last executing test programs: 7.063953316s ago: executing program 1 (id=707): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0xc}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0xa3, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82348, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, @perf_config_ext={0x5, 0x875}, 0x2, 0x2000000, 0x0, 0x8, 0x4402, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2106, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r6 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f00000001c0)={0x5, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21d, 0x4, @perf_config_ext={0xffff8880b8622f20, 0x1}, 0x4000, 0x0, 0x0, 0x0, 0x8, 0x2, 0x2, 0x0, 0x2}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}, 0x202, 0x4, 0xffffffff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x16, 0x0, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb0100180000000000ff000c0000000629749e44cff30c00000007000000080000000000000f0500"/50], &(0x7f0000000040)=""/249, 0x2b, 0xf9, 0xa}, 0x28) sendmsg$NFT_BATCH(r3, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000340)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x6}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x18, 0x3, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}]}, {0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}]}, @NFT_MSG_DELSETELEM={0x2c, 0xe, 0xa, 0x201, 0x0, 0x0, {0xa}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0xd4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0xfd, &(0x7f00000004c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e140602000000000e000a001000000002900000121f", 0x2e}], 0x1}, 0x40) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r8, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001580)=@newqdisc={0x40, 0x24, 0xf0b, 0x70bd29, 0x0, {0x0, 0x0, 0x12, r9, {}, {0xffff, 0xffff}, {0xa}}, [@qdisc_kind_options=@q_hhf={{0x8}, {0x14, 0x2, [@TCA_HHF_ADMIT_BYTES={0x8}, @TCA_HHF_NON_HH_WEIGHT={0x8, 0x7, 0x5}]}}]}, 0x40}}, 0x4000810) bpf$TOKEN_CREATE(0x24, &(0x7f00000005c0)={0x0, r1}, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x2, &(0x7f0000000440)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0x4}], &(0x7f0000000500)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41000, 0x6, '\x00', r9, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000580)={0x3, 0x4, 0xa9, 0xc425}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000005c0), &(0x7f0000000640)=[{0x3, 0x4, 0x2, 0x9}, {0x4, 0x3, 0xc, 0x5}, {0x2, 0x1, 0x6, 0x3}], 0x10, 0x5}, 0x94) 6.811872852s ago: executing program 1 (id=714): r0 = socket$kcm(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$inet(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="5c00000014006b03004e21000af32c6e020675f800250002400100000017d34460bc24eab556a705251e6182949a36c23d3b48dfd8cdbf9367b498fa51f60a64c9f4d4938037e786a6d0bdd70000b6c0504bb9189d9193e9bd1c1b78", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x4004880) r1 = socket$kcm(0x2a, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000140)=@qipcrtr, 0x80, 0x0}, 0x0) sendmsg$kcm(r1, &(0x7f0000001540)={&(0x7f0000000000)=@qipcrtr={0x2a, 0xffffffff, 0xffff0002}, 0x80, 0x0}, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)=ANY=[], 0x50) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{}, &(0x7f0000000400), &(0x7f00000004c0)=r2}, 0x20) close(0x3) socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000200004000000080000000200000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r4}, 0xc) ioctl$SIOCSIFHWADDR(r3