last executing test programs: 7m14.307795857s ago: executing program 1 (id=2): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x7, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x7, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="620ac4ff000000007110b300000000008500000076000000850000001100000095"], &(0x7f0000000480)='GPL\x00'}, 0x94) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') 7m13.898708751s ago: executing program 1 (id=6): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000009112ce000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$inet(0xffffffffffffffff, &(0x7f0000002480)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x41, 0x0, 0x11}, 0x0) r1 = socket$kcm(0x2, 0x5, 0x84) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x64, &(0x7f0000000000)=r4, 0x10) sendmsg$inet(r1, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0xff04}], 0x1}, 0x80d1) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x0, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000004000000bb7f1a00c600feff0000000a9500000000000000f97ea220a57904b7c47b389c0ebe59a96e44787c0c756994e5fa5a9bf8bcf108fc102a638f18a7ec88393bfa98584c6f110b7c919f33f5d274f3d386bec23e11d1f9cb25bb71c7cab79ba5103cb924a9c872bf2f3b0f8daa"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="89000000120081ae08060cdc030000007f1be3f74001000000e2ffca201f0000000004c00e72f750375ed08a56331dbf9ed7815e281ad6e747033a0093b837dc6cc074be5d78ea08e0561e32efaec8c7a600000c00000140060404000104", 0x5e}], 0x1}, 0x20000810) r8 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f0000000040)=ANY=[@ANYBLOB="001000001a00911c01000000000041da81"], 0xfe33) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000150a0101"], 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x2000c896) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000580)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x13c}}, 0x0) 7m12.500848046s ago: executing program 1 (id=7): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x4}]}}, 0x0, 0x26}, 0x28) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x337) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000200)={'veth1_macvtap\x00', @random="be693e7da489"}) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1943}, 0x5000, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e50200"], &(0x7f0000000000)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x6, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x2, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20000000) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRESHEX], 0x48) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x890b, &(0x7f0000000100)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x28, 0x0, 0x0, 0xfffff038}]}) 7m11.160948016s ago: executing program 1 (id=9): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x7, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x7, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="620ac4ff000000007110b300000000008500000076000000850000001100000095"], &(0x7f0000000480)='GPL\x00'}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') 7m10.754960491s ago: executing program 2 (id=3): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0100000002000000e27f00000900000000000000", @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000f6ffffffffffffff080000000000f61d96d06f2d0d2b89a599d21969e8e6a36aa8f59f30f021dd2f685c2f7225bd27e12176cca5d80da86d77594f22aa1e380000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x2, 0x5, 0x84) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x200000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xf0}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1d, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x4}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f0000000240)={0x0, 0x3, [@empty, @random="f5b6bab0fd64", @random="378c217cad44"]}) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x5c, 0x2, 0x1, 0x201, 0x0, 0x0, {0x8, 0x0, 0x6}, [@CTA_TUPLE_MASTER={0x48, 0xe, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010100}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @remote}}}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4084}, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r6, 0x29, 0x2e, 0x0, 0x108) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a500000005"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf4240, 0x0, &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$IPCTNL_MSG_CT_NEW(r0, 0x0, 0x0) 7m10.095532473s ago: executing program 1 (id=12): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x7, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x20, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99ee}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x9b}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f0, &(0x7f0000000080)) 7m8.504515432s ago: executing program 1 (id=14): close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r4 = socket$kcm(0xa, 0x2, 0x3a) sendmsg$kcm(r4, &(0x7f0000000440)={&(0x7f0000000180)=@in6={0xa, 0xffff, 0x0, @mcast1, 0x6}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000780)="80005b020eaa4da2", 0x7}, {0x0, 0x30}], 0x2, 0x0, 0x0, 0x900}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0x1}, 0x0, 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000004780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x20000840) r6 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r6, 0x84, 0x14, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x20000000}, 0x20) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40010040) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @flow_dissector}, 0x48) r8 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(r8, 0x11b, 0x2, &(0x7f0000000900)=r7, 0x4) 7m8.476323575s ago: executing program 2 (id=15): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x1159e4047a6348de, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) socket$kcm(0x10, 0x2, 0x4) socket$kcm(0x2, 0x922000000001, 0x106) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={0xffffffffffffffff, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0x2}, 0x18) r1 = socket$kcm(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x200048cc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8020, 0x90000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x6}, 0x8224, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={@cgroup, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r3, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000100)=r4, 0x4) sendmsg$inet(r3, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xd, &(0x7f0000000080), 0x24) close(r1) 6m50.847707285s ago: executing program 32 (id=14): close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r4 = socket$kcm(0xa, 0x2, 0x3a) sendmsg$kcm(r4, &(0x7f0000000440)={&(0x7f0000000180)=@in6={0xa, 0xffff, 0x0, @mcast1, 0x6}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000780)="80005b020eaa4da2", 0x7}, {0x0, 0x30}], 0x2, 0x0, 0x0, 0x900}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0x1}, 0x0, 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000004780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x20000840) r6 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r6, 0x84, 0x14, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x20000000}, 0x20) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40010040) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4000000000000007910900000000000620000000000000095000000000000009e574bffff1729aba9b39a58e3cd8757e44cf3611b8e327a0279acba1f7791408d1efa421239728e2e5cc319b58520609dfd4a1a021d000000000000efffff75c3d894d99aef659f8b0000c515d8c219fbd9da31fc3ce3e9a2653000aec385a84a3d3f466bba30ac1486a70037fb03adef1a427fb0f4cb3072182da7c30000000000000000000000000000000000000000000000000000297e9fed660213ecb576987ad0972f18fbb7c9ecc03901f028b15b30ecf3205f90c9684ddc80d13bf37afc00e5efd686e6fb5ef4ee00b66126f773434a5c0d2ad3526bc484a6b94396117615f78f97637d8f8838aa75efb657ddafb15b88d97e47731cc3f55ce4e6a42562e6fb1f0000003030249c350044b09c36d10549a5949ff21418f1517508fb13540a82b5030cd9bb1bb066ca833c1fef6cefa28543ee520e46a3e96aca0d5a5f8cb34ad9c54c3a9a698f835bb83bcfd81ac5cfa18ce0740717994b5152cd0fa735433e50dccee16a208245b4366d44bb7ebd169b9e3a66d0cb29291a50f642ae4cb007540c806cd1cf88fdcaa393d1e1a697649401a802b474e374c767cb1ce52fd917d6af3de547be8429540de37f868a7f25d47c4b710836436008d4e8c8b42aeee84629d06d75ef09e0260b41de1f750480e492b6822d6275b7ccda1141707069cdb21de7a98dc37efdd806cc3619ad0659998bdd90b008c1aed04ee682b8ffd25741abbd9c6482ca45b82b6b7f25f71280cd6ba8bbb1e32dfe84831d1fc132755ce9aaf1952cb6829e9d6f4cbd8a07dc0cebcad512b3e0f2daa622bc805d2e152e0765b20cd6c8e2f4fff81e1458a43f35d36b25225dc0fbaf3b8131f5a8ae73e8badc519350edf048d5f56617"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @flow_dissector}, 0x48) r8 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(r8, 0x11b, 0x2, &(0x7f0000000900)=r7, 0x4) 6m50.751503994s ago: executing program 33 (id=15): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x1159e4047a6348de, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) socket$kcm(0x10, 0x2, 0x4) socket$kcm(0x2, 0x922000000001, 0x106) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={0xffffffffffffffff, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0x2}, 0x18) r1 = socket$kcm(0x2b, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x200048cc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8020, 0x90000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x6}, 0x8224, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={@cgroup, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r3, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000100)=r4, 0x4) sendmsg$inet(r3, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xd, &(0x7f0000000080), 0x24) close(r1) 5m42.63303915s ago: executing program 0 (id=152): write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed5de7e91cd360a136ce6203c23c00fe82000000000400875865969f7e7507018100000000001a8829"], 0xfe1b) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x0, 0x0, &(0x7f0000000880)='GPL\x00'}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000000201050000000000000000000a01000704001980040002"], 0x1c}}, 0x840) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000001300000095"], &(0x7f00000000c0)='syzkaller\x00'}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='contention_end\x00', r4}, 0x10) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000140)={0x0, 0x32, &(0x7f0000000040)=[{&(0x7f00000005c0)="3504000041000511d25a35400c0002000200002037153e370c04018006041000450000002a560000e7ff00400000", 0x2e}, {&(0x7f0000000600)="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"/1013, 0x401}, {&(0x7f0000000a40)="47f72fedcd1d", 0x6}], 0x3}, 0x10049014) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f3, &(0x7f0000000080)) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000fc0)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x1}, 0x50) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001040)={0xffffffffffffffff, 0x400, 0x18}, 0xc) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000010c0)=@generic={&(0x7f0000001080)='./file0\x00', 0x0, 0x18}, 0x18) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000001100), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0x1d, 0x6, &(0x7f0000000a00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7ff}, [@map_idx={0x18, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000a80)='syzkaller\x00', 0x2, 0xbe, &(0x7f0000000ac0)=""/190, 0x40f00, 0x52, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000c00)={0x0, 0xf, 0x1, 0x401}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000001140)=[r7, 0xffffffffffffffff, r3, r8, r5, r9, r10]}, 0x94) r11 = socket$kcm(0x25, 0x1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r11, &(0x7f0000000600)={&(0x7f0000000140)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000000240)=[{&(0x7f00000002c0)="cf56937d96ddac51a50269af0dc8600d7ea395ef60027ef112e085bbfa8bc4831f7809bd7bd77e7e390c0a7db2e767aa15c4ea9ed0f211605393dd19", 0x3c}], 0x1, &(0x7f0000000500)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_retopts={{0x14, 0x0, 0x7, {[@lsrr={0x83, 0x3, 0xba}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xb1}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6b}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r12, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010102}}}], 0xb0}, 0x2000c850) r13 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r13, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r13, 0x1, 0x3e, &(0x7f0000000100)=r14, 0x4) r15 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r15}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) r16 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1b, 0x4, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, [@alu={0x7, 0x1, 0xd, 0xa, 0x8, 0xffffffffffffffe0, 0xfffffffffffffffc}]}, &(0x7f0000000340)='GPL\x00', 0x100, 0xc1, &(0x7f0000000380)=""/193, 0x41000, 0x0, '\x00', r12, @fallback=0x31, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x2, 0x4}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x5, 0x3, 0x8001}, 0x10, 0x0, r0, 0x4, &(0x7f0000000580)=[r14, r15, r16], &(0x7f00000005c0)=[{0x2, 0x5, 0xd}, {0x4, 0x4, 0x10, 0x5}, {0x2, 0x5, 0x2, 0x8}, {0x0, 0x2, 0x5, 0xc}], 0x10, 0xa00000}, 0x94) r17 = socket$key(0xf, 0x3, 0x2) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={@fallback=r0, 0x1, 0x1, 0x8, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000080), &(0x7f00000001c0)=[0x0, 0x0, 0x0]}, 0x40) sendmsg$key(r17, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0xd, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x3c, 0x0, 0x0, @in6={0xa, 0x80ff, 0x0, @private1}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @local}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0xffffffff, {0x6, 0x2b, 0x2, 0x3, 0x0, 0x0, 0x0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private1}}]}, 0x90}}, 0x0) 5m40.347378162s ago: executing program 0 (id=156): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x20, 0x3, &(0x7f0000000200)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99ee}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x9b}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, 0x0) 5m40.057912353s ago: executing program 0 (id=159): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x7ff0, 0x82, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x30, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x6}, 0x1b, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000003780)={0x0, 0x0, 0x0}, 0x600) r2 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={@ifindex, 0xffffffffffffffff, 0x9, 0x4}, 0x20) r3 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f00000001c0)="2e00000010008188040f46ecdb4cb9cca7480ef40f000000e3bd6efb010509000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r2, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x12, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x62, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) r7 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030031000b12d25a80648c2594f90124fc60100c044002200600053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x9, &(0x7f0000000680)=ANY=[@ANYRES8=r6, @ANYRESOCT=r5, @ANYRESDEC=r3, @ANYRES64=r0, @ANYRESDEC], &(0x7f00000001c0)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x20, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2080}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.stat\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x8b29, &(0x7f0000000000)={'wlan1\x00', @random="010000000700"}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r10, 0x1, 0x32, &(0x7f0000000200)=r8, 0x4) recvmsg$unix(r9, &(0x7f0000000800)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000780)=""/7, 0x7}], 0x1}, 0x10000) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x91c, 0x20046, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc, 0x1}, 0x102c9, 0x3, 0x9, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0xfffffffffffffffd) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r11, &(0x7f0000000000), 0x2a979d) 5m29.481450432s ago: executing program 0 (id=171): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newtaction={0xd8, 0x30, 0xffff, 0x8000000, 0x0, {}, [{0xc4, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x10000000, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40}}}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x54, 0x2, 0x0, 0x0, {{0x9}, {0x28, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x0, 0x1489, 0x4}}, @TCA_GACT_PARMS={0x18, 0x2, {0x7, 0x8, 0x20000000, 0x2, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xd8}}, 0x0) 5m29.125742329s ago: executing program 0 (id=176): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r1, &(0x7f0000000180)="e913", &(0x7f00000001c0), 0x4}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000dc0)={{r1, 0xffffffffffffffff}, &(0x7f0000000400), &(0x7f0000000500), 0x8}, 0x20) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xb2, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x55, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40001) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x2}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000880)={{r1, 0xffffffffffffffff}, &(0x7f0000000800), &(0x7f0000000840)='%pI4 \x00'}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000940)=@bpf_ext={0x1c, 0x7, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x56e85aa9, 0x0, 0x0, 0x0, 0x7}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}]}, &(0x7f0000000240)='syzkaller\x00', 0xbc, 0x0, 0x0, 0x40f00, 0x1a, '\x00', r3, 0x0, r4, 0x8, &(0x7f00000004c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x5, 0xb, 0x314c, 0x1}, 0x10, 0x6649, 0xffffffffffffffff, 0x4, &(0x7f00000008c0)=[r5, r2, r1, r1, r2, r2, r6], &(0x7f0000000900)=[{0x3, 0x3, 0xf}, {0x3, 0x1, 0x0, 0x5}, {0x1, 0x1, 0xd, 0x4}, {0x1, 0x5, 0x8, 0x7}], 0x10, 0x200}, 0x94) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000580)="6700000011008188040f56ecdb4cb9cca7480ef437000000e3bd6efb440009000e000a0010000000ba80010000005a8c3774fa0af3dc59a933c1e7a6d3361d83b20000319cdf5656826edaaa11032701c61ec666d482078ccebcb9a4f187f7a4e98f09cdc2649f", 0x67}], 0x1}, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40845}, 0x84) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000540)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x2}}, [@NFT_MSG_NEWTABLE={0x14, 0x0, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0x7}}, @NFT_MSG_DELFLOWTABLE={0x38, 0x18, 0xa, 0x3, 0x0, 0x0, {0x7}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x20, 0x3, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x8}, [@NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELFLOWTABLE={0x34, 0x18, 0xa, 0x101, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x6}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0x1}, @NFT_OBJECT_CONNLIMIT=@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x2}}}, 0xe8}}, 0x20008000) 5m28.551256436s ago: executing program 0 (id=179): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0xc, 0x800000, 0x40, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x20}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"/270], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)=ANY=[@ANYBLOB="50000000030701080000000000000000020000070c00024000000040000000000900010073797a30000000000c000240ffffffffffffffc8000000030c000240000000000003"], 0x50}, 0x1, 0x0, 0x0, 0x885}, 0x8000) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="050000000100000009000000ae00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2106, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, 0x0, &(0x7f0000000180)='syzkaller\x00'}, 0x94) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="f80000001a0007000000000000400000fe80000000000000000000000000000c0a010100000000000000000000000000fffd00004e210000000000003c000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="fe8000000000000000000000000000aa000000003c000000fe8000000000000000000000000000aa0000000000000000b500000000000010020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000300000000000000fdffffffffffffff0000040000000000122c000008000000000000000a00020068000000000000000800160000080000"], 0xf8}, 0x1, 0x0, 0x0, 0x400}, 0x0) write$cgroup_devices(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="1e002803008c71ef288563"], 0xffdd) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000500)={0xfd, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000005c0)=@bpf_lsm={0x1d, 0x18, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @exit, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfff}}, @ldst={0x2, 0x3, 0x6, 0x8, 0x7, 0xffffffffffffffc0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x1, 0x1, 0x1, 0x2, 0x4}, @call={0x85, 0x0, 0x0, 0x9d}, @generic={0x48, 0xf, 0x6, 0x354, 0x7}, @alu={0x7, 0x1, 0x5, 0x2, 0x6, 0xffffffffffffffff, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xaccc, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000000300)='syzkaller\x00', 0xc, 0x16, &(0x7f0000000340)=""/22, 0x100, 0x55, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x6, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x2, 0x5, 0x0, 0x6}, 0x10, r6, 0x0, 0x8, 0x0, &(0x7f0000000540)=[{0x0, 0x4, 0x10, 0x9}, {0x2, 0x4, 0x2, 0x3}, {0x2, 0x4, 0xb, 0xb}, {0x5, 0x3, 0x3, 0x8}, {0x3, 0x1, 0x0, 0xc}, {0x1, 0x4, 0x0, 0x8}, {0x4, 0x4, 0x6, 0x8c21f08040a21baf}, {0x4, 0x2, 0x7}], 0x10, 0x9}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x42) 5m13.338195277s ago: executing program 34 (id=179): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0xc, 0x800000, 0x40, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x20}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"/270], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)=ANY=[@ANYBLOB="50000000030701080000000000000000020000070c00024000000040000000000900010073797a30000000000c000240ffffffffffffffc8000000030c000240000000000003"], 0x50}, 0x1, 0x0, 0x0, 0x885}, 0x8000) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="050000000100000009000000ae00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2106, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, 0x0, &(0x7f0000000180)='syzkaller\x00'}, 0x94) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="f80000001a0007000000000000400000fe80000000000000000000000000000c0a010100000000000000000000000000fffd00004e210000000000003c000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="fe8000000000000000000000000000aa000000003c000000fe8000000000000000000000000000aa0000000000000000b500000000000010020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000300000000000000fdffffffffffffff0000040000000000122c000008000000000000000a00020068000000000000000800160000080000"], 0xf8}, 0x1, 0x0, 0x0, 0x400}, 0x0) write$cgroup_devices(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="1e002803008c71ef288563"], 0xffdd) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000500)={0xfd, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000005c0)=@bpf_lsm={0x1d, 0x18, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @exit, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfff}}, @ldst={0x2, 0x3, 0x6, 0x8, 0x7, 0xffffffffffffffc0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x1, 0x1, 0x1, 0x2, 0x4}, @call={0x85, 0x0, 0x0, 0x9d}, @generic={0x48, 0xf, 0x6, 0x354, 0x7}, @alu={0x7, 0x1, 0x5, 0x2, 0x6, 0xffffffffffffffff, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xaccc, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000000300)='syzkaller\x00', 0xc, 0x16, &(0x7f0000000340)=""/22, 0x100, 0x55, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x6, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x2, 0x5, 0x0, 0x6}, 0x10, r6, 0x0, 0x8, 0x0, &(0x7f0000000540)=[{0x0, 