last executing test programs: 12.647910446s ago: executing program 4 (id=5): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000120000000000000000"], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, 0x0, 0x4008804) r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3}, 0x5000, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r3, 0x0, 0x4004040) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x8, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @cgroup_skb=0x1}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x10000) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x4, [@var={0x2, 0x0, 0x0, 0x11, 0x4}, @const={0x0, 0x0, 0x0, 0x2}, @func_proto={0x2, 0x0, 0x0, 0x6, 0x2}, @var={0x2, 0x0, 0x0, 0xe, 0x3}]}, {0x0, [0x0, 0x61]}}, 0x0, 0x54}, 0x20) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001f80)={&(0x7f0000001d00)=@qipcrtr={0x2a, 0xffffffffffffffff, 0xfffffffe}, 0x80, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x40002182) sendmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0xffffffffffffffff, 0x3}, 0x80, 0x0, 0x0, &(0x7f00000001c0)=ANY=[], 0x38}, 0x40) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5931, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x202, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10007}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) write$cgroup_subtree(r5, &(0x7f0000000240)={[{0x2d, 'cpuacct'}, {0x2b, 'blkio'}]}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 11.519844169s ago: executing program 4 (id=20): bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xe, 0x3, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x35776b2e}}, &(0x7f0000000c40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5}, 0x94) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1943}, 0x5000, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa100, 0x7, 0x8, 0x0, 0x2b66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa"], 0xcfa4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc200011800e000100636f6e6e6c696d69740000040c00028008000140fffff274140000"], 0x84}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x58, &(0x7f00000008c0)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000980), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{0x1}, 0x0, &(0x7f0000000a40)=r3}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000ac0)={0xffffffffffffffff}, 0xc) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xe00000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x4}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2d, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}}, 0x0, 0x8, 0x0, 0x0, 0x41000}, 0x94) bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) sendmsg$IPSET_CMD_TYPE(r0, 0x0, 0x20020010) 10.137523581s ago: executing program 4 (id=25): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r1, 0x0, 0x0}, 0x10) sendmsg$xdp(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000340)={0x2c, 0x0, 0x0, 0x3a}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x800) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r3 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x0, 0x4, 0x0, 0x28) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{}, 0x0, &(0x7f0000000100)=r4}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$kcm(0x11, 0x200000000000003, 0x300) sendmsg$sock(r6, &(0x7f0000000600)={&(0x7f0000000280)=@hci={0x1f, 0x0, 0x3}, 0x80, &(0x7f0000000240)=[{&(0x7f00000004c0)='A', 0x1}], 0x1, &(0x7f0000000340)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f9, &(0x7f0000000080)) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, 0x0, 0xc0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) 9.113293609s ago: executing program 4 (id=30): socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x24048015) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="1400000010003507d25a806f8c6394f90324fc60", 0x14}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000003940)=[{&(0x7f00000039c0)=""/4104, 0x1008}, {&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000180)=""/56, 0x38}, {&(0x7f00000016c0)=""/262, 0x106}, {&(0x7f0000001600)=""/149, 0x95}, {&(0x7f00000038c0)=""/115, 0x73}], 0x7}, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0xa0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x400000000008, 0x8000008}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2106, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="d8000000210081044e81f782db44b90402090000e8fe55a1180015000600142603600000000401a80016000a001040319a4707c5ee6f83b94dcf5c0468c1d67f6f94007134cf6ee0800089e408e8d8ef52b49816cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9db22fe7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db70300000040fad95667e006dcdf969b3ef35ce3bb9ad809d58bd0fdcaed0bffec29002a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701000440005041c827c8245afef87b9a2125c0fcbb4095452741", 0xda}], 0x1}, 0x4008000) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001d00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000005c0)={&(0x7f0000001800)=@flushpolicy={0x448, 0x1d, 0x2, 0x70bd2a, 0x25dfdbfe, "", [@tmpl={0x84, 0x5, [{{@in6=@mcast2, 0x4d3, 0x32}, 0xa, @in=@private=0xa010100, 0x3504, 0x0, 0x3, 0x5, 0x3, 0x7, 0x81}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d4, 0x3c}, 0xa, @in=@multicast2, 0x3507, 0x4, 0x2, 0x3, 0x6, 0x0, 0xfffff001}]}, @user_kmaddress={0x2c, 0x13, {@in6=@private0, @in=@remote, 0x0, 0xa}}, @migrate={0x180, 0x11, [{@in6=@dev={0xfe, 0x80, '\x00', 0x19}, @in=@rand_addr=0x64010102, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, @in6=@private1, 0x2b, 0x4, 0x0, 0x3500, 0x2, 0x2}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @in=@broadcast, @in=@dev={0xac, 0x14, 0x14, 0x15}, @in6=@mcast2, 0x32, 0x4, 0x0, 0x3504, 0x2, 0x2}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@mcast2, @in=@empty, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x6c, 0x0, 0x0, 0x0, 0xa, 0x2}, {@in=@rand_addr=0x64010100, @in=@private=0xa010101, @in6=@remote, @in=@private=0xa010100, 0x33, 0x2, 0x0, 0x0, 0x2, 0x2}, {@in6=@empty, @in6=@mcast1, @in=@remote, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x3c, 0x4, 0x0, 0x3505, 0x2, 0x2}]}, @lifetime_val={0x24, 0x9, {0x3, 0x1, 0x2, 0x9}}, @algo_auth_trunc={0x103, 0x14, {{'tgr160\x00'}, 0x5b8, 0x80, "6fefdb0d273f8d256200b37cb2e37847837d1df06f3f410d4a207e13c2293881bbb146604e9fcb1baaafb388d796510e93cba1435a3ae9531bc981ada16c4e8b2e332ccb67d79bd89b943d88613cb94046e97bd1a315809609f55a78b3b677b5040a84df21b52806d394389574ef1ffb7b7f8c473ebd096f89b378ec880449a0cea84bd1f3b2eea87680faa15f630ee7aeabe0939551cbca9c05f1ccd9ded48e693e448b42a85172f39bef1dbcbaead09af1793474ba93"}}, @algo_aead={0xab, 0x12, {{'morus1280\x00'}, 0x2f8, 0x0, "a26f2cbccc1e63a1d6b97d8b968b7b7e0f34001254471dc36f00b7e4689e2599e5c94cce445fef823031172549137dd37f0b595d4f855bd04fad324b02095284a6b0fb7236425991ff29515e647b1b27cbf068c3b430bb0a9d59509df782b1"}}, @etimer_thresh={0x8, 0xc, 0x401}, @user_kmaddress={0x2c, 0x13, {@in6=@private0={0xfc, 0x0, '\x00', 0x1}, @in=@loopback, 0x0, 0x2}}]}, 0x448}, 0x1, 0x0, 0x0, 0x40000}, 0x20004054) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)="2e00000029008188e6b62aa73772cc9f1ba1f848430000005e1406020000063e0e002800100007000280000012", 0x2d}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000440)={0x2, 0x0, [0x0, 0x0]}) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="5c0100001000130700000000fcdbdf052001000000000000000000000000000020010000000000000000000000000001000000004e210002000020006c000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="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"], 0x15c}, 0x1, 0x0, 0x0, 0x880}, 0x2000) 7.606917233s ago: executing program 4 (id=34): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={0x0, 0x2}, 0xca8, 0x6, 0x0, 0x0, 0x9, 0x800000, 0xfffc, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0xc000) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$kcm(0x10, 0x2, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000000031d08510000006", @ANYRES32=r2, @ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x2, 0xce, &(0x7f0000000340)=""/206}, 0x94) sendmsg$nl_xfrm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=@newsa={0x104, 0x1a, 0x7, 0x0, 0x2000000, {{@in6=@dev={0xfe, 0x80, '\x00', 0x1b}, @in=@multicast2, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xee00}, {@in6=@mcast1, 0x0, 0x2b}, @in6=@private0, {0x300, 0x3, 0x2, 0xfeffff7f00000000}, {0x0, 0x200000, 0x7, 0xfffffffffffffffd}, {0x40000, 0x0, 0xae8}, 0x0, 0x0, 0xa, 0x2, 0x0, 0x70}, [@coaddr={0x14, 0xe, @in6=@remote}]}, 0x104}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$can_j1939(0x1d, 0x2, 0x7) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = socket$kcm(0xa, 0x1, 0x106) sendmsg$kcm(r5, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x20000011) sendmsg$kcm(r5, 0x0, 0xe07e872420dfefca) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0xc220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[], &(0x7f0000000c00)='GPL\x00'}, 0x94) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x84000, 0x0) recvmsg$can_j1939(r4, &(0x7f0000003280)={&(0x7f0000000080)=@alg, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/199, 0xc7}, {&(0x7f0000001240)=""/4096, 0x1000}, {&(0x7f0000002240)=""/4096, 0x1000}], 0x4, &(0x7f0000003240)=""/27, 0x1b}, 0x2) sendmsg$nl_generic(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x20010080}, 0x0) 7.156595878s ago: executing program 4 (id=38): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={0x0, 0x4}, 0xf242, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000003080)=[{&(0x7f0000000040)}], 0x1}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, 0x0, 0x0) socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r3 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3c, &(0x7f0000000500)=r2, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000100081044e81f782db44b904021d080010000000e8fe55a1180015000600142603600e120500210000000401a8001600a400014020000300036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) socket$kcm(0xa, 0x5, 0x0) socket$kcm(0xa, 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 4.405623621s ago: executing program 3 (id=51): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x5, 0x8, 0xf}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r0}, &(0x7f0000000080), &(0x7f0000000200)}, 0x20) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x100e68, 0x0, 0x4000, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100003a00702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x500, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) r3 = socket$kcm(0xa, 0x5, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x46025, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0x1, 0x1, 0x0, 0x8}, 0x0, 0x7, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r3}, 0x8) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='GPL\x00'}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='sched_process_wait\x00', r4}, 0x18) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@ifindex, r7, 0x11, 0x0, 0x0, @void, @value=r6}, 0x20) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000840), 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x2b, 'cpuset'}, {0x2d, 'blkio'}, {0x6, 'net_cls'}, {0x2b, 'pids'}, {0x2d, 'rdma'}, {0x2b, 'net_prio'}, {0x2d, 'perf_event'}, {0x2b, 'net_cls'}, {0x2b, 'pids'}]}, 0x49) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="85000000d3000000760000000000000027007fffffff00009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffc62, 0x10, 0x0, 0xfffffffffffffed8}, 0x23) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xd3, &(0x7f0000000180)=[{}, {}], 0x10, 