends on the new lock. [ 790.483960][T19200] [ 790.483966][T19200] [ 790.483966][T19200] the existing dependency chain (in reverse order) is: [ 790.483973][T19200] [ 790.483973][T19200] -> #4 (&rq->__lock){-.-.}-{2:2}: [ 790.483995][T19200] _raw_spin_lock_nested+0x32/0x50 [ 790.484017][T19200] raw_spin_rq_lock_nested+0x2a/0x140 [ 790.484034][T19200] task_rq_lock+0xbc/0x460 [ 790.484049][T19200] cgroup_move_task+0x9a/0x2b0 [ 790.484069][T19200] css_set_move_task+0x658/0x9e0 [ 790.484086][T19200] cgroup_post_fork+0x209/0x7d0 [ 790.484101][T19200] copy_process+0x365f/0x3980 [ 790.484120][T19200] kernel_clone+0x248/0x870 [ 790.484136][T19200] user_mode_thread+0x110/0x180 [ 790.484154][T19200] rest_init+0x23/0x300 [ 790.484168][T19200] start_kernel+0x380/0x3d0 [ 790.484183][T19200] x86_64_start_reservations+0x24/0x30 [ 790.484205][T19200] x86_64_start_kernel+0x143/0x1c0 [ 790.484225][T19200] common_startup_64+0x13e/0x147 [ 790.484248][T19200] [ 790.484248][T19200] -> #3 (&p->pi_lock){-.-.}-{2:2}: [ 790.484271][T19200] _raw_spin_lock_irqsave+0x40/0x60 [ 790.484289][T19200] try_to_wake_up+0x66/0x12a0 [ 790.484308][T19200] __wake_up_common_lock+0x137/0x1f0 [ 790.484329][T19200] tty_port_default_wakeup+0xfb/0x170 [ 790.484350][T19200] serial8250_tx_chars+0x72e/0x970 [ 790.484369][T19200] serial8250_handle_irq+0x633/0xbb0 [ 790.484386][T19200] serial8250_default_handle_irq+0xbf/0x200 [ 790.484406][T19200] serial8250_interrupt+0x8d/0x180 [ 790.484436][T19200] __handle_irq_event_percpu+0x216/0x960 [ 790.484458][T19200] handle_irq_event+0x8b/0x1e0 [ 790.484478][T19200] handle_edge_irq+0x23b/0xa10 [ 790.484498][T19200] __common_interrupt+0x141/0x1f0 [ 790.484521][T19200] common_interrupt+0xb6/0xe0 [ 790.484537][T19200] asm_common_interrupt+0x26/0x40 [ 790.484554][T19200] finish_task_switch+0x241/0x920 [ 790.484576][T19200] __schedule+0x14f7/0x4fb0 [ 790.484594][T19200] schedule+0x164/0x360 [ 790.484612][T19200] worker_thread+0xa81/0xd90 [ 790.484629][T19200] kthread+0x726/0x8b0 [ 790.484648][T19200] ret_from_fork+0x51b/0xa40 [ 790.484663][T19200] ret_from_fork_asm+0x1a/0x30 [ 790.484685][T19200] [ 790.484685][T19200] -> #2 (&tty->write_wait){-.-.}-{3:3}: [ 790.484709][T19200] _raw_spin_lock_irqsave+0x40/0x60 [ 790.484726][T19200] __wake_up_common_lock+0x2f/0x1f0 [ 790.484745][T19200] tty_port_default_wakeup+0xfb/0x170 [ 790.484765][T19200] serial8250_tx_chars+0x72e/0x970 [ 790.484781][T19200] serial8250_handle_irq+0x633/0xbb0 [ 790.484797][T19200] serial8250_default_handle_irq+0xbf/0x200 [ 790.484815][T19200] serial8250_interrupt+0x8d/0x180 [ 790.484836][T19200] __handle_irq_event_percpu+0x216/0x960 [ 790.484855][T19200] handle_irq_event+0x8b/0x1e0 [ 790.484875][T19200] handle_edge_irq+0x23b/0xa10 [ 790.484892][T19200] __common_interrupt+0x141/0x1f0 [ 790.484912][T19200] common_interrupt+0xb6/0xe0 [ 790.484926][T19200] asm_common_interrupt+0x26/0x40 [ 790.484940][T19200] _raw_spin_unlock_irqrestore+0x47/0x80 [ 790.484958][T19200] uart_port_unlock_deref+0x111/0x2f0 [ 790.484975][T19200] uart_write+0xe8/0x130 [ 790.484988][T19200] n_tty_write+0xd84/0x12a0 [ 790.485008][T19200] file_tty_write+0x559/0xa20 [ 790.485023][T19200] vfs_write+0x61d/0xb90 [ 790.485040][T19200] ksys_write+0x150/0x270 [ 790.485055][T19200] do_syscall_64+0xe2/0xf80 [ 790.485075][T19200] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 790.485090][T19200] [ 790.485090][T19200] -> #1 (&port_lock_key){-.