0x4, 0x10, 0x9}, {0x2, 0x4, 0x2, 0x3}, {0x2, 0x4, 0xb, 0xb}, {0x5, 0x3, 0x3, 0x8}, {0x3, 0x1, 0x0, 0xc}, {0x1, 0x4, 0x0, 0x8}, {0x4, 0x4, 0x6, 0x8c21f08040a21baf}, {0x4, 0x2, 0x7}], 0x10, 0x9}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x42) 10.121019007s ago: executing program 6 (id=1305): r0 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x17, 0x0, 0x54) socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x10, 0x2, 0x4) socket$kcm(0xa, 0x1, 0x106) socket$kcm(0x29, 0x2, 0x0) close(0xffffffffffffffff) r1 = syz_clone(0x80001000, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x565000, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x28030, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2a, 0x2, 0x0) syz_open_procfs$namespace(r1, &(0x7f00000001c0)='ns/net\x00') bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x2, 0x3, 0x84) socket$kcm(0x10, 0x400000002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x40}, 0x94) socketpair(0x3, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) socketpair(0x1, 0x1, 0xfffffffc, &(0x7f0000000200)) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000300)={r2, r3, 0xd, 0x0, @void}, 0x10) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000080)=@phonet={0x23, 0x1, 0x9, 0x6}, 0x80, 0x0}, 0xb80b) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x80) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0xb, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYRES64=0x0], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2121, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x828, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000050000000900010073797a300000000078000000030a01030000000000000000050000000900010073797a300000000008000540000000001c0008800c00024000000000000000000c00014000000000000000000900030073797a3200000000280004800800024000000000140003007465616d5f736c6176655f30000000000800014000000001"], 0xd4}}, 0x4000010) 10.036363426s ago: executing program 5 (id=1306): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0xb, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc200011800e000100636f6e6e6c696d69740000000c00028008000140fffff27414000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x40008d0}, 0x40) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000480)=ANY=[@ANYBLOB="140000001000010000000000000000000700000a400000000e0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c000180060001"], 0x1b4}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) (fail_nth: 2) 9.52122203s ago: executing program 5 (id=1308): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8923, &(0x7f00000000c0)={'bond_slave_0\x00', @random="013301300108"}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003800)=ANY=[@ANYBLOB="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"], 0x408}, 0x1) r2 = socket$kcm(0x2, 0x5, 0x84) close(r2) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x240440d1) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7fffffff, 0x7, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x3, 0x10, 0x0, 0x1, 0x0, 0x0, 0x0, 0x118}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000007000000070000000020000000400000000000002050000000300000005000093010000000a000000000000000600000002000000ff0f0000050000000400000040000000fe5fe4090c0000000500000085000000100000007304000001000000060000000000000e0400000001000000000000000000000d00"], 0x0, 0x8a, 0x0, 0x1, 0x6, 0x10000}, 0x28) r6 = socket$kcm(0x11, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0x1, &(0x7f0000000740)=@raw=[@ldst={0x0, 0x1, 0x1, 0x4, 0x2, 0xfffffffffffffff4, 0x8}], &(0x7f0000000240)='syzkaller\x00', 0x7, 0x0, 0x0, 0x0, 0x40}, 0x94) sendmsg$kcm(r6, &(0x7f0000001780)={&(0x7f00000003c0)=@caif=@rfm={0x25, 0x15, "fb95785b587f23ba61bfb990191a2af1"}, 0x80, &(0x7f00000015c0)=[{&(0x7f0000001800)="a5", 0x48}], 0x1}, 0x0) sendmsg$nl_xfrm(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=@newsa={0x154, 0x10, 0x1, 0x0, 0x0, {{@in6=@local, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x0, 0x33}, @in=@broadcast, {0x2abe9d7c, 0x40000000000000, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, {}, {0x0, 0x0, 0xfffffff7}, 0xfffffffd, 0x0, 0xa}, [@algo_auth_trunc={0x5c, 0x14, {{'cmac(aes)\x00'}, 0x80, 0x0, "9300d719ed77ad60765ae9de6eb27926"}}, @XFRMA_SET_MARK={0x8, 0x1d, 0xfffffffb}]}, 0x154}}, 0x0) 9.287705787s ago: executing program 6 (id=1311): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x10, 0x3, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="5c0000000206010100000000000000000000000005000400000000000900020073797a31000000000500010007000000050005000a0000001400078008001140000000690800124000007fff10000300686173683a69702c6d6163"], 0x5c}}, 0x0) 7.363338574s ago: executing program 6 (id=1314): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000800030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0xc4}, 0x890) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/net\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000180000002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000580)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000004c0)={r1, 0x3, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x44) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f00000004c0)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[], 0xe) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="14000000100001e456b8aa00000000000000000a3c000000120a09000000000000000000020000000900020073797a310000000008000440080000000900010073797a3000000000080003400000000114000000110001"], 0x64}, 0x1, 0x0, 0x0, 0x20000804}, 0x4004000) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000180)={0x0, 0x34, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="34000000150a03000000000000000000020000000900020073797a310000000008000340000000010900010073797a30"], 0x34}}, 0x0) 7.241796748s ago: executing program 5 (id=1316): perf_event_open(0x0, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x9) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/29], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) r1 = socket(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000b00)={{0x14, 0x10, 0x1, 0x0, 0x0, {0xa}}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x28}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="300000000a14010028bd334d63abdf2508000100000000000800010001000000080015"], 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x80) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="d8000000310081044e81f782db44b904021d080005000000e8fe55a1180015000600142603600e120900210000000401a8001600a40001", 0x37}], 0x1}, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000380)={&(0x7f0000000040)="b64b6779e728a585fc6d831c9c111ee3bf867c7fa20663508d961b5b0bc1d4eded804b84c8ee0b5e7b55af44aa8bf4a16c4d4aaf896a13f650a3b4f737945a9a179a6ceb93adadb8dd841258d0f04b02868cd415ab9bc48b055a8b3f92b143cb16138c216513a045af2101e7e3c507bedee404330f1171812cdaeed17a0e89dd4863a4e6808ca6b7046c38f33b9a0417e1c8fae7a9e1b4c8161b02", 0x0, 0x0, 0x0}, 0x38) r5 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="2b40000048009125745c7388641f9c0e0a"], 0xfe33) 6.911458767s ago: executing program 7 (id=1319): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x9, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r3, &(0x7f00000006c0)={&(0x7f0000000040)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000140)=[{&(0x7f00000000c0)="e0", 0x1}], 0x1}, 0xc000) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x2000, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x3, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="5c00000014006b03000000d86e6c1d0002847ea622fb564500004e23e3f58e76110165f450e71b0075e3002500028d459e37000f0000000000bf9367b47e51f60a64c9f4d4938037e786a6d0bdd700"/92, 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r4, &(0x7f0000002f80)={0x0, 0x0, &(0x7f0000002ec0)=[{&(0x7f0000000cc0)=""/4096, 0x1000}, {&(0x7f0000001ec0)=""/4096, 0x1000}], 0x2}, 0x10000) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="58000000020605000000000000000000000000001400078005001400200000000800124008001f000500010006000000050005000200000005000400000000000900020073797a31000000000c0003"], 0x58}}, 0x0) 6.910801612s ago: executing program 3 (id=1320): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000240)="d8000000200081044e81f782db44b90402000000e8fe450f55a1180015000600142603600e120900100000000401a80016000a00114006000000036010fab94dcf5c0468c1d67f6f94007134cf6ee0808856e408e8d8cbf7a7ff4841ef52b49816277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4d180a54f14f00004d9db22fe7c9f8775730d16a4683f1aea4edbb57a5025ccca9e00360db70100000040fad95667e006d8df969b3ef35ce3bb9ad809d561cace91ed0bffd6e4edef3d93452a92954b43370e00"/216, 0xd8}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, &(0x7f0000000200), &(0x7f0000000240)=r0}, 0x20) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee0, 0x4, @perf_bp={0x0, 0x2}, 0x828, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x4, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 6.858875245s ago: executing program 5 (id=1321): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x8602, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000005d00)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000004a80)="8b", 0x1}], 0x1}, 0x0) (async) sendmsg$inet(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000280)="a7", 0x1}], 0x1}, 0x4880) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b00000000800001a5000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x5, 0x2, 0x0, 0x0, 0x0, 0x9, 0x4022, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc, 0x5, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async, rerun: 64) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) r3 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x2, 0x1000000}, 0xffffffffffffffff, 0x0, r3, 0x0) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x90}, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00', 0x200}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8946, &(0x7f0000000080)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) (async) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x4c000, 0x0) close(r7) (async, rerun: 32) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) (rerun: 32) write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[], 0x66) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 6.187672507s ago: executing program 5 (id=1332): bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x9}, 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='..\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_macvtap\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000080)) 5.703426777s ago: executing program 7 (id=1323): r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030031000b12d25a80648c2594f90124fc60100c044002200600053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)=ANY=[@ANYBLOB], 0xfe33) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x40002063) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8b04, &(0x7f0000000080)={'wlan1\x00'}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0xfdef) r4 = socket$kcm(0xa, 0x2, 0x3a) sendmsg$kcm(r4, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0x2004080) perf_event_open(&(0x7f0000000040)={0x5, 0x6c, 0x2, 0x2, 0x8, 0x9, 0x0, 0x6, 0x0, 0xc, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x8}, 0x2000, 0xff, 0x9, 0x0, 0x4, 0x145d, 0x1, 0x0, 0x3f8, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, @perf_bp={0x0, 0xf}, 0x1000, 0x4, 0x0, 0x8, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000f228f31f0000000000f5ffffffffffffff0095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) socketpair(0x9, 0x800, 0x0, 0x0) r7 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r7, 0x0, 0x4, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r9 = openat$cgroup_devices(r8, &(0x7f0000000100)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r9, &(0x7f0000000140)=ANY=[@ANYBLOB="62202a3a3409776d0a89"], 0xa) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)={{0x14}, [@NFT_MSG_NEWRULE={0x44, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x18, 0x4, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @match={{0xa}, @val={0x4}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x6c}, 0x1, 0x0, 0x0, 0x2000094}, 0x4000800) 4.058079881s ago: executing program 4 (id=1326): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000001b00)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x28) close(r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800110000000000000000000000ca6c9500000000000000ffdb360734076d08000d0ba8897489c522ba66c5439753d3e0c9b47bef3c2879fc55ce1649fcc6cff6b7eddc1ae3947efadabc0399ee4099902841e1c394783c541a69c0b2af1dcd8598b5c388992876d8e7858aed8e2f5308e47d9b93e38f092f022e25a098b85645ea1b65d5b5e38355cb7d53cb83ed9d6bc2756c81b8692e12b1b572660c0d83d23e57f5ffa19bad8b1feca88786116725e92d6d6e399a37a38899d361337c02c04a0dbda849dc41b918a60e7830677446f3280ea4f0e5"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0xc, &(0x7f00000000c0)={0x0, 0x1}, 0x1, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffd1}, 0x90) 3.893555437s ago: executing program 4 (id=1327): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='afs_cell\x00', 0xffffffffffffffff, 0x0, 0x2ea}, 0x18) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x10828, 0x0, 0x0, 0x2, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, r0, 0x3) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000009c0)="d80000001c0081064e81f782db44b9040a1d080404000000000081a1180002000600142603600e1208000f000000000100001605200001400200000803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e40ae8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccc29e00360db70100000d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e7834", 0xd8}], 0x1, 0x0, 0x0, 0x7400}, 0x8000800) 2.202660477s ago: executing program 3 (id=1328): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x88e}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB="940200003e000100fcff0700040000000100000004008c00700201806c0210806802088004003b00fcfda94daa0ae4dc5148a6a951ebdc011c80630d952e8540e617333d39c58ed322bc7d08107b23c414fa4317588238ab50d51274424fd7fec19bf2a990229a073f5babe2476788303f94b554b08c331b536a82a3ec83459984a2b585285a6b3f83ed55357164de601d26f056881cac69828bc5373e09f534b65c1aeadb8009ef772fdf3910a182f1937bb9ce2e9734463241789d25f10369fb416cb6c5a15617ee03ab130f705c15b76d6cea869090c7235addefad87be3ea7d5dcf2eba9975bb3d9ae4303ec264f79b4c865dc700312748a0c006900050000000000000052e8036bd4f2156656b79b398609f779f0d497324e272ad9fc44dca52bba5daab0f78440f7477af92af44960eaea14b8f0407de8ce5e7c194cd79a98cd24f7d760bf862e5c45786a4a5fdd1400ed800400688004000c8004009f80040048800fb251963a00c2d6f8c423f58bb5712986f77e3234111fd471667d122d3a28aef31df2853e513350a7252e90fd0768ed7a88712065e902f3b2f45aabd9f8b7cbe9a98c2a5bf9826aac00b4108f3ab74758aed6a8f4b318f3aec9f275c79cb9dabcfdf604d821619372fd9d8a4194d88c766c2a44", @ANYRES32, @ANYBLOB="a01d8de04ed19204acf523ece9badebf18ad99d02d653f7d6954bb59518409866a67a76fe3961698f70a94b27037e49c80c92d311dbbe73380edee7e9fbf10dbf37dfc9292dc000a17298ba87a7964e27d8e2bc1414620702be47baf08e42f89afa8ad05a9b28488998ecd32751f3157de272519225ec14878df695dbc40df094046b99fafb440df79b6dd84e73249b35927a34fd42fed4fc8d5cca5d9638f3cdb8341893b8440e40a140c0c0002"], 0x294}, 0x1, 0x0, 0x0, 0x400c801}, 0x4008094) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b400000000000000791028000000000069000c00000000009500740000000000", @ANYRESDEC], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/164, 0x0, 0x25, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffff8f}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x4110, 0x0, 0x0, 0x8, 0x37e, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={r3, r4, 0x4, 0x0, @void}, 0x10) 2.199968628s ago: executing program 5 (id=1329): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x58, 0x4, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xaf) r4 = gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(r4, &(0x7f0000000280)='ns/user\x00') syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.148367672s ago: executing program 7 (id=1330): bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x9}, 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='..\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x40, 0x0, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8001, 0xc}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x0, 0x4, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_macvtap\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000080)) 2.095585106s ago: executing program 4 (id=1331): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702000002ffffffb703000008000000b704000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x400ff9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4082c5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000001ac0)={&(0x7f0000000180)={0x100, 0x24, 0x1, 0x70bd2a, 0x25dfdbfe, {0x44}, [@generic="728ab89f66d06dfee6edcfc9bfaaacd0ecdfa409d70c9fdf720baa39622a4a2052e5b2b59cf6accb71dcfb117a50d8e66c207c16cd8d1e4b2dd588e558aadc5d8039fe1746e6f398eda640c31bb26364ea73f64bd212d440cfb8dc7f7a90f5bc5b87f93e95c76c888e418be1a8b804b750b6106a6961d99cca030aec6385adcc621b22abeb2cad166dc58d47bbc1630624213795ba6cb4802d55d50c071075a7a7283ccabb6e1f1a86fc1bbe2262ec3f8c6f9469b82f9c503ec4d20633b63f76fbf6490444e4ed1176ae77197c7ed552ce24763b4b37ddb22978c1f93abf2196682a37910c13c4caab"]}, 0x100}, 0x1, 0x0, 0x0, 0x880d}, 0x20000000) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r1, r0}, 0xc) 2.067654161s ago: executing program 6 (id=1333): perf_event_open(0x0, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x9) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/29], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) r1 = socket(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000b00)={{0x14, 0x10, 0x1, 0x0, 0x0, {0xa}}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x28}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="300000000a14010028bd334d63abdf2508000100000000000800010001000000080015"], 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x80) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="d8000000310081044e81f782db44b904021d080005000000e8fe55a1180015000600142603600e120900210000000401a8001600a40001", 0x37}], 0x1}, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000380)={&(0x7f0000000040)="b64b6779e728a585fc6d831c9c111ee3bf867c7fa20663508d961b5b0bc1d4eded804b84c8ee0b5e7b55af44aa8bf4a16c4d4aaf896a13f650a3b4f737945a9a179a6ceb93adadb8dd841258d0f04b02868cd415ab9bc48b055a8b3f92b143cb16138c216513a045af2101e7e3c507bedee404330f1171812cdaeed17a0e89dd4863a4e6808ca6b7046c38f33b9a0417e1c8fae7a9e1b4c8161b02", 0x0, 0x0, 0x0}, 0x38) r5 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="2b40000048009125745c7388641f9c0e0a"], 0xfe33) 1.883867847s ago: executing program 4 (id=1334): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x5, 0x84) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x21, &(0x7f0000002980)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@alu={0x7, 0x1, 0x9, 0x9, 0x6, 0xfffffffffffffff0, 0xffffffffffffffff}, @map_val={0x18, 0xb, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @generic={0x0, 0x5, 0x2, 0x504, 0x2}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='GPL\x00', 0x1, 0x1000, &(0x7f0000001980)=""/4096, 0x41000, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x5, 0x10, 0x5, 0x80000001}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000580)=[r0, r0, r0], &(0x7f00000005c0)=[{0x1, 0x4, 0xf, 0x6}, {0x1, 0x5, 0xb, 0x1}], 0x10, 0xfffffbfc}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_tracing={0x1a, 0x4, &(0x7f0000000880)=ANY=[@ANYBLOB="180000050000000000000095000000000000002149430fc5e365ed8526c5ec647eacdbbf04d444e219758fb4338e00000100"/59], &(0x7f0000000280)='syzkaller\x00', 0xffffff95, 0x1000, &(0x7f0000000980)=""/4096, 0x41100, 0x0, '\x00', 0x0, 0x19, r2, 0x8, &(0x7f00000002c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x2, 0x10, 0x7d6afa91, 0xffff}, 0x10, 0x209a, r3, 0x1, &(0x7f0000000600)=[r0, 0x1, r0, r0, r0], &(0x7f0000000640)=[{0x2, 0x2, 0x0, 0x7}], 0x10, 0x9}, 0x94) setsockopt$sock_attach_bpf(r2, 0x84, 0x76, &(0x7f0000000000), 0x8) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xe07e872420dfef8a) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x1, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = socket$kcm(0x1e, 0x4, 0x0) sendmsg$kcm(r4, &(0x7f0000000100)={&(0x7f0000001540)=@tipc=@id={0x1e, 0x3, 0x0, {0x4e22}}, 0x80, 0x0}, 0xf5ff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'netdevsim0\x00', 0xfd01}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) socket$kcm(0xa, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x4c, &(0x7f0000000000), 0x4) recvmsg$unix(r6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$SIOCSIFHWADDR(r7, 0xff05, 0x0) 1.719157635s ago: executing program 3 (id=1335): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x10, 0x0, &(0x7f0000000000), &(0x7f0000000280)='GPL\x00'}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x31}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x33}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r4, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 1.50677201s ago: executing program 7 (id=1336): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0xbb, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300)}, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1519f0cf040000000800001da9de00000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x58}}]}, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000008000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000500)='memory.pressure\x00', 0x2, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x42040, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffff8880b8727a20, 0x1}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x4}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000), 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000580)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f00000008c0)=[{&(0x7f00000005c0)="c8cd754bac10dca13083b69453315f4af47148254dc905545fa16d5993af31afe4f44e70ee3f5a755546d7b96e65543ca6bb8ab56b", 0x35}, {&(0x7f0000000600)="2efabc736e1b49349387eb44e66a4eeb52c48fe7dc450d4a45c52a5b85f3df418fb54d5e62f0a001a794756bc439e7541b2d9858c783e024f8fb2c120a3c3935a8caf72b671ba0edb5d5336ac87d3dac7e3341fc47ccd44bd37cfc3c03bd52bfb5787c10e81f33cbd3a351083a30bdc1fa3a7b9b82776e56dcfcdb92eb5e64c6b20066a4e0", 0x85}, {&(0x7f00000006c0)="c46cf2f1b7e13e7d85796c35611e9d75da86113c0fa22a96c8e54d89e076775b1d40a79549bdafab789e5fd413784eb240dc532d2ce345e8afef29d0a2e6c6e4d15f38dd076f", 0x46}, {&(0x7f0000000740)="a18d457a052801a24e7bbad9effcbbc06c7c0752ab3cafe50135d515e5f4e5952acd3a11b570a9933f9afe9228d8ed6a9582b4c27434d7", 0x37}, {&(0x7f0000000780)="df80c782913d3a1d73637e8cdfd60312c8957547cdb6bd6548cf1731bf133b9b312f79f5817d6f2be54970c399dc8cddb919f80fba47752b7a70da7329f125c285037ffe7d9684610d55faf9fc3f4ba05bc64db17cebedfdacafad99d1fb7fc6e496e1726299296030d1e62b23c702f2bdd17dbb1a3944b550b9920cdef228ed67cc12e0cb0f77c6259af4b893ae520a906b426d1b15e808f4042ce2ed6928a95f452578bfe63f154eeeecf5708f11ccf71744a9e3bb275029f09c892fda50bf5f482857887a2ff68ed34ef11008ab86c6ca84c2c6b7a9732e88d827ca37807944", 0xe1}, {&(0x7f0000000880)="2480f56c2fe6229fc79719", 0xb}], 0x6, &(0x7f0000000a40)=[@ip_ttl={{0x14}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @remote}}}, @ip_retopts={{0x70, 0x0, 0x7, {[@timestamp_addr={0x44, 0x14, 0xdf, 0x1, 0xe, [{@broadcast, 0x1}, {@multicast2, 0x400}]}, @rr={0x7, 0x27, 0x3c, [@dev={0xac, 0x14, 0x14, 0xf}, @rand_addr=0x64010101, @empty, @loopback, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010102]}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x1f, 