0x10, &(0x7f0000000240), &(0x7f00000002c0), 0x8, 0xb2, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz1\x00', 0x1ff) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x420040, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f00000002c0)="00001a000000002ac7b04b1b980f", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfd}, 0x50) 3.906146859s ago: executing program 0 (id=53): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000000)='/proc/sys/net/\x00\x00v4\x00\x00s/\x92ync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd1l,'}, 0x30) mkdir(&(0x7f0000001a80)='./file0\x00', 0x100) mount$bpf(0x200000000000, &(0x7f0000000440)='./file0/../file0\x00', 0x0, 0x989046, 0x0) r0 = socket$kcm(0x10, 0x400000002, 0x0) recvmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x20) write$cgroup_subtree(r0, &(0x7f0000001a00)=ANY=[@ANYBLOB], 0xfe33) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000d00008500000001000000"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000900)={{}, &(0x7f0000000880), &(0x7f00000008c0)='%+9llu \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) socket$kcm(0x29, 0x5, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1943}, 0x5000, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1000000000000008, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x15, 0x5, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)=ANY=[@ANYBLOB="020d0000100000000000000000000000080012000200020000000000000000001000320003000000000000000000000010003300010000000000000000000000fc020000000000000000000000000000030005000000000002000000ac1414aa00000000000000000300060000000000"], 0x80}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0xd, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, 0x0, 0x4000000) socket$kcm(0x10, 0x2, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) ioctl$TUNSETIFINDEX(r7, 0x400454da, &(0x7f0000000080)) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x20071, &(0x7f00000004c0)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB]) 3.817526589s ago: executing program 3 (id=55): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000009e00)={0x0, 0x0, &(0x7f0000009dc0)={&(0x7f0000009a00)={0x14, 0x36, 0x201, 0x70bd27, 0x25dfdbff, {0x12}}, 0x14}, 0x1, 0x0, 0x0, 0x40001}, 0x40040) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, 0x0, 0x0}, 0x94) r1 = socket$kcm(0xa, 0x1, 0x106) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='syzkaller\x00'}, 0x90) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e7", 0x4b}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000000240)=""/209, 0xd1}], 0x1}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$kcm(r1, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @dev, 0x2}, 0xff3c, 0x0}, 0xe07e872420dfefca) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="1400000023000b6c8cfffdfccabb00f90429fc", 0x13}], 0x1}, 0x2400c000) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, 0x0, 0x0) 3.563088746s ago: executing program 1 (id=56): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r2, 0x0, 0x8, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000000)='blkio.bfq.sectors\x00'}, 0x30) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x103fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.sectors\x00', 0x26e1, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)={{0x14}, [@NFT_MSG_DELCHAIN={0x50, 0x5, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_TYPE={0xa, 0x7, 'route\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x197dee54}]}, @NFTA_CHAIN_ID={0x2, 0xb, 0x1, 0x0, 0x3}, @NFTA_CHAIN_ID={0x8, 0xb, 0x1, 0x0, 0x1}, @NFTA_CHAIN_TYPE={0xa, 0x7, 'route\x00'}, @NFTA_CHAIN_ID={0x8, 0xb, 0x1, 0x0, 0x2}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x3, 0x84}}}, 0x78}, 0x1, 0x0, 0x0, 0xc800}, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x5, 0x1, 0x301, 0x0, 0x0, {0x7, 0x0, 0xa}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x34, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x221, 0x0, 0x0, 0x8, 0x3fe, 0x7ffeffff, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0x11, 0x200000000000003, 0x300) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8948, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="b40500000000000061108a0000000000a6000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x94) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(0xffffffffffffffff, 0x0, 0x4004800) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x8) r5 = socket$inet(0x2, 0x2, 0x1) sendmsg$inet(r5, 0x0, 0x40010) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r4, 0x8b26, &(0x7f0000000140)={'wlan1\x00', @random="000000000100"}) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000200000a80000000060a0b0400000000000000000200000054000480500001800a0001006d6174636800000040000280080002400000000124000300d67a8527f76ec1d39e537c4c3060c6a405106c72848aa8bcb429b3a20d5324520e000100636f6e6e6c696d69740000000900010073797a30000000000900020073797a32"], 0xa8}}, 0x4048010) recvmsg$unix(r0, 0x0, 0x0) 3.500046431s ago: executing program 2 (id=57): socket$kcm(0x10, 0x2, 0x0) socket$kcm(0xa, 0x1, 0x106) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext={0x1, 0x1944}, 0x14440, 0x5bc, 0x0, 0x8, 0x3, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) recvmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x10000) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x9}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0x6, 0x8, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x800) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) r4 = socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x8, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x14, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000040)=r5, 0x4) sendmsg$nl_generic(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000002280)={0x14, 0x803d, 0x107, 0x8000, 0x8, {0x3, 0x7c}}, 0x14}, 0x1, 0x0, 0x0, 0x4091}, 0xc000) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r6, 0x0, 0x4000084) socket$kcm(0x10, 0x2, 0x4) 3.362534676s ago: executing program 1 (id=58): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000009e00)={0x0, 0x0, &(0x7f0000009dc0)={&(0x7f0000009a00)={0x14, 0x36, 0x201, 0x70bd27, 0x25dfdbff, {0x12}}, 0x14}, 0x1, 0x0, 0x0, 0x40001}, 0x40040) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000195"], 0x0}, 0x94) r1 = socket$kcm(0xa, 0x1, 0x106) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='syzkaller\x00'}, 0x90) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509", 0x4e}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000000240)=""/209, 0xd1}], 0x1}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$kcm(r1, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @dev, 0x2}, 0xff3c, 0x0}, 0xe07e872420dfefca) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="1400000023000b6c8cfffdfccabb00f90429fc60", 0x14}], 0x1}, 0x2400c000) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2001) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x400000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef3}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x24}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c0260000410007010000000007000000017c00000400fc80a72601"], 0x26c0}}, 0x4010) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000004a40)=ANY=[@ANYBLOB="c0260000410007010000000007000000027c00000400fc80a72601"], 0x26c0}}, 0x4010) 2.969403292s ago: executing program 0 (id=59): socket$kcm(0x2, 0x922000000001, 0x106) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000001946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x8800) socket$kcm(0x10, 0x2, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)=@o_path={&(0x7f0000000140)='./file0\x00', 0x0, 0x18, r1}, 0x18) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000a80)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a40000000060a0b040000000000000000020000001400048010000180090001006d617371000000000900010073797a30000000000900020073797a320000000014000000110001"], 0x68}}, 0x0) r3 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r3, &(0x7f0000001000)={&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001040)="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", 0x5c8}, {&(0x7f0000000600)="3001fb90647586f4601659c5ad2644b99bfd65452e947b394c96c29278d097c5f170d77283a744139d2ce2a2f4bb5bb37e7396e7bac14056f25d17145e73bc2461b20ea3fce771f1b32d1585e8a456763cfafcf7189145a6e261af6232014cbf8a0f898bf6d14136874b6a1fd7caf8ec9966b0419be0420dc6e247d1a44f038ae29eb4bc67d6a04e80dfb7715ebafaa20fcbc57ade23cba05da1fbe4bba675b742472eebaabf356adc99866930e146125a272cef5baf5dfad4a28a01208d9908183ab2085a781e531f1bed4ac9c245ec19be383047656a7d857d364e6f69eccea5aca3964f", 0xe5}, {&(0x7f0000000e40)="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", 0x194}, {&(0x7f0000000cc0)="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"/349, 0x15d}, {&(0x7f0000000700)="15c84609b06c6d85a5ca6f3a9a242f214aee4e7093161b717090c0c852a05393abd8992d91576f57bbd3488e85d8456d6c6c09de5c5228ee18819665861f01a2823a7cfa8e9260a5fe3921638db2dc5156149f86916810f913a944e1c8cd7fccb63f37900c5b287016e512b050ca214125b2217260c9ce3019e88b80985402ff7ca34be17e0dbda4f028cec9973a2b9eed83eee86f35f2c0adf50a04296e99c0f709fb", 0xa3}], 0x5, &(0x7f0000000580)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @loopback}}}], 0x20}, 0x0) socket$kcm(0x2b, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) r4 = socket$kcm(0x2, 0x200000000000001, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000002100)=ANY=[], 0x84}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_MSG_GETSETELEM(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3c}}, 0x8000) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[], 0x230}, 0x0) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c018030029000b12d25a80648c2594f90124fc60100c020000040000053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r4, 0x6, 0x15, &(0x7f0000000500), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x10, 0x0, 0x0) 2.827955585s ago: executing program 3 (id=60): socket$kcm(0x2, 0x922000000001, 0x106) r0 = perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xf8, 0x1, 0x0, 0x0, 0x0, 0x8e, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x3, 0x8000001946}, 0x0, 0x0, 0x6894, 0x7, 0x3fe, 0x800}, 0x0, 0xffffffffffffffff, r0, 0xa) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2040, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x2, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x4) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$kcm(0x2c, 0x3, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x800) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={0xffffffffffffffff, r1}) socket$kcm(0x2, 0xa, 0x2) socket$kcm(0xa, 0x3, 0x87) socket$kcm(0x10, 0x2, 0x10) r4 = socket$kcm(0xa, 0x1, 0x106) sendmsg$kcm(r4, &(0x7f00000019c0)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @remote, 0xfffffffe}, 0x80, 0x0}, 0x20040010) sendmsg$kcm(r4, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, '\x00', 0x3d}, 0x4}, 0x80, 0x0}, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) 2.670892667s ago: executing program 0 (id=61): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000100)=@phonet={0x23, 0x8, 0x0, 0x42}, 0x80, 0x0}, 0x24048015) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000003940)=[{&(0x7f00000039c0)=""/4104, 0x1008}, {&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000180)=""/56, 0x38}, {&(0x7f00000016c0)=""/262, 0x106}, {&(0x7f0000001600)=""/149, 0x95}, {&(0x7f00000038c0)=""/115, 0x73}], 0x7}, 0x0) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0xa0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x400000000008, 