-.}-{3:3}: [ 790.485115][T19200] _raw_spin_lock_irqsave+0x40/0x60 [ 790.485131][T19200] serial8250_console_write+0x150/0x1ba0 [ 790.485150][T19200] console_flush_all+0x718/0xb20 [ 790.485171][T19200] console_unlock+0xd1/0x1c0 [ 790.485187][T19200] vprintk_emit+0x485/0x560 [ 790.485205][T19200] _printk+0xdd/0x130 [ 790.485226][T19200] register_console+0xbad/0xf80 [ 790.485245][T19200] univ8250_console_init+0x3a/0x70 [ 790.485266][T19200] console_init+0xfc/0x3e0 [ 790.485285][T19200] start_kernel+0x226/0x3d0 [ 790.485299][T19200] x86_64_start_reservations+0x24/0x30 [ 790.485319][T19200] x86_64_start_kernel+0x143/0x1c0 [ 790.485337][T19200] common_startup_64+0x13e/0x147 [ 790.485356][T19200] [ 790.485356][T19200] -> #0 (console_owner){-.-.}-{0:0}: [ 790.485377][T19200] __lock_acquire+0x15a5/0x2cf0 [ 790.485393][T19200] lock_acquire+0x106/0x330 [ 790.485406][T19200] console_flush_all+0x6c1/0xb20 [ 790.485431][T19200] console_unlock+0xd1/0x1c0 [ 790.485447][T19200] vprintk_emit+0x485/0x560 [ 790.485463][T19200] _printk+0xdd/0x130 [ 790.485482][T19200] should_fail_ex+0x3f3/0x560 [ 790.485497][T19200] strncpy_from_user+0x36/0x2b0 [ 790.485512][T19200] strncpy_from_user_nofault+0x71/0x150 [ 790.485531][T19200] bpf_probe_read_user_str+0x2a/0x70 [ 790.485547][T19200] bpf_prog_c762caf419d1c004+0x3e/0x44 [ 790.485560][T19200] bpf_trace_run4+0x2b0/0x4e0 [ 790.485578][T19200] __bpf_trace_sched_switch+0x1cb/0x230 [ 790.485600][T19200] __traceiter_sched_switch+0x9d/0xd0 [ 790.485620][T19200] __schedule+0x25a3/0x4fb0 [ 790.485637][T19200] preempt_schedule_irq+0x4d/0xa0 [ 790.485655][T19200] irqentry_exit+0x597/0x620 [ 790.485673][T19200] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 790.485690][T19200] tomoyo_socket_sendmsg_permission+0x9/0x300 [ 790.485712][T19200] security_socket_sendmsg+0x97/0x280 [ 790.485728][T19200] __sock_sendmsg+0x49/0x270 [ 790.485744][T19200] ____sys_sendmsg+0x4d7/0x810 [ 790.485764][T19200] ___sys_sendmsg+0x2a5/0x360 [ 790.485783][T19200] __x64_sys_sendmsg+0x1bd/0x2a0 [ 790.485803][T19200] do_syscall_64+0xe2/0xf80 [ 790.485820][T19200] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 790.485835][T19200] [ 790.485835][T19200] other info that might help us debug this: [ 790.485835][T19200] [ 790.485841][T19200] Chain exists of: [ 790.485841][T19200] console_owner --> &p->pi_lock --> &rq->__lock [ 790.485841][T19200] [ 790.485866][T19200] Possible unsafe locking scenario: [ 790.485866][T19200] [ 790.485871][T19200] CPU0 CPU1 [ 790.485877][T19200] ---- ---- [ 790.485882][T19200] lock(&rq->__lock); [ 790.485892][T19200] lock(&p->pi_lock); [ 790.485905][T19200] lock(&rq->__lock); [ 790.485916][T19200] lock(console_owner); [ 790.485927][T19200] [ 790.485927][T19200] *** DEADLOCK *** [ 790.485927][T19200] [ 790.485931][T19200] 4 locks held by syz.7.4434/19200: [ 790.485942][T19200] #0: ffff8880b863a918 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2a/0x140 [ 790.485980][T19200] #1: ffffffff8e341b20 (rcu_read_lock){....