0x36, [@initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x1a}, @loopback, @empty, @loopback]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @private=0xa010102}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private=0xa010100, @remote}}}, @ip_retopts={{0x10}}], 0x140}, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x2, 0x17, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000020100000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000011000000bf09000000000000550901000074f696e500000000000000180100002020702500000000002020207baaf8ff00000000bda100000000000027010000f8ffffffb702000008000000b7030000000000002500000006000000be91000000000000b502ecffffff00008500000005000000b70000000000000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='ext4_es_lookup_extent_enter\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f}, 0x94) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 1.439362522s ago: executing program 6 (id=1337): r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000000), 0x4) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22020000000000000000000000000000007f"], 0xfdef) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0xa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x80280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x3000, 0x9, 0x0, 0x4, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x4, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0x3, 0xffffffffffffffff, 0xa) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r3, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b40)={&(0x7f0000001ac0)=ANY=[@ANYBLOB="200000001114010028bd7000fcdbdf"], 0x20}, 0x1, 0x0, 0x0, 0x408c}, 0x40040) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x880) sendmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000000200)=@caif=@dgm={0x25, 0x12}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000140)="18", 0x1}], 0x1}, 0x0) r5 = socket$kcm(0x2, 0x5, 0x84) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001040)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="a01d8de04ed19204acf523ece9badebf18ad99d02d653f7d6954bb59518409866a67a76fe3961698f70a94b27037e49c80c92d311dbbe73380edee7e9fbf10dbf37dfc9292dc000a17298ba87a7964e27d8e2bc1414620702be47baf08e42f89afa8ad05a9b28488998ecd32751f3157de272519225ec14878df695dbc40df094046b99fafb440df79b6dd84e73249b35927a34fd42fed4fc8d5cca5d9638f3cdb8341893b8440e40a140c0c0002"], 0x294}, 0x1, 0x0, 0x0, 0x400c801}, 0x4008094) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{}, {0x10000002}]}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000c00)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0xfffffffffffffffe}], 0x7}, 0x10000) setsockopt$sock_attach_bpf(r5, 0x84, 0x64, &(0x7f0000000000)=r9, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) 1.438523622s ago: executing program 3 (id=1338): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="5c0000000206010100000000000000000000000005000400000000000900020073797a31000000000500010007000000050005000a0000001400078008001140000000690800124000007fff10000300686173683a69702c6d6163"], 0x5c}}, 0x0) 695.277292ms ago: executing program 4 (id=1339): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x80, 0x6, 0x1, 0xb, 0x4, 0x0, 0xf, 0x10848, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x7fffffffffffffff, 0x9}, 0x1e400, 0x7, 0xb, 0x1, 0xbf, 0xc48, 0xfff, 0x0, 0xe, 0x0, 0x1c7}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0xec, 0x20, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_config_ext={0x76, 0x1efb}, 0x1820, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r0, 0xffffffffffffffff, r1, 0x2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) socketpair(0x3, 0x1, 0x0, &(0x7f0000000200)) 694.320946ms ago: executing program 7 (id=1340): r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="5c00000012006b000040017ea608601602f3650440010008000000000002009ee517c356a7b0251e616859ad3a78a76e807c857e21bea297bff435cf01c937e786a6d0bdc7fcf50e4509c5cc68b7ed9c232d786c3500000000000074", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r1 = socket$qrtr(0x2a, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x1f, 0x15, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000fcffffff000000000800000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000080850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000020000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000a800000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x11}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r2, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xffffffffffffffdd) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0x1, 0x58, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="97ea1d1f395a85b651643577c12f76fd0a9ddefb3a393790dbe61886a1c8cf1c3eee674b5569f15757d725e0f1d166050925266d15baed4256d36e589e530ab1eccb9f2c9d888e087c0d54c16292f159bdc356afb06b3d3d152988d568a0fe819a8340ad635957998a83edbee6a9d4d93cb72dc291d8556959914fd7cb388066106bcb359115a5c679e587fc96b11ada7408ff14ff8256366673a1522a83de62d073071bb04100604e8281522aa3b1372fbf2809b46f2f9ce43730770a153fc12325f449f176f8f06712b802794775355293e083ef6341edd41e3f6522e3bbf82d26e2bfe407388479194eba42e18ef5", 0xf0}, {&(0x7f00000002c0)="cd8b206b8efa1eefa9d7953b96be74f96d5ade342d273200d5d9dd42c37f00b49c2da25047efd61ab6650daa29717231318e8bedac1feac0d3d532a8e6378159d48371137ddabef16d16261263477ae36957d637c7e37c1bd51fbfd3ca96099c4f203660d9f9d7868ea2ee8bd0e65d7436e53106be454a03779fcaa4c81309e465a8dfdf2a24faa5d006a3b70abb108b1f157e356028", 0x96}, {&(0x7f0000000380)="072178972746669db5586b53adc2fdf53beb5bd09c44ffae8e8281644646a82516f742d2b7e83b718e37c3f78343403b15387d3fb902c6bc3cff9310c9682703919f17c63693e2339c4825881c4f569437ebccf8d204f83b1289207d1dd41e4be90d92e2448dbd9af32f56544c20f1fb4e6f62efd5f611792957fb635dbcbc0b3ed11103211d26880dd53153fad4a51d3c7e88ff5f327e293e62d11c54a8a8019224c8d9642e9a9b221313089a047786a1811569daa3cae02bc3098dd9a10b3b491082c65e990f03cc2a253b82083b6ed53bb06bb4b429d6a9a5edb23e2f4e47bd18eb966ec558af701dc2e2", 0xec}], 0x3, &(0x7f0000000580)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @multicast1}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_retopts={{0x24, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x14, 0x11, 0x3, 0x2, [{@loopback, 0x3}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x5}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @private=0xa010100}}}, @ip_retopts={{0x10}}], 0x90}, 0xc050) 357.138348ms ago: executing program 3 (id=1341): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000400)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe40, 0x10000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x6}, 0x2c) socket$nl_xfrm(0x10, 0x3, 0x6) 205.577076ms ago: executing program 7 (id=1342): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0xa, 0x30b, 0x2, 0x9}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000380), &(0x7f00000003c0)='%pI4 \x00', 0x2}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.current\x00', 0x26e1, 0x0) close(r2) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x3, 0x3, 0x7, 0x0, {0xa, 0xe24, 0x1000002, @private0, 0x7}}}, 0x80, 0x0}, 0x2000f761) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000080)=ANY=[@ANYBLOB="180800000000000000000000000000008510000006000000180000004cb5d47a00000000f7ffffff6600000000200000180000040800000000000000e7ffffff9400000000000000460a0000f0ffffff9500000000000000"], &(0x7f0000000000)='GPL\x00', 0xa}, 0x94) ioctl$SIOCSIFHWADDR(r2, 0x8b32, &(0x7f0000000000)={'virt_wifi0\x00'}) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000000b00010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a58000000200a0b040000000000000000020000002c0004802800018011000100666c6f775f6f66666c6f616400000000100002800900010073797a30000000000900010073797a3000000000090002"], 0x250}, 0x1, 0x0, 0x0, 0x2000094}, 0x4000800) r4 = getpid() perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x81, 0xf7, 0x8, 0xfb, 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x6}, 0x40, 0x1c, 0xff, 0x9, 0xfffffffffffff445, 0xb5, 0x1, 0x0, 0x4800, 0x0, 0x7}, r4, 0x8, r2, 0x9) 152.818521ms ago: executing program 6 (id=1343): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x2838, 0x0, 0x0, 0x0, 0x0, 0x7ffffe, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)={0x14, 0x2, 0x7, 0x801, 0x0, 0x0, {0x1, 0x0, 0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x884) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r2}, 0x8) socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000880)={0x2c, 0x3, 0x1, 0x201, 0x0, 0x0, {0xa, 0x0, 0xa}, [@CTA_TUPLE_REPLY={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_REPLY_FLAGS={0x8, 0x2, 0x4}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4004}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0004003c000723fffffffffeffffff0108000465c03eba80"], 0x1c}, 0x1, 0x0, 0x0, 0x769885401cf0f709}, 0xc000) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={0xffffffffffffffff}, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r5) 27.778968ms ago: executing program 4 (id=1344): socket$kcm(0x10, 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x180, 0x4, 0x28}, 0x50) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x4, 0x82030, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x8000001946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000010000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x18) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) (fail_nth: 21) 0s ago: executing program 3 (id=1345): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x3, [@restrict, @datasec={0x1, 0x1, 0x0, 0xf, 0x1, [{0x1, 0x0, 0x1}], "d1"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], "868e"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], '^'}]}, {0x0, [0x2e]}}, 0x0, 0x5b, 0x0, 0xa}, 0x20) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r1, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000040)='sys_exit\x00', r2}, 0x10) kernel console output (not intermixed with test programs): 169.274345][ T49] veth0_macvtap: left promiscuous mode [ 169.295766][ T49] veth1_vlan: left promiscuous mode [ 169.303687][ T49] veth0_vlan: left promiscuous mode [ 170.087591][ T6304] netlink: 'syz.3.81': attribute type 10 has an invalid length. [ 171.182818][ T49] team0 (unregistering): Port device team_slave_1 removed [ 171.307774][ T49] team0 (unregistering): Port device team_slave_0 removed [ 171.667488][ T6313] FAULT_INJECTION: forcing a failure. [ 171.667488][ T6313] name failslab, interval 1, probability 0, space 0, times 0 [ 171.687470][ T6313] CPU: 1 UID: 0 PID: 6313 Comm: syz.0.84 Not tainted 6.17.0-rc1-syzkaller-ge4414b01c1cd #0 PREEMPT(full) [ 171.687501][ T6313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 171.687512][ T6313] Call Trace: [ 171.687522][ T6313] [ 171.687535][ T6313] dump_stack_lvl+0x189/0x250 [ 171.687570][ T6313] ? __pfx____ratelimit+0x10/0x10 [ 171.687602][ T6313] ? __pfx_dump_stack_lvl+0x10/0x10 [ 171.687630][ T6313] ? __pfx__printk+0x10/0x10 [ 171.687682][ T6313] ? __pfx___might_resched+0x10/0x10 [ 171.687700][ T6313] ? fs_reclaim_acquire+0x7d/0x100 [ 171.687746][ T6313] should_fail_ex+0x414/0x560 [ 171.687790][ T6313] ? rhashtable_init_noprof+0x4ee/0xbb0 [ 171.687808][ T6313] should_failslab+0xa8/0x100 [ 171.687842][ T6313] __kvmalloc_node_noprof+0x161/0x5f0 [ 171.687874][ T6313] ? rhashtable_init_noprof+0x4ee/0xbb0 [ 171.687916][ T6313] rhashtable_init_noprof+0x4ee/0xbb0 [ 171.687962][ T6313] nft_rhash_init+0x10b/0x3a0 [ 171.688005][ T6313] ? __pfx_nft_rhash_init+0x10/0x10 [ 171.688037][ T6313] ? __pfx_nft_rhash_key+0x10/0x10 [ 171.688063][ T6313] ? __pfx_nft_rhash_obj+0x10/0x10 [ 171.688088][ T6313] ? __pfx_nft_rhash_cmp+0x10/0x10 [ 171.688127][ T6313] ? nf_tables_newset+0x1396/0x2530 [ 171.688146][ T6313] ? kfree+0x18e/0x440 [ 171.688193][ T6313] nf_tables_newset+0x1c04/0x2530 [ 171.688247][ T6313] ? __pfx_nf_tables_newset+0x10/0x10 [ 171.688326][ T6313] ? __nla_parse+0x40/0x60 [ 171.688368][ T6313] nfnetlink_rcv+0x1132/0x2520 [ 171.688505][ T6313] ? __pfx_nfnetlink_rcv+0x10/0x10 [ 171.688690][ T6313] ? __netlink_deliver_tap+0x807/0x850 [ 171.688722][ T6313] ? netlink_deliver_tap+0x2e/0x1b0 [ 171.688811][ T6313] netlink_unicast+0x82c/0x9e0 [ 171.688873][ T6313] ? __pfx_netlink_unicast+0x10/0x10 [ 171.688911][ T6313] ? netlink_sendmsg+0x642/0xb30 [ 171.688935][ T6313] ? skb_put+0x11b/0x210 [ 171.688983][ T6313] netlink_sendmsg+0x805/0xb30 [ 171.689047][ T6313] ? __pfx_netlink_sendmsg+0x10/0x10 [ 171.689092][ T6313] ? aa_sock_msg_perm+0xf1/0x1d0 [ 171.689133][ T6313] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 171.689157][ T6313] ? __pfx_netlink_sendmsg+0x10/0x10 [ 171.689190][ T6313] __sock_sendmsg+0x21c/0x270 [ 171.689223][ T6313] ____sys_sendmsg+0x505/0x830 [ 171.689259][ T6313] ? __pfx_____sys_sendmsg+0x10/0x10 [ 171.689316][ T6313] ? import_iovec+0x74/0xa0 [ 171.689357][ T6313] ___sys_sendmsg+0x21f/0x2a0 [ 171.689392][ T6313] ? __pfx____sys_sendmsg+0x10/0x10 [ 171.689499][ T6313] ? __fget_files+0x2a/0x420 [ 171.689563][ T6313] ? __fget_files+0x2a/0x420 [ 171.689582][ T6313] ? __fget_files+0x3a0/0x420 [ 171.689639][ T6313] __x64_sys_sendmsg+0x19b/0x260 [ 171.689675][ T6313] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 171.689734][ T6313] ? __pfx_ksys_write+0x10/0x10 [ 171.689758][ T6313] ? rcu_is_watching+0x15/0xb0 [ 171.689800][ T6313] ? do_syscall_64+0xbe/0x3b0 [ 171.689845][ T6313] do_syscall_64+0xfa/0x3b0 [ 171.689871][ T6313] ? lockdep_hardirqs_on+0x9c/0x150 [ 171.689900][ T6313] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 171.689921][ T6313] ? clear_bhb_loop+0x60/0xb0 [ 171.689957][ T6313] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 171.689977][ T6313] RIP: 0033:0x7f682338ebe9 [ 171.690001][ T6313] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 171.690017][ T6313] RSP: 002b:00007f6824216038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 171.690040][ T6313] RAX: ffffffffffffffda RBX: 00007f68235b5fa0 RCX: 00007f682338ebe9 [ 171.690054][ T6313] RDX: 0000000020050800 RSI: 00002000000000c0 RDI: 0000000000000003 [ 171.690067][ T6313] RBP: 00007f6824216090 R08: 0000000000000000 R09: 0000000000000000 [ 171.690079][ T6313] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 171.690090][ T6313] R13: 00007f68235b6038 R14: 00007f68235b5fa0 R15: 00007ffe64999c28 [ 171.690160][ T6313] [ 172.627051][ T6322] netlink: 'syz.0.87': attribute type 10 has an invalid length. [ 172.631797][ T6304] 8021q: adding VLAN 0 to HW filter on device bond0 [ 172.650236][ T6304] team0: Port device bond0 added [ 172.681831][ T6322] netlink: 55 bytes leftover after parsing attributes in process `syz.0.87'. [ 172.819773][ T6328] netlink: 'syz.4.86': attribute type 10 has an invalid length. [ 173.587002][ T6328] 8021q: adding VLAN 0 to HW filter on device bond0 [ 173.592679][ T6326] netlink: 147608 bytes leftover after parsing attributes in process `syz.0.87'. [ 173.600101][ T6328] team0: Port device bond0 added [ 173.632583][ T6326] netlink: 62239 bytes leftover after parsing attributes in process `syz.0.87'. [ 173.946637][ T6337] sit0: entered allmulticast mode [ 174.071272][ T6341] sit0: entered promiscuous mode [ 174.493073][ T6057] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 174.507856][ T6338] syz.4.89 (6338) used greatest stack depth: 16552 bytes left [ 174.537821][ T6353] netlink: 'syz.3.92': attribute type 19 has an invalid length. [ 174.560607][ T6057] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 174.647314][ T6353] netlink: 132 bytes leftover after parsing attributes in process `syz.3.92'. [ 174.706958][ T6057] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 174.994566][ T6057] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 175.521826][ T6361] sit0: entered promiscuous mode [ 175.847659][ T6373] netlink: 'syz.3.95': attribute type 28 has an invalid length. [ 175.901626][ T6373] netlink: 2 bytes leftover after parsing attributes in process `syz.3.95'. [ 175.957282][ T6054] 8021q: adding VLAN 0 to HW filter on device bond0 [ 176.316069][ T6054] 8021q: adding VLAN 0 to HW filter on device team0 [ 176.759059][ T6394] netlink: 12 bytes leftover after parsing attributes in process `syz.0.100'. [ 176.875743][ T6396] netlink: 'syz.3.98': attribute type 10 has an invalid length. [ 177.133922][ T4091] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.142376][ T4091] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.330770][ T4091] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.339289][ T4091] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.503623][ T6057] 8021q: adding VLAN 0 to HW filter on device bond0 [ 177.775106][ T6057] 8021q: adding VLAN 0 to HW filter on device team0 [ 177.896778][ T4091] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.906741][ T4091] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.964436][ T4091] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.972553][ T4091] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.597422][ T6057] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 178.686425][ T6057] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 179.086633][ T6422] netlink: 'syz.4.103': attribute type 1 has an invalid length. [ 179.192274][ T6422] netlink: 168864 bytes leftover after parsing attributes in process `syz.4.103'. [ 179.221476][ T6431] netlink: 24 bytes leftover after parsing attributes in process `syz.3.102'. [ 179.419862][ T6421] netlink: 60 bytes leftover after parsing attributes in process `syz.3.102'. [ 179.442384][ T6427] netlink: 60 bytes leftover after parsing attributes in process `syz.3.102'. [ 179.505148][ T6431] netlink: 60 bytes leftover after parsing attributes in process `syz.3.102'. [ 179.821145][ T6054] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 179.932397][ T6057] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 180.049171][ T6433] Driver unsupported XDP return value 0 on prog (id 105) dev N/A, expect packet loss! [ 181.311593][ T6466] netlink: 60 bytes leftover after parsing attributes in process `syz.4.108'. [ 181.358563][ T6464] netlink: 60 bytes leftover after parsing attributes in process `syz.4.108'. [ 181.422829][ T6466] netlink: 60 bytes leftover after parsing attributes in process `syz.4.108'. [ 181.721757][ T6480] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 181.755026][ T6057] veth0_vlan: entered promiscuous mode [ 181.806515][ T6481] netlink: 'syz.3.110': attribute type 40 has an invalid length. [ 181.868142][ T6057] veth1_vlan: entered promiscuous mode [ 182.205744][ T6054] veth0_vlan: entered promiscuous mode [ 182.221395][ T6486] netlink: 'syz.4.112': attribute type 7 has an invalid length. [ 182.252766][ T6054] veth1_vlan: entered promiscuous mode [ 182.342250][ T6057] veth0_macvtap: entered promiscuous mode [ 182.417238][ T6057] veth1_macvtap: entered promiscuous mode [ 182.539370][ T6054] veth0_macvtap: entered promiscuous mode [ 182.551681][ T6492] netlink: 4 bytes leftover after parsing attributes in process `syz.3.114'. [ 182.612888][ T6054] veth1_macvtap: entered promiscuous mode [ 182.629192][ T6492] netlink: 4 bytes leftover after parsing attributes in process `syz.3.114'. [ 182.663356][ T6057] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 182.761888][ T6057] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 185.471270][ T6054] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 185.584519][ T6054] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 185.726595][ T49] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 185.768541][ T49] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 185.856034][ T49] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 185.924728][ T49] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 185.955305][ T49] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.276660][ T49] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.318329][ T49] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 187.798058][ T49] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 188.294411][ T6522] FAULT_INJECTION: forcing a failure. [ 188.294411][ T6522] name failslab, interval 1, probability 0, space 0, times 0 [ 188.564948][ T1113] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 188.670538][ T6522] CPU: 0 UID: 0 PID: 6522 Comm: syz.4.120 Not tainted 6.17.0-rc1-syzkaller-ge4414b01c1cd #0 PREEMPT(full) [ 188.670571][ T6522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 188.670583][ T6522] Call Trace: [ 188.670591][ T6522] [ 188.670601][ T6522] dump_stack_lvl+0x189/0x250 [ 188.670633][ T6522] ? __pfx____ratelimit+0x10/0x10 [ 188.670661][ T6522] ? __pfx_dump_stack_lvl+0x10/0x10 [ 188.670685][ T6522] ? __pfx__printk+0x10/0x10 [ 188.670722][ T6522] ? __pfx___might_resched+0x10/0x10 [ 188.670740][ T6522] ? fs_reclaim_acquire+0x7d/0x100 [ 188.670778][ T6522] should_fail_ex+0x414/0x560 [ 188.670812][ T6522] should_failslab+0xa8/0x100 [ 188.670843][ T6522] __kmalloc_cache_noprof+0x70/0x3d0 [ 188.670870][ T6522] ? nf_tables_newtable+0x435/0x1890 [ 188.670898][ T6522] nf_tables_newtable+0x435/0x1890 [ 188.670916][ T6522] ? nfnl_pernet+0x2/0x240 [ 188.670967][ T6522] nfnetlink_rcv+0x1132/0x2520 [ 188.671047][ T6522] ? __pfx_nfnetlink_rcv+0x10/0x10 [ 188.671097][ T6522] ? ref_tracker_free+0x63a/0x7d0 [ 188.671167][ T6522] ? __netlink_deliver_tap+0x807/0x850 [ 188.671194][ T6522] ? netlink_deliver_tap+0x2e/0x1b0 [ 188.671248][ T6522] netlink_unicast+0x82c/0x9e0 [ 188.671286][ T6522] ? __pfx_netlink_unicast+0x10/0x10 [ 188.671314][ T6522] ? netlink_sendmsg+0x642/0xb30 [ 188.671338][ T6522] ? skb_put+0x11b/0x210 [ 188.671374][ T6522] netlink_sendmsg+0x805/0xb30 [ 188.671416][ T6522] ? __pfx_netlink_sendmsg+0x10/0x10 [ 188.671449][ T6522] ? aa_sock_msg_perm+0xf1/0x1d0 [ 188.671480][ T6522] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 188.671502][ T6522] ? __pfx_netlink_sendmsg+0x10/0x10 [ 188.671531][ T6522] __sock_sendmsg+0x21c/0x270 [ 188.671562][ T6522] ____sys_sendmsg+0x505/0x830 [ 188.671592][ T6522] ? __pfx_____sys_sendmsg+0x10/0x10 [ 188.671626][ T6522] ? import_iovec+0x74/0xa0 [ 188.671655][ T6522] ___sys_sendmsg+0x21f/0x2a0 [ 188.671679][ T6522] ? __pfx____sys_sendmsg+0x10/0x10 [ 188.671748][ T6522] ? __fget_files+0x2a/0x420 [ 188.671765][ T6522] ? __fget_files+0x3a0/0x420 [ 188.671797][ T6522] __x64_sys_sendmsg+0x19b/0x260 [ 188.671823][ T6522] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 188.671858][ T6522] ? __pfx_ksys_write+0x10/0x10 [ 188.671880][ T6522] ? rcu_is_watching+0x15/0xb0 [ 188.671909][ T6522] ? do_syscall_64+0xbe/0x3b0 [ 188.671943][ T6522] do_syscall_64+0xfa/0x3b0 [ 188.671968][ T6522] ? lockdep_hardirqs_on+0x9c/0x150 [ 188.671994][ T6522] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 188.672021][ T6522] ? clear_bhb_loop+0x60/0xb0 [ 188.672046][ T6522] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 188.672065][ T6522] RIP: 0033:0x7f8aae78ebe9 [ 188.672085][ T6522] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 188.672100][ T6522] RSP: 002b:00007f8aaf692038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 188.672122][ T6522] RAX: ffffffffffffffda RBX: 00007f8aae9b5fa0 RCX: 00007f8aae78ebe9 [ 188.672136][ T6522] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 188.672148][ T6522] RBP: 00007f8aaf692090 R08: 0000000000000000 R09: 0000000000000000 [ 188.672160][ T6522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 188.672170][ T6522] R13: 00007f8aae9b6038 R14: 00007f8aae9b5fa0 R15: 00007ffef54adeb8 [ 188.672208][ T6522] [ 189.124368][ T1113] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 189.139050][ T4091] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 189.147223][ T4091] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 189.344419][ T49] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 189.372169][ T49] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 189.625175][ T12] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 189.690518][ T12] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 192.604337][ T6565] netlink: 52 bytes leftover after parsing attributes in process `syz.5.127'. [ 194.385227][ T6600] netlink: 4 bytes leftover after parsing attributes in process `syz.4.129'. [ 194.423340][ T6600] netlink: 32 bytes leftover after parsing attributes in process `syz.4.129'. [ 194.503934][ T6600] FAULT_INJECTION: forcing a failure. [ 194.503934][ T6600] name failslab, interval 1, probability 0, space 0, times 0 [ 194.558636][ T6600] CPU: 0 UID: 0 PID: 6600 Comm: syz.4.129 Not tainted 6.17.0-rc1-syzkaller-ge4414b01c1cd #0 PREEMPT(full) [ 194.558671][ T6600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 194.558682][ T6600] Call Trace: [ 194.558691][ T6600] [ 194.558700][ T6600] dump_stack_lvl+0x189/0x250 [ 194.558734][ T6600] ? __pfx____ratelimit+0x10/0x10 [ 194.558762][ T6600] ? __pfx_dump_stack_lvl+0x10/0x10 [ 194.558787][ T6600] ? __pfx__printk+0x10/0x10 [ 194.558815][ T6600] ? perf_trace_lock+0xec/0x3b0 [ 194.558856][ T6600] should_fail_ex+0x414/0x560 [ 194.558889][ T6600] should_failslab+0xa8/0x100 [ 194.558921][ T6600] kmem_cache_alloc_noprof+0x73/0x3c0 [ 194.558946][ T6600] ? skb_clone+0x212/0x3a0 [ 194.558975][ T6600] skb_clone+0x212/0x3a0 [ 194.559003][ T6600] __netlink_deliver_tap+0x404/0x850 [ 194.559056][ T6600] ? netlink_deliver_tap+0x2e/0x1b0 [ 194.559086][ T6600] netlink_deliver_tap+0x19c/0x1b0 [ 194.559119][ T6600] netlink_dump+0x92b/0xe90 [ 194.559169][ T6600] ? __pfx_netlink_dump+0x10/0x10 [ 194.559235][ T6600] ? netlink_lookup+0x30/0x200 [ 194.559259][ T6600] ? netlink_lookup+0x30/0x200 [ 194.559287][ T6600] ? nf_tables_dumpreset_obj_start+0x114/0x180 [ 194.559324][ T6600] __netlink_dump_start+0x5cb/0x7e0 [ 194.559361][ T6600] ? nft_netlink_dump_start_rcu+0xb6/0x1a0 [ 194.559387][ T6600] nft_netlink_dump_start_rcu+0xdb/0x1a0 [ 194.559417][ T6600] nf_tables_getobj_reset+0x1c8/0x600 [ 194.559447][ T6600] ? __pfx_nf_tables_getobj_reset+0x10/0x10 [ 194.559467][ T6600] ? __pfx_nf_tables_dumpreset_obj_start+0x10/0x10 [ 194.559493][ T6600] ? __pfx_nf_tables_dumpreset_obj+0x10/0x10 [ 194.559519][ T6600] ? __pfx_nf_tables_dump_obj_done+0x10/0x10 [ 194.559560][ T6600] ? __nla_parse+0x40/0x60 [ 194.559590][ T6600] ? __pfx_nf_tables_getobj_reset+0x10/0x10 [ 194.559617][ T6600] nfnetlink_rcv_msg+0x80e/0x1130 [ 194.559646][ T6600] ? nfnetlink_rcv_msg+0x20d/0x1130 [ 194.559703][ T6600] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 194.559726][ T6600] ? kasan_save_free_info+0x46/0x50 [ 194.559839][ T6600] netlink_rcv_skb+0x208/0x470 [ 194.559869][ T6600] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 194.559898][ T6600] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 194.559950][ T6600] ? bpf_lsm_capable+0x9/0x20 [ 194.559974][ T6600] ? security_capable+0x7e/0x2e0 [ 194.560018][ T6600] nfnetlink_rcv+0x26a/0x2520 [ 194.560050][ T6600] ? __dev_queue_xmit+0x1d79/0x3b50 [ 194.560093][ T6600] ? __dev_queue_xmit+0x27b/0x3b50 [ 194.560139][ T6600] ? __pfx_nfnetlink_rcv+0x10/0x10 [ 194.560163][ T6600] ? __pfx___dev_queue_xmit+0x10/0x10 [ 194.560210][ T6600] ? ref_tracker_free+0x63a/0x7d0 [ 194.560251][ T6600] ? __asan_memcpy+0x40/0x70 [ 194.560274][ T6600] ? __pfx_ref_tracker_free+0x10/0x10 [ 194.560298][ T6600] ? __skb_clone+0x63/0x7a0 [ 194.560329][ T6600] ? __skb_clone+0x483/0x7a0 [ 194.560363][ T6600] ? skb_clone+0x246/0x3a0 [ 194.560389][ T6600] ? __netlink_deliver_tap+0x807/0x850 [ 194.560418][ T6600] ? netlink_deliver_tap+0x2e/0x1b0 [ 194.560459][ T6600] ? netlink_deliver_tap+0x2e/0x1b0 [ 194.560500][ T6600] netlink_unicast+0x82c/0x9e0 [ 194.560544][ T6600] ? __pfx_netlink_unicast+0x10/0x10 [ 194.560574][ T6600] ? netlink_sendmsg+0x642/0xb30 [ 194.560599][ T6600] ? skb_put+0x11b/0x210 [ 194.560635][ T6600] netlink_sendmsg+0x805/0xb30 [ 194.560676][ T6600] ? __pfx_netlink_sendmsg+0x10/0x10 [ 194.560709][ T6600] ? aa_sock_msg_perm+0xf1/0x1d0 [ 194.560740][ T6600] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 194.560760][ T6600] ? __pfx_netlink_sendmsg+0x10/0x10 [ 194.560787][ T6600] __sock_sendmsg+0x21c/0x270 [ 194.560817][ T6600] ____sys_sendmsg+0x505/0x830 [ 194.560847][ T6600] ? __pfx_____sys_sendmsg+0x10/0x10 [ 194.560882][ T6600] ? import_iovec+0x74/0xa0 [ 194.560912][ T6600] ___sys_sendmsg+0x21f/0x2a0 [ 194.560937][ T6600] ? __pfx____sys_sendmsg+0x10/0x10 [ 194.561022][ T6600] ? __fget_files+0x2a/0x420 [ 194.561039][ T6600] ? __fget_files+0x3a0/0x420 [ 194.561076][ T6600] __x64_sys_sendmsg+0x19b/0x260 [ 194.561103][ T6600] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 194.561142][ T6600] ? __pfx_ksys_write+0x10/0x10 [ 194.561165][ T6600] ? rcu_is_watching+0x15/0xb0 [ 194.561196][ T6600] ? do_syscall_64+0xbe/0x3b0 [ 194.561243][ T6600] do_syscall_64+0xfa/0x3b0 [ 194.561269][ T6600] ? lockdep_hardirqs_on+0x9c/0x150 [ 194.561295][ T6600] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 194.561315][ T6600] ? clear_bhb_loop+0x60/0xb0 [ 194.561343][ T6600] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 194.561363][ T6600] RIP: 0033:0x7f8aae78ebe9 [ 194.561385][ T6600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 194.561401][ T6600] RSP: 002b:00007f8aaf671038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 194.561425][ T6600] RAX: ffffffffffffffda RBX: 00007f8aae9b6090 RCX: 00007f8aae78ebe9 [ 194.561439][ T6600] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000004 [ 194.561452][ T6600] RBP: 00007f8aaf671090 R08: 0000000000000000 R09: 0000000000000000 [ 194.561464][ T6600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 194.561476][ T6600] R13: 00007f8aae9b6128 R14: 00007f8aae9b6090 R15: 00007ffef54adeb8 [ 194.561522][ T6600] [ 196.612480][ T6624] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 196.886918][ T6624] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 197.009397][ T6617] netlink: 22 bytes leftover after parsing attributes in process `syz.3.134'. [ 197.390798][ T6624] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 197.431194][ T6624] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 197.669491][ T6633] netlink: 'syz.5.140': attribute type 10 has an invalid length. [ 197.741278][ T6633] netlink: 2 bytes leftover after parsing attributes in process `syz.5.140'. [ 197.819150][ T6633] bond0: entered promiscuous mode [ 197.826125][ T6633] bond_slave_0: entered promiscuous mode [ 197.831550][ T6635] netlink: 'syz.5.140': attribute type 4 has an invalid length. [ 197.861919][ T6633] bond_slave_1: entered promiscuous mode [ 197.862467][ T6633] bridge0: port 3(bond0) entered blocking state [ 197.862713][ T6633] bridge0: port 3(bond0) entered disabled state [ 197.862946][ T6633] bond0: entered allmulticast mode [ 197.862963][ T6633] bond_slave_0: entered allmulticast mode [ 197.862979][ T6633] bond_slave_1: entered allmulticast mode [ 197.867651][ T6633] bridge0: port 3(bond0) entered blocking state [ 197.867817][ T6633] bridge0: port 3(bond0) entered forwarding state [ 198.009133][ T6635] netlink: 199836 bytes leftover after parsing attributes in process `syz.5.140'. [ 199.362726][ T6668] sctp: [Deprecated]: syz.5.148 (pid 6668) Use of struct sctp_assoc_value in delayed_ack socket option. [ 199.362726][ T6668] Use struct sctp_sack_info instead [ 200.574053][ T6685] netlink: 146936 bytes leftover after parsing attributes in process `syz.3.151'. [ 200.721005][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 200.728712][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 200.742325][ T6685] openvswitch: netlink: Message has 6 unknown bytes. [ 200.876898][ T6695] netlink: 17 bytes leftover after parsing attributes in process `syz.0.152'. [ 200.929124][ T6695] netlink: zone id is out of range [ 200.936269][ T6695] netlink: zone id is out of range [ 201.209945][ T6695] netlink: zone id is out of range [ 201.424659][ T6695] netlink: zone id is out of range [ 201.658734][ T6695] netlink: zone id is out of range [ 201.780918][ T6695] netlink: zone id is out of range [ 201.875514][ T6695] netlink: zone id is out of range [ 201.958678][ T6695] netlink: zone id is out of range [ 201.964249][ T6695] netlink: zone id is out of range [ 202.009808][ T6708] netlink: 'syz.4.155': attribute type 10 has an invalid length. [ 202.106014][ T6708] netlink: 55 bytes leftover after parsing attributes in process `syz.4.155'. [ 203.499982][ T6740] netlink: 'syz.0.159': attribute type 10 has an invalid length. [ 203.623542][ T6744] netlink: 'syz.0.159': attribute type 4 has an invalid length. [ 203.623576][ T6744] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.159'. [ 205.675855][ T6740] netlink: 2 bytes leftover after parsing attributes in process `syz.0.159'. [ 205.691528][ T6740] bond0: entered promiscuous mode [ 205.699664][ T6740] bond_slave_0: entered promiscuous mode [ 205.706856][ T6740] bond_slave_1: entered promiscuous mode [ 205.714197][ T6740] bridge0: port 3(bond0) entered blocking state [ 205.774419][ T6740] bridge0: port 3(bond0) entered disabled state [ 205.801563][ T6740] bond0: entered allmulticast mode [ 205.813004][ T6740] bond_slave_0: entered allmulticast mode [ 205.821873][ T6740] bond_slave_1: entered allmulticast mode [ 205.838054][ T6740] bridge0: port 3(bond0) entered blocking state [ 205.846239][ T6740] bridge0: port 3(bond0) entered forwarding state [ 214.352661][ T6829] netlink: 'syz.0.176': attribute type 10 has an invalid length. [ 214.429614][ T6829] netlink: 55 bytes leftover after parsing attributes in process `syz.0.176'. [ 214.626181][ T6828] netlink: 5 bytes leftover after parsing attributes in process `syz.6.177'. [ 216.291259][ T6846] netlink: 64 bytes leftover after parsing attributes in process `syz.6.182'. [ 216.472688][ T6836] syzkaller0: entered promiscuous mode [ 216.482202][ T6836] syzkaller0: entered allmulticast mode [ 217.178680][ T6858] netlink: 'syz.4.185': attribute type 1 has an invalid length. [ 217.365266][ T6858] net_ratelimit: 76 callbacks suppressed [ 217.365295][ T6858] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 218.487983][ T6881] netlink: 8 bytes leftover after parsing attributes in process `syz.5.187'. [ 218.719631][ T6881] netlink: 9275 bytes leftover after parsing attributes in process `syz.5.187'. [ 226.264772][ T5876] Bluetooth: hci3: command 0x0406 tx timeout [ 226.271907][ T5868] Bluetooth: hci1: command 0x0406 tx timeout [ 226.279580][ T5868] Bluetooth: hci2: command 0x0406 tx timeout [ 230.514836][ T6928] netlink: 'syz.5.198': attribute type 39 has an invalid length. [ 230.677250][ T5183] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 230.705732][ T5183] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 230.726041][ T5183] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 230.742581][ T5183] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 230.751830][ T5183] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 232.734669][ T6932] chnl_net:caif_netlink_parms(): no params data found [ 232.797804][ T5183] Bluetooth: hci0: command tx timeout [ 234.135215][ T6981] nft_compat: unsupported protocol 0 [ 234.344299][ T6984] netlink: 'syz.5.206': attribute type 10 has an invalid length. [ 234.465336][ T6984] netlink: 156 bytes leftover after parsing attributes in process `syz.5.206'. [ 234.875967][ T5183] Bluetooth: hci0: command tx timeout [ 235.363209][ T6999] netlink: 28 bytes leftover after parsing attributes in process `syz.6.209'. [ 235.373158][ T6932] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.413426][ T6932] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.434685][ T6932] bridge_slave_0: entered allmulticast mode [ 235.482964][ T6932] bridge_slave_0: entered promiscuous mode [ 235.523749][ T6932] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.568611][ T6932] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.605077][ T6932] bridge_slave_1: entered allmulticast mode [ 235.664347][ T6932] bridge_slave_1: entered promiscuous mode [ 236.035994][ T6932] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 236.229076][ T6932] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 236.590012][ T6932] team0: Port device team_slave_0 added [ 236.644695][ T6932] team0: Port device team_slave_1 added [ 236.745911][ T7031] netlink: 104 bytes leftover after parsing attributes in process `syz.6.217'. [ 236.948533][ T5183] Bluetooth: hci0: command tx timeout [ 237.016934][ T6932] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 237.030024][ T6932] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 237.062764][ T6932] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 237.090021][ T6932] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 237.148290][ T6932] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 237.242300][ T6932] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 237.354768][ T7051] FAULT_INJECTION: forcing a failure. [ 237.354768][ T7051] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 237.407340][ T7051] CPU: 1 UID: 0 PID: 7051 Comm: syz.6.220 Not tainted 6.17.0-rc1-syzkaller-ge4414b01c1cd #0 PREEMPT(full) [ 237.407373][ T7051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 237.407384][ T7051] Call Trace: [ 237.407392][ T7051] [ 237.407400][ T7051] dump_stack_lvl+0x189/0x250 [ 237.407431][ T7051] ? __pfx____ratelimit+0x10/0x10 [ 237.407456][ T7051] ? __pfx_dump_stack_lvl+0x10/0x10 [ 237.407489][ T7051] ? __pfx__printk+0x10/0x10 [ 237.407511][ T7051] ? lock_acquire+0x175/0x360 [ 237.407553][ T7051] should_fail_ex+0x414/0x560 [ 237.407581][ T7051] _copy_from_user+0x2d/0xb0 [ 237.407603][ T7051] ___sys_sendmsg+0x158/0x2a0 [ 237.407625][ T7051] ? __pfx____sys_sendmsg+0x10/0x10 [ 237.407681][ T7051] ? __fget_files+0x2a/0x420 [ 237.407695][ T7051] ? __fget_files+0x3a0/0x420 [ 237.407720][ T7051] __x64_sys_sendmsg+0x19b/0x260 [ 237.407736][ T7051] ? clockevents_program_event+0x24d/0x360 [ 237.407762][ T7051] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 237.407809][ T7051] do_syscall_64+0xfa/0x3b0 [ 237.407835][ T7051] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 237.407851][ T7051] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 237.407868][ T7051] ? clear_bhb_loop+0x60/0xb0 [ 237.407890][ T7051] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 237.407905][ T7051] RIP: 0033:0x7fcff4d8ebe9 [ 237.407922][ T7051] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 237.407937][ T7051] RSP: 002b:00007fcff5c04038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 237.407958][ T7051] RAX: ffffffffffffffda RBX: 00007fcff4fb6180 RCX: 00007fcff4d8ebe9 [ 237.407971][ T7051] RDX: 00000000000080d1 RSI: 0000200000000140 RDI: 0000000000000003 [ 237.407981][ T7051] RBP: 00007fcff5c04090 R08: 0000000000000000 R09: 0000000000000000 [ 237.407992][ T7051] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 237.408002][ T7051] R13: 00007fcff4fb6218 R14: 00007fcff4fb6180 R15: 00007ffc385bfac8 [ 237.408033][ T7051] [ 237.846774][ T6932] hsr_slave_0: entered promiscuous mode [ 237.858878][ T6932] hsr_slave_1: entered promiscuous mode [ 239.391401][ T7072] : entered promiscuous mode [ 239.393701][ T5183] Bluetooth: hci0: command tx timeout [ 239.625646][ T7077] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 240.890105][ T7098] netlink: 48 bytes leftover after parsing attributes in process `syz.4.227'. [ 241.350367][ T7110] FAULT_INJECTION: forcing a failure. [ 241.350367][ T7110] name failslab, interval 1, probability 0, space 0, times 0 [ 241.391971][ T7110] CPU: 1 UID: 0 PID: 7110 Comm: syz.6.231 Not tainted 6.17.0-rc1-syzkaller-ge4414b01c1cd #0 PREEMPT(full) [ 241.392005][ T7110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 241.392016][ T7110] Call Trace: [ 241.392024][ T7110] [ 241.392034][ T7110] dump_stack_lvl+0x189/0x250 [ 241.392065][ T7110] ? __pfx____ratelimit+0x10/0x10 [ 241.392091][ T7110] ? __pfx_dump_stack_lvl+0x10/0x10 [ 241.392114][ T7110] ? __pfx__printk+0x10/0x10 [ 241.392143][ T7110] ? __pfx___might_resched+0x10/0x10 [ 241.392162][ T7110] ? fs_reclaim_acquire+0x7d/0x100 [ 241.392196][ T7110] should_fail_ex+0x414/0x560 [ 241.392226][ T7110] should_failslab+0xa8/0x100 [ 241.392255][ T7110] __kmalloc_noprof+0xcb/0x4f0 [ 241.392279][ T7110] ? tomoyo_encode+0x28b/0x550 [ 241.392303][ T7110] tomoyo_encode+0x28b/0x550 [ 241.392327][ T7110] tomoyo_realpath_from_path+0x58d/0x5d0 [ 241.392359][ T7110] ? tomoyo_path_number_perm+0x1bc/0x5a0 [ 241.392384][ T7110] tomoyo_path_number_perm+0x1e8/0x5a0 [ 241.392413][ T7110] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 241.392457][ T7110] ? __lock_acquire+0xab9/0xd20 [ 241.392530][ T7110] ? __fget_files+0x2a/0x420 [ 241.392551][ T7110] ? __fget_files+0x2a/0x420 [ 241.392565][ T7110] ? __fget_files+0x3a0/0x420 [ 241.392581][ T7110] ? __fget_files+0x2a/0x420 [ 241.392602][ T7110] security_file_ioctl+0xcb/0x2d0 [ 241.392629][ T7110] __se_sys_ioctl+0x47/0x170 [ 241.392656][ T7110] do_syscall_64+0xfa/0x3b0 [ 241.392681][ T7110] ? lockdep_hardirqs_on+0x9c/0x150 [ 241.392704][ T7110] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 241.392722][ T7110] ? clear_bhb_loop+0x60/0xb0 [ 241.392746][ T7110] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 241.392763][ T7110] RIP: 0033:0x7fcff4d8ebe9 [ 241.392781][ T7110] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 241.392797][ T7110] RSP: 002b:00007fcff5c25038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 241.392819][ T7110] RAX: ffffffffffffffda RBX: 00007fcff4fb6090 RCX: 00007fcff4d8ebe9 [ 241.392832][ T7110] RDX: 0000200000000280 RSI: 000000004030582a RDI: 0000000000000005 [ 241.392844][ T7110] RBP: 00007fcff5c25090 R08: 0000000000000000 R09: 0000000000000000 [ 241.392855][ T7110] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 241.392866][ T7110] R13: 00007fcff4fb6128 R14: 00007fcff4fb6090 R15: 00007ffc385bfac8 [ 241.392898][ T7110] [ 241.392921][ T7110] ERROR: Out of memory at tomoyo_realpath_from_path. [ 241.501026][ T6932] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 241.625523][ T7115] netlink: 'syz.5.230': attribute type 26 has an invalid length. [ 241.907687][ T7114] netlink: 3 bytes leftover after parsing attributes in process `syz.5.230'. [ 243.049217][ T7137] netlink: 8 bytes leftover after parsing attributes in process `syz.6.235'. [ 243.138963][ T6932] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 243.148993][ T7138] netlink: 9275 bytes leftover after parsing attributes in process `syz.6.235'. [ 243.236544][ T6932] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 243.491876][ T2896] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 243.706807][ T7145] netlink: 'syz.6.238': attribute type 10 has an invalid length. [ 243.747781][ T6932] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 245.361486][ T7145] 8021q: adding VLAN 0 to HW filter on device team0 [ 245.395482][ T7145] bond0: (slave team0): Enslaving as an active interface with an up link [ 246.860736][ T2896] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 246.891575][ T5183] Bluetooth: hci5: unexpected event 0x12 length: 151 > 8 [ 247.205358][ T2896] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 247.235103][ T7188] netlink: 8 bytes leftover after parsing attributes in process `syz.6.244'. [ 247.409244][ T7188] netlink: 168 bytes leftover after parsing attributes in process `syz.6.244'. [ 249.816308][ T2896] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 250.229538][ T7228] netlink: 'syz.3.249': attribute type 11 has an invalid length. [ 250.281280][ T7230] FAULT_INJECTION: forcing a failure. [ 250.281280][ T7230] name failslab, interval 1, probability 0, space 0, times 0 [ 250.297491][ T7230] CPU: 1 UID: 0 PID: 7230 Comm: syz.5.250 Not tainted 6.17.0-rc1-syzkaller-ge4414b01c1cd #0 PREEMPT(full) [ 250.297525][ T7230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 250.297537][ T7230] Call Trace: [ 250.297545][ T7230] [ 250.297553][ T7230] dump_stack_lvl+0x189/0x250 [ 250.297585][ T7230] ? __pfx____ratelimit+0x10/0x10 [ 250.297721][ T7230] ? __pfx_dump_stack_lvl+0x10/0x10 [ 250.297746][ T7230] ? __pfx__printk+0x10/0x10 [ 250.297777][ T7230] ? rcu_is_watching+0x15/0xb0 [ 250.297805][ T7230] should_fail_ex+0x414/0x560 [ 250.297838][ T7230] should_failslab+0xa8/0x100 [ 250.297868][ T7230] kmem_cache_alloc_noprof+0x73/0x3c0 [ 250.297893][ T7230] ? skb_clone+0x212/0x3a0 [ 250.297918][ T7230] skb_clone+0x212/0x3a0 [ 250.297942][ T7230] bpf_clone_redirect+0xad/0x3d0 [ 250.297974][ T7230] ? bpf_test_run+0x197/0x7b0 [ 250.298000][ T7230] bpf_prog_e97454e6a39c6b06+0x62/0x6b [ 250.298029][ T7230] ? perf_trace_preemptirq_template+0xa3/0x340 [ 250.298055][ T7230] ? __local_bh_enable_ip+0xce/0x1c0 [ 250.298076][ T7230] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 250.298100][ T7230] ? seqcount_lockdep_reader_access+0x123/0x1c0 [ 250.298122][ T7230] ? lockdep_hardirqs_on+0x9c/0x150 [ 250.298154][ T7230] ? ktime_get+0x3e/0x1f0 [ 250.298174][ T7230] ? seqcount_lockdep_reader_access+0x175/0x1c0 [ 250.298203][ T7230] ? __local_bh_disable_ip+0xf1/0x190 [ 250.298220][ T7230] ? __pfx___cant_migrate+0x10/0x10 [ 250.298237][ T7230] ? __local_bh_enable_ip+0x12d/0x1c0 [ 250.298255][ T7230] ? __pfx___local_bh_enable_ip+0x10/0x10 [ 250.298277][ T7230] ? bpf_test_timer_continue+0x136/0x350 [ 250.298469][ T7230] bpf_test_run+0x318/0x7b0 [ 250.298525][ T7230] ? __pfx_bpf_test_run+0x10/0x10 [ 250.298575][ T7230] ? slab_build_skb+0x273/0x3e0 [ 250.298601][ T7230] ? convert___skb_to_skb+0x3d/0x590 [ 250.298625][ T7230] bpf_prog_test_run_skb+0xb30/0x1560 [ 250.298665][ T7230] ? __pfx_bpf_prog_test_run_skb+0x10/0x10 [ 250.298694][ T7230] bpf_prog_test_run+0x2c7/0x340 [ 250.298727][ T7230] __sys_bpf+0x581/0x870 [ 250.298753][ T7230] ? __pfx___sys_bpf+0x10/0x10 [ 250.298793][ T7230] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 250.298821][ T7230] ? __pfx_ksys_write+0x10/0x10 [ 250.298844][ T7230] ? rcu_is_watching+0x15/0xb0 [ 250.298870][ T7230] __x64_sys_bpf+0x7c/0x90 [ 250.298893][ T7230] do_syscall_64+0xfa/0x3b0 [ 250.298918][ T7230] ? lockdep_hardirqs_on+0x9c/0x150 [ 250.298942][ T7230] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 250.298961][ T7230] ? clear_bhb_loop+0x60/0xb0 [ 250.298984][ T7230] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 250.299003][ T7230] RIP: 0033:0x7f5dc978ebe9 [ 250.299023][ T7230] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 250.299039][ T7230] RSP: 002b:00007f5dca5e0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 250.299060][ T7230] RAX: ffffffffffffffda RBX: 00007f5dc99b5fa0 RCX: 00007f5dc978ebe9 [ 250.299074][ T7230] RDX: 0000000000000050 RSI: 0000200000000080 RDI: 000000000000000a [ 250.299086][ T7230] RBP: 00007f5dca5e0090 R08: 0000000000000000 R09: 0000000000000000 [ 250.299097][ T7230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 250.299107][ T7230] R13: 00007f5dc99b6038 R14: 00007f5dc99b5fa0 R15: 00007ffe0a5a4428 [ 250.299139][ T7230] [ 250.340867][ T7228] netlink: 149476 bytes leftover after parsing attributes in process `syz.3.249'. [ 250.696090][ T6932] 8021q: adding VLAN 0 to HW filter on device bond0 [ 251.157077][ T7224] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 251.317818][ T6932] 8021q: adding VLAN 0 to HW filter on device team0 [ 251.420998][ T7246] netlink: 'syz.6.254': attribute type 10 has an invalid length. [ 251.797226][ T7244] mac80211_hwsim hwsim17 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 251.814726][ T7248] netlink: 'syz.5.255': attribute type 29 has an invalid length. [ 251.863930][ T7246] bond0: (slave wlan1): Enslaving as an active interface with an up link [ 251.878582][ T2896] bridge_slave_1: left allmulticast mode [ 251.893981][ T2896] bridge_slave_1: left promiscuous mode [ 251.902988][ T2896] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.975734][ T2896] bridge_slave_0: left allmulticast mode [ 252.104543][ T2896] bridge_slave_0: left promiscuous mode [ 252.111888][ T2896] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.247108][ T7263] netlink: 8 bytes leftover after parsing attributes in process `syz.6.258'. [ 252.690214][ T7263] netlink: 9275 bytes leftover after parsing attributes in process `syz.6.258'. [ 254.083019][ T59] wlan1: Trigger new scan to find an IBSS to join [ 254.886285][ T7298] netlink: 152 bytes leftover after parsing attributes in process `syz.5.268'. [ 255.876847][ T7304] netlink: 8 bytes leftover after parsing attributes in process `syz.4.269'. [ 255.929577][ T7304] netlink: 9275 bytes leftover after parsing attributes in process `syz.4.269'. [ 256.097993][ T2896] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 256.118013][ T2896] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 256.141714][ T2896] bond0 (unregistering): Released all slaves [ 256.238187][ T36] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.246260][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.267999][ T7299] netlink: 60 bytes leftover after parsing attributes in process `syz.3.267'. [ 256.383926][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.392281][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.457137][ T7314] netlink: 132 bytes leftover after parsing attributes in process `syz.6.272'. [ 256.855294][ T7320] netlink: 4 bytes leftover after parsing attributes in process `syz.6.274'. [ 256.994168][ T6932] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 257.050258][ T7330] IPv6: NLM_F_REPLACE set, but no existing node found! [ 257.655298][ T7347] netlink: 8 bytes leftover after parsing attributes in process `syz.5.280'. [ 257.775848][ T7347] netlink: 9275 bytes leftover after parsing attributes in process `syz.5.280'. [ 257.952418][ T2896] hsr_slave_0: left promiscuous mode [ 257.995050][ T2896] hsr_slave_1: left promiscuous mode [ 258.003525][ T2896] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 258.056623][ T2896] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 258.069497][ T1113] wlan1: Trigger new scan to find an IBSS to join [ 258.089543][ T2896] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 258.104937][ T2896] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 258.136058][ T7358] bpf: Bad value for 'gid' [ 258.158691][ T7358] raw_sendmsg: syz.3.281 forgot to set AF_INET. Fix it! [ 258.217270][ T2896] veth1_macvtap: left promiscuous mode [ 258.261088][ T2896] veth0_macvtap: left promiscuous mode [ 258.293978][ T2896] veth1_vlan: left promiscuous mode [ 258.320028][ T2896] veth0_vlan: left promiscuous mode [ 259.079887][ T59] wlan1: Creating new IBSS network, BSSID 6a:8b:b4:9b:ab:c1 [ 259.230215][ T6895] Bluetooth: hci5: command 0x0406 tx timeout [ 259.238711][ T51] Bluetooth: hci6: command 0x0406 tx timeout [ 259.464824][ T7380] FAULT_INJECTION: forcing a failure. [ 259.464824][ T7380] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 259.491476][ T7380] CPU: 0 UID: 0 PID: 7380 Comm: syz.6.288 Not tainted 6.17.0-rc1-syzkaller-ge4414b01c1cd #0 PREEMPT(full) [ 259.491511][ T7380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 259.491525][ T7380] Call Trace: [ 259.491534][ T7380] [ 259.491545][ T7380] dump_stack_lvl+0x189/0x250 [ 259.491582][ T7380] ? __pfx____ratelimit+0x10/0x10 [ 259.491615][ T7380] ? __pfx_dump_stack_lvl+0x10/0x10 [ 259.491644][ T7380] ? __pfx__printk+0x10/0x10 [ 259.491690][ T7380] ? __might_fault+0xb0/0x130 [ 259.491743][ T7380] should_fail_ex+0x414/0x560 [ 259.491792][ T7380] _copy_to_user+0x31/0xb0 [ 259.491827][ T7380] simple_read_from_buffer+0xe1/0x170 [ 259.491874][ T7380] proc_fail_nth_read+0x1b3/0x220 [ 259.491912][ T7380] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 259.491951][ T7380] ? rw_verify_area+0x2a6/0x4d0 [ 259.491979][ T7380] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 259.492013][ T7380] vfs_read+0x1fd/0xa30 [ 259.492041][ T7380] ? fdget_pos+0x247/0x320 [ 259.492076][ T7380] ? __pfx___mutex_lock+0x10/0x10 [ 259.492109][ T7380] ? __pfx_vfs_read+0x10/0x10 [ 259.492147][ T7380] ? __fget_files+0x2a/0x420 [ 259.492184][ T7380] ? __fget_files+0x3a0/0x420 [ 259.492202][ T7380] ? __fget_files+0x2a/0x420 [ 259.492256][ T7380] ksys_read+0x145/0x250 [ 259.492306][ T7380] ? __pfx_ksys_read+0x10/0x10 [ 259.492329][ T7380] ? rcu_is_watching+0x15/0xb0 [ 259.492372][ T7380] ? do_syscall_64+0xbe/0x3b0 [ 259.492417][ T7380] do_syscall_64+0xfa/0x3b0 [ 259.492443][ T7380] ? lockdep_hardirqs_on+0x9c/0x150 [ 259.492472][ T7380] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 259.492493][ T7380] ? clear_bhb_loop+0x60/0xb0 [ 259.492528][ T7380] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 259.492546][ T7380] RIP: 0033:0x7fcff4d8d5fc [ 259.492570][ T7380] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 259.492587][ T7380] RSP: 002b:00007fcff5c46030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 259.492610][ T7380] RAX: ffffffffffffffda RBX: 00007fcff4fb5fa0 RCX: 00007fcff4d8d5fc [ 259.492625][ T7380] RDX: 000000000000000f RSI: 00007fcff5c460a0 RDI: 0000000000000008 [ 259.492637][ T7380] RBP: 00007fcff5c46090 R08: 0000000000000000 R09: 0000000000000000 [ 259.492648][ T7380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 259.492660][ T7380] R13: 00007fcff4fb6038 R14: 00007fcff4fb5fa0 R15: 00007ffc385bfac8 [ 259.492731][ T7380] [ 260.288601][ T2896] team0 (unregistering): Port device team_slave_1 removed [ 260.348822][ T2896] team0 (unregistering): Port device team_slave_0 removed [ 260.958108][ T7356] netlink: 'syz.4.282': attribute type 1 has an invalid length. [ 260.969072][ T7356] netlink: 8 bytes leftover after parsing attributes in process `syz.4.282'. [ 261.433647][ T6932] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 261.469852][ T7395] netlink: 8 bytes leftover after parsing attributes in process `syz.6.293'. [ 261.742575][ T7397] netlink: 4 bytes leftover after parsing attributes in process `syz.4.294'. [ 261.860509][ T7395] netlink: 9275 bytes leftover after parsing attributes in process `syz.6.293'. [ 262.230894][ T7405] FAULT_INJECTION: forcing a failure. [ 262.230894][ T7405] name failslab, interval 1, probability 0, space 0, times 0 [ 262.258857][ T7405] CPU: 1 UID: 0 PID: 7405 Comm: syz.3.297 Not tainted 6.17.0-rc1-syzkaller-ge4414b01c1cd #0 PREEMPT(full) [ 262.258891][ T7405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 262.258902][ T7405] Call Trace: [ 262.258913][ T7405] [ 262.258923][ T7405] dump_stack_lvl+0x189/0x250 [ 262.258956][ T7405] ? __pfx____ratelimit+0x10/0x10 [ 262.258986][ T7405] ? __pfx_dump_stack_lvl+0x10/0x10 [ 262.259011][ T7405] ? __pfx__printk+0x10/0x10 [ 262.259049][ T7405] ? __pfx___might_resched+0x10/0x10 [ 262.259066][ T7405] ? fs_reclaim_acquire+0x7d/0x100 [ 262.259106][ T7405] should_fail_ex+0x414/0x560 [ 262.259141][ T7405] should_failslab+0xa8/0x100 [ 262.259172][ T7405] __kmalloc_node_track_caller_noprof+0xcc/0x4e0 [ 262.259199][ T7405] ? kasprintf+0xd4/0x120 [ 262.259231][ T7405] kvasprintf+0xdc/0x190 [ 262.259250][ T7405] ? __kmalloc_noprof+0x27a/0x4f0 [ 262.259273][ T7405] ? nla_strdup+0x9d/0x140 [ 262.259312][ T7405] ? nf_tables_newset+0x136a/0x2530 [ 262.259335][ T7405] ? __pfx_kvasprintf+0x10/0x10 [ 262.259354][ T7405] ? ____sys_sendmsg+0x505/0x830 [ 262.259375][ T7405] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 262.259415][ T7405] kasprintf+0xd4/0x120 [ 262.259450][ T7405] ? __pfx_kasprintf+0x10/0x10 [ 262.259498][ T7405] nf_tables_set_alloc_name+0x109/0x720 [ 262.259535][ T7405] ? rcu_is_watching+0x15/0xb0 [ 262.259559][ T7405] ? __pfx_nf_tables_set_alloc_name+0x10/0x10 [ 262.259582][ T7405] ? nla_strdup+0xb8/0x140 [ 262.259627][ T7405] nf_tables_newset+0x138b/0x2530 [ 262.259670][ T7405] ? __pfx_nf_tables_newset+0x10/0x10 [ 262.259728][ T7405] ? __nla_parse+0x40/0x60 [ 262.259765][ T7405] nfnetlink_rcv+0x1132/0x2520 [ 262.259846][ T7405] ? __pfx_nfnetlink_rcv+0x10/0x10 [ 262.259900][ T7405] ? ref_tracker_free+0x63a/0x7d0 [ 262.259977][ T7405] ? __netlink_deliver_tap+0x807/0x850 [ 262.260004][ T7405] ? netlink_deliver_tap+0x2e/0x1b0 [ 262.260061][ T7405] netlink_unicast+0x82c/0x9e0 [ 262.260103][ T7405] ? __pfx_netlink_unicast+0x10/0x10 [ 262.260133][ T7405] ? netlink_sendmsg+0x642/0xb30 [ 262.260157][ T7405] ? skb_put+0x11b/0x210 [ 262.260193][ T7405] netlink_sendmsg+0x805/0xb30 [ 262.260237][ T7405] ? __pfx_netlink_sendmsg+0x10/0x10 [ 262.260272][ T7405] ? aa_sock_msg_perm+0xf1/0x1d0 [ 262.260317][ T7405] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 262.260338][ T7405] ? __pfx_netlink_sendmsg+0x10/0x10 [ 262.260369][ T7405] __sock_sendmsg+0x21c/0x270 [ 262.260402][ T7405] ____sys_sendmsg+0x505/0x830 [ 262.260433][ T7405] ? __pfx_____sys_sendmsg+0x10/0x10 [ 262.260469][ T7405] ? import_iovec+0x74/0xa0 [ 262.260497][ T7405] ___sys_sendmsg+0x21f/0x2a0 [ 262.260523][ T7405] ? __pfx____sys_sendmsg+0x10/0x10 [ 262.260580][ T7405] ? __fget_files+0x2a/0x420 [ 262.260621][ T7405] ? __fget_files+0x2a/0x420 [ 262.260636][ T7405] ? __fget_files+0x3a0/0x420 [ 262.260673][ T7405] __x64_sys_sendmsg+0x19b/0x260 [ 262.260699][ T7405] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 262.260736][ T7405] ? __pfx_ksys_write+0x10/0x10 [ 262.260773][ T7405] ? do_syscall_64+0xbe/0x3b0 [ 262.260808][ T7405] do_syscall_64+0xfa/0x3b0 [ 262.260832][ T7405] ? lockdep_hardirqs_on+0x9c/0x150 [ 262.260857][ T7405] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 262.260875][ T7405] ? clear_bhb_loop+0x60/0xb0 [ 262.260903][ T7405] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 262.260921][ T7405] RIP: 0033:0x7f0d9b38ebe9 [ 262.260943][ T7405] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 262.260958][ T7405] RSP: 002b:00007f0d9c24a038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 262.260980][ T7405] RAX: ffffffffffffffda RBX: 00007f0d9b5b5fa0 RCX: 00007f0d9b38ebe9 [ 262.260993][ T7405] RDX: 0000000000000040 RSI: 0000200000009b40 RDI: 0000000000000003 [ 262.261006][ T7405] RBP: 00007f0d9c24a090 R08: 0000000000000000 R09: 0000000000000000 [ 262.261018][ T7405] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 262.261029][ T7405] R13: 00007f0d9b5b6038 R14: 00007f0d9b5b5fa0 R15: 00007ffe336830c8 [ 262.261069][ T7405] [ 263.269072][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 263.279754][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 264.055242][ T6932] veth0_vlan: entered promiscuous mode [ 264.174699][ T6932] veth1_vlan: entered promiscuous mode [ 265.311000][ T6932] veth0_macvtap: entered promiscuous mode [ 265.424554][ T6932] veth1_macvtap: entered promiscuous mode [ 265.619369][ T6932] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 265.726247][ T6932] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 265.871770][ T14] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 265.945431][ T14] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 266.188564][ T14] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 266.254272][ T14] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 266.481649][ T7433] netlink: 'syz.3.300': attribute type 25 has an invalid length. [ 266.554099][ T7433] netlink: 2418 bytes leftover after parsing attributes in process `syz.3.300'. [ 266.660958][ T7437] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 266.938435][ T36] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 266.984969][ T36] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 267.207788][ T14] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 267.265002][ T14] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 267.391218][ T7456] pim6reg1: entered allmulticast mode [ 267.432467][ T7458] pim6reg1: left allmulticast mode [ 268.215266][ T7482] netlink: 'syz.6.311': attribute type 10 has an invalid length. [ 268.306907][ T7482] bond0: (slave wlan1): Releasing backup interface [ 268.373922][ T7482] team0: Port device wlan1 added [ 268.378546][ T49] wlan1: Selected IBSS BSSID 6a:8b:b4:9b:ab:c1 based on configured SSID [ 269.456320][ T7519] netlink: 65047 bytes leftover after parsing attributes in process `syz.6.321'. [ 270.606796][ T7548] netlink: 'syz.6.330': attribute type 11 has an invalid length. [ 270.784644][ T7541] netlink: 'syz.6.330': attribute type 10 has an invalid length. [ 270.854080][ T7550] syzkaller0: entered promiscuous mode [ 270.890101][ T7550] syzkaller0: entered allmulticast mode [ 271.864038][ T7541] bond0: (slave team0): Releasing backup interface [ 271.883719][ T7541] team0 (unregistering): Port device team_slave_0 removed [ 271.896345][ T7541] team0 (unregistering): Port device team_slave_1 removed [ 271.916525][ T7541] team0 (unregistering): Port device wlan1 removed [ 272.066697][ T7568] netlink: 'syz.3.339': attribute type 1 has an invalid length. [ 272.077971][ T7568] netlink: 'syz.3.339': attribute type 4 has an invalid length. [ 272.088658][ T7568] netlink: 9462 bytes leftover after parsing attributes in process `syz.3.339'. [ 272.600266][ T7572] netlink: 'syz.3.341': attribute type 10 has an invalid length. [ 272.609074][ T7572] netlink: 40 bytes leftover after parsing attributes in process `syz.3.341'. [ 274.125975][ T7585] netlink: 4 bytes leftover after parsing attributes in process `syz.6.347'. [ 275.480324][ T7572] batadv0: entered promiscuous mode [ 275.486355][ T7572] batadv0: entered allmulticast mode [ 275.497243][ T7572] bridge0: port 3(batadv0) entered blocking state [ 275.507167][ T7572] bridge0: port 3(batadv0) entered disabled state [ 275.525052][ T7572] bridge0: port 3(batadv0) entered blocking state [ 275.532802][ T7572] bridge0: port 3(batadv0) entered forwarding state [ 275.773297][ T1149] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 275.784524][ T1149] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 276.574700][ T7610] netlink: 14560 bytes leftover after parsing attributes in process `syz.3.353'. [ 276.887511][ T7613] netlink: 'syz.7.354': attribute type 10 has an invalid length. [ 277.080267][ T7615] netlink: 'syz.4.355': attribute type 39 has an invalid length. [ 277.124939][ T7613] team0: Port device geneve1 added [ 277.724414][ T7631] netlink: 'syz.7.360': attribute type 10 has an invalid length. [ 277.753700][ T7631] bridge0: port 3(macsec0) entered blocking state [ 277.849122][ T7631] bridge0: port 3(macsec0) entered disabled state [ 277.904620][ T7631] macsec0: entered allmulticast mode [ 277.989560][ T7631] veth1_macvtap: entered allmulticast mode [ 278.036913][ T7631] macsec0: entered promiscuous mode [ 278.083056][ T7631] bridge0: port 3(macsec0) entered blocking state [ 278.091391][ T7631] bridge0: port 3(macsec0) entered forwarding state [ 278.969390][ T7654] syz.6.367: vmalloc error: size 8589938688, exceeds total pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0-1 [ 279.011532][ T7648] netlink: 65055 bytes leftover after parsing attributes in process `syz.7.365'. [ 279.017956][ T7654] CPU: 1 UID: 0 PID: 7654 Comm: syz.6.367 Not tainted 6.17.0-rc1-syzkaller-ge4414b01c1cd #0 PREEMPT(full) [ 279.017993][ T7654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 279.018005][ T7654] Call Trace: [ 279.018015][ T7654] [ 279.018026][ T7654] dump_stack_lvl+0x189/0x250 [ 279.018065][ T7654] ? __pfx_dump_stack_lvl+0x10/0x10 [ 279.018090][ T7654] ? __pfx__printk+0x10/0x10 [ 279.018124][ T7654] ? cpuset_print_current_mems_allowed+0x1f/0x360 [ 279.018147][ T7654] ? cpuset_print_current_mems_allowed+0x1f/0x360 [ 279.018171][ T7654] ? cpuset_print_current_mems_allowed+0x2ee/0x360 [ 279.018197][ T7654] warn_alloc+0x214/0x310 [ 279.018227][ T7654] ? stack_depot_save_flags+0x40/0x860 [ 279.018255][ T7654] ? __pfx_warn_alloc+0x10/0x10 [ 279.018287][ T7654] ? kasan_save_track+0x4f/0x80 [ 279.018313][ T7654] ? xskq_create+0x56/0x170 [ 279.018352][ T7654] ? xsk_init_queue+0xb0/0x110 [ 279.018372][ T7654] ? xsk_setsockopt+0x57b/0x8d0 [ 279.018392][ T7654] ? do_sock_setsockopt+0x17c/0x1b0 [ 279.018422][ T7654] ? __x64_sys_setsockopt+0x13f/0x1b0 [ 279.018437][ T7654] ? do_syscall_64+0xfa/0x3b0 [ 279.018461][ T7654] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 279.018491][ T7654] __vmalloc_node_range_noprof+0x125/0x12f0 [ 279.018556][ T7654] ? __pfx___vmalloc_node_range_noprof+0x10/0x10 [ 279.018593][ T7654] ? __kasan_kmalloc+0x93/0xb0 [ 279.018623][ T7654] vmalloc_user_noprof+0xad/0xf0 [ 279.018649][ T7654] ? xskq_create+0xbf/0x170 [ 279.018672][ T7654] xskq_create+0xbf/0x170 [ 279.018700][ T7654] xsk_init_queue+0xb0/0x110 [ 279.018726][ T7654] xsk_setsockopt+0x57b/0x8d0 [ 279.018755][ T7654] ? __pfx_xsk_setsockopt+0x10/0x10 [ 279.018778][ T7654] ? __pfx_aa_sk_perm+0x10/0x10 [ 279.018812][ T7654] ? __fget_files+0x2a/0x420 [ 279.018826][ T7654] ? aa_sock_opt_perm+0xff/0x1b0 [ 279.018848][ T7654] ? bpf_lsm_socket_setsockopt+0x9/0x20 [ 279.018871][ T7654] ? __pfx_xsk_setsockopt+0x10/0x10 [ 279.018898][ T7654] do_sock_setsockopt+0x17c/0x1b0 [ 279.018935][ T7654] __x64_sys_setsockopt+0x13f/0x1b0 [ 279.018961][ T7654] do_syscall_64+0xfa/0x3b0 [ 279.018987][ T7654] ? lockdep_hardirqs_on+0x9c/0x150 [ 279.019013][ T7654] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 279.019032][ T7654] ? clear_bhb_loop+0x60/0xb0 [ 279.019059][ T7654] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 279.019079][ T7654] RIP: 0033:0x7fcff4d8ebe9 [ 279.019099][ T7654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 279.019116][ T7654] RSP: 002b:00007fcff5c46038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 279.019140][ T7654] RAX: ffffffffffffffda RBX: 00007fcff4fb5fa0 RCX: 00007fcff4d8ebe9 [ 279.019155][ T7654] RDX: 0000000000000002 RSI: 000000000000011b RDI: 0000000000000006 [ 279.019166][ T7654] RBP: 00007fcff4e11e19 R08: 0000000000000004 R09: 0000000000000000 [ 279.019178][ T7654] R10: 0000200000000900 R11: 0000000000000246 R12: 0000000000000000 [ 279.019190][ T7654] R13: 00007fcff4fb6038 R14: 00007fcff4fb5fa0 R15: 00007ffc385bfac8 [ 279.019224][ T7654] [ 279.157920][ T7654] Mem-Info: [ 279.282183][ T7657] netlink: 126588 bytes leftover after parsing attributes in process `syz.3.368'. [ 279.380735][ T7654] active_anon:7010 inactive_anon:0 isolated_anon:0 [ 279.380735][ T7654] active_file:14984 inactive_file:39902 isolated_file:0 [ 279.380735][ T7654] unevictable:768 dirty:195 writeback:0 [ 279.380735][ T7654] slab_reclaimable:10791 slab_unreclaimable:102308 [ 279.380735][ T7654] mapped:29495 shmem:1378 pagetables:1331 [ 279.380735][ T7654] sec_pagetables:0 bounce:0 [ 279.380735][ T7654] kernel_misc_reclaimable:0 [ 279.380735][ T7654] free:1314694 free_pcp:13597 free_cma:0 [ 279.544285][ T7654] Node 0 active_anon:27940kB inactive_anon:0kB active_file:59936kB inactive_file:159404kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:118080kB dirty:780kB writeback:0kB shmem:3976kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB kernel_stack:12496kB pagetables:5188kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 279.546030][ T7656] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 279.658268][ T7654] Node 1 active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:204kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:1536kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB kernel_stack:48kB pagetables:136kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 279.801915][ T7654] Node 0 DMA free:15360kB boost:0kB min:204kB low:252kB high:300kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 279.849663][ T7654] lowmem_reserve[]: 0 2497 2499 2499 2499 [ 279.889867][ T7654] Node 0 DMA32 free:1354204kB boost:0kB min:34248kB low:42808kB high:51368kB reserved_highatomic:0KB free_highatomic:0KB active_anon:28092kB inactive_anon:0kB active_file:59936kB inactive_file:157828kB unevictable:1536kB writepending:780kB present:3129332kB managed:2557484kB mlocked:0kB bounce:0kB free_pcp:36456kB local_pcp:18540kB free_cma:0kB [ 279.927422][ T7654] lowmem_reserve[]: 0 0 1 1 1 [ 279.952909][ T7654] Node 0 Normal free:12kB boost:0kB min:20kB low:24kB high:28kB reserved_highatomic:0KB free_highatomic:0KB active_anon:48kB inactive_anon:0kB active_file:0kB inactive_file:1576kB unevictable:0kB writepending:0kB present:1048580kB managed:1644kB mlocked:0kB bounce:0kB free_pcp:8kB local_pcp:8kB free_cma:0kB [ 280.024238][ T7654] lowmem_reserve[]: 0 0 0 0 0 [ 280.033137][ T7654] Node 1 Normal free:3889088kB boost:0kB min:55632kB low:69540kB high:83448kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:204kB unevictable:1536kB writepending:0kB present:4194300kB managed:4111100kB mlocked:0kB bounce:0kB free_pcp:18432kB local_pcp:6240kB free_cma:0kB [ 280.069997][ T7654] lowmem_reserve[]: 0 0 0 0 0 [ 280.075782][ T7654] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 280.091688][ T7654] Node 0 DMA32: 1905*4kB (UME) 769*8kB (UM) 305*16kB (UME) 604*32kB (UME) 204*64kB (UM) 55*128kB (UM) 55*256kB (UME) 52*512kB (UM) 18*1024kB (UM) 4*2048kB (UM) 300*4096kB (UM) = 1354204kB [ 280.113207][ T7654] Node 0 Normal: 1*4kB (M) 1*8kB (M) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 280.139466][ T7667] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.149711][ T7667] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.184722][ T7667] bridge0: entered allmulticast mode [ 280.191629][ T7654] Node 1 Normal: 210*4kB (UME) 51*8kB (UME) 48*16kB (UME) 109*32kB (UME) 35*64kB (UME) 9*128kB (UME) 3*256kB (ME) 3*512kB (UM) 3*1024kB (UME) 2*2048kB (UE) 945*4096kB (M) = 3889088kB [ 280.217903][ T7668] sit0: entered allmulticast mode [ 280.243223][ T7654] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 280.256004][ T7654] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 280.266541][ T7654] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 280.278765][ T7654] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 280.294004][ T7656] mac80211_hwsim hwsim6 wlan0: entered allmulticast mode [ 280.309070][ T7665] bridge_slave_1: left allmulticast mode [ 280.316764][ T7654] 56262 total pagecache pages [ 280.322351][ T7665] bridge_slave_1: left promiscuous mode [ 280.341352][ T7665] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.344429][ T7654] 0 pages in swap cache [ 280.396643][ T7665] bridge_slave_0: left allmulticast mode [ 280.405729][ T7665] bridge_slave_0: left promiscuous mode [ 280.415668][ T7654] Free swap = 124996kB [ 280.424791][ T7665] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.435878][ T7654] Total swap = 124996kB [ 280.441280][ T7654] 2097051 pages RAM [ 280.446266][ T7654] 0 pages HighMem/MovableOnly [ 280.453094][ T7654] 425654 pages reserved [ 280.459029][ T7654] 0 pages cma reserved [ 280.645712][ T7657] mac80211_hwsim hwsim6 wlan0: entered promiscuous mode [ 280.658467][ T7670] sit0: entered promiscuous mode [ 281.185892][ T7691] netlink: 'syz.5.379': attribute type 10 has an invalid length. [ 281.303817][ T7691] netlink: 55 bytes leftover after parsing attributes in process `syz.5.379'. [ 284.580260][ T7723] netlink: 4 bytes leftover after parsing attributes in process `syz.4.385'. [ 286.708477][ T7719] netlink: 132 bytes leftover after parsing attributes in process `syz.3.383'. [ 286.722785][ T7721] netlink: 'syz.5.384': attribute type 29 has an invalid length. [ 290.059525][ T7799] netlink: 'syz.6.402': attribute type 10 has an invalid length. [ 292.741619][ T7850] netlink: 202920 bytes leftover after parsing attributes in process `syz.3.416'. [ 295.265546][ T7824] mac80211_hwsim hwsim20 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 295.959380][ T7859] netlink: 8 bytes leftover after parsing attributes in process `syz.3.420'. [ 296.072089][ T7859] netlink: 9275 bytes leftover after parsing attributes in process `syz.3.420'. [ 296.747177][ T7877] netlink: 'syz.7.425': attribute type 3 has an invalid length. [ 296.761126][ T7877] netlink: 132 bytes leftover after parsing attributes in process `syz.7.425'. [ 297.679851][ T7874] netlink: 132 bytes leftover after parsing attributes in process `syz.3.424'. [ 298.300209][ T7897] mac80211_hwsim hwsim17 O3ãc¤±: renamed from wlan1 [ 299.953146][ T7932] pim6reg1: entered promiscuous mode [ 299.984948][ T7932] pim6reg1: entered allmulticast mode [ 303.238457][ T8006] syzkaller0: entered promiscuous mode [ 303.273547][ T8006] syzkaller0: entered allmulticast mode [ 307.774286][ T8028] veth0_vlan: entered allmulticast mode [ 307.791371][ T8033] ÿÿÿÿÿÿ: renamed from vlan1 [ 308.018690][ T8060] netlink: 14 bytes leftover after parsing attributes in process `syz.4.477'. [ 308.517431][ T8060] team0: Port device bond0 removed [ 308.535117][ T8060] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 308.615018][ T8060] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 308.629513][ T8060] bond0 (unregistering): Released all slaves [ 311.133276][ T8124] wg2: entered promiscuous mode [ 311.208299][ T8124] wg2: entered allmulticast mode [ 311.739515][ T8137] veth0_vlan: entered allmulticast mode [ 314.696381][ T8159] netlink: 'syz.7.507': attribute type 11 has an invalid length. [ 314.791312][ T8160] Freezing with imperfect legacy cgroup freezer. See cgroup.freeze of cgroup v2 [ 314.848586][ T8159] netlink: 149476 bytes leftover after parsing attributes in process `syz.7.507'. [ 315.034627][ T8158] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 318.267032][ T5867] Bluetooth: hci0: unexpected event 0x12 length: 151 > 8 [ 323.529854][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 323.555672][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 324.439227][ T8232] syzkaller0: entered promiscuous mode [ 324.445528][ T8232] syzkaller0: entered allmulticast mode [ 324.674740][ T8243] netlink: 132 bytes leftover after parsing attributes in process `syz.4.529'. [ 327.728699][ T8255] wg2: left promiscuous mode [ 327.746926][ T8255] wg2: left allmulticast mode [ 328.126139][ T8255] wg2: entered promiscuous mode [ 328.143554][ T8255] wg2: entered allmulticast mode [ 329.335198][ T1113] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 329.564518][ T1113] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 329.855339][ T1113] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 330.740228][ T1113] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 337.741178][ T1113] bond0: left allmulticast mode [ 337.759984][ T1113] bond_slave_0: left allmulticast mode [ 337.780455][ T1113] bond_slave_1: left allmulticast mode [ 337.808681][ T1113] bridge0: port 3(bond0) entered disabled state [ 337.910494][ T1113] bridge_slave_1: left allmulticast mode [ 338.074507][ T1113] bridge_slave_1: left promiscuous mode [ 338.084293][ T1113] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.501283][ T1113] bridge_slave_0: left allmulticast mode [ 338.541343][ T1113] bridge_slave_0: left promiscuous mode [ 338.579720][ T1113] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.661342][ T1113] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 340.697475][ T1113] bond_slave_0: left promiscuous mode [ 340.729916][ T1113] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 340.743104][ T1113] bond_slave_1: left promiscuous mode [ 340.754031][ T1113] bond0 (unregistering): Released all slaves [ 345.592723][ T8438] syzkaller0: entered promiscuous mode [ 345.601607][ T8438] syzkaller0: entered allmulticast mode [ 345.623228][ T1113] hsr_slave_0: left promiscuous mode [ 345.636431][ T1113] hsr_slave_1: left promiscuous mode [ 345.664641][ T1113] veth1_macvtap: left promiscuous mode [ 345.676246][ T1113] veth0_macvtap: left promiscuous mode [ 346.351084][ T1113] team0 (unregistering): Port device team_slave_1 removed [ 346.409719][ T1113] team0 (unregistering): Port device team_slave_0 removed [ 346.947927][ T8444] pim6reg1: entered promiscuous mode [ 346.957364][ T8444] pim6reg1: entered allmulticast mode [ 352.097231][ T8507] sit0: entered allmulticast mode [ 356.398166][ T5867] Bluetooth: hci0: command 0x0406 tx timeout [ 356.946582][ T8566] syzkaller0: entered promiscuous mode [ 356.978237][ T8566] syzkaller0: entered allmulticast mode [ 360.371618][ T8592] pim6reg1: entered promiscuous mode [ 360.388665][ T8592] pim6reg1: entered allmulticast mode [ 363.548704][ T8635] wg2: entered promiscuous mode [ 363.577603][ T8635] wg2: entered allmulticast mode [ 363.728445][ T8644] pim6reg1: entered promiscuous mode [ 363.818294][ T8644] pim6reg1: entered allmulticast mode [ 375.346636][ T8817] Ÿë: port 1(erspan0) entered blocking state [ 375.419814][ T8817] Ÿë: port 1(erspan0) entered disabled state [ 375.524920][ T8817] erspan0: entered allmulticast mode [ 375.697660][ T8817] erspan0: entered promiscuous mode [ 378.480583][ T8861] can: request_module (can-proto-0) failed. [ 378.508555][ T8871] wg2: entered promiscuous mode [ 378.513787][ T8871] wg2: entered allmulticast mode [ 378.573027][ T8874] veth1_macvtap: left promiscuous mode [ 378.708930][ T8879] veth1_macvtap: entered promiscuous mode [ 378.750099][ T8879] macsec0: entered promiscuous mode [ 378.779922][ T8879] macsec0: entered allmulticast mode [ 379.028291][ T8879] veth1_macvtap: entered allmulticast mode [ 384.987995][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 384.995482][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 388.937587][ T8981] syzkaller0: entered promiscuous mode [ 389.007260][ T8981] syzkaller0: entered allmulticast mode [ 398.674981][ T9035] sit0: left promiscuous mode [ 399.105756][ T9039] sit0: entered promiscuous mode [ 401.720160][ T9070] pim6reg1: entered promiscuous mode [ 401.726964][ T9070] pim6reg1: entered allmulticast mode [ 405.309230][ T9111] wg2: left promiscuous mode [ 405.321477][ T9111] wg2: left allmulticast mode [ 413.051395][ T9140] pim6reg1: entered promiscuous mode [ 413.057990][ T9140] pim6reg1: entered allmulticast mode [ 413.800125][ T9166] Ÿë: port 1(erspan0) entered blocking state [ 413.806794][ T9166] Ÿë: port 1(erspan0) entered disabled state [ 413.876735][ T9166] erspan0: entered allmulticast mode [ 413.986561][ T9166] erspan0: entered promiscuous mode [ 414.177672][ T9170] Ÿë: port 1(erspan0) entered blocking state [ 414.184709][ T9170] Ÿë: port 1(erspan0) entered forwarding state [ 414.784842][ T9183] syzkaller0: entered promiscuous mode [ 414.798777][ T9183] syzkaller0: entered allmulticast mode [ 432.043712][ T9296] wg2: left promiscuous mode [ 432.092520][ T9296] wg2: left allmulticast mode [ 432.120529][ T9302] veth0_vlan: entered allmulticast mode [ 432.185777][ T9305] wg2: entered promiscuous mode [ 432.203626][ T9305] wg2: entered allmulticast mode [ 432.374480][ T9314] veth1_macvtap: left promiscuous mode [ 432.443706][ T9315] veth1_macvtap: entered promiscuous mode [ 432.476725][ T9310] can: request_module (can-proto-0) failed. [ 432.520038][ T9315] macsec0: entered promiscuous mode [ 432.520242][ T9315] macsec0: entered allmulticast mode [ 432.520259][ T9315] veth1_macvtap: entered allmulticast mode [ 433.060734][ T9318] wg2: left promiscuous mode [ 433.076146][ T9318] wg2: left allmulticast mode [ 433.143745][ T9323] wg2: entered promiscuous mode [ 433.167396][ T9323] wg2: entered allmulticast mode [ 434.447003][ T9335] syzkaller0: entered promiscuous mode [ 434.486304][ T9335] syzkaller0: entered allmulticast mode [ 438.440491][ T9361] syzkaller0: entered promiscuous mode [ 438.447765][ T9361] syzkaller0: entered allmulticast mode [ 441.838736][ T9397] netlink: 8 bytes leftover after parsing attributes in process `syz.6.863'. [ 441.870095][ T9397] netlink: 9275 bytes leftover after parsing attributes in process `syz.6.863'. [ 442.791492][ T9410] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 444.466239][ T9430] veth1_macvtap: left promiscuous mode [ 444.714682][ T9430] veth1_macvtap: entered promiscuous mode [ 444.735960][ T9430] macsec0: entered promiscuous mode [ 444.768538][ T9430] macsec0: entered allmulticast mode [ 444.782929][ T9430] veth1_macvtap: entered allmulticast mode [ 446.806229][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 446.813811][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 452.042297][ T9534] netlink: 16 bytes leftover after parsing attributes in process `syz.4.908'. [ 452.154766][ T9548] netlink: 104 bytes leftover after parsing attributes in process `syz.5.911'. [ 452.298407][ T9546] netlink: 209836 bytes leftover after parsing attributes in process `syz.5.911'. [ 452.435605][ T9548] netlink: 8 bytes leftover after parsing attributes in process `syz.5.911'. [ 453.149915][ T9570] netlink: 72 bytes leftover after parsing attributes in process `syz.4.915'. [ 453.736181][ T9570] netlink: 72 bytes leftover after parsing attributes in process `syz.4.915'. [ 454.154467][ T9594] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 455.024677][ T9570] netlink: 72 bytes leftover after parsing attributes in process `syz.4.915'. [ 458.089794][ T9606] netlink: 'syz.5.925': attribute type 4 has an invalid length. [ 458.135439][ T9606] netlink: 152 bytes leftover after parsing attributes in process `syz.5.925'. [ 458.156920][ T9610] netlink: 16 bytes leftover after parsing attributes in process `syz.6.927'. [ 458.162232][ T9606] .`: renamed from bond0 (while UP) [ 458.347080][ T9606] bridge0: port 3(.`) entered disabled state [ 458.391035][ T9613] netlink: 12 bytes leftover after parsing attributes in process `syz.7.928'. [ 458.534072][ T9620] netdevsim netdevsim4 netdevsim0: entered promiscuous mode [ 459.330104][ T9635] lo speed is unknown, defaulting to 1000 [ 459.721152][ T9635] lo speed is unknown, defaulting to 1000 [ 459.785839][ T9635] lo speed is unknown, defaulting to 1000 [ 459.985699][ T9635] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 460.049427][ T9635] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 460.090661][ T9642] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 460.212290][ T9635] lo speed is unknown, defaulting to 1000 [ 460.235464][ T9635] lo speed is unknown, defaulting to 1000 [ 460.266184][ T9635] lo speed is unknown, defaulting to 1000 [ 460.292572][ T9635] lo speed is unknown, defaulting to 1000 [ 460.327050][ T9635] lo speed is unknown, defaulting to 1000 [ 461.152604][ T9658] FAULT_INJECTION: forcing a failure. [ 461.152604][ T9658] name failslab, interval 1, probability 0, space 0, times 0 [ 461.190059][ T9658] CPU: 0 UID: 0 PID: 9658 Comm: syz.3.945 Not tainted 6.17.0-rc1-syzkaller-ge4414b01c1cd #0 PREEMPT(full) [ 461.190093][ T9658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 461.190105][ T9658] Call Trace: [ 461.190113][ T9658] [ 461.190123][ T9658] dump_stack_lvl+0x189/0x250 [ 461.190167][ T9658] ? __pfx____ratelimit+0x10/0x10 [ 461.190196][ T9658] ? __pfx_dump_stack_lvl+0x10/0x10 [ 461.190232][ T9658] ? __pfx__printk+0x10/0x10 [ 461.190267][ T9658] ? __pfx___might_resched+0x10/0x10 [ 461.190306][ T9658] should_fail_ex+0x414/0x560 [ 461.190338][ T9658] should_failslab+0xa8/0x100 [ 461.190370][ T9658] __kmalloc_noprof+0xcb/0x4f0 [ 461.190396][ T9658] ? sk_prot_alloc+0xe7/0x220 [ 461.190421][ T9658] sk_prot_alloc+0xe7/0x220 [ 461.190437][ T9658] ? sk_alloc+0x24/0x370 [ 461.190458][ T9658] sk_alloc+0x3a/0x370 [ 461.190473][ T9658] ? bpf_ctx_init+0x167/0x1d0 [ 461.190504][ T9658] bpf_prog_test_run_skb+0x2ed/0x1560 [ 461.190530][ T9658] ? __fget_files+0x2a/0x420 [ 461.190564][ T9658] ? __pfx_bpf_prog_test_run_skb+0x10/0x10 [ 461.190592][ T9658] bpf_prog_test_run+0x2c7/0x340 [ 461.190626][ T9658] __sys_bpf+0x581/0x870 [ 461.190654][ T9658] ? __pfx___sys_bpf+0x10/0x10 [ 461.190695][ T9658] ? ksys_write+0x22a/0x250 [ 461.190723][ T9658] ? __pfx_ksys_write+0x10/0x10 [ 461.190746][ T9658] ? rcu_is_watching+0x15/0xb0 [ 461.190775][ T9658] __x64_sys_bpf+0x7c/0x90 [ 461.190800][ T9658] do_syscall_64+0xfa/0x3b0 [ 461.190826][ T9658] ? lockdep_hardirqs_on+0x9c/0x150 [ 461.190852][ T9658] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 461.190872][ T9658] ? clear_bhb_loop+0x60/0xb0 [ 461.190896][ T9658] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 461.190914][ T9658] RIP: 0033:0x7f0d9b38ebe9 [ 461.190934][ T9658] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 461.190950][ T9658] RSP: 002b:00007f0d9c24a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 461.190972][ T9658] RAX: ffffffffffffffda RBX: 00007f0d9b5b5fa0 RCX: 00007f0d9b38ebe9 [ 461.190986][ T9658] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 461.190999][ T9658] RBP: 00007f0d9c24a090 R08: 0000000000000000 R09: 0000000000000000 [ 461.191011][ T9658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 461.191023][ T9658] R13: 00007f0d9b5b6038 R14: 00007f0d9b5b5fa0 R15: 00007ffe336830c8 [ 461.191058][ T9658] [ 461.483247][ T9651] netlink: 60 bytes leftover after parsing attributes in process `syz.4.943'. [ 461.500189][ T9659] netlink: 60 bytes leftover after parsing attributes in process `syz.4.943'. [ 461.526820][ T9651] netlink: 60 bytes leftover after parsing attributes in process `syz.4.943'. [ 461.725773][ T9672] netlink: 'syz.7.950': attribute type 29 has an invalid length. [ 461.737606][ T9672] netlink: 'syz.7.950': attribute type 29 has an invalid length. [ 461.777428][ T9672] netlink: 'syz.7.950': attribute type 29 has an invalid length. [ 462.030529][ T9674] netlink: 8 bytes leftover after parsing attributes in process `syz.4.949'. [ 462.125770][ T9674] netlink: 9275 bytes leftover after parsing attributes in process `syz.4.949'. [ 462.247760][ T9678] netlink: ct family unspecified [ 462.254814][ T9678] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 462.690515][ T9681] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 464.291166][ T9718] netlink: 76 bytes leftover after parsing attributes in process `syz.5.962'. [ 464.567634][ T9725] FAULT_INJECTION: forcing a failure. [ 464.567634][ T9725] name failslab, interval 1, probability 0, space 0, times 0 [ 464.610282][ T9725] CPU: 0 UID: 0 PID: 9725 Comm: syz.6.966 Not tainted 6.17.0-rc1-syzkaller-ge4414b01c1cd #0 PREEMPT(full) [ 464.610317][ T9725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 464.610330][ T9725] Call Trace: [ 464.610340][ T9725] [ 464.610349][ T9725] dump_stack_lvl+0x189/0x250 [ 464.610388][ T9725] ? __pfx_dump_stack_lvl+0x10/0x10 [ 464.610412][ T9725] ? __pfx__printk+0x10/0x10 [ 464.610468][ T9725] should_fail_ex+0x414/0x560 [ 464.610501][ T9725] ? rhashtable_init_noprof+0x4ee/0xbb0 [ 464.610519][ T9725] should_failslab+0xa8/0x100 [ 464.610548][ T9725] __kvmalloc_node_noprof+0x161/0x5f0 [ 464.610586][ T9725] ? rhashtable_init_noprof+0x4ee/0xbb0 [ 464.610611][ T9725] rhashtable_init_noprof+0x4ee/0xbb0 [ 464.610638][ T9725] rhltable_init_noprof+0x1e/0x60 [ 464.610660][ T9725] nf_tables_newtable+0x68f/0x1890 [ 464.610706][ T9725] nfnetlink_rcv+0x1132/0x2520 [ 464.610768][ T9725] ? __pfx_nfnetlink_rcv+0x10/0x10 [ 464.610811][ T9725] ? ref_tracker_free+0x63a/0x7d0 [ 464.610871][ T9725] ? __netlink_deliver_tap+0x807/0x850 [ 464.610900][ T9725] ? netlink_deliver_tap+0x2e/0x1b0 [ 464.610948][ T9725] netlink_unicast+0x82c/0x9e0 [ 464.610984][ T9725] ? __pfx_netlink_unicast+0x10/0x10 [ 464.611010][ T9725] ? netlink_sendmsg+0x6c0/0xb30 [ 464.611045][ T9725] netlink_sendmsg+0x805/0xb30 [ 464.611069][ T9725] ? lockdep_hardirqs_on+0x9c/0x150 [ 464.611107][ T9725] ? __pfx_netlink_sendmsg+0x10/0x10 [ 464.611140][ T9725] ? bpf_lsm_socket_sendmsg+0x4/0x20 [ 464.611165][ T9725] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 464.611184][ T9725] ? __pfx_netlink_sendmsg+0x10/0x10 [ 464.611213][ T9725] __sock_sendmsg+0x21c/0x270 [ 464.611241][ T9725] ____sys_sendmsg+0x505/0x830 [ 464.611269][ T9725] ? __pfx_____sys_sendmsg+0x10/0x10 [ 464.611301][ T9725] ? import_iovec+0x74/0xa0 [ 464.611327][ T9725] ___sys_sendmsg+0x21f/0x2a0 [ 464.611352][ T9725] ? __pfx____sys_sendmsg+0x10/0x10 [ 464.611414][ T9725] ? __fget_files+0x2a/0x420 [ 464.611441][ T9725] ? __fget_files+0x3a0/0x420 [ 464.611473][ T9725] __x64_sys_sendmsg+0x19b/0x260 [ 464.611495][ T9725] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 464.611544][ T9725] do_syscall_64+0xfa/0x3b0 [ 464.611573][ T9725] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 464.611592][ T9725] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 464.611611][ T9725] ? clear_bhb_loop+0x60/0xb0 [ 464.611635][ T9725] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 464.611653][ T9725] RIP: 0033:0x7fcff4d8ebe9 [ 464.611672][ T9725] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 464.611689][ T9725] RSP: 002b:00007fcff5c25038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 464.611712][ T9725] RAX: ffffffffffffffda RBX: 00007fcff4fb6090 RCX: 00007fcff4d8ebe9 [ 464.611726][ T9725] RDX: 0000000000000080 RSI: 0000200000000c40 RDI: 0000000000000008 [ 464.611740][ T9725] RBP: 00007fcff5c25090 R08: 0000000000000000 R09: 0000000000000000 [ 464.611752][ T9725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 464.611762][ T9725] R13: 00007fcff4fb6128 R14: 00007fcff4fb6090 R15: 00007ffc385bfac8 [ 464.611797][ T9725] [ 466.534958][ T9740] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 467.019766][ T9747] netlink: 16 bytes leftover after parsing attributes in process `syz.7.973'. [ 467.137800][ T9755] netlink: 12 bytes leftover after parsing attributes in process `syz.7.973'. [ 467.164948][ T9755] openvswitch: netlink: Flow actions attr not present in new flow. [ 467.209888][ T9754] netlink: 112 bytes leftover after parsing attributes in process `syz.4.974'. [ 467.319529][ T9759] netlink: 200 bytes leftover after parsing attributes in process `syz.3.976'. [ 467.429230][ T9759] openvswitch: netlink: Flow key attr not present in new flow. [ 468.015453][ T9764] syzkaller0: entered promiscuous mode [ 468.068521][ T9764] syzkaller0: entered allmulticast mode [ 468.294629][ T9773] netlink: 40 bytes leftover after parsing attributes in process `syz.6.979'. [ 468.330594][ T9775] netlink: 6955 bytes leftover after parsing attributes in process `syz.3.980'. [ 468.376751][ T9775] netlink: 127868 bytes leftover after parsing attributes in process `syz.3.980'. [ 468.663395][ T9777] netlink: 'syz.7.981': attribute type 3 has an invalid length. [ 468.701057][ T9777] netlink: 'syz.7.981': attribute type 2 has an invalid length. [ 468.712556][ T9777] netlink: 198112 bytes leftover after parsing attributes in process `syz.7.981'. [ 471.865609][ T9796] netlink: 'syz.7.986': attribute type 12 has an invalid length. [ 471.877277][ T9796] netlink: 132 bytes leftover after parsing attributes in process `syz.7.986'. [ 472.152378][ T9818] netlink: 'syz.4.992': attribute type 3 has an invalid length. [ 472.216922][ T9818] netlink: 'syz.4.992': attribute type 1 has an invalid length. [ 472.285076][ T9823] netlink: 'syz.5.994': attribute type 11 has an invalid length. [ 472.295176][ T9823] netlink: 149476 bytes leftover after parsing attributes in process `syz.5.994'. [ 472.501666][ T9820] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 472.873511][ T9840] veth1_macvtap: left allmulticast mode [ 472.960652][ T9840] veth1_macvtap: left promiscuous mode [ 472.966922][ T9840] macsec0: left promiscuous mode [ 474.102132][ T9853] netlink: 'syz.3.1002': attribute type 12 has an invalid length. [ 474.170071][ T9853] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1002'. [ 474.994914][ T9871] netlink: 40 bytes leftover after parsing attributes in process `syz.6.1009'. [ 475.355684][ T9881] netlink: 104 bytes leftover after parsing attributes in process `syz.3.1013'. [ 475.494806][ T9876] delete_channel: no stack [ 475.694589][ T9891] openvswitch: netlink: Tunnel attr 12 has unexpected len 0 expected 16 [ 475.924386][ T9898] ======================================================= [ 475.924386][ T9898] WARNING: The mand mount option has been deprecated and [ 475.924386][ T9898] and is ignored by this kernel. Remove the mand [ 475.924386][ T9898] option from the mount to silence this warning. [ 475.924386][ T9898] ======================================================= [ 476.625820][ T9924] netlink: 60 bytes leftover after parsing attributes in process `syz.6.1024'. [ 476.660345][ T9912] netlink: 60 bytes leftover after parsing attributes in process `syz.6.1024'. [ 476.733200][ T9924] netlink: 60 bytes leftover after parsing attributes in process `syz.6.1024'. [ 476.759156][ T9931] netlink: 'syz.4.1027': attribute type 9 has an invalid length. [ 476.767924][ T9931] netlink: 204732 bytes leftover after parsing attributes in process `syz.4.1027'. [ 477.375691][ T9938] netlink: 28 bytes leftover after parsing attributes in process `syz.5.1031'. [ 477.386569][ T9938] netlink: 28 bytes leftover after parsing attributes in process `syz.5.1031'. [ 477.959114][ T9955] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1039'. [ 478.405520][ T9961] netlink: 'syz.5.1040': attribute type 5 has an invalid length. [ 478.418750][ T9961] netlink: 'syz.5.1040': attribute type 7 has an invalid length. [ 478.434565][ T9961] netlink: 137592 bytes leftover after parsing attributes in process `syz.5.1040'. [ 478.647143][ T9966] netlink: 96 bytes leftover after parsing attributes in process `syz.4.1044'. [ 478.748885][ T9972] netlink: 'syz.6.1045': attribute type 21 has an invalid length. [ 478.815046][ T9972] netlink: 8 bytes leftover after parsing attributes in process `syz.6.1045'. [ 478.890732][ T9975] netlink: 'syz.3.1047': attribute type 4 has an invalid length. [ 478.943929][ T9975] netlink: 199836 bytes leftover after parsing attributes in process `syz.3.1047'. [ 479.006532][ T9980] FAULT_INJECTION: forcing a failure. [ 479.006532][ T9980] name failslab, interval 1, probability 0, space 0, times 0 [ 479.048323][ T9980] CPU: 1 UID: 0 PID: 9980 Comm: syz.4.1049 Not tainted 6.17.0-rc1-syzkaller-ge4414b01c1cd #0 PREEMPT(full) [ 479.048357][ T9980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 479.048369][ T9980] Call Trace: [ 479.048378][ T9980] [ 479.048387][ T9980] dump_stack_lvl+0x189/0x250 [ 479.048418][ T9980] ? __pfx____ratelimit+0x10/0x10 [ 479.048445][ T9980] ? __pfx_dump_stack_lvl+0x10/0x10 [ 479.048468][ T9980] ? __pfx__printk+0x10/0x10 [ 479.048503][ T9980] ? __pfx___might_resched+0x10/0x10 [ 479.048530][ T9980] should_fail_ex+0x414/0x560 [ 479.048561][ T9980] should_failslab+0xa8/0x100 [ 479.048592][ T9980] kmem_cache_alloc_node_noprof+0x76/0x3c0 [ 479.048619][ T9980] ? __alloc_skb+0x112/0x2d0 [ 479.048651][ T9980] __alloc_skb+0x112/0x2d0 [ 479.048684][ T9980] netlink_sendmsg+0x5c6/0xb30 [ 479.048724][ T9980] ? __pfx_netlink_sendmsg+0x10/0x10 [ 479.048756][ T9980] ? aa_sock_msg_perm+0xf1/0x1d0 [ 479.048787][ T9980] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 479.048809][ T9980] ? __pfx_netlink_sendmsg+0x10/0x10 [ 479.048837][ T9980] __sock_sendmsg+0x21c/0x270 [ 479.048865][ T9980] ____sys_sendmsg+0x505/0x830 [ 479.048891][ T9980] ? __pfx_____sys_sendmsg+0x10/0x10 [ 479.048922][ T9980] ? import_iovec+0x74/0xa0 [ 479.048949][ T9980] ___sys_sendmsg+0x21f/0x2a0 [ 479.048972][ T9980] ? __pfx____sys_sendmsg+0x10/0x10 [ 479.049028][ T9980] ? __fget_files+0x2a/0x420 [ 479.049045][ T9980] ? __fget_files+0x3a0/0x420 [ 479.049075][ T9980] __x64_sys_sendmsg+0x19b/0x260 [ 479.049098][ T9980] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 479.049129][ T9980] ? __pfx_ksys_write+0x10/0x10 [ 479.049152][ T9980] ? rcu_is_watching+0x15/0xb0 [ 479.049178][ T9980] ? do_syscall_64+0xbe/0x3b0 [ 479.049211][ T9980] do_syscall_64+0xfa/0x3b0 [ 479.049235][ T9980] ? lockdep_hardirqs_on+0x9c/0x150 [ 479.049279][ T9980] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 479.049300][ T9980] ? clear_bhb_loop+0x60/0xb0 [ 479.049325][ T9980] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 479.049343][ T9980] RIP: 0033:0x7f8aae78ebe9 [ 479.049364][ T9980] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 479.049382][ T9980] RSP: 002b:00007f8aaf692038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 479.049405][ T9980] RAX: ffffffffffffffda RBX: 00007f8aae9b5fa0 RCX: 00007f8aae78ebe9 [ 479.049420][ T9980] RDX: 0000000020008000 RSI: 0000200000000500 RDI: 0000000000000005 [ 479.049434][ T9980] RBP: 00007f8aaf692090 R08: 0000000000000000 R09: 0000000000000000 [ 479.049446][ T9980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 479.049458][ T9980] R13: 00007f8aae9b6038 R14: 00007f8aae9b5fa0 R15: 00007ffef54adeb8 [ 479.049490][ T9980] [ 479.802070][ T9995] netlink: 32 bytes leftover after parsing attributes in process `syz.4.1055'. [ 479.888013][ T9997] netlink: 12 bytes leftover after parsing attributes in process `syz.7.1057'. [ 479.977617][T10003] netlink: 4 bytes leftover after parsing attributes in process `syz.7.1057'. [ 480.010265][T10002] netlink: 'syz.5.1058': attribute type 2 has an invalid length. [ 486.104192][T10028] __nla_validate_parse: 4 callbacks suppressed [ 486.104220][T10028] netlink: 28 bytes leftover after parsing attributes in process `syz.5.1066'. [ 486.175436][T10035] netlink: 204 bytes leftover after parsing attributes in process `syz.7.1069'. [ 487.830464][T10061] openvswitch: netlink: Geneve option length err (len 612, max 255). [ 488.112427][T10063] netlink: 16186 bytes leftover after parsing attributes in process `syz.7.1076'. [ 489.550153][T10092] netlink: 132 bytes leftover after parsing attributes in process `syz.6.1086'. [ 489.615210][T10093] netlink: 'syz.3.1087': attribute type 9 has an invalid length. [ 491.504257][T10112] netlink: 16186 bytes leftover after parsing attributes in process `syz.4.1093'. [ 491.969332][T10116] netlink: 40 bytes leftover after parsing attributes in process `syz.7.1096'. [ 492.143066][T10116] netlink: 20 bytes leftover after parsing attributes in process `syz.7.1096'. [ 492.465071][T10126] FAULT_INJECTION: forcing a failure. [ 492.465071][T10126] name failslab, interval 1, probability 0, space 0, times 0 [ 492.623556][T10126] CPU: 1 UID: 0 PID: 10126 Comm: syz.3.1099 Not tainted 6.17.0-rc1-syzkaller-ge4414b01c1cd #0 PREEMPT(full) [ 492.623590][T10126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 492.623604][T10126] Call Trace: [ 492.623614][T10126] [ 492.623625][T10126] dump_stack_lvl+0x189/0x250 [ 492.623665][T10126] ? __pfx_dump_stack_lvl+0x10/0x10 [ 492.623691][T10126] ? __pfx__printk+0x10/0x10 [ 492.623724][T10126] ? __pfx_sctp_v6_cmp_addr+0x10/0x10 [ 492.623766][T10126] should_fail_ex+0x414/0x560 [ 492.623801][T10126] should_failslab+0xa8/0x100 [ 492.623835][T10126] __kmalloc_cache_noprof+0x70/0x3d0 [ 492.623863][T10126] ? sctp_add_bind_addr+0x8c/0x370 [ 492.623909][T10126] sctp_add_bind_addr+0x8c/0x370 [ 492.623943][T10126] sctp_copy_local_addr_list+0x30b/0x4e0 [ 492.623976][T10126] ? sctp_copy_local_addr_list+0x9b/0x4e0 [ 492.624004][T10126] ? __pfx_sctp_copy_local_addr_list+0x10/0x10 [ 492.624026][T10126] ? irqentry_exit+0x74/0x90 [ 492.624056][T10126] ? sctp_v6_is_any+0x64/0x80 [ 492.624085][T10126] ? sctp_copy_one_addr+0x93/0x360 [ 492.624115][T10126] sctp_bind_addr_copy+0xb3/0x3c0 [ 492.624142][T10126] ? sctp_assoc_set_bind_addr_from_ep+0xa5/0x1a0 [ 492.624171][T10126] sctp_connect_new_asoc+0x2e0/0x690 [ 492.624208][T10126] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 492.624246][T10126] ? __sanitizer_cov_trace_pc+0x5d/0x70 [ 492.624275][T10126] ? security_sctp_bind_connect+0x7e/0x2e0 [ 492.624307][T10126] sctp_sendmsg+0x155c/0x2810 [ 492.624333][T10126] ? lockdep_hardirqs_on+0x9c/0x150 [ 492.624377][T10126] ? __pfx_sctp_sendmsg+0x10/0x10 [ 492.624416][T10126] ? irqentry_exit+0x74/0x90 [ 492.624459][T10126] ? __pfx_sctp_sendmsg+0x10/0x10 [ 492.624488][T10126] ? inet_sendmsg+0x2f4/0x370 [ 492.624525][T10126] __sock_sendmsg+0x19c/0x270 [ 492.624558][T10126] ____sys_sendmsg+0x505/0x830 [ 492.624589][T10126] ? __pfx_____sys_sendmsg+0x10/0x10 [ 492.624623][T10126] ? import_iovec+0x74/0xa0 [ 492.624651][T10126] ___sys_sendmsg+0x21f/0x2a0 [ 492.624676][T10126] ? __pfx____sys_sendmsg+0x10/0x10 [ 492.624763][T10126] __x64_sys_sendmsg+0x19b/0x260 [ 492.624788][T10126] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 492.624821][T10126] ? __pfx_ksys_write+0x10/0x10 [ 492.624856][T10126] ? do_syscall_64+0xbe/0x3b0 [ 492.624901][T10126] do_syscall_64+0xfa/0x3b0 [ 492.624928][T10126] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 492.624946][T10126] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 492.624966][T10126] ? clear_bhb_loop+0x60/0xb0 [ 492.624991][T10126] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 492.625011][T10126] RIP: 0033:0x7f0d9b38ebe9 [ 492.625030][T10126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 492.625047][T10126] RSP: 002b:00007f0d9c24a038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 492.625070][T10126] RAX: ffffffffffffffda RBX: 00007f0d9b5b5fa0 RCX: 00007f0d9b38ebe9 [ 492.625084][T10126] RDX: 0000000000040040 RSI: 00002000000003c0 RDI: 0000000000000003 [ 492.625096][T10126] RBP: 00007f0d9c24a090 R08: 0000000000000000 R09: 0000000000000000 [ 492.625109][T10126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 492.625119][T10126] R13: 00007f0d9b5b6038 R14: 00007f0d9b5b5fa0 R15: 00007ffe336830c8 [ 492.625155][T10126] [ 493.063923][T10130] syzkaller0: entered promiscuous mode [ 493.071766][T10130] syzkaller0: entered allmulticast mode [ 493.692092][T10148] netlink: 212408 bytes leftover after parsing attributes in process `syz.3.1104'. [ 495.047055][T10166] netlink: 'syz.3.1109': attribute type 2 has an invalid length. [ 497.176804][T10141] sit0: entered allmulticast mode [ 497.186423][T10137] sit0: entered promiscuous mode [ 497.270939][T10166] : entered promiscuous mode [ 498.567373][T10189] netlink: 16186 bytes leftover after parsing attributes in process `syz.3.1112'. [ 499.111312][T10199] netlink: 20 bytes leftover after parsing attributes in process `syz.5.1118'. [ 501.203002][T10229] netlink: 'syz.3.1127': attribute type 13 has an invalid length. [ 501.245891][T10229] netlink: 'syz.3.1127': attribute type 17 has an invalid length. [ 501.385173][T10236] netlink: 12 bytes leftover after parsing attributes in process `syz.5.1130'. [ 501.416557][T10239] netlink: 92 bytes leftover after parsing attributes in process `syz.7.1132'. [ 501.430919][T10239] netlink: 92 bytes leftover after parsing attributes in process `syz.7.1132'. [ 501.444858][T10239] netlink: 8 bytes leftover after parsing attributes in process `syz.7.1132'. [ 501.857932][T10255] netlink: 28 bytes leftover after parsing attributes in process `syz.7.1140'. [ 501.920461][T10255] netlink: 28 bytes leftover after parsing attributes in process `syz.7.1140'. [ 502.247002][T10267] ref_ctr_offset mismatch. inode: 0x430 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x20 [ 502.445990][T10277] Ÿë: port 1(erspan0) entered blocking state [ 502.456245][T10277] Ÿë: port 1(erspan0) entered disabled state [ 502.486944][T10277] erspan0: entered allmulticast mode [ 502.531817][T10277] erspan0: entered promiscuous mode [ 502.567787][T10279] Ÿë: port 1(erspan0) entered blocking state [ 502.575355][T10279] Ÿë: port 1(erspan0) entered forwarding state [ 502.829370][T10282] FAULT_INJECTION: forcing a failure. [ 502.829370][T10282] name failslab, interval 1, probability 0, space 0, times 0 [ 502.874482][T10285] ref_ctr_offset mismatch. inode: 0x38e offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x20 [ 502.896234][T10282] CPU: 0 UID: 0 PID: 10282 Comm: syz.6.1148 Not tainted 6.17.0-rc1-syzkaller-ge4414b01c1cd #0 PREEMPT(full) [ 502.896265][T10282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 502.896277][T10282] Call Trace: [ 502.896285][T10282] [ 502.896296][T10282] dump_stack_lvl+0x189/0x250 [ 502.896326][T10282] ? __pfx____ratelimit+0x10/0x10 [ 502.896358][T10282] ? __pfx_dump_stack_lvl+0x10/0x10 [ 502.896382][T10282] ? __pfx__printk+0x10/0x10 [ 502.896419][T10282] ? __pfx___might_resched+0x10/0x10 [ 502.896437][T10282] ? fs_reclaim_acquire+0x7d/0x100 [ 502.896472][T10282] should_fail_ex+0x414/0x560 [ 502.896506][T10282] should_failslab+0xa8/0x100 [ 502.896539][T10282] kmem_cache_alloc_node_noprof+0x76/0x3c0 [ 502.896566][T10282] ? perf_event_alloc+0x1c4/0x2be0 [ 502.896594][T10282] perf_event_alloc+0x1c4/0x2be0 [ 502.896614][T10282] ? __lock_acquire+0xab9/0xd20 [ 502.896654][T10282] ? __lock_acquire+0xab9/0xd20 [ 502.896701][T10282] ? __pfx_perf_event_alloc+0x10/0x10 [ 502.896732][T10282] ? find_lively_task_by_vpid+0x19/0x290 [ 502.896755][T10282] ? find_lively_task_by_vpid+0x19/0x290 [ 502.896774][T10282] ? find_lively_task_by_vpid+0x19/0x290 [ 502.896814][T10282] __se_sys_perf_event_open+0x772/0x1d70 [ 502.896860][T10282] ? __pfx___se_sys_perf_event_open+0x10/0x10 [ 502.896905][T10282] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 502.896935][T10282] ? __pfx_ksys_write+0x10/0x10 [ 502.896959][T10282] ? rcu_is_watching+0x15/0xb0 [ 502.896989][T10282] ? do_syscall_64+0xbe/0x3b0 [ 502.897014][T10282] ? __x64_sys_perf_event_open+0x20/0xc0 [ 502.897070][T10282] do_syscall_64+0xfa/0x3b0 [ 502.897096][T10282] ? lockdep_hardirqs_on+0x9c/0x150 [ 502.897124][T10282] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 502.897144][T10282] ? clear_bhb_loop+0x60/0xb0 [ 502.897171][T10282] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 502.897190][T10282] RIP: 0033:0x7fcff4d8ebe9 [ 502.897211][T10282] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 502.897236][T10282] RSP: 002b:00007fcff5c46038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 502.897260][T10282] RAX: ffffffffffffffda RBX: 00007fcff4fb5fa0 RCX: 00007fcff4d8ebe9 [ 502.897275][T10282] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000000 [ 502.897289][T10282] RBP: 00007fcff5c46090 R08: 0000000000000000 R09: 0000000000000000 [ 502.897302][T10282] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 502.897315][T10282] R13: 00007fcff4fb6038 R14: 00007fcff4fb5fa0 R15: 00007ffc385bfac8 [ 502.897355][T10282] [ 503.215123][T10287] netlink: 60 bytes leftover after parsing attributes in process `syz.4.1150'. [ 503.226997][T10287] netlink: 60 bytes leftover after parsing attributes in process `syz.4.1150'. [ 503.541720][T10290] netlink: 'syz.5.1151': attribute type 21 has an invalid length. [ 503.879618][T10299] __nla_validate_parse: 1 callbacks suppressed [ 503.879643][T10299] netlink: 68 bytes leftover after parsing attributes in process `syz.7.1154'. [ 504.449145][T10318] netlink: 16182 bytes leftover after parsing attributes in process `syz.6.1161'. [ 504.539573][T10316] netlink: 'syz.6.1161': attribute type 10 has an invalid length. [ 504.585667][T10320] netlink: 'syz.4.1162': attribute type 10 has an invalid length. [ 504.628867][T10313] netlink: 'syz.7.1160': attribute type 10 has an invalid length. [ 505.105484][T10313] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 505.239506][T10337] FAULT_INJECTION: forcing a failure. [ 505.239506][T10337] name failslab, interval 1, probability 0, space 0, times 0 [ 505.256010][T10337] CPU: 1 UID: 0 PID: 10337 Comm: syz.5.1167 Not tainted 6.17.0-rc1-syzkaller-ge4414b01c1cd #0 PREEMPT(full) [ 505.256044][T10337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 505.256069][T10337] Call Trace: [ 505.256078][T10337] [ 505.256087][T10337] dump_stack_lvl+0x189/0x250 [ 505.256120][T10337] ? __pfx____ratelimit+0x10/0x10 [ 505.256149][T10337] ? __pfx_dump_stack_lvl+0x10/0x10 [ 505.256173][T10337] ? __pfx__printk+0x10/0x10 [ 505.256220][T10337] should_fail_ex+0x414/0x560 [ 505.256253][T10337] should_failslab+0xa8/0x100 [ 505.256284][T10337] kmem_cache_alloc_noprof+0x73/0x3c0 [ 505.256312][T10337] ? skb_clone+0x212/0x3a0 [ 505.256339][T10337] skb_clone+0x212/0x3a0 [ 505.256365][T10337] __netlink_deliver_tap+0x404/0x850 [ 505.256409][T10337] ? netlink_deliver_tap+0x2e/0x1b0 [ 505.256439][T10337] netlink_deliver_tap+0x19c/0x1b0 [ 505.256468][T10337] netlink_sendskb+0x68/0x140 [ 505.256495][T10337] netlink_unicast+0x397/0x9e0 [ 505.256532][T10337] ? __pfx_netlink_unicast+0x10/0x10 [ 505.256553][T10337] ? nfnl_pernet+0x23/0x240 [ 505.256575][T10337] ? nfnl_pernet+0x23/0x240 [ 505.256602][T10337] nlmsg_notify+0x12e/0x1a0 [ 505.256631][T10337] nf_tables_commit+0x78ca/0x8700 [ 505.256678][T10337] ? __pfx_nf_tables_commit+0x10/0x10 [ 505.256698][T10337] ? __pfx_nf_tables_newchain+0x10/0x10 [ 505.256732][T10337] ? __pfx___nla_validate_parse+0x10/0x10 [ 505.256781][T10337] ? __lock_acquire+0xab9/0xd20 [ 505.256848][T10337] nfnetlink_rcv+0x1a4b/0x2520 [ 505.256910][T10337] ? __pfx_nfnetlink_rcv+0x10/0x10 [ 505.256953][T10337] ? ref_tracker_free+0x63a/0x7d0 [ 505.257011][T10337] ? __netlink_deliver_tap+0x807/0x850 [ 505.257038][T10337] ? netlink_deliver_tap+0x2e/0x1b0 [ 505.257085][T10337] netlink_unicast+0x82c/0x9e0 [ 505.257120][T10337] ? __pfx_netlink_unicast+0x10/0x10 [ 505.257146][T10337] ? netlink_sendmsg+0x642/0xb30 [ 505.257169][T10337] ? skb_put+0x11b/0x210 [ 505.257200][T10337] netlink_sendmsg+0x805/0xb30 [ 505.257251][T10337] ? __pfx_netlink_sendmsg+0x10/0x10 [ 505.257305][T10337] ? aa_sock_msg_perm+0xf1/0x1d0 [ 505.257348][T10337] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 505.257371][T10337] ? __pfx_netlink_sendmsg+0x10/0x10 [ 505.257401][T10337] __sock_sendmsg+0x21c/0x270 [ 505.257429][T10337] ____sys_sendmsg+0x505/0x830 [ 505.257456][T10337] ? __pfx_____sys_sendmsg+0x10/0x10 [ 505.257485][T10337] ? import_iovec+0x74/0xa0 [ 505.257512][T10337] ___sys_sendmsg+0x21f/0x2a0 [ 505.257535][T10337] ? __pfx____sys_sendmsg+0x10/0x10 [ 505.257596][T10337] ? __fget_files+0x2a/0x420 [ 505.257611][T10337] ? __fget_files+0x3a0/0x420 [ 505.257639][T10337] __x64_sys_sendmsg+0x19b/0x260 [ 505.257661][T10337] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 505.257690][T10337] ? __pfx_ksys_write+0x10/0x10 [ 505.257711][T10337] ? rcu_is_watching+0x15/0xb0 [ 505.257735][T10337] ? do_syscall_64+0xbe/0x3b0 [ 505.257778][T10337] do_syscall_64+0xfa/0x3b0 [ 505.257801][T10337] ? lockdep_hardirqs_on+0x9c/0x150 [ 505.257825][T10337] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 505.257846][T10337] ? clear_bhb_loop+0x60/0xb0 [ 505.257868][T10337] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 505.257888][T10337] RIP: 0033:0x7f5dc978ebe9 [ 505.257908][T10337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 505.257925][T10337] RSP: 002b:00007f5dca5e0038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 505.257948][T10337] RAX: ffffffffffffffda RBX: 00007f5dc99b5fa0 RCX: 00007f5dc978ebe9 [ 505.257961][T10337] RDX: 0000000000000490 RSI: 0000200000009b40 RDI: 0000000000000003 [ 505.257973][T10337] RBP: 00007f5dca5e0090 R08: 0000000000000000 R09: 0000000000000000 [ 505.257984][T10337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 505.257995][T10337] R13: 00007f5dc99b6038 R14: 00007f5dc99b5fa0 R15: 00007ffe0a5a4428 [ 505.258031][T10337] [ 507.644606][T10374] netlink: zone id is out of range [ 507.679003][T10374] netlink: zone id is out of range [ 507.691612][T10374] netlink: zone id is out of range [ 507.797753][T10381] netlink: 830 bytes leftover after parsing attributes in process `syz.7.1183'. [ 507.816467][T10380] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 507.864969][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 507.872719][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 507.979299][T10381] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 508.027533][T10381] netlink: 147608 bytes leftover after parsing attributes in process `syz.7.1183'. [ 508.058405][T10381] netlink: 62239 bytes leftover after parsing attributes in process `syz.7.1183'. [ 508.540408][T10391] netlink: 8 bytes leftover after parsing attributes in process `syz.7.1186'. [ 508.599418][T10391] netlink: 9275 bytes leftover after parsing attributes in process `syz.7.1186'. [ 509.866569][T10419] FAULT_INJECTION: forcing a failure. [ 509.866569][T10419] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 509.997459][T10419] CPU: 1 UID: 0 PID: 10419 Comm: syz.6.1196 Not tainted 6.17.0-rc1-syzkaller-ge4414b01c1cd #0 PREEMPT(full) [ 509.997496][T10419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 509.997509][T10419] Call Trace: [ 509.997520][T10419] [ 509.997535][T10419] dump_stack_lvl+0x189/0x250 [ 509.997572][T10419] ? irqentry_exit+0x74/0x90 [ 509.997619][T10419] ? __pfx_dump_stack_lvl+0x10/0x10 [ 509.997707][T10419] ? dump_stack+0x9/0x20 [ 509.997793][T10419] should_fail_ex+0x414/0x560 [ 509.997864][T10419] _copy_from_user+0x2d/0xb0 [ 509.997901][T10419] __copy_msghdr+0x3c5/0x5b0 [ 509.997963][T10419] ___sys_sendmsg+0x1a5/0x2a0 [ 509.998009][T10419] ? __pfx____sys_sendmsg+0x10/0x10 [ 509.998167][T10419] ? __fget_files+0x2a/0x420 [ 509.998265][T10419] ? __fget_files+0x2a/0x420 [ 509.998287][T10419] ? __fget_files+0x3a0/0x420 [ 509.998379][T10419] __x64_sys_sendmsg+0x19b/0x260 [ 509.998430][T10419] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 509.998603][T10419] do_syscall_64+0xfa/0x3b0 [ 509.998646][T10419] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 509.998665][T10419] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 509.998685][T10419] ? clear_bhb_loop+0x60/0xb0 [ 509.998744][T10419] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 509.998766][T10419] RIP: 0033:0x7fcff4d8ebe9 [ 509.998796][T10419] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 509.998813][T10419] RSP: 002b:00007fcff5c46038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 509.998838][T10419] RAX: ffffffffffffffda RBX: 00007fcff4fb5fa0 RCX: 00007fcff4d8ebe9 [ 509.998853][T10419] RDX: 0000000000000000 RSI: 0000200000000600 RDI: 0000000000000008 [ 509.998884][T10419] RBP: 00007fcff5c46090 R08: 0000000000000000 R09: 0000000000000000 [ 509.998897][T10419] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 509.998910][T10419] R13: 00007fcff4fb6038 R14: 00007fcff4fb5fa0 R15: 00007ffc385bfac8 [ 509.999023][T10419] [ 510.417295][T10426] netlink: 209852 bytes leftover after parsing attributes in process `syz.5.1197'. [ 510.428550][T10426] openvswitch: netlink: ufid size 3068 bytes exceeds the range (1, 16) [ 510.791292][T10428] pim6reg1: entered promiscuous mode [ 510.823650][T10428] pim6reg1: entered allmulticast mode [ 511.249152][T10434] netlink: 8 bytes leftover after parsing attributes in process `syz.6.1202'. [ 511.292240][T10434] netlink: 9275 bytes leftover after parsing attributes in process `syz.6.1202'. [ 512.637746][T10460] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1211'. [ 512.660565][T10460] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1211'. [ 512.726097][T10460] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1211'. [ 513.403744][T10472] wg2: entered promiscuous mode [ 513.409827][T10472] wg2: entered allmulticast mode [ 513.621088][T10479] netlink: 8 bytes leftover after parsing attributes in process `syz.5.1218'. [ 513.699605][T10479] netlink: 9275 bytes leftover after parsing attributes in process `syz.5.1218'. [ 513.900954][T10488] openvswitch: netlink: Geneve option length err (len 612, max 255). [ 514.598557][T10492] can: request_module (can-proto-0) failed. [ 516.018910][T10521] FAULT_INJECTION: forcing a failure. [ 516.018910][T10521] name failslab, interval 1, probability 0, space 0, times 0 [ 516.230616][T10521] CPU: 1 UID: 0 PID: 10521 Comm: syz.4.1229 Not tainted 6.17.0-rc1-syzkaller-ge4414b01c1cd #0 PREEMPT(full) [ 516.230659][T10521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 516.230671][T10521] Call Trace: [ 516.230680][T10521] [ 516.230690][T10521] dump_stack_lvl+0x189/0x250 [ 516.230721][T10521] ? __pfx____ratelimit+0x10/0x10 [ 516.230748][T10521] ? __pfx_dump_stack_lvl+0x10/0x10 [ 516.230772][T10521] ? __pfx__printk+0x10/0x10 [ 516.230806][T10521] ? __pfx___might_resched+0x10/0x10 [ 516.230835][T10521] should_fail_ex+0x414/0x560 [ 516.230867][T10521] should_failslab+0xa8/0x100 [ 516.230898][T10521] kmem_cache_alloc_node_noprof+0x76/0x3c0 [ 516.230940][T10521] ? __pfx_nf_tables_abort+0x10/0x10 [ 516.230958][T10521] ? __alloc_skb+0x112/0x2d0 [ 516.230992][T10521] __alloc_skb+0x112/0x2d0 [ 516.231025][T10521] netlink_ack+0x146/0xa50 [ 516.231059][T10521] ? __kasan_kmalloc+0x93/0xb0 [ 516.231098][T10521] nfnetlink_rcv+0x2290/0x2520 [ 516.231167][T10521] ? __pfx_nfnetlink_rcv+0x10/0x10 [ 516.231213][T10521] ? ref_tracker_free+0x63a/0x7d0 [ 516.231278][T10521] ? __netlink_deliver_tap+0x807/0x850 [ 516.231305][T10521] ? netlink_deliver_tap+0x2e/0x1b0 [ 516.231355][T10521] netlink_unicast+0x82c/0x9e0 [ 516.231392][T10521] ? __pfx_netlink_unicast+0x10/0x10 [ 516.231420][T10521] ? netlink_sendmsg+0x642/0xb30 [ 516.231501][T10521] ? skb_put+0x11b/0x210 [ 516.231535][T10521] netlink_sendmsg+0x805/0xb30 [ 516.231575][T10521] ? __pfx_netlink_sendmsg+0x10/0x10 [ 516.231606][T10521] ? aa_sock_msg_perm+0xf1/0x1d0 [ 516.231644][T10521] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 516.231675][T10521] ? __pfx_netlink_sendmsg+0x10/0x10 [ 516.231703][T10521] __sock_sendmsg+0x21c/0x270 [ 516.231732][T10521] ____sys_sendmsg+0x505/0x830 [ 516.231761][T10521] ? __pfx_____sys_sendmsg+0x10/0x10 [ 516.231793][T10521] ? import_iovec+0x74/0xa0 [ 516.231821][T10521] ___sys_sendmsg+0x21f/0x2a0 [ 516.231844][T10521] ? __pfx____sys_sendmsg+0x10/0x10 [ 516.231893][T10521] ? __fget_files+0x2a/0x420 [ 516.231927][T10521] ? __fget_files+0x2a/0x420 [ 516.231943][T10521] ? __fget_files+0x3a0/0x420 [ 516.231975][T10521] __x64_sys_sendmsg+0x19b/0x260 [ 516.231999][T10521] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 516.232032][T10521] ? __pfx_ksys_write+0x10/0x10 [ 516.232055][T10521] ? rcu_is_watching+0x15/0xb0 [ 516.232081][T10521] ? do_syscall_64+0xbe/0x3b0 [ 516.232114][T10521] do_syscall_64+0xfa/0x3b0 [ 516.232139][T10521] ? lockdep_hardirqs_on+0x9c/0x150 [ 516.232163][T10521] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 516.232182][T10521] ? clear_bhb_loop+0x60/0xb0 [ 516.232206][T10521] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 516.232225][T10521] RIP: 0033:0x7f8aae78ebe9 [ 516.232245][T10521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 516.232261][T10521] RSP: 002b:00007f8aaf692038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 516.232283][T10521] RAX: ffffffffffffffda RBX: 00007f8aae9b5fa0 RCX: 00007f8aae78ebe9 [ 516.232298][T10521] RDX: 0000000004000800 RSI: 0000200000000000 RDI: 0000000000000003 [ 516.232311][T10521] RBP: 00007f8aaf692090 R08: 0000000000000000 R09: 0000000000000000 [ 516.232322][T10521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 516.232334][T10521] R13: 00007f8aae9b6038 R14: 00007f8aae9b5fa0 R15: 00007ffef54adeb8 [ 516.232370][T10521] [ 517.347141][T10540] openvswitch: netlink: Geneve option length err (len 612, max 255). [ 518.575765][T10574] FAULT_INJECTION: forcing a failure. [ 518.575765][T10574] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 518.610839][T10574] CPU: 0 UID: 0 PID: 10574 Comm: syz.6.1249 Not tainted 6.17.0-rc1-syzkaller-ge4414b01c1cd #0 PREEMPT(full) [ 518.610873][T10574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 518.610886][T10574] Call Trace: [ 518.610904][T10574] [ 518.610914][T10574] dump_stack_lvl+0x189/0x250 [ 518.610946][T10574] ? __pfx____ratelimit+0x10/0x10 [ 518.610974][T10574] ? __pfx_dump_stack_lvl+0x10/0x10 [ 518.610997][T10574] ? __pfx__printk+0x10/0x10 [ 518.611025][T10574] ? __might_fault+0xb0/0x130 [ 518.611065][T10574] should_fail_ex+0x414/0x560 [ 518.611098][T10574] _copy_from_iter+0x1db/0x16f0 [ 518.611122][T10574] ? sock_alloc_send_pskb+0x875/0x990 [ 518.611151][T10574] ? __pfx__copy_from_iter+0x10/0x10 [ 518.611180][T10574] ? __pfx_sock_alloc_send_pskb+0x10/0x10 [ 518.611206][T10574] skb_copy_datagram_from_iter+0xf5/0x720 [ 518.611232][T10574] ? dev_get_by_index+0x22/0x2e0 [ 518.611255][T10574] ? skb_put+0x11b/0x210 [ 518.611287][T10574] packet_sendmsg+0x3797/0x5080 [ 518.611321][T10574] ? aa_unix_file_perm+0xd18/0x1250 [ 518.611372][T10574] ? __pfx___might_resched+0x10/0x10 [ 518.611389][T10574] ? __lock_acquire+0xab9/0xd20 [ 