0x8000008}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2106, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="d8000000210081044e81f782db44b90402090000e8fe55a1180015000600142603600000000401a80016000a001040319a4707c5ee6f83b94dcf5c0468c1d67f6f94007134cf6ee0800089e408e8d8ef52b49816cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9db22fe7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db70300000040fad95667e006dcdf969b3ef35ce3bb9ad809d58bd0fdcaed0bffec29002a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701000440005041c827c8245afef87b9a2125c0fcbb4095452741", 0xda}], 0x1}, 0x4008000) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001d00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0x4, &(0x7f0000000080)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x3, 0x34, &(0x7f0000000240)=""/52, 0x41100, 0x20, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x2, 0xf, 0x6, 0xb}, 0x10, 0x178c7, 0xffffffffffffffff, 0x3, 0x0, &(0x7f00000002c0)=[{0x4, 0x4, 0xd, 0x8}, {0x5, 0x3, 0x4, 0x9}, {0x2, 0x1, 0xc}], 0x10, 0x6}, 0x94) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)="2e00000029008188e6b62aa73772cc9f1ba1f848430000005e1406020000063e0e002800100007000280000012", 0x2d}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000440)={0x2, 0x0, [0x0, 0x0]}) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="5c0100001000130700000000fcdbdf052001000000000000000000000000000020010000000000000000000000000001000000004e210002000020006c000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="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"], 0x15c}, 0x1, 0x0, 0x0, 0x880}, 0x2000) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x15, 0x3, &(0x7f0000000540)=ANY=[], &(0x7f00000005c0)='GPL\x00'}, 0x94) r8 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x34, &(0x7f0000000040)=r7, 0x4) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000001000040000000000000000000000000a20000000000a05000000000000000000070000010900010073797a30000000003c000000090a010400000000000600000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021840000000c0a01030000000000000000070000000900020073797a31000000000900010073797a30000000005800038054000080080003400000000248000b80340001800a0001006c696d69740000002400028008000440000000010c00024000000000000000000c000140000000000000000310"], 0x108}}, 0x0) 2.60784697s ago: executing program 3 (id=62): bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYBLOB], 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0x10, 0x2, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1943}, 0x5000, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x480, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x3, &(0x7f00000011c0)=[{&(0x7f0000000140)="5c00000013006bcc9e3be35c6e17aa31076b876c1d0000007ea60864160af36514001ac00800020007000c00060005c00364bc24eab556a705251e618294ff0051f60a84c9f4d4938037e786a6d0001000000e4509c5bbcd72c6c953", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x9, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x2, 0x1) sendmsg$inet(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{0x0}, {&(0x7f0000000800)="d9dc3363a247165a4d", 0xfffffcaa}, {&(0x7f0000000040)="f198340166be1cc8f23f9838dfd922a1"}, {&(0x7f0000000080)="2122cf2fdb6cd58e1ec6dda511c08392e1a4fad82574ad916354cdea0e25112e4397e6f03ef03b443e764da7672e8729886ebfd18fee5dafcc9e47338a7fd9f93dbb6c124df7943c66903ede78ff956e461d2f4b5bb73552109e9ff49515fa1c448accc4c02c56d260c84ef7099b42d84d3deb53397eceb65c441f49b5d220efe073708e4ee811f70b1a0b52a1ad5b7bc8b0f03cd36603988bb921f1608a011385c63c6794c6cbe795"}], 0x2}, 0x20008890) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r6) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sendmsg$IPSET_CMD_SAVE(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x3c, 0x8, 0x6, 0x301, 0x0, 0x0, {0x2, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8d0}, 0x0) close(r3) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x401c5820, &(0x7f0000000000)=0x8000) sendmsg$RDMA_NLDEV_CMD_SET(r9, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x5c, 0x1402, 0x8, 0x70bd26, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r10}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x24044040) sendmsg$nl_generic(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x2d, 0x9, 0x70bd27, 0x0, {0x4}, [@typed={0x8, 0x18, 0x0, 0x0, @binary="04ac0f00"}]}, 0x1c}, 0x1, 0x0, 0x0, 0x42804}, 0x84) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x54, 0x2, 0x6, 0x301, 0x0, 0x0, {0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8, 0x13, 0x0, 0x0, 0xfff}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) 2.54963069s ago: executing program 2 (id=63): socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000100)=@phonet={0x23, 0x8, 0x0, 0x42}, 0x80, 0x0}, 0x24048015) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="1400000010003507d25a", 0xa}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000003940)=[{&(0x7f00000039c0)=""/4104, 0x1008}, {&(0x7f0000000100)=""/81, 0x51}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000180)=""/56, 0x38}, {&(0x7f00000016c0)=""/262, 0x106}, {&(0x7f0000001600)=""/149, 0x95}, {0x0}], 0x7}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0xa0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x400000000008, 0x8000008}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2106, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="d8000000210081044e81f782db44b90402090000e8fe55a1180015000600142603600000000401a80016000a001040319a4707c5ee6f83b94dcf5c0468c1d67f6f94007134cf6ee0800089e408e8d8ef52b49816cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9db22fe7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db70300000040fad95667e006dcdf969b3ef35ce3bb9ad809d58bd0fdcaed0bffec29002a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701000440005041c827c8245afef87b9a2125c0fcbb4095452741", 0xda}], 0x1}, 0x4008000) 2.383562428s ago: executing program 2 (id=64): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd6000, 0x4, @perf_bp={0x0, 0x8}, 0x29, 0x0, 0x0, 0x1, 0x9, 0x800000, 0x4, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000700), 0x4) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)}, 0xff4c) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x11002, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9785, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffbf, 0xffffffffffffffff, 0x8) r2 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r2, 0x6, 0x17, &(0x7f0000000200)=r2, 0x21) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000540)=ANY=[@ANYBLOB="5c000000240001052abd7000fedbdf250900000006000300"], 0x5c}, 0x1, 0x0, 0x0, 0x48044}, 0x800) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'geneve0\x00', 0x8000}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x8090) recvmsg$unix(r3, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r6 = socket$kcm(0xa, 0x2, 0x88) setsockopt$sock_attach_bpf(r6, 0x1, 0x41, &(0x7f0000000040)=r5, 0x4) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socket(0x10, 0x80002, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=@updpolicy={0xc4, 0x19, 0x1, 0x70bd2d, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xc, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xa00, 0x407ffffffffffe, 0x800000000000002}, 0x0, 0x0, 0x1}, [@policy_type={0xa, 0x10, {0x1}}]}, 0xc4}}, 0x0) sendmsg$inet6(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0xa, 0x4e26, 0x0, @mcast2}, 0x1c, 0x0}, 0x20040811) 2.263465297s ago: executing program 1 (id=65): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x7ff0, 0x82, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x30, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x6}, 0x1b, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r0, &(0x7f0000003780)={0x0, 0x0, 0x0}, 0x600) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f00000001c0)="2e00000010008188040f46ecdb4cb9cca7480ef40f000000e3bd6efb010509000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b00000"], &(0x7f00000001c0)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2080}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8b29, &(0x7f0000000000)={'wlan1\x00', @random="010000000700"}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000000)=r2, 0x4) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20005, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x1, 0x2, 0x7fffffff, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x830d}, 0x18004, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x18, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="d4010000400000001800000000000000000000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r4}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0, r5, 0x0, 0x1}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000680)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x60044084) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0xfffffffffffffffd) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x2a979d) 2.063012056s ago: executing program 2 (id=66): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x54, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2, 0x0, 0x9}, [@NFTA_RULE_EXPRESSIONS={0x28, 0x4, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_OP={0x8, 0x6, 0x1, 0x0, 0x1}, @NFTA_EXTHDR_OFFSET={0x8, 0x3, 0x1, 0x0, 0x1}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x7c}}, 0x0) socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0xb00000000000000, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x3}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x64, 0x9, 0xa, 0x401, 0x0, 0x0, {0x3}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x23}, @NFTA_SET_EXPR={0x28, 0x11, 0x0, 0x1, @connlimit={{0xe}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_COUNT={0x8}, @NFTA_CONNLIMIT_FLAGS={0x8}]}}}]}], {0x14, 0x10}}, 0xac}}, 0x4) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$netlink(r3, 0x0, 0x40) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x16) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x58, &(0x7f0000000200)}, 0x10) r4 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r4, 0x1, 0x7, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f0000000180)={0x0, 0x0}) socket$kcm(0x2, 0x1, 0x84) socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000002dc0)={&(0x7f0000001640)=@l2tp6={0xa, 0x0, 0x7fff, @local, 0x9, 0x1}, 0x80, &(0x7f0000000340)=[{&(0x7f00000003c0)='`', 0x37}], 0x1}, 0x41) 1.698061224s ago: executing program 2 (id=67): r0 = socket$kcm(0x10, 0x3, 0x10) socket$kcm(0x10, 0x3, 0x10) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x221, 0x0, 0x0, 0x8, 0x3fe, 0x7ffeffff, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) recvmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffc9}, 0x40000100) r3 = socket$kcm(0xa, 0x3, 0x73) sendmsg$inet(r3, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001080)=[{0x0}, {&(0x7f0000001040)="9d7fcf3efc63f4a6a555ba8b4726d7ccaf8a207100e69cfac4377876021d7131b838029f96bd206d4776368ed2a92432e5af71", 0x33}], 0x2, &(0x7f00000010c0)=[@ip_tos_int={{0x14, 0x29, 0x3e}}, @ip_tos_u8={{0x11, 0x29, 0x43}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @remote}}}], 0x50}, 0x9fc) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x2, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x12, &(0x7f0000000500)=r4, 0x4) r5 = bpf$ITER_CREATE(0xb, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xbd, &(0x7f000000cf3d)=""/189, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) close(r6) r7 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r7, 0x0, 