}-{1:3}, at: bpf_trace_run4+0x1be/0x4e0 [ 790.486020][T19200] #2: ffffffff8e335a00 (console_lock){+.+.}-{0:0}, at: _printk+0xdd/0x130 [ 790.486062][T19200] #3: ffffffff8e21d2b8 (console_srcu){....}-{0:0}, at: console_flush_all+0x123/0xb20 [ 790.486103][T19200] [ 790.486103][T19200] stack backtrace: [ 790.486112][T19200] CPU: 0 UID: 0 PID: 19200 Comm: syz.7.4434 Not tainted syzkaller #0 PREEMPT(full) [ 790.486130][T19200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 790.486142][T19200] Call Trace: [ 790.486149][T19200] [ 790.486156][T19200] dump_stack_lvl+0xe8/0x150 [ 790.486177][T19200] print_circular_bug+0x2e1/0x300 [ 790.486200][T19200] check_noncircular+0x12e/0x150 [ 790.486222][T19200] __lock_acquire+0x15a5/0x2cf0 [ 790.486247][T19200] ? console_flush_all+0x123/0xb20 [ 790.486267][T19200] lock_acquire+0x106/0x330 [ 790.486282][T19200] ? console_flush_all+0x123/0xb20 [ 790.486305][T19200] ? do_raw_spin_unlock+0x121/0x230 [ 790.486326][T19200] ? console_flush_all+0x123/0xb20 [ 790.486347][T19200] console_flush_all+0x6c1/0xb20 [ 790.486367][T19200] ? console_flush_all+0x123/0xb20 [ 790.486389][T19200] ? console_flush_all+0x123/0xb20 [ 790.486412][T19200] ? __pfx_console_flush_all+0x10/0x10 [ 790.486441][T19200] ? is_printk_cpu_sync_owner+0x32/0x40 [ 790.486465][T19200] console_unlock+0xd1/0x1c0 [ 790.486484][T19200] ? __pfx_console_unlock+0x10/0x10 [ 790.486503][T19200] ? _raw_spin_unlock_irqrestore+0x20/0x80 [ 790.486522][T19200] ? _printk+0xdd/0x130 [ 790.486545][T19200] vprintk_emit+0x485/0x560 [ 790.486564][T19200] ? __pfx_vprintk_emit+0x10/0x10 [ 790.486587][T19200] _printk+0xdd/0x130 [ 790.486610][T19200] ? __pfx__printk+0x10/0x10 [ 790.486632][T19200] ? is_bpf_text_address+0x292/0x2b0 [ 790.486656][T19200] ? is_bpf_text_address+0x26/0x2b0 [ 790.486678][T19200] ? ___ratelimit+0x58c/0x8d0 [ 790.486699][T19200] should_fail_ex+0x3f3/0x560 [ 790.486717][T19200] strncpy_from_user+0x36/0x2b0 [ 790.486734][T19200] strncpy_from_user_nofault+0x71/0x150 [ 790.486754][T19200] bpf_probe_read_user_str+0x2a/0x70 [ 790.486770][T19200] bpf_prog_c762caf419d1c004+0x3e/0x44 [ 790.486784][T19200] bpf_trace_run4+0x2b0/0x4e0 [ 790.486804][T19200] ? bpf_trace_run4+0x1be/0x4e0 [ 790.486824][T19200] ? __pfx_bpf_trace_run4+0x10/0x10 [ 790.486846][T19200] ? pick_next_task_fair+0x1eea/0x2120 [ 790.486866][T19200] ? __bpf_trace_sched_switch+0x1a4/0x230 [ 790.486889][T19200] __bpf_trace_sched_switch+0x1cb/0x230 [ 790.486912][T19200] ? __pfx___bpf_trace_sched_switch+0x10/0x10 [ 790.486934][T19200] ? psi_group_change+0xab8/0x1050 [ 790.486956][T19200] ? __schedule+0x24fd/0x4fb0 [ 790.486976][T19200] ? tracing_record_taskinfo_sched_switch+0x7d/0x370 [ 790.486998][T19200] ? __pfx___bpf_trace_sched_switch+0x10/0x10 [ 790.487020][T19200] __traceiter_sched_switch+0x9d/0xd0 [ 790.487043][T19200] __schedule+0x25a3/0x4fb0 [ 790.487068][T19200] ? __lock_acquire+0x6b5/0x2cf0 [ 790.487084][T19200] ? perf_trace_preemptirq_template+0xab/0x340 [ 790.487106][T19200] ? preempt_schedule_irq+0x42/0xa0 [ 790.487126][T19200] ? __pfx___schedule+0x10/0x10 [ 790.487144][T19200] ? perf_trace_preemptirq_template+0xab/0x340 [ 790.487166][T19200] ? irqentry_enter+0xac/0x130 [ 790.487186][T19200] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 