518.611439][T10574] ? __pfx_packet_sendmsg+0x10/0x10 [ 518.611459][T10574] ? aa_sk_perm+0x81e/0x950 [ 518.611493][T10574] ? tomoyo_socket_sendmsg_permission+0x1e1/0x300 [ 518.611521][T10574] ? __lock_acquire+0xab9/0xd20 [ 518.611546][T10574] ? aa_sock_msg_perm+0xf1/0x1d0 [ 518.611577][T10574] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 518.611597][T10574] ? __pfx_packet_sendmsg+0x10/0x10 [ 518.611617][T10574] __sock_sendmsg+0x21c/0x270 [ 518.611646][T10574] ____sys_sendmsg+0x505/0x830 [ 518.611673][T10574] ? __pfx_____sys_sendmsg+0x10/0x10 [ 518.611703][T10574] ? import_iovec+0x74/0xa0 [ 518.611730][T10574] ___sys_sendmsg+0x21f/0x2a0 [ 518.611752][T10574] ? __pfx____sys_sendmsg+0x10/0x10 [ 518.611812][T10574] ? __fget_files+0x2a/0x420 [ 518.611829][T10574] ? __fget_files+0x3a0/0x420 [ 518.611858][T10574] __x64_sys_sendmsg+0x19b/0x260 [ 518.611881][T10574] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 518.611920][T10574] ? __pfx_ksys_write+0x10/0x10 [ 518.611945][T10574] ? rcu_is_watching+0x15/0xb0 [ 518.611970][T10574] ? do_syscall_64+0xbe/0x3b0 [ 518.612003][T10574] do_syscall_64+0xfa/0x3b0 [ 518.612027][T10574] ? lockdep_hardirqs_on+0x9c/0x150 [ 518.612052][T10574] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 518.612072][T10574] ? clear_bhb_loop+0x60/0xb0 [ 518.612097][T10574] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 518.612116][T10574] RIP: 0033:0x7fcff4d8ebe9 [ 518.612136][T10574] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 518.612154][T10574] RSP: 002b:00007fcff5c46038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 518.612178][T10574] RAX: ffffffffffffffda RBX: 00007fcff4fb5fa0 RCX: 00007fcff4d8ebe9 [ 518.612193][T10574] RDX: 0000000000000000 RSI: 0000200000000fc0 RDI: 0000000000000003 [ 518.612206][T10574] RBP: 00007fcff5c46090 R08: 0000000000000000 R09: 0000000000000000 [ 518.612217][T10574] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 518.612229][T10574] R13: 00007fcff4fb6038 R14: 00007fcff4fb5fa0 R15: 00007ffc385bfac8 [ 518.612263][T10574] [ 518.742057][T10571] can: request_module (can-proto-0) failed. [ 518.869271][T10577] veth1_macvtap: left allmulticast mode [ 519.122208][T10577] veth1_macvtap: left promiscuous mode [ 519.139495][T10577] bridge0: port 3(macsec0) entered disabled state [ 519.472819][T10571] veth1_macvtap: entered promiscuous mode [ 519.516420][T10571] veth1_macvtap: entered allmulticast mode [ 519.546203][T10590] openvswitch: netlink: Geneve option length err (len 612, max 255). [ 519.643374][ T12] bridge0: port 3(macsec0) entered blocking state [ 519.651416][ T12] bridge0: port 3(macsec0) entered listening state [ 520.423935][T10601] netlink: 'syz.4.1254': attribute type 21 has an invalid length. [ 520.539242][T10601] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1254'. [ 520.871585][T10605] C: renamed from team_slave_0 (while UP) [ 520.887963][T10605] netlink: 'syz.3.1255': attribute type 3 has an invalid length. [ 520.898501][T10605] netlink: 152 bytes leftover after parsing attributes in process `syz.3.1255'. [ 520.924581][T10605] A link change request failed with some changes committed already. Interface C may have been left with an inconsistent configuration, please check. [ 521.745258][T10629] netlink: 14 bytes leftover after parsing attributes in process `syz.6.1262'. [ 522.353545][T10643] openvswitch: netlink: Geneve option length err (len 612, max 255). [ 522.455164][T10630] lo speed is unknown, defaulting to 1000 [ 522.537489][T10626] lo speed is unknown, defaulting to 1000 [ 522.959333][T10654] netlink: 'syz.4.1268': attribute type 10 has an invalid length. [ 523.574491][ T5183] Bluetooth: hci0: unexpected subevent 0x01 length: 150 > 18 [ 523.900794][T10654] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 523.927465][T10654] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 524.867168][T10689] openvswitch: netlink: Geneve option length err (len 612, max 255). [ 524.992449][T10685] wg2: entered promiscuous mode [ 525.011503][T10685] wg2: entered allmulticast mode [ 525.412670][T10703] openvswitch: netlink: Geneve option length err (len 612, max 255). [ 526.434590][T10700] syzkaller0: entered promiscuous mode [ 526.482375][T10700] syzkaller0: entered allmulticast mode [ 528.070838][T10728] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1299'. [ 531.476355][T10743] FAULT_INJECTION: forcing a failure. [ 531.476355][T10743] name failslab, interval 1, probability 0, space 0, times 0 [ 531.517716][T10743] CPU: 0 UID: 0 PID: 10743 Comm: syz.6.1294 Not tainted 6.17.0-rc1-syzkaller-ge4414b01c1cd #0 PREEMPT(full) [ 531.517751][T10743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 531.517763][T10743] Call Trace: [ 531.517772][T10743] [ 531.517781][T10743] dump_stack_lvl+0x189/0x250 [ 531.517811][T10743] ? __pfx____ratelimit+0x10/0x10 [ 531.517839][T10743] ? __pfx_dump_stack_lvl+0x10/0x10 [ 531.517863][T10743] ? __pfx__printk+0x10/0x10 [ 531.517886][T10743] ? __lock_acquire+0xab9/0xd20 [ 531.517931][T10743] should_fail_ex+0x414/0x560 [ 531.517964][T10743] should_failslab+0xa8/0x100 [ 531.517994][T10743] __kmalloc_cache_noprof+0x70/0x3d0 [ 531.518020][T10743] ? proc_self_get_link+0xe6/0x180 [ 531.518040][T10743] ? __task_pid_nr_ns+0x398/0x470 [ 531.518068][T10743] proc_self_get_link+0xe6/0x180 [ 531.518090][T10743] ? __pfx_proc_self_get_link+0x10/0x10 [ 531.518114][T10743] pick_link+0x67c/0xe80 [ 531.518145][T10743] step_into+0xc5d/0xf30 [ 531.518168][T10743] ? read_word_at_a_time+0x16/0x20 [ 531.518202][T10743] ? __pfx_step_into+0x10/0x10 [ 531.518223][T10743] ? lookup_fast+0x168/0x5b0 [ 531.518245][T10743] ? inode_permission+0x149/0x470 [ 531.518263][T10743] ? __asan_memcpy+0x40/0x70 [ 531.518289][T10743] link_path_walk+0x77b/0xea0 [ 531.518327][T10743] path_openat+0x28c/0x3830 [ 531.518379][T10743] ? perf_trace_preemptirq_template+0xa3/0x340 [ 531.518415][T10743] ? __pfx_path_openat+0x10/0x10 [ 531.518446][T10743] ? perf_trace_preemptirq_template+0xa3/0x340 [ 531.518470][T10743] ? irqentry_exit+0x74/0x90 [ 531.518504][T10743] do_filp_open+0x1fa/0x410 [ 531.518530][T10743] ? __pfx_do_filp_open+0x10/0x10 [ 531.518580][T10743] ? _raw_spin_unlock+0x28/0x50 [ 531.518602][T10743] ? alloc_fd+0x64c/0x6c0 [ 531.518643][T10743] do_sys_openat2+0x121/0x1c0 [ 531.518679][T10743] ? __pfx_do_sys_openat2+0x10/0x10 [ 531.518696][T10743] ? irqentry_exit+0x74/0x90 [ 531.518736][T10743] __x64_sys_openat+0x138/0x170 [ 531.518763][T10743] do_syscall_64+0xfa/0x3b0 [ 531.518791][T10743] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 531.518809][T10743] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 531.518827][T10743] ? clear_bhb_loop+0x60/0xb0 [ 531.518849][T10743] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 531.518868][T10743] RIP: 0033:0x7fcff4d8d550 [ 531.518888][T10743] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 531.518905][T10743] RSP: 002b:00007fcff5c45f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 531.518929][T10743] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007fcff4d8d550 [ 531.518942][T10743] RDX: 0000000000000002 RSI: 00007fcff5c45fa0 RDI: 00000000ffffff9c [ 531.518955][T10743] RBP: 00007fcff5c45fa0 R08: 0000000000000000 R09: 0000000000000000 [ 531.518967][T10743] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 531.518979][T10743] R13: 00007fcff4fb6038 R14: 00007fcff4fb5fa0 R15: 00007ffc385bfac8 [ 531.519012][T10743] [ 531.950910][T10759] openvswitch: netlink: Geneve option length err (len 612, max 255). [ 532.507587][T10766] netlink: 8 bytes leftover after parsing attributes in process `syz.6.1301'. [ 532.531341][T10766] netlink: 9275 bytes leftover after parsing attributes in process `syz.6.1301'. [ 533.191955][T10776] FAULT_INJECTION: forcing a failure. [ 533.191955][T10776] name failslab, interval 1, probability 0, space 0, times 0 [ 533.208083][T10776] CPU: 0 UID: 0 PID: 10776 Comm: syz.5.1306 Not tainted 6.17.0-rc1-syzkaller-ge4414b01c1cd #0 PREEMPT(full) [ 533.208117][T10776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 533.208130][T10776] Call Trace: [ 533.208141][T10776] [ 533.208151][T10776] dump_stack_lvl+0x189/0x250 [ 533.208187][T10776] ? __pfx____ratelimit+0x10/0x10 [ 533.208221][T10776] ? __pfx_dump_stack_lvl+0x10/0x10 [ 533.208250][T10776] ? __pfx__printk+0x10/0x10 [ 533.208303][T10776] ? __pfx___might_resched+0x10/0x10 [ 533.208370][T10776] should_fail_ex+0x414/0x560 [ 533.208435][T10776] should_failslab+0xa8/0x100 [ 533.208472][T10776] kmem_cache_alloc_node_noprof+0x76/0x3c0 [ 533.208504][T10776] ? __alloc_skb+0x112/0x2d0 [ 533.208548][T10776] __alloc_skb+0x112/0x2d0 [ 533.208592][T10776] netlink_sendmsg+0x5c6/0xb30 [ 533.208659][T10776] ? __pfx_netlink_sendmsg+0x10/0x10 [ 533.208703][T10776] ? aa_sock_msg_perm+0xf1/0x1d0 [ 533.208745][T10776] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 533.208771][T10776] ? __pfx_netlink_sendmsg+0x10/0x10 [ 533.208807][T10776] __sock_sendmsg+0x21c/0x270 [ 533.208849][T10776] ____sys_sendmsg+0x505/0x830 [ 533.208896][T10776] ? __pfx_____sys_sendmsg+0x10/0x10 [ 533.208971][T10776] ? import_iovec+0x74/0xa0 [ 533.209014][T10776] ___sys_sendmsg+0x21f/0x2a0 [ 533.209058][T10776] ? __pfx____sys_sendmsg+0x10/0x10 [ 533.209160][T10776] ? __fget_files+0x2a/0x420 [ 533.209227][T10776] ? __fget_files+0x2a/0x420 [ 533.209246][T10776] ? __fget_files+0x3a0/0x420 [ 533.209306][T10776] __x64_sys_sendmsg+0x19b/0x260 [ 533.209343][T10776] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 533.209402][T10776] ? __pfx_ksys_write+0x10/0x10 [ 533.209435][T10776] ? rcu_is_watching+0x15/0xb0 [ 533.209477][T10776] ? do_syscall_64+0xbe/0x3b0 [ 533.209518][T10776] do_syscall_64+0xfa/0x3b0 [ 533.209544][T10776] ? lockdep_hardirqs_on+0x9c/0x150 [ 533.209574][T10776] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 533.209595][T10776] ? clear_bhb_loop+0x60/0xb0 [ 533.209631][T10776] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 533.209650][T10776] RIP: 0033:0x7f5dc978ebe9 [ 533.209673][T10776] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 533.209692][T10776] RSP: 002b:00007f5dca5e0038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 533.209716][T10776] RAX: ffffffffffffffda RBX: 00007f5dc99b5fa0 RCX: 00007f5dc978ebe9 [ 533.209731][T10776] RDX: 0000000000000040 RSI: 0000200000000200 RDI: 0000000000000003 [ 533.209744][T10776] RBP: 00007f5dca5e0090 R08: 0000000000000000 R09: 0000000000000000 [ 533.209757][T10776] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 533.209770][T10776] R13: 00007f5dc99b6038 R14: 00007f5dc99b5fa0 R15: 00007ffe0a5a4428 [ 533.209840][T10776] [ 533.825088][T10789] : renamed from bond_slave_0 (while UP) [ 534.708920][ C1] bridge0: port 3(macsec0) entered learning state [ 534.958760][T10804] openvswitch: netlink: Geneve option length err (len 612, max 255). [ 535.989207][T10810] netlink: 4 bytes leftover after parsing attributes in process `syz.6.1314'. [ 536.176915][T10810] netlink: 4 bytes leftover after parsing attributes in process `syz.6.1314'. [ 536.194214][T10815] netlink: 8 bytes leftover after parsing attributes in process `syz.5.1316'. [ 536.207592][T10815] netlink: 9275 bytes leftover after parsing attributes in process `syz.5.1316'. [ 536.436187][T10824] netlink: 'syz.3.1320': attribute type 6 has an invalid length. [ 536.467456][T10824] netlink: 164 bytes leftover after parsing attributes in process `syz.3.1320'. [ 537.605158][T10845] netlink: 'syz.7.1323': attribute type 4 has an invalid length. [ 537.634556][T10845] netlink: 199836 bytes leftover after parsing attributes in process `syz.7.1323'. [ 541.008121][T10858] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1327'. [ 541.146697][T10861] openvswitch: netlink: Geneve option length err (len 612, max 255). [ 541.309076][T10865] netlink: 236 bytes leftover after parsing attributes in process `syz.4.1331'. [ 541.495228][T10868] netlink: 8 bytes leftover after parsing attributes in process `syz.6.1333'. [ 541.536184][T10868] netlink: 9275 bytes leftover after parsing attributes in process `syz.6.1333'. [ 542.135137][T10883] netlink: 12 bytes leftover after parsing attributes in process `syz.6.1337'. [ 542.328446][T10883] openvswitch: netlink: Flow actions attr not present in new flow. [ 543.564600][T10902] ================================================================== [ 543.575430][T10902] BUG: KASAN: slab-out-of-bounds in __bpf_get_stackid+0x677/0xcf0 [ 543.584881][T10902] Write of size 8 at addr ffff888029315658 by task syz.4.1344/10902 [ 543.595045][T10902] [ 543.597810][T10902] CPU: 1 UID: 0 PID: 10902 Comm: syz.4.1344 Not tainted 6.17.0-rc1-syzkaller-ge4414b01c1cd #0 PREEMPT(full) [ 543.597843][T10902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 543.597858][T10902] Call Trace: [ 543.597867][T10902] [ 543.597876][T10902] dump_stack_lvl+0x189/0x250 [ 543.597908][T10902] ? __virt_addr_valid+0x1c8/0x5c0 [ 543.597934][T10902] ? rcu_is_watching+0x15/0xb0 [ 543.597952][T10902] ? __kasan_check_byte+0x12/0x40 [ 543.597981][T10902] ? __pfx_dump_stack_lvl+0x10/0x10 [ 543.598002][T10902] ? rcu_is_watching+0x15/0xb0 [ 543.598021][T10902] ? lock_release+0x4b/0x3e0 [ 543.598048][T10902] ? __virt_addr_valid+0x1c8/0x5c0 [ 543.598070][T10902] ? __virt_addr_valid+0x4a5/0x5c0 [ 543.598132][T10902] print_report+0xca/0x240 [ 543.598152][T10902] ? __bpf_get_stackid+0x677/0xcf0 [ 543.598179][T10902] kasan_report+0x118/0x150 [ 543.598206][T10902] ? __bpf_get_stackid+0x677/0xcf0 [ 543.598246][T10902] ? __alloc_pages_noprof+0xa/0x30 [ 543.598266][T10902] __bpf_get_stackid+0x677/0xcf0 [ 543.598299][T10902] ? bpf_prog_12712c88fd19bd5b+0x2a/0x32 [ 543.598319][T10902] bpf_get_stackid_raw_tp+0x196/0x210 [ 543.598344][T10902] bpf_prog_12712c88fd19bd5b+0x2a/0x32 [ 543.598360][T10902] bpf_trace_run4+0x28e/0x4a0 [ 543.598384][T10902] ? bpf_trace_run4+0x19c/0x4a0 [ 543.598408][T10902] ? __pfx_bpf_trace_run4+0x10/0x10 [ 543.598435][T10902] ? trace_mm_page_alloc+0xb2/0x150 [ 543.598457][T10902] trace_mm_page_alloc+0x129/0x150 [ 543.598478][T10902] __alloc_frozen_pages_noprof+0x1d6/0x370 [ 543.598498][T10902] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 543.598520][T10902] ? __kmalloc_node_noprof+0x293/0x4e0 [ 543.598544][T10902] ? bpf_map_area_alloc+0x64/0x180 [ 543.598576][T10902] __alloc_pages_noprof+0xa/0x30 [ 543.598592][T10902] bpf_ringbuf_alloc+0x93/0x590 [ 543.598623][T10902] ? bpf_map_init_from_attr+0x14a/0x340 [ 543.598653][T10902] ringbuf_map_alloc+0x1c8/0x2f0 [ 543.598684][T10902] map_create+0xaa0/0x14d0 [ 543.598711][T10902] ? security_bpf+0x7e/0x300 [ 543.598738][T10902] __sys_bpf+0x60f/0x870 [ 543.598762][T10902] ? __pfx___sys_bpf+0x10/0x10 [ 543.598801][T10902] __x64_sys_bpf+0x7c/0x90 [ 543.598823][T10902] do_syscall_64+0xfa/0x3b0 [ 543.598853][T10902] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 543.598872][T10902] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 543.598891][T10902] ? clear_bhb_loop+0x60/0xb0 [ 543.598911][T10902] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 543.598930][T10902] RIP: 0033:0x7f8aae78ebe9 [ 543.598949][T10902] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 543.598966][T10902] RSP: 002b:00007f8aaf692038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 543.598989][T10902] RAX: ffffffffffffffda RBX: 00007f8aae9b5fa0 RCX: 00007f8aae78ebe9 [ 543.599004][T10902] RDX: 0000000000000048 RSI: 00002000000007c0 RDI: 0000000000000000 [ 543.599016][T10902] RBP: 00007f8aaf692090 R08: 0000000000000000 R09: 0000000000000000 [ 543.599029][T10902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 543.599041][T10902] R13: 00007f8aae9b6038 R14: 00007f8aae9b5fa0 R15: 00007ffef54adeb8 [ 543.599061][T10902] [ 543.599068][T10902] [ 543.963365][T10902] Allocated by task 10902: [ 543.967883][T10902] kasan_save_track+0x3e/0x80 [ 543.972686][T10902] __kasan_kmalloc+0x93/0xb0 [ 543.977478][T10902] __kmalloc_node_noprof+0x276/0x4e0 [ 543.983007][T10902] bpf_map_area_alloc+0x64/0x180 [ 543.988062][T10902] prealloc_elems_and_freelist+0x86/0x1d0 [ 543.993801][T10902] stack_map_alloc+0x33f/0x4c0 [ 543.998873][T10902] map_create+0xaa0/0x14d0 [ 544.003316][T10902] __sys_bpf+0x60f/0x870 [ 544.008118][T10902] __x64_sys_bpf+0x7c/0x90 [ 544.012654][T10902] do_syscall_64+0xfa/0x3b0 [ 544.017731][T10902] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 544.023943][T10902] [ 544.026798][T10902] The buggy address belongs to the object at ffff888029315000 [ 544.026798][T10902] which belongs to the cache kmalloc-cg-2k of size 2048 [ 544.043090][T10902] The buggy address is located 24 bytes to the right of [ 544.043090][T10902] allocated 1600-byte region [ffff888029315000, ffff888029315640) [ 544.059547][T10902] [ 544.062240][T10902] The buggy address belongs to the physical page: [ 544.069215][T10902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x29310 [ 544.080644][T10902] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 544.090791][T10902] memcg:ffff888078b6a681 [ 544.095607][T10902] anon flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff) [ 544.105055][T10902] page_type: f5(slab) [ 544.111268][T10902] raw: 00fff00000000040 ffff88801a44b3c0 0000000000000000 0000000000000001 [ 544.125177][T10902] raw: 0000000000000000 0000000000080008 00000000f5000000 ffff888078b6a681 [ 544.135218][T10902] head: 00fff00000000040 ffff88801a44b3c0 0000000000000000 0000000000000001 [ 544.145743][T10902] head: 0000000000000000 0000000000080008 00000000f5000000 ffff888078b6a681 [ 544.156319][T10902] head: 00fff00000000003 ffffea0000a4c401 00000000ffffffff 00000000ffffffff [ 544.165543][T10902] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 544.174768][T10902] page dumped because: kasan: bad access detected [ 544.181999][T10902] page_owner tracks the page as allocated [ 544.189158][T10902] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 10709, tgid 10707 (syz.5.1284), ts 527083548529, free_ts 527075377249 [ 544.212670][T10902] post_alloc_hook+0x240/0x2a0 [ 544.217835][T10902] get_page_from_freelist+0x21e4/0x22c0 [ 544.223679][T10902] __alloc_frozen_pages_noprof+0x181/0x370 [ 544.231197][T10902] alloc_pages_mpol+0x232/0x4a0 [ 544.237116][T10902] allocate_slab+0x8a/0x370 [ 544.242066][T10902] ___slab_alloc+0xbeb/0x1410 [ 544.247387][T10902] __kmalloc_cache_noprof+0x296/0x3d0 [ 544.253543][T10902] copy_verifier_state+0x837/0xf10 [ 544.259605][T10902] do_check+0x4017/0xe520 [ 544.264910][T10902] do_check_common+0x1949/0x24f0 [ 544.270596][T10902] bpf_check+0x1746a/0x1d2d0 [ 544.276030][T10902] bpf_prog_load+0x1318/0x1930 [ 544.281349][T10902] __sys_bpf+0x528/0x870 [ 544.287695][T10902] __x64_sys_bpf+0x7c/0x90 [ 544.292946][T10902] do_syscall_64+0xfa/0x3b0 [ 544.297564][T10902] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 544.304759][T10902] page last free pid 5850 tgid 5850 stack trace: [ 544.311972][T10902] __free_frozen_pages+0xbc4/0xd30 [ 544.317692][T10902] __put_partials+0x156/0x1a0 [ 544.322852][T10902] put_cpu_partial+0x17c/0x250 [ 544.329497][T10902] __slab_free+0x2d5/0x3c0 [ 544.334144][T10902] qlist_free_all+0x97/0x140 [ 544.339186][T10902] kasan_quarantine_reduce+0x148/0x160 [ 544.345521][T10902] __kasan_slab_alloc+0x22/0x80 [ 544.351457][T10902] kmem_cache_alloc_noprof+0x1c1/0x3c0 [ 544.358010][T10902] jbd2__journal_start+0x146/0x5b0 [ 544.364044][T10902] __ext4_journal_start_sb+0x227/0x5c0 [ 544.370167][T10902] ext4_dirty_inode+0x93/0x110 [ 544.375241][T10902] __mark_inode_dirty+0x2d1/0xdf0 [ 544.380609][T10902] file_update_time+0x40c/0x490 [ 544.389093][T10902] ext4_page_mkwrite+0x20e/0x1190 [ 544.395939][T10902] do_page_mkwrite+0x14a/0x310 [ 544.401017][T10902] do_wp_page+0x268d/0x5800 [ 544.406690][T10902] [ 544.409158][T10902] Memory state around the buggy address: [ 544.415539][T10902] ffff888029315500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 544.424160][T10902] ffff888029315580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 544.433107][T10902] >ffff888029315600: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 544.441440][T10902] ^ [ 544.448926][T10902] ffff888029315680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 544.458185][T10902] ffff888029315700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 544.468289][T10902] ================================================================== [ 544.493863][T10902] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 544.501596][T10902] CPU: 1 UID: 0 PID: 10902 Comm: syz.4.1344 Not tainted 6.17.0-rc1-syzkaller-ge4414b01c1cd #0 PREEMPT(full) [ 544.514068][T10902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 544.525789][T10902] Call Trace: [ 544.529378][T10902] [ 544.532984][T10902] dump_stack_lvl+0x99/0x250 [ 544.538486][T10902] ? __asan_memcpy+0x40/0x70 [ 544.543655][T10902] ? __pfx_dump_stack_lvl+0x10/0x10 [ 544.549612][T10902] ? __pfx__printk+0x10/0x10 [ 544.555021][T10902] vpanic+0x281/0x750 [ 544.560466][T10902] ? __pfx_print_hex_dump+0x10/0x10 [ 544.567277][T10902] ? __pfx_vpanic+0x10/0x10 [ 544.572883][T10902] ? irqentry_exit+0x74/0x90 [ 544.578671][T10902] ? lockdep_hardirqs_on+0x9c/0x150 [ 544.585559][T10902] panic+0xb9/0xc0 [ 544.589843][T10902] ? __pfx_panic+0x10/0x10 [ 544.596387][T10902] ? _raw_spin_unlock_irqrestore+0xa8/0x110 [ 544.603897][T10902] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 544.611088][T10902] ? __bpf_get_stackid+0x677/0xcf0 [ 544.617502][T10902] check_panic_on_warn+0x89/0xb0 [ 544.623035][T10902] ? __bpf_get_stackid+0x677/0xcf0 [ 544.628963][T10902] end_report+0x78/0x160 [ 544.633930][T10902] kasan_report+0x129/0x150 [ 544.638897][T10902] ? __bpf_get_stackid+0x677/0xcf0 [ 544.645588][T10902] ? __alloc_pages_noprof+0xa/0x30 [ 544.651753][T10902] __bpf_get_stackid+0x677/0xcf0 [ 544.658159][T10902] ? bpf_prog_12712c88fd19bd5b+0x2a/0x32 [ 544.664539][T10902] bpf_get_stackid_raw_tp+0x196/0x210 [ 544.670999][T10902] bpf_prog_12712c88fd19bd5b+0x2a/0x32 [ 544.678375][T10902] bpf_trace_run4+0x28e/0x4a0 [ 544.683998][T10902] ? bpf_trace_run4+0x19c/0x4a0 [ 544.691401][T10902] ? __pfx_bpf_trace_run4+0x10/0x10 [ 544.698001][T10902] ? trace_mm_page_alloc+0xb2/0x150 [ 544.705248][T10902] trace_mm_page_alloc+0x129/0x150 [ 544.710600][T10902] __alloc_frozen_pages_noprof+0x1d6/0x370 [ 544.717254][T10902] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 544.726118][T10902] ? __kmalloc_node_noprof+0x293/0x4e0 [ 544.732249][T10902] ? bpf_map_area_alloc+0x64/0x180 [ 544.738276][T10902] __alloc_pages_noprof+0xa/0x30 [ 544.743751][T10902] bpf_ringbuf_alloc+0x93/0x590 [ 544.749122][T10902] ? bpf_map_init_from_attr+0x14a/0x340 [ 544.754980][T10902] ringbuf_map_alloc+0x1c8/0x2f0 [ 544.760740][T10902] map_create+0xaa0/0x14d0 [ 544.765654][T10902] ? security_bpf+0x7e/0x300 [ 544.770859][T10902] __sys_bpf+0x60f/0x870 [ 544.775780][T10902] ? __pfx___sys_bpf+0x10/0x10 [ 544.781132][T10902] __x64_sys_bpf+0x7c/0x90 [ 544.785911][T10902] do_syscall_64+0xfa/0x3b0 [ 544.791901][T10902] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 544.799085][T10902] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 544.807133][T10902] ? clear_bhb_loop+0x60/0xb0 [ 544.812289][T10902] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 544.818703][T10902] RIP: 0033:0x7f8aae78ebe9 [ 544.823537][T10902] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 544.845872][T10902] RSP: 002b:00007f8aaf692038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 544.855026][T10902] RAX: ffffffffffffffda RBX: 00007f8aae9b5fa0 RCX: 00007f8aae78ebe9 [ 544.863165][T10902] RDX: 0000000000000048 RSI: 00002000000007c0 RDI: 0000000000000000 [ 544.871795][T10902] RBP: 00007f8aaf692090 R08: 0000000000000000 R09: 0000000000000000 [ 544.880570][T10902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 544.889535][T10902] R13: 00007f8aae9b6038 R14: 00007f8aae9b5fa0 R15: 00007ffef54adeb8 [ 544.899122][T10902] [ 544.903581][T10902] Kernel Offset: disabled [ 544.908288][T10902] Rebooting in 86400 seconds..