0x20008000) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001300)=ANY=[@ANYBLOB="0f000000040000000400000012000000000000007ddaf344d203e738714540349aa17d39e783727c0f6f3dd355311b5731500a7de03c2de260b559f89c255e02bef8eef05a0089725ecebde05a257a6a60fa5d2c1623eee2f1b733da7ac043c95d3dd61e5620fd6d884e908ba67352d4f0ea695f7a3763d68fafb95bbea2b28b41f86eb8", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/25], 0x48) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r8}, 0x0, &(0x7f0000000080)=r6}, 0x20) recvmsg$kcm(r7, &(0x7f00000009c0)={0x0, 0x0, 0x0}, 0x40007600) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r9 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$sock_attach_bpf(r9, 0x84, 0x64, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFT_MSG_GETOBJ(r5, &(0x7f00000012c0)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x1c094}, 0x4040805) r10 = socket$kcm(0x1e, 0x2, 0x0) sendmsg(r10, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x40000040) 1.516637731s ago: executing program 0 (id=68): r0 = socket$kcm(0x2, 0x200000000000001, 0x106) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1d00000009000000040000000900000000000200", @ANYRES32, @ANYBLOB="06000000000000000000000000010054b1db3ef30000000000b204b1d34e28245bb6f591a5875aa83991e590dbedbdb19fb5", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="010000000300"/28], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="12000000030000000800000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000280), &(0x7f0000000040)=r2}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r3}, &(0x7f0000001d80), &(0x7f0000001d40)=r1}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c40)={0xffffffffffffffff, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0xb, &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x43, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000a80), &(0x7f0000000ac0), 0x8, 0x77, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x66, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r4, &(0x7f0000000600)={&(0x7f00000002c0)={0x2, 0x4e24, @rand_addr=0x64010100}, 0x10, &(0x7f0000000740)=[{0x0}, {&(0x7f0000000480)="2d4624e18a8dc16a6e119d96f1ba18968af9fd86262abc151f6989706cc93a734d6cd48cd81b1f24af7f6784b68309d7dc777c53e28e", 0x36}], 0x2}, 0x200000fd) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000700)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) getpid() r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="12000000280000000400"], 0x48) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000000)='/proc/sys/net/\x00\x00v4\x00\x00s/\x92ync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd1l,'}, 0x30) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000000c0)="6880a642beaf34317f0dd3122a90ad0d2b", 0x11}], 0x1}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x4) recvmsg(r7, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=""/15, 0xf}, 0x0) sendmsg$inet(r7, &(0x7f0000000540)={0x0, 0xc027, &(0x7f0000000340)=[{&(0x7f00000000c0)="97eb000014006bcd9e", 0xeb97}], 0x1, 0x0, 0x0, 0x1f000000}, 0x600) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r5, 0x0, 0x0}, 0x20) sendmsg$inet(r0, &(0x7f00000017c0)={0x0, 0x0, 0x0}, 0x20004000) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4005, @empty}, 0x10, 0x0}, 0x34004093) 1.51418668s ago: executing program 3 (id=69): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000002d00)={0x28, 0x0, 0x2, 0x5, 0x0, 0x0, {0xa, 0x0, 0xfffe}, [@CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x1}, @CTA_EXPECT_MASTER={0x4}, @CTA_EXPECT_TUPLE={0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x803}, 0x4044) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x5, 0xb, 0x8000, 0x4}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="020000000400000008000000010000008000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000510700140000000000000001b7080000000000007b8af8ff00000000b7080000fcffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x0, 0x0, 0x0, 0x7, 0x39b8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r1, &(0x7f0000000600), &(0x7f0000000080)=""/61}, 0x20) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0x0, 0x0, 0xa, 0x801, 0x0, 0x0, {0x2}, [@NFTA_TABLE_HANDLE={0x0, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_HANDLE={0x0, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_NAME={0x0, 0x1, 'syz1\x00'}, @NFTA_TABLE_USERDATA={0x0, 0x6, "00c12fd7ee4714e3c8118fae"}, @NFTA_TABLE_USERDATA={0x0, 0x6, "c1c70a6e603ab6fa78d2059f251cfe4cccf79fba26c260e02a965560418a2b3569fe08d03092fb82537aa8740b0a49885894d669154bf6449bf02f557907cce21a666228b91374f7e294bb3eb4f9555b9f"}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x7}}}, 0x78}, 0x1, 0x0, 0x0, 0x20040841}, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf1, 0xf1, 0x4, [@type_tag={0x4, 0x0, 0x0, 0x12, 0x3}, @enum64={0x5, 0x2, 0x0, 0x13, 0x1, 0x0, [{0xf, 0x1ff, 0x2}, {0x9, 0x8, 0x6}]}, @enum64={0xd}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x3, 0x2}}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @datasec={0xe, 0x2, 0x0, 0xf, 0x1, [{0x3, 0xbf27, 0x9}, {0x3, 0xbb, 0x3}], '7'}, @type_tag={0x8, 0x0, 0x0, 0x12, 0x1}, @enum64={0xd, 0x6, 0x0, 0x13, 0x1, 0x8, [{0xf}, {0xe, 0x0, 0x2}, {0xf, 0x2, 0x2}, {0xb, 0xfffffff6, 0x5d6}, {0x7, 0x3, 0x81}, {0xf, 0x2, 0xfffffff3}]}, @restrict={0x6, 0x0, 0x0, 0xb, 0x3}]}, {0x0, [0x61, 0x30]}}, &(0x7f0000000680)=""/92, 0x110, 0x5c, 0x1, 0xb}, 0x28) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000900)=@newtaction={0x78, 0x30, 0xb, 0x5, 0x0, {}, [{0x64, 0x1, [@m_ct={0x60, 0x1, 0x0, 0x0, {{0x7}, {0x38, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x80000001, 0x0, 0x4, 0x0, 0x400}}, @TCA_CT_ACTION={0x19, 0x3, 0x19}, @TCA_CT_LABELS={0x14, 0x7, "e142a1dc6b3a3dd0aaeb9317676b63d2"}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc}}}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8890}, 0x40) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='cgroup.events\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x8, 0x15, &(0x7f00000003c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, {}, {}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0xa1}, @exit, @call={0x85, 0x0, 0x0, 0x23}, @call={0x85, 0x0, 0x0, 0x78}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000002c0)='GPL\x00', 0x10000, 0x83, &(0x7f0000000480)=""/131, 0x40e00, 0x24, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000900)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000740)={0x2, 0x10, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[r6], &(0x7f0000000800)=[{0x3, 0x2, 0xf, 0xc}], 0x10, 0xfff}, 0x94) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x58, 0x2, 0x3, 0x201, 0x0, 0x0, {0x0, 0x0, 0x2}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1, 0x0, 0x8d59753d175166d2}}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x10}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFQA_CFG_CMD={0x8, 0x1, {0x1, 0x0, 0x25}}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x1}, @NFQA_CFG_CMD={0x8, 0x1, {0x1, 0x0, 0x27}}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0xffffffc0}, @NFQA_CFG_PARAMS={0x1, 0x2, {0x38, 0x2}}]}, 0x58}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r7 = socket$kcm(0x10, 0x2, 0x4) close(r7) socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r7, &(0x7f0000000040)={0x0, 0xa00, &(0x7f00000001c0)=[{&(0x7f0000000100)="5c0000001e006bcd9e3fe3dc6e08000007000000010000007ea60864160af36504005425198bc3488bc3a0e69ee517d34460bc24eab556a705251e6182949a3651f668c3664402682fb6e27bbfa83b5cae0300c9f4d1938037e786a6", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) sendmsg$IPSET_CMD_GET_BYNAME(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, 0xe, 0x6, 0x101, 0x0, 0x0, {0x3, 0x0, 0x8}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x8000) 1.348730012s ago: executing program 1 (id=70): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x30, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2, 0x0, 0x9}, [@NFTA_RULE_EXPRESSIONS={0x4}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x58}}, 0x0) socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0xb00000000000000, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWSET={0x64, 0x9, 0xa, 0x401, 0x0, 0x0, {0x3}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x23}, @NFTA_SET_EXPR={0x28, 0x11, 0x0, 0x1, @connlimit={{0xe}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_COUNT={0x8}, @NFTA_CONNLIMIT_FLAGS={0x8}]}}}]}], {0x14, 0x10}}, 0x8c}}, 0x4) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$netlink(r3, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44040}, 0x40) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x16) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x58, &(0x7f0000000200)}, 0x10) r4 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r4, 0x1, 0x7, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f0000000180)={0x0, 0x0}) socket$kcm(0x2, 0x1, 0x84) socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000002dc0)={&(0x7f0000001640)=@l2tp6={0xa, 0x0, 0x7fff, @local, 0x9, 0x1}, 0x80, &(0x7f0000000340)=[{&(0x7f00000003c0)='`', 0x37}], 0x1}, 0x41) 876.621062ms ago: executing program 0 (id=71): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$TUNDETACHFILTER(r0, 0x8903, 0x1000000000000) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x1, 0xffffffffffffffff, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x8, [@typedef={0x6, 0x0, 0x0, 0x8, 0x3}, @float={0x1, 0x0, 0x0, 0x10, 0x10}, @type_tag={0x2, 0x0, 0x0, 0x12, 0x4}, @float={0x3, 0x0, 0x0, 0x10, 0x2}]}, {0x0, [0x2e, 0x30, 0x2e, 0x0, 0x30, 0x5f]}}, &(0x7f0000000300)=""/215, 0x50, 0xd7, 0x1, 0x8001}, 0x28) socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000bf000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) r3 = socket$kcm(0x2c, 0x3, 0x0) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x20000011}, 0x2000e8a1) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x4008000) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB], 0x7c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x4000800) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000ec0)="d80000001d0081044e81f782db44b904021d080500000000040000a1180002000000000000000e1208000f0100810401a8001600060001400300000803600cfab94dcf5c0461c16f94007134cf6ee08000a0e408e8d8ef075c11503c6baace801bcb090000001fb791643a5ee4001b146218a07445", 0x75}, {&(0x7f00000006c0)="54f6d4d87eb3f1c0c5", 0x9}, {&(0x7f0000000080)}], 0x3, 0x0, 0x0, 0x7400}, 0xd0) sendmsg$kcm(r5, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000380)="d800000010008104687da3aa7143a0b8c81d080b25000000e8fe55a19c9d8714060014000000001208000a0043000040a80016000400014006000d00036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a9d7c7c0b7a196e6f661", 0x64}, {&(0x7f0000000140)="aa581ff83dac4a519b67538bfa897e210c31e1446808358248cf2d795634b12c4ce81c3876aff89235b78ea0e5c5badfa122797d62c09ada7441b4f31cd5e6fc4b2a325fb5e811fead55530751e6f4bc4b40d94743ed5bd8ec1fff7b0abcc6eaabeb7a2f5f985467a8db7dda907aad81e83049f6", 0x74}], 0x2}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB], &(0x7f0000000040)='syzkaller\x00', 0x3, 0xee, &(0x7f00000003c0)=""/238, 0x0, 0x8}, 0x94) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x602000, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8924, 0xfffffffffffffffc) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x45, '\x00', 0x0, @fallback=0x22}, 0x94) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)={0x38, 0x9, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x10, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x10040047}, 0x240008c4) 871.45265ms ago: executing program 1 (id=72): r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWRULE={0x54, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2, 0x0, 0x9}, [@NFTA_RULE_EXPRESSIONS={0x28, 0x4, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_OP={0x8, 0x6, 0x1, 0x0, 0x1}, @NFTA_EXTHDR_OFFSET={0x8, 0x3, 0x1, 0x0, 0x1}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x7c}}, 0x0) socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0xb00000000000000, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x3}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x5c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x3}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_EXPR={0x28, 0x11, 0x0, 0x1, @connlimit={{0xe}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_COUNT={0x8}, @NFTA_CONNLIMIT_FLAGS={0x8}]}}}]}], {0x14, 0x10}}, 0xa4}}, 0x4) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$netlink(r3, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44040}, 0x40) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x16) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x58, &(0x7f0000000200)}, 0x10) r4 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r4, 0x1, 0x7, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f0000000180)={0x0, 0x0}) socket$kcm(0x2, 0x1, 0x84) socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000002dc0)={&(0x7f0000001640)=@l2tp6={0xa, 0x0, 0x7fff, @local, 0x9, 0x1}, 0x80, &(0x7f0000000340)=[{&(0x7f00000003c0)='`', 0x37}], 0x1}, 0x41) 355.728416ms ago: executing program 3 (id=73): socket$kcm(0x10, 0x2, 0x0) socket$kcm(0xa, 0x1, 0x106) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext={0x1, 0x1944}, 0x14440, 0x5bc, 0x0, 0x8, 0x3, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) recvmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x10000) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x9}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0x6, 0x8, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x800) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) r4 = socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x8, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x14, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000040)=r5, 0x4) sendmsg$nl_generic(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000002280)={0x14, 0x803d, 0x107, 0x8000, 0x8, {0x3, 0x7c}}, 0x14}, 0x1, 0x0, 0x0, 0x4091}, 0xc000) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r6, 0x0, 0x4000084) socket$kcm(0x10, 0x2, 0x4) 354.001336ms ago: executing program 2 (id=74): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) r0 = socket$kcm(0xa, 0x1, 0x106) sendmsg$sock(r0, &(0x7f0000000400)={&(0x7f0000000180)=@l2tp6={0xa, 0x0, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x6}, 0x80, 0x0}, 0x2004c040) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000080)=@l2tp6={0xa, 0x50, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x400000, 0x4}, 0x80, 0x0}, 0x20040010) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_ro(r1, &(0x7f0000000640)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x0, 0x3, 0x0, 0x4, 0x82, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x0, @perf_config_ext={0x3, 0x8001}, 0x0, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0xa4706, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x320, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r3 = socket$kcm(0x2, 0x200000000000001, 0x106) setsockopt$sock_attach_bpf(r3, 0x6, 0x9, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r2, &(0x7f0000000040)={&(0x7f0000000280)=@caif=@dgm={0x25, 0x9, 0x9}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000580)="62042700590200000000002f1eafbcf706e12b30087f5c582d26116642c47a5f8786ee601e65ab3c06d4b8bf4a81cb3e247345af215542f41ddf82f618438a34f90186cee8441e2305e495d04ad68ab8fef69df82de6456fbb48b63f60c9c9097be968ea872c4801e5d0711b4373c7224ed7a9cbd49d40f82bdb6afc0036824be26fc96e49a70e90797e6caa1b38ddacb3cb2b3eac7c068a185b644582f25edfa3d6a46e2a894ca809a422a6a29bd7145bb6e7992570484d6a710292ea0c3f97b7cbff701684b13c5593262534", 0xcd}, {&(0x7f0000000840)="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", 0x1c9}, {&(0x7f00000003c0)="0a985d7879f1bbff16c7d66e33657e452299fd0ef8c2afda588eb05891b7da030e01452a7986bea19b59c98dc2996c0ea09604d00ea48336d0c813d83025aca8623a5915ddddce2c11c5e374f2e0f387d2398fe0b899ff60dc7a73addcf253cf32aafbe2b9f90799e7fc583bdd9b564697ba988080270bdcea4714219a2d4c4b985418cc8fbcd2935f4e8b229fffb0d86fb286e3553a8b3ac02badc66ada5fceabe5f63c79da96e641a45901128063d6e1e31b11", 0xb4}], 0x3}, 0x8001) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x200, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETSTEERINGEBPF(r5, 0x800454e0, &(0x7f0000000080)=r4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000005a00)={0x0, 0x0, 0x0, 0x0, 0x1, 0x2}, 0x28) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./cgroup.net/syz0\x00', 0x1ff) setsockopt$sock_attach_bpf(r7, 0x1, 0x4c, &(0x7f0000000000), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)=@xdp={0x2c, 0x0, 0x0, 0x1c}, 0x80, &(0x7f0000000140)}, 0x220c60c0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1d, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005100000018010000756c6c2500000000002020207b"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lsm=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) sendmsg$inet(r6, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r7, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x2000) recvmsg$unix(r6, &(0x7f00000002c0)={&(0x7f0000000200), 0x6e, &(0x7f0000000280)=[{0x0}, {&(0x7f0000002980)=""/4096, 0x1000}], 0x2, &(0x7f0000000440)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xf8}, 0x102) 206.671986ms ago: executing program 0 (id=75): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000009e00)={0x0, 0x0, &(0x7f0000009dc0)={&(0x7f0000009a00)={0x14, 0x36, 0x201, 0x70bd27, 0x25dfdbff, {0x12}}, 0x14}, 0x1, 0x0, 0x0, 0x40001}, 0x40040) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000195"], 0x0}, 0x94) r1 = socket$kcm(0xa, 0x1, 0x106) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000100)=ANY=[], &(0x7f00000000c0)='syzkaller\x00'}, 0x90) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509", 0x4e}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000004140)=[{&(0x7f0000000240)=""/209, 0xd1}], 0x1}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$kcm(r1, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @dev, 0x2}, 0xff3c, 0x0}, 0xe07e872420dfefca) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="1400000023000b6c8cfffdfccabb00f90429fc60", 0x14}], 0x1}, 0x2400c000) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2001) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x400000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef3}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x24}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="c0260000410007010000000007000000017c00000400fc80a72601"], 0x26c0}}, 0x4010) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000004a40)=ANY=[@ANYBLOB="c0260000410007010000000007000000027c00000400fc80a72601"], 0x26c0}}, 0x4010) 0s ago: executing program 1 (id=76): perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x89153, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x7, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r0, @ANYBLOB="0600"/18, @ANYRES32, @ANYRES32, @ANYBLOB="02e9ffff0300c9fd0400e7993817aabe07d3184433fd8700000054e2ff97947beeb8d568f83dbe0c79"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000096c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newtaction={0x48, 0x30, 0x20, 0x0, 0xfffffff9, {}, [{0xffffffffffffff62, 0x1, [@m_vlan={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}]}]}, 0xfffffffffffffffe}, 0x1, 0x0, 0x0, 0x8000}, 0x3578c47989c799a3) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0xc, &(0x7f0000000580)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x401}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40}, 0x94) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000580)="d8000000140081054e81f782db44b904021d080225000000040000a118000200fcffffff00000e1208000f0100810401a80016ea1f0006", 0x37}], 0x1, 0x0, 0x0, 0x7400}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000580)=ANY=[], 0xfe33) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, 0x0, 0x0}, 0x94) socket$kcm(0x2, 0x5, 0x84) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x50) r4 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r4, 0x0, 0x490, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x16, 0x17, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x20}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@p, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x4, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}, {0x14}}], {{0x5, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x88}}}, &(0x7f0000000140)='GPL\x00', 0x9, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0xb, &(0x7f0000000280)=@framed={{0x62, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0xb3}, [@printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xa}}]}, &(0x7f0000000480)='GPL\x00'}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000a40)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="040000000400000000000000", @ANYRES32, @ANYBLOB="ea6aa779ac41f0bc1fc40f8cba08c6025a3d8387632b1c367d62eb281f6720ec608c7d04a9cbdc39ce6138cb1fb6951be6a4dceca3e278b20698246d4ab4a2f1b10c9b866ccaa9fcf5c13910b89fda130c6ddcd645c296084264f04e3819624aa907b59995d755b729d2de3c6b6db860f87c79a146006e14b0e3bd240d007c52ce1ef6d5b96c48a7a7a53d686115825afb958ffe85605888a61a2d882363e05349a766d1", @ANYRES64=0x0], 0x20) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x24, 0x1402, 0x10, 0x70bd2a, 0x25dfdbfc, "", [@RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r0}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x24000804) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.132' (ED25519) to the list of known hosts. [ 69.137967][ T5851] cgroup: Unknown subsys name 'net' [ 69.278415][ T5851] cgroup: Unknown subsys name 'cpuset' [ 69.288036][ T5851] cgroup: Unknown subsys name 'rlimit' Setting up swapspace version 1, size = 127995904 bytes [ 70.681849][ T5851] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 71.388164][ T1303] ieee802154 phy0 wpan0: encryption failed: -22 [ 71.394538][ T1303] ieee802154 phy1 wpan1: encryption failed: -22 [ 74.551436][ T5870] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 74.572485][ T5880] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 74.583657][ T5881] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 74.586536][ T5871] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 74.592186][ T5881] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 74.598796][ T5871] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 74.606857][ T5881] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 74.613355][ T5871] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 74.626924][ T5881] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 74.628280][ T5871] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 74.634493][ T5881] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 74.642052][ T5871] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 74.649765][ T5881] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 74.657726][ T5871] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 74.663819][ T5881] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 74.671250][ T5871] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 74.683971][ T5871] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 74.692873][ T5881] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 74.707456][ T5871] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 74.707567][ T5881] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 74.743966][ T5880] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 74.754091][ T5880] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 74.754106][ T5877] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 74.779638][ T5881] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 74.787361][ T5881] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 75.313812][ T5862] chnl_net:caif_netlink_parms(): no params data found [ 75.411910][ T5865] chnl_net:caif_netlink_parms(): no params data found [ 75.546648][ T5875] chnl_net:caif_netlink_parms(): no params data found [ 75.638983][ T5862] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.646332][ T5862] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.653720][ T5862] bridge_slave_0: entered allmulticast mode [ 75.662426][ T5862] bridge_slave_0: entered promiscuous mode [ 75.670511][ T5861] chnl_net:caif_netlink_parms(): no params data found [ 75.722269][ T5862] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.729496][ T5862] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.737998][ T5862] bridge_slave_1: entered allmulticast mode [ 75.745439][ T5862] bridge_slave_1: entered promiscuous mode [ 75.758692][ T5872] chnl_net:caif_netlink_parms(): no params data found [ 75.780551][ T5865] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.787824][ T5865] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.795237][ T5865] bridge_slave_0: entered allmulticast mode [ 75.802154][ T5865] bridge_slave_0: entered promiscuous mode [ 75.850832][ T5865] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.858285][ T5865] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.865827][ T5865] bridge_slave_1: entered allmulticast mode [ 75.873409][ T5865] bridge_slave_1: entered promiscuous mode [ 75.913664][ T5862] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.971787][ T5875] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.979767][ T5875] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.987834][ T5875] bridge_slave_0: entered allmulticast mode [ 75.994915][ T5875] bridge_slave_0: entered promiscuous mode [ 76.010444][ T5862] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.035260][ T5865] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.044979][ T5875] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.052219][ T5875] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.059616][ T5875] bridge_slave_1: entered allmulticast mode [ 76.068280][ T5875] bridge_slave_1: entered promiscuous mode [ 76.107612][ T5865] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.147033][ T5862] team0: Port device team_slave_0 added [ 76.209420][ T5862] team0: Port device team_slave_1 added [ 76.221566][ T5865] team0: Port device team_slave_0 added [ 76.229955][ T5865] team0: Port device team_slave_1 added [ 76.243962][ T5875] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.253385][ T5861] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.260986][ T5861] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.268909][ T5861] bridge_slave_0: entered allmulticast mode [ 76.275914][ T5861] bridge_slave_0: entered promiscuous mode [ 76.328083][ T5875] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.337781][ T5861] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.345000][ T5861] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.352148][ T5861] bridge_slave_1: entered allmulticast mode [ 76.360704][ T5861] bridge_slave_1: entered promiscuous mode [ 76.368102][ T5862] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 76.375900][ T5862] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 76.401934][ T5862] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 76.415234][ T5862] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 76.422183][ T5862] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 76.448130][ T5862] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 76.528459][ T5872] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.537401][ T5872] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.544618][ T5872] bridge_slave_0: entered allmulticast mode [ 76.556187][ T5872] bridge_slave_0: entered promiscuous mode [ 76.564003][ T5865] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 76.572006][ T5865] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 76.598589][ T5865] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 76.633892][ T5872] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.641704][ T5872] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.649139][ T5872] bridge_slave_1: entered allmulticast mode [ 76.656055][ T5872] bridge_slave_1: entered promiscuous mode [ 76.663150][ T5865] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 76.670423][ T5865] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 76.696523][ T5865] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 76.709142][ T5875] team0: Port device team_slave_0 added [ 76.717665][ T5861] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.730149][ T5861] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.745585][ T5870] Bluetooth: hci1: command tx timeout [ 76.811635][ T5875] team0: Port device team_slave_1 added [ 76.828569][ T5881] Bluetooth: hci0: command tx timeout [ 76.830975][ T5870] Bluetooth: hci2: command tx timeout [ 76.834736][ T5880] Bluetooth: hci4: command tx timeout [ 76.848794][ T5861] team0: Port device team_slave_0 added [ 76.860873][ T5862] hsr_slave_0: entered promiscuous mode [ 76.868398][ T5862] hsr_slave_1: entered promiscuous mode [ 76.894151][ T5872] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.908468][ T5880] Bluetooth: hci3: command tx timeout [ 76.918831][ T5861] team0: Port device team_slave_1 added [ 76.963661][ T5872] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.984618][ T5875] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 76.991997][ T5875] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 77.018929][ T5875] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 77.057876][ T5865] hsr_slave_0: entered promiscuous mode [ 77.064136][ T5865] hsr_slave_1: entered promiscuous mode [ 77.070367][ T5865] debugfs: 'hsr0' already exists in 'hsr' [ 77.076375][ T5865] Cannot create hsr debugfs directory [ 77.108599][ T5861] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 77.115673][ T5861] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 77.141850][ T5861] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 77.154044][ T5875] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 77.161351][ T5875] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 77.187338][ T5875] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 77.229690][ T5861] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 77.236909][ T5861] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 77.263033][ T5861] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 77.293107][ T5872] team0: Port device team_slave_0 added [ 77.336790][ T5872] team0: Port device team_slave_1 added [ 77.441112][ T5861] hsr_slave_0: entered promiscuous mode [ 77.447487][ T5861] hsr_slave_1: entered promiscuous mode [ 77.453500][ T5861] debugfs: 'hsr0' already exists in 'hsr' [ 77.459818][ T5861] Cannot create hsr debugfs directory [ 77.507156][ T5875] hsr_slave_0: entered promiscuous mode [ 77.513654][ T5875] hsr_slave_1: entered promiscuous mode [ 77.520153][ T5875] debugfs: 'hsr0' already exists in 'hsr' [ 77.526117][ T5875] Cannot create hsr debugfs directory [ 77.570856][ T5872] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 77.578111][ T5872] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 77.604432][ T5872] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 77.616773][ T5872] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 77.623720][ T5872] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 77.649702][ T5872] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 77.844057][ T5872] hsr_slave_0: entered promiscuous mode [ 77.850846][ T5872] hsr_slave_1: entered promiscuous mode [ 77.857595][ T5872] debugfs: 'hsr0' already exists in 'hsr' [ 77.863321][ T5872] Cannot create hsr debugfs directory [ 78.031534][ T5862] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 78.066538][ T5862] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 78.090365][ T5862] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 78.119340][ T5862] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 78.200227][ T5865] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 78.210996][ T5865] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 78.240175][ T5865] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 78.264213][ T5865] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 78.319993][ T5875] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 78.331089][ T5875] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 78.355744][ T5875] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 78.387729][ T5875] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 78.490921][ T5861] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 78.502421][ T5861] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 78.542945][ T5861] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 78.566137][ T5861] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 78.639089][ T5865] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.656812][ T5872] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 78.668043][ T5872] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 78.695978][ T5872] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 78.708982][ T5872] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 78.724661][ T5862] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.770901][ T5865] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.790237][ T4327] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.797561][ T4327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.826469][ T5880] Bluetooth: hci1: command tx timeout [ 78.848258][ T5862] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.871098][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.878281][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.904700][ T36] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.911840][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.915059][ T5880] Bluetooth: hci4: command tx timeout [ 78.920215][ T5881] Bluetooth: hci0: command tx timeout [ 78.924410][ T5880] Bluetooth: hci2: command tx timeout [ 78.941407][ T5875] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.957220][ T78] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.964355][ T78] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.996412][ T5880] Bluetooth: hci3: command tx timeout [ 79.003613][ T5875] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.035910][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.043484][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.089862][ T1318] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.097033][ T1318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.137936][ T5861] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.232324][ T5872] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.258457][ T5861] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.297926][ T4327] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.305116][ T4327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.322930][ T4327] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.330137][ T4327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.383620][ T5875] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 79.446119][ T5872] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.517497][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.524660][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.589124][ T36] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.596357][ T36] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.646501][ T5865] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 79.698100][ T5862] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 79.870152][ T5875] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 79.919172][ T5862] veth0_vlan: entered promiscuous mode [ 79.956526][ T5865] veth0_vlan: entered promiscuous mode [ 79.993683][ T5862] veth1_vlan: entered promiscuous mode [ 80.017069][ T5865] veth1_vlan: entered promiscuous mode [ 80.033939][ T5875] veth0_vlan: entered promiscuous mode [ 80.071863][ T5861] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 80.082567][ T5875] veth1_vlan: entered promiscuous mode [ 80.152292][ T5862] veth0_macvtap: entered promiscuous mode [ 80.166896][ T5862] veth1_macvtap: entered promiscuous mode [ 80.209183][ T5865] veth0_macvtap: entered promiscuous mode [ 80.232428][ T5862] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 80.248146][ T5865] veth1_macvtap: entered promiscuous mode [ 80.263573][ T5862] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 80.278786][ T5872] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 80.291983][ T5875] veth0_macvtap: entered promiscuous mode [ 80.312390][ T5861] veth0_vlan: entered promiscuous mode [ 80.347052][ T5875] veth1_macvtap: entered promiscuous mode [ 80.359646][ T78] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.388072][ T5865] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 80.412171][ T5861] veth1_vlan: entered promiscuous mode [ 80.433204][ T78] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.466121][ T5865] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 80.492089][ T78] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.518391][ T5875] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 80.530005][ T78] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.561330][ T78] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.572455][ T78] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.584413][ T5875] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 80.604244][ T78] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.615374][ T78] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.638307][ T12] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.658341][ T12] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.673374][ T12] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.711690][ T12] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.724223][ T5861] veth0_macvtap: entered promiscuous mode [ 80.752028][ T1006] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 80.763964][ T5861] veth1_macvtap: entered promiscuous mode [ 80.766232][ T1006] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 80.849840][ T5861] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 80.877590][ T5872] veth0_vlan: entered promiscuous mode [ 80.891008][ T5861] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 80.899468][ T1318] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 80.908109][ T5880] Bluetooth: hci1: command tx timeout [ 80.920590][ T1318] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 80.942723][ T78] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 80.956838][ T78] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 80.980914][ T1318] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.990665][ T5880] Bluetooth: hci0: command tx timeout [ 80.990706][ T5880] Bluetooth: hci4: command tx timeout [ 80.995241][ T5880] Bluetooth: hci2: command tx timeout [ 81.008812][ T1318] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.017672][ T1318] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.049337][ T1318] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.064203][ T5872] veth1_vlan: entered promiscuous mode [ 81.064580][ T5862] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 81.079309][ T5880] Bluetooth: hci3: command tx timeout [ 81.131996][ T1318] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 81.152302][ T1318] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 81.183893][ T49] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 81.200685][ T49] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 81.287064][ T49] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 81.297961][ T49] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 81.377702][ T5872] veth0_macvtap: entered promiscuous mode [ 81.392509][ T12] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 81.414319][ T12] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 81.441015][ T5872] veth1_macvtap: entered promiscuous mode [ 81.457781][ T49] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 81.471420][ T49] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 81.478085][ T5872] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 81.530321][ T5872] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 81.696382][ T49] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.723610][ T49] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.754799][ C1] hrtimer: interrupt took 55604 ns [ 81.762641][ T49] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.765097][ T5991] netlink: 'syz.3.6': attribute type 4 has an invalid length. [ 81.866612][ T5991] netlink: 'syz.3.6': attribute type 4 has an invalid length. [ 81.892082][ T49] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.928629][ T5991] netlink: 199756 bytes leftover after parsing attributes in process `syz.3.6'. [ 82.016258][ T5996] warning: `syz.2.7' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211 [ 82.155946][ T49] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 82.206173][ T49] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 82.290015][ T6001] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 82.644031][ T12] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 82.675483][ T12] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 82.714262][ T6011] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 82.952018][ T6014] ======================================================= [ 82.952018][ T6014] WARNING: The mand mount option has been deprecated and [ 82.952018][ T6014] and is ignored by this kernel. Remove the mand [ 82.952018][ T6014] option from the mount to silence this warning. [ 82.952018][ T6014] ======================================================= [ 83.052456][ T5880] Bluetooth: hci1: command tx timeout [ 83.073756][ T5880] Bluetooth: hci2: command tx timeout [ 83.079877][ T5881] Bluetooth: hci4: command tx timeout [ 83.085442][ T5870] Bluetooth: hci0: command tx timeout [ 83.145103][ T5880] Bluetooth: hci3: command tx timeout [ 83.622958][ T6025] netlink: 'syz.0.14': attribute type 2 has an invalid length. [ 83.666625][ T6025] netlink: 'syz.0.14': attribute type 8 has an invalid length. [ 83.700570][ T6025] netlink: 132 bytes leftover after parsing attributes in process `syz.0.14'. [ 83.838230][ T6030] netlink: 'syz.1.15': attribute type 2 has an invalid length. [ 83.866806][ T6033] netlink: 16 bytes leftover after parsing attributes in process `syz.2.16'. [ 83.897205][ T6033] netlink: 356 bytes leftover after parsing attributes in process `syz.2.16'. [ 83.971137][ T6030] netlink: 137592 bytes leftover after parsing attributes in process `syz.1.15'. [ 84.324200][ T6044] Zero length message leads to an empty skb [ 84.381772][ T6044] sctp: [Deprecated]: syz.2.18 (pid 6044) Use of struct sctp_assoc_value in delayed_ack socket option. [ 84.381772][ T6044] Use struct sctp_sack_info instead [ 84.769209][ T6050] netlink: 104 bytes leftover after parsing attributes in process `syz.1.19'. [ 84.812788][ T6050] syz.1.19 uses obsolete (PF_INET,SOCK_PACKET) [ 86.228807][ T6067] netlink: del zone limit has 4 unknown bytes [ 86.592592][ T6065] netlink: 4 bytes leftover after parsing attributes in process `syz.3.23'. [ 86.759782][ T10] cfg80211: failed to load regulatory.db [ 86.779603][ T6063] netlink: 128 bytes leftover after parsing attributes in process `syz.1.22'. [ 86.788631][ T6063] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 87.420812][ T6087] netlink: 12 bytes leftover after parsing attributes in process `syz.0.28'. [ 87.432023][ T6080] netlink: 56 bytes leftover after parsing attributes in process `syz.0.28'. [ 87.456330][ T6084] netlink: 180 bytes leftover after parsing attributes in process `syz.4.30'. [ 87.476243][ T6084] netlink: 12 bytes leftover after parsing attributes in process `syz.4.30'. [ 88.086908][ T6097] cgroup: Unknown subsys name '0x0000000000000000' [ 88.699830][ T5880] Bluetooth: hci2: Unable to find connection for big 0x00 [ 89.547733][ T6110] syz.2.35 (6110) used greatest stack depth: 16728 bytes left [ 89.598478][ T6122] netlink: 'syz.1.39': attribute type 2 has an invalid length. [ 89.666249][ T6122] netlink: 'syz.1.39': attribute type 8 has an invalid length. [ 89.713431][ T6122] netlink: 132 bytes leftover after parsing attributes in process `syz.1.39'. [ 90.555846][ T6136] netlink: 180 bytes leftover after parsing attributes in process `syz.2.44'. [ 90.602350][ T6136] netlink: 12 bytes leftover after parsing attributes in process `syz.2.44'. [ 90.903598][ T6144] netlink: 180 bytes leftover after parsing attributes in process `syz.3.47'. [ 90.950199][ T6144] netlink: 12 bytes leftover after parsing attributes in process `syz.3.47'. [ 92.276782][ T6156] Driver unsupported XDP return value 0 on prog (id 39) dev N/A, expect packet loss! [ 92.332488][ T6156] netlink: 'syz.2.52': attribute type 10 has an invalid length. [ 92.356012][ T6156] netlink: 40 bytes leftover after parsing attributes in process `syz.2.52'. [ 92.373829][ T6156] batadv0: entered promiscuous mode [ 92.395375][ T6156] batadv0: entered allmulticast mode [ 92.429029][ T6156] bridge0: port 3(batadv0) entered blocking state [ 92.458586][ T6156] bridge0: port 3(batadv0) entered disabled state [ 92.572840][ T6156] bridge0: port 3(batadv0) entered blocking state [ 92.580177][ T6156] bridge0: port 3(batadv0) entered forwarding state [ 92.939628][ T4327] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 92.949707][ T4327] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 93.050344][ T6173] netlink: zone id is out of range [ 93.057557][ T6173] netlink: zone id is out of range [ 93.062716][ T6173] netlink: zone id is out of range [ 93.073777][ T6173] netlink: zone id is out of range [ 93.081435][ T6173] netlink: zone id is out of range [ 93.091125][ T6173] netlink: zone id is out of range [ 93.098855][ T6173] netlink: zone id is out of range [ 93.112227][ T6173] netlink: zone id is out of range [ 93.124346][ T6173] netlink: zone id is out of range [ 93.137197][ T6175] netlink: del zone limit has 4 unknown bytes [ 93.439420][ T6177] netlink: 'syz.0.59': attribute type 2 has an invalid length. [ 93.448116][ T6177] netlink: 199836 bytes leftover after parsing attributes in process `syz.0.59'. [ 93.458975][ T6177] nbd: must specify at least one socket [ 93.717854][ T6184] netlink: 180 bytes leftover after parsing attributes in process `syz.0.61'. [ 93.766318][ T6184] netlink: 12 bytes leftover after parsing attributes in process `syz.0.61'. [ 93.805450][ T6188] netlink: 180 bytes leftover after parsing attributes in process `syz.2.63'. [ 93.947637][ T6191] netlink: 64 bytes leftover after parsing attributes in process `syz.2.64'. [ 93.995931][ T6191] sock: sock_timestamping_bind_phc: sock not bind to device [ 94.186190][ T6193] netlink: 'syz.1.65': attribute type 10 has an invalid length. [ 94.204435][ T6193] netlink: 2 bytes leftover after parsing attributes in process `syz.1.65'. [ 94.225020][ T6193] bond0: entered promiscuous mode [ 94.230198][ T6193] bond_slave_0: entered promiscuous mode [ 94.277369][ T6193] bond_slave_1: entered promiscuous mode [ 94.286591][ T6193] bridge0: port 3(bond0) entered blocking state [ 94.308645][ T6193] bridge0: port 3(bond0) entered disabled state [ 94.339281][ T6193] bond0: entered allmulticast mode [ 94.347800][ T6193] bond_slave_0: entered allmulticast mode [ 94.362270][ T6193] bond_slave_1: entered allmulticast mode [ 94.390782][ T6193] bridge0: port 3(bond0) entered blocking state [ 94.397582][ T6193] bridge0: port 3(bond0) entered forwarding state [ 94.971841][ T6205] netlink: 'syz.3.69': attribute type 3 has an invalid length. [ 94.991382][ T6205] netlink: 56 bytes leftover after parsing attributes in process `syz.3.69'. [ 95.743919][ T6211] team0: Port device team_slave_0 removed [ 99.136079][ T6220] [ 99.138453][ T6220] ===================================== [ 99.144075][ T6220] WARNING: bad unlock balance detected! [ 99.149617][ T6220] syzkaller #0 Not tainted [ 99.154021][ T6220] ------------------------------------- [ 99.159551][ T6220] syz.0.75/6220 is trying to release lock (&sighand->siglock) at: [ 99.167362][ T6220] [] copy_process+0x2793/0x3c00 [ 99.173793][ T6220] but there are no more locks to release! [ 99.179495][ T6220] [ 99.179495][ T6220] other info that might help us debug this: [ 99.187544][ T6220] 1 lock held by syz.0.75/6220: [ 99.192378][ T6220] #0: ffffffff8e171810 (cgroup_threadgroup_rwsem){++++}-{0:0}, at: copy_process+0x212a/0x3c00 [ 99.202734][ T6220] [ 99.202734][ T6220] stack backtrace: [ 99.208634][ T6220] CPU: 0 UID: 0 PID: 6220 Comm: syz.0.75 Not tainted syzkaller #0 PREEMPT(full) [ 99.208653][ T6220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 99.208670][ T6220] Call Trace: [ 99.208676][ T6220] [ 99.208683][ T6220] dump_stack_lvl+0x189/0x250 [ 99.208704][ T6220] ? __pfx_dump_stack_lvl+0x10/0x10 [ 99.208721][ T6220] ? __pfx__printk+0x10/0x10 [ 99.208744][ T6220] ? copy_process+0x2793/0x3c00 [ 99.208760][ T6220] print_unlock_imbalance_bug+0xdc/0xf0 [ 99.208778][ T6220] lock_release+0x269/0x3e0 [ 99.208798][ T6220] ? copy_process+0x2793/0x3c00 [ 99.208815][ T6220] _raw_spin_unlock+0x16/0x50 [ 99.208836][ T6220] copy_process+0x2793/0x3c00 [ 99.208857][ T6220] ? copy_process+0x97f/0x3c00 [ 99.208875][ T6220] ? __pfx_copy_process+0x10/0x10 [ 99.208895][ T6220] kernel_clone+0x21e/0x840 [ 99.208914][ T6220] ? __pfx_kernel_clone+0x10/0x10 [ 99.208933][ T6220] ? __lock_acquire+0xab9/0xd20 [ 99.208955][ T6220] __se_sys_clone3+0x256/0x2d0 [ 99.208973][ T6220] ? __might_fault+0xb0/0x130 [ 99.208992][ T6220] ? __pfx___se_sys_clone3+0x10/0x10 [ 99.209015][ T6220] ? _copy_to_user+0x8a/0xb0 [ 99.209039][ T6220] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 99.209061][ T6220] ? do_syscall_64+0xbe/0x3b0 [ 99.209080][ T6220] do_syscall_64+0xfa/0x3b0 [ 99.209095][ T6220] ? lockdep_hardirqs_on+0x9c/0x150 [ 99.209110][ T6220] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 99.209125][ T6220] ? clear_bhb_loop+0x60/0xb0 [ 99.209142][ T6220] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 99.209156][ T6220] RIP: 0033:0x7f5f60fc3609 [ 99.209175][ T6220] Code: d7 08 00 48 8d 3d 9c d7 08 00 e8 e2 28 f6 ff 66 90 b8 ea ff ff ff 48 85 ff 74 2c 48 85 d2 74 27 49 89 c8 b8 b3 01 00 00 0f 05 <48> 85 c0 7c 18 74 01 c3 31 ed 48 83 e4 f0 4c 89 c7 ff d2 48 89 c7 [ 99.209188][ T6220] RSP: 002b:00007ffda85c32a8 EFLAGS: 00000206 ORIG_RAX: 00000000000001b3 [ 99.209204][ T6220] RAX: ffffffffffffffda RBX: 00007f5f60f459f0 RCX: 00007f5f60fc3609 [ 99.209216][ T6220] RDX: 00007f5f60f459f0 RSI: 0000000000000058 RDI: 00007ffda85c32f0 [ 99.209226][ T6220] RBP: 00007f5f61e096c0 R08: 00007f5f61e096c0 R09: 00007ffda85c33d7 [ 99.209237][ T6220] R10: 0000000000000008 R11: 0000000000000206 R12: ffffffffffffffa8 [ 99.209248][ T6220] R13: 000000000000000b R14: 00007ffda85c32f0 R15: 00007ffda85c33d8 [ 99.209264][ T6220] [ 99.675963][ T6221] ------------[ cut here ]------------ [ 99.682108][ T6221] pvqspinlock: lock 0xffff88802ae540c0 has corrupted value 0x0! [ 99.712676][ T6221] WARNING: CPU: 0 PID: 6221 at kernel/locking/qspinlock_paravirt.h:506 __pv_queued_spin_unlock_slowpath+0x1fe/0x2a0 [ 99.724961][ T6221] Modules linked in: [ 99.728866][ T6221] CPU: 0 UID: 0 PID: 6221 Comm: syz.1.76 Not tainted syzkaller #0 PREEMPT(full) [ 99.738012][ T6221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 99.748089][ T6221] RIP: 0010:__pv_queued_spin_unlock_slowpath+0x1fe/0x2a0 [ 99.755129][ T6221] Code: 28 25 a6 f6 48 89 d8 48 c1 e8 03 42 0f b6 04 28 84 c0 0f 85 93 00 00 00 8b 13 48 c7 c7 00 0c 8b 8b 48 89 de e8 d3 41 06 f6 90 <0f> 0b 90 90 eb 95 48 c7 c7 90 c5 00 8e 4c 89 f6 4c 89 fa e8 ca cd [ 99.774832][ T6221] RSP: 0018:ffffc9000bea78c0 EFLAGS: 00010246 [ 99.781618][ T6221] RAX: 22a58305143c0800 RBX: ffff88802ae540c0 RCX: ffff8880254f0000 [ 99.790458][ T6221] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000002 [ 99.798477][ T6221] RBP: 1ffff110055ca819 R08: 0000000000000003 R09: 0000000000000004 [ 99.806484][ T6221] R10: dffffc0000000000 R11: fffffbfff1bfa22c R12: dffffc0000000000 [ 99.814454][ T6221] R13: dffffc0000000000 R14: ffff88802ae540d0 R15: ffff88802ae540c8 [ 99.822448][ T6221] FS: 0000555568f01500(0000) GS:ffff888125c12000(0000) knlGS:0000000000000000 [ 99.831411][ T6221] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 99.838040][ T6221] CR2: 00005555759f85c8 CR3: 000000007edb2000 CR4: 00000000003526f0 [ 99.846047][ T6221] Call Trace: [ 99.849323][ T6221] [ 99.852264][ T6221] __raw_callee_save___pv_queued_spin_unlock_slowpath+0x15/0x30 [ 99.859929][ T6221] .slowpath+0x9/0x18 [ 99.863908][ T6221] do_raw_spin_unlock+0x122/0x240 [ 99.869089][ T6221] _raw_spin_unlock+0x1e/0x50 [ 99.873770][ T6221] copy_process+0x2793/0x3c00 [ 99.878494][ T6221] ? copy_process+0x97f/0x3c00 [ 99.883945][ T6221] ? __pfx_copy_process+0x10/0x10 [ 99.889495][ T6221] kernel_clone+0x21e/0x840 [ 99.894000][ T6221] ? __pfx_kernel_clone+0x10/0x10 [ 99.899084][ T6221] ? __lock_acquire+0xab9/0xd20 [ 99.903939][ T6221] __se_sys_clone3+0x256/0x2d0 [ 99.908738][ T6221] ? __might_fault+0xb0/0x130 [ 99.913414][ T6221] ? __pfx___se_sys_clone3+0x10/0x10 [ 99.918730][ T6221] ? _copy_to_user+0x8a/0xb0 [ 99.923327][ T6221] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 99.929970][ T6221] ? do_syscall_64+0xbe/0x3b0 [ 99.934649][ T6221] do_syscall_64+0xfa/0x3b0 [ 99.939192][ T6221] ? lockdep_hardirqs_on+0x9c/0x150 [ 99.944388][ T6221] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 99.950576][ T6221] ? clear_bhb_loop+0x60/0xb0 [ 99.955314][ T6221] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 99.961200][ T6221] RIP: 0033:0x7f74087c3609 [ 99.965642][ T6221] Code: d7 08 00 48 8d 3d 9c d7 08 00 e8 e2 28 f6 ff 66 90 b8 ea ff ff ff 48 85 ff 74 2c 48 85 d2 74 27 49 89 c8 b8 b3 01 00 00 0f 05 <48> 85 c0 7c 18 74 01 c3 31 ed 48 83 e4 f0 4c 89 c7 ff d2 48 89 c7 [ 99.986018][ T6221] RSP: 002b:00007ffde6117a98 EFLAGS: 00000206 ORIG_RAX: 00000000000001b3 [ 99.994439][ T6221] RAX: ffffffffffffffda RBX: 00007f74087459f0 RCX: 00007f74087c3609 [ 100.003002][ T6221] RDX: 00007f74087459f0 RSI: 0000000000000058 RDI: 00007ffde6117ae0 [ 100.011007][ T6221] RBP: 00007f74096986c0 R08: 00007f74096986c0 R09: 00007ffde6117bc7 [ 100.019025][ T6221] R10: 0000000000000008 R11: 0000000000000206 R12: ffffffffffffffa8 [ 100.027073][ T6221] R13: 000000000000000b R14: 00007ffde6117ae0 R15: 00007ffde6117bc8 [ 100.035066][ T6221] [ 100.038087][ T6221] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 100.045359][ T6221] CPU: 0 UID: 0 PID: 6221 Comm: syz.1.76 Not tainted syzkaller #0 PREEMPT(full) [ 100.054455][ T6221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 100.064527][ T6221] Call Trace: [ 100.067805][ T6221] [ 100.070725][ T6221] dump_stack_lvl+0x99/0x250 [ 100.075314][ T6221] ? __asan_memcpy+0x40/0x70 [ 100.079897][ T6221] ? __pfx_dump_stack_lvl+0x10/0x10 [ 100.085087][ T6221] ? __pfx__printk+0x10/0x10 [ 100.089677][ T6221] vpanic+0x281/0x750 [ 100.093659][ T6221] ? __pfx__printk+0x10/0x10 [ 100.098244][ T6221] ? __pfx_vpanic+0x10/0x10 [ 100.102742][ T6221] ? is_bpf_text_address+0x26/0x2b0 [ 100.107943][ T6221] panic+0xb9/0xc0 [ 100.111661][ T6221] ? __pfx_panic+0x10/0x10 [ 100.116074][ T6221] __warn+0x31b/0x4b0 [ 100.120047][ T6221] ? __pv_queued_spin_unlock_slowpath+0x1fe/0x2a0 [ 100.126454][ T6221] ? __pv_queued_spin_unlock_slowpath+0x1fe/0x2a0 [ 100.132861][ T6221] report_bug+0x2be/0x4f0 [ 100.137181][ T6221] ? __pv_queued_spin_unlock_slowpath+0x1fe/0x2a0 [ 100.143589][ T6221] ? __pv_queued_spin_unlock_slowpath+0x1fe/0x2a0 [ 100.149995][ T6221] ? __pv_queued_spin_unlock_slowpath+0x200/0x2a0 [ 100.156400][ T6221] handle_bug+0x84/0x160 [ 100.160636][ T6221] exc_invalid_op+0x1a/0x50 [ 100.165134][ T6221] asm_exc_invalid_op+0x1a/0x20 [ 100.169974][ T6221] RIP: 0010:__pv_queued_spin_unlock_slowpath+0x1fe/0x2a0 [ 100.176991][ T6221] Code: 28 25 a6 f6 48 89 d8 48 c1 e8 03 42 0f b6 04 28 84 c0 0f 85 93 00 00 00 8b 13 48 c7 c7 00 0c 8b 8b 48 89 de e8 d3 41 06 f6 90 <0f> 0b 90 90 eb 95 48 c7 c7 90 c5 00 8e 4c 89 f6 4c 89 fa e8 ca cd [ 100.196588][ T6221] RSP: 0018:ffffc9000bea78c0 EFLAGS: 00010246 [ 100.202665][ T6221] RAX: 22a58305143c0800 RBX: ffff88802ae540c0 RCX: ffff8880254f0000 [ 100.210631][ T6221] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000002 [ 100.218600][ T6221] RBP: 1ffff110055ca819 R08: 0000000000000003 R09: 0000000000000004 [ 100.226563][ T6221] R10: dffffc0000000000 R11: fffffbfff1bfa22c R12: dffffc0000000000 [ 100.234525][ T6221] R13: dffffc0000000000 R14: ffff88802ae540d0 R15: ffff88802ae540c8 [ 100.242496][ T6221] __raw_callee_save___pv_queued_spin_unlock_slowpath+0x15/0x30 [ 100.250128][ T6221] .slowpath+0x9/0x18 [ 100.254100][ T6221] do_raw_spin_unlock+0x122/0x240 [ 100.259120][ T6221] _raw_spin_unlock+0x1e/0x50 [ 100.263793][ T6221] copy_process+0x2793/0x3c00 [ 100.268466][ T6221] ? copy_process+0x97f/0x3c00 [ 100.273237][ T6221] ? __pfx_copy_process+0x10/0x10 [ 100.278259][ T6221] kernel_clone+0x21e/0x840 [ 100.282762][ T6221] ? __pfx_kernel_clone+0x10/0x10 [ 100.287783][ T6221] ? __lock_acquire+0xab9/0xd20 [ 100.292634][ T6221] __se_sys_clone3+0x256/0x2d0 [ 100.297391][ T6221] ? __might_fault+0xb0/0x130 [ 100.302063][ T6221] ? __pfx___se_sys_clone3+0x10/0x10 [ 100.307347][ T6221] ? _copy_to_user+0x8a/0xb0 [ 100.311936][ T6221] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 100.318523][ T6221] ? do_syscall_64+0xbe/0x3b0 [ 100.323196][ T6221] do_syscall_64+0xfa/0x3b0 [ 100.327691][ T6221] ? lockdep_hardirqs_on+0x9c/0x150 [ 100.332879][ T6221] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 100.338937][ T6221] ? clear_bhb_loop+0x60/0xb0 [ 100.343607][ T6221] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 100.349580][ T6221] RIP: 0033:0x7f74087c3609 [ 100.353986][ T6221] Code: d7 08 00 48 8d 3d 9c d7 08 00 e8 e2 28 f6 ff 66 90 b8 ea ff ff ff 48 85 ff 74 2c 48 85 d2 74 27 49 89 c8 b8 b3 01 00 00 0f 05 <48> 85 c0 7c 18 74 01 c3 31 ed 48 83 e4 f0 4c 89 c7 ff d2 48 89 c7 [ 100.373585][ T6221] RSP: 002b:00007ffde6117a98 EFLAGS: 00000206 ORIG_RAX: 00000000000001b3 [ 100.381999][ T6221] RAX: ffffffffffffffda RBX: 00007f74087459f0 RCX: 00007f74087c3609 [ 100.389975][ T6221] RDX: 00007f74087459f0 RSI: 0000000000000058 RDI: 00007ffde6117ae0 [ 100.397951][ T6221] RBP: 00007f74096986c0 R08: 00007f74096986c0 R09: 00007ffde6117bc7 [ 100.405922][ T6221] R10: 0000000000000008 R11: 0000000000000206 R12: ffffffffffffffa8 [ 100.413884][ T6221] R13: 000000000000000b R14: 00007ffde6117ae0 R15: 00007ffde6117bc8 [ 100.421854][ T6221] [ 100.425105][ T6221] Kernel Offset: disabled [ 100.429410][ T6221] Rebooting in 86400 seconds..