790.487212][T19200] preempt_schedule_irq+0x4d/0xa0 [ 790.487231][T19200] irqentry_exit+0x597/0x620 [ 790.487252][T19200] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 790.487270][T19200] RIP: 0010:tomoyo_socket_sendmsg_permission+0x9/0x300 [ 790.487295][T19200] Code: ad db fd e9 48 ff ff ff 66 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 40 d6 55 41 57 41 56 <41> 55 41 54 53 48 83 ec 50 48 89 f5 49 89 ff 65 48 8b 05 30 33 73 [ 790.487310][T19200] RSP: 0018:ffffc90003077950 EFLAGS: 00000293 [ 790.487325][T19200] RAX: ffffffff844e5fe6 RBX: 0000000000000060 RCX: ffff888025d61e80 [ 790.487337][T19200] RDX: 0000000000000060 RSI: ffffc90003077de0 RDI: ffff8880788e6780 [ 790.487349][T19200] RBP: ffffc90003077b10 R08: 0000000000000003 R09: 0000000000000000 [ 790.487360][T19200] R10: ffffc90003077a60 R11: fffff5200060ef50 R12: ffff8880788e6780 [ 790.487372][T19200] R13: dffffc0000000000 R14: ffffc90003077de0 R15: ffff8880788e6780 [ 790.487389][T19200] ? tomoyo_socket_sendmsg+0x16/0x30 [ 790.487410][T19200] security_socket_sendmsg+0x97/0x280 [ 790.487433][T19200] __sock_sendmsg+0x49/0x270 [ 790.487449][T19200] ? ____sys_sendmsg+0x4cc/0x810 [ 790.487471][T19200] ____sys_sendmsg+0x4d7/0x810 [ 790.487492][T19200] ? __might_fault+0xaf/0x130 [ 790.487519][T19200] ? __pfx_____sys_sendmsg+0x10/0x10 [ 790.487544][T19200] ? import_iovec+0x73/0xa0 [ 790.487567][T19200] ___sys_sendmsg+0x2a5/0x360 [ 790.487587][T19200] ? __lock_acquire+0x6b5/0x2cf0 [ 790.487605][T19200] ? __pfx____sys_sendmsg+0x10/0x10 [ 790.487640][T19200] ? __fget_files+0x2a/0x420 [ 790.487661][T19200] ? __fget_files+0x3a0/0x420 [ 790.487685][T19200] __x64_sys_sendmsg+0x1bd/0x2a0 [ 790.487707][T19200] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 790.487728][T19200] ? perf_trace_preemptirq_template+0xab/0x340 [ 790.487753][T19200] ? __pfx_ksys_write+0x10/0x10 [ 790.487774][T19200] do_syscall_64+0xe2/0xf80 [ 790.487793][T19200] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 790.487808][T19200] ? trace_irq_disable+0x37/0x100 [ 790.487828][T19200] ? clear_bhb_loop+0x60/0xb0 [ 790.487846][T19200] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 790.487862][T19200] RIP: 0033:0x7f12e259acb9 [ 790.487875][T19200] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 790.487888][T19200] RSP: 002b:00007f12e34ed028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 790.487904][T19200] RAX: ffffffffffffffda RBX: 00007f12e2815fa0 RCX: 00007f12e259acb9 [ 790.487917][T19200] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000003 [ 790.487927][T19200] RBP: 00007f12e34ed090 R08: 0000000000000000 R09: 0000000000000000 [ 790.487938][T19200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 790.487948][T19200] R13: 00007f12e2816038 R14: 00007f12e2815fa0 R15: 00007fff90750f38 [ 790.487967][T19200] [ 791.811453][T19200] CPU: 0 UID: 0 PID: 19200 Comm: syz.7.4434 Not tainted syzkaller #0 PREEMPT(full) [ 791.811471][T19200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 791.811480][T19200] Call Trace: [ 791.811489][T19200] [ 791.811497][T19200] dump_stack_lvl+0xe8/0x150 [ 791.811517][T19200] should_fail_ex+0x412/0x560 [ 791.811533][T19200] strncpy_from_user+0x36/0x2b0 [ 791.811545][T19200] strncpy_from_user_nofault+0x71/0x150 [ 791.811560][T19200] bpf_probe_read_user_str+0x2a/0x70 [ 791.811573][T19200] bpf_prog_c762caf419d1c004+0x3e/0x44 [ 791.811583][T19200] bpf_trace_run4+0x2b0/0x4e0 [ 791.811598][T19200] ? bpf_trace_run4+0x1be/0x4e0 [ 791.811611][T19200] ? __pfx_bpf_trace_run4+0x10/0x10 [ 791.811625][T19200] ? pick_next_task_fair+0x1eea/0x2120 [ 791.811639][T19200] ? __bpf_trace_sched_switch+0x1a4/0x230 [ 791.811655][T19200] __bpf_trace_sched_switch+0x1cb/0x230 [ 791.811670][T19200] ? __pfx___bpf_trace_sched_switch+0x10/0x10 [ 791.811684][T19200] ? psi_group_change+0xab8/0x1050 [ 791.811700][T19200] ? __schedule+0x24fd/0x4fb0 [ 791.811714][T19200] ? tracing_record_taskinfo_sched_switch+0x7d/0x370 [ 791.811728][T19200] ? __pfx___bpf_trace_sched_switch+0x10/0x10 [ 791.811743][T19200] __traceiter_sched_switch+0x9d/0xd0 [ 791.811759][T19200] __schedule+0x25a3/0x4fb0 [ 791.811775][T19200] ? __lock_acquire+0x6b5/0x2cf0 [ 791.811786][T19200] ? perf_trace_preemptirq_template+0xab/0x340 [ 791.811801][T19200] ? preempt_schedule_irq+0x42/0xa0 [ 791.811813][T19200] ? __pfx___schedule+0x10/0x10 [ 791.811824][T19200] ? perf_trace_preemptirq_template+0xab/0x340 [ 791.811839][T19200] ? irqentry_enter+0xac/0x130 [ 791.811853][T19200] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 791.811869][T19200] preempt_schedule_irq+0x4d/0xa0 [ 791.811882][T19200] irqentry_exit+0x597/0x620 [ 791.811897][T19200] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 791.811909][T19200] RIP: 0010:tomoyo_socket_sendmsg_permission+0x9/0x300 [ 791.811928][T19200] Code: ad db fd e9 48 ff ff ff 66 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 40 d6 55 41 57 41 56 <41> 55 41 54 53 48 83 ec 50 48 89 f5 49 89 ff 65 48 8b 05 30 33 73 [ 791.811937][T19200] RSP: 0018:ffffc90003077950 EFLAGS: 00000293 [ 791.811948][T19200] RAX: ffffffff844e5fe6 RBX: 0000000000000060 RCX: ffff888025d61e80 [ 791.811956][T19200] RDX: 0000000000000060 RSI: ffffc90003077de0 RDI: ffff8880788e6780 [ 791.811964][T19200] RBP: ffffc90003077b10 R08: 0000000000000003 R09: 0000000000000000 [ 791.811971][T19200] R10: ffffc90003077a60 R11: fffff5200060ef50 R12: ffff8880788e6780 [ 791.811979][T19200] R13: dffffc0000000000 R14: ffffc90003077de0 R15: ffff8880788e6780 [ 791.811989][T19200] ? tomoyo_socket_sendmsg+0x16/0x30 [ 791.812007][T19200] security_socket_sendmsg+0x97/0x280 [ 791.812019][T19200] __sock_sendmsg+0x49/0x270 [ 791.812032][T19200] ? ____sys_sendmsg+0x4cc/0x810 [ 791.812047][T19200] ____sys_sendmsg+0x4d7/0x810 [ 791.812061][T19200] ? __might_fault+0xaf/0x130 [ 791.812079][T19200] ? __pfx_____sys_sendmsg+0x10/0x10 [ 791.812095][T19200] ? import_iovec+0x73/0xa0 [ 791.812110][T19200] ___sys_sendmsg+0x2a5/0x360 [ 791.812124][T19200] ? __lock_acquire+0x6b5/0x2cf0 [ 791.812135][T19200] ? __pfx____sys_sendmsg+0x10/0x10 [ 791.812157][T19200] ? __fget_files+0x2a/0x420 [ 791.812171][T19200] ? __fget_files+0x3a0/0x420 [ 791.812186][T19200] __x64_sys_sendmsg+0x1bd/0x2a0 [ 791.812202][T19200] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 791.812216][T19200] ? perf_trace_preemptirq_template+0xab/0x340 [ 791.812232][T19200] ? __pfx_ksys_write+0x10/0x10 [ 791.812246][T19200] do_syscall_64+0xe2/0xf80 [ 791.812260][T19200] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 791.812270][T19200] ? trace_irq_disable+0x37/0x100 [ 791.812283][T19200] ? clear_bhb_loop+0x60/0xb0 [ 791.812294][T19200] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 791.812304][T19200] RIP: 0033:0x7f12e259acb9 [ 791.812315][T19200] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 791.812324][T19200] RSP: 002b:00007f12e34ed028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 791.812334][T19200] RAX: ffffffffffffffda RBX: 00007f12e2815fa0 RCX: 00007f12e259acb9 [ 791.812342][T19200] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000003 [ 791.812349][T19200] RBP: 00007f12e34ed090 R08: 0000000000000000 R09: 0000000000000000 [ 791.812355][T19200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 791.812361][T19200] R13: 00007f12e2816038 R14: 00007f12e2815fa0 R15: 00007fff90750f38 [ 791.812373][T19200] [ 792.385622][T19204] IPv6: NLM_F_CREATE should be specified when creating new route [ 793.583720][ T8219] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 793.669269][ T8219] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 793.739342][ T8219] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 793.818752][ T8219] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 793.890437][ T8219] bridge0: port 3(dummy0) entered disabled state [ 793.897761][ T8219] bridge_slave_1: left allmulticast mode [ 793.903393][ T8219] bridge_slave_1: left promiscuous mode [ 793.910238][ T8219] bridge0: port 2(bridge_slave_1) entered disabled state [ 793.919353][ T8219] bridge_slave_0: left allmulticast mode [ 793.925246][ T8219] bridge_slave_0: left promiscuous mode [ 793.930855][ T8219] bridge0: port 1(bridge_slave_0) entered disabled state [ 794.018025][ T8219] žÿ (unregistering): (slave bond_slave_0): Releasing backup interface [ 794.026624][ T8219] bond_slave_0: left promiscuous mode [ 794.033216][ T8219] žÿ (unregistering): (slave bond_slave_1): Releasing backup interface [ 794.042065][ T8219] bond_slave_1: left promiscuous mode [ 794.048753][ T8219] žÿ (unregistering): (slave batadv0): Releasing backup interface [ 794.058272][ T8219] batadv0: left promiscuous mode [ 794.063934][ T8219] žÿ (unregistering): (slave batadv_slave_0): Releasing backup interface [ 794.072768][ T8219] batadv_slave_0: left promiscuous mode [ 794.079634][ T8219] žÿ (unregistering): Released all slaves [ 794.086870][ T5987] erspan0 speed is unknown, defaulting to 1000 [ 794.093084][ T5987] infiniband syz2: ib_query_port failed (-19) [ 794.340357][ T8219] hsr_slave_0: left promiscuous mode [ 794.346094][ T8219] hsr_slave_1: left promiscuous mode [ 794.351669][ T8219] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 794.359064][ T8219] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 794.367818][ T8219] veth1_macvtap: left promiscuous mode [ 794.373305][ T8219] veth0_macvtap: left promiscuous mode [ 794.379401][ T8219] veth1_vlan: left promiscuous mode [ 794.384651][ T8219] veth0_vlan: left promiscuous mode [ 794.521045][ T8219] team0 (unregistering): Port device team_slave_1 removed [ 794.540972][ T8219] team0 (unregistering): Port device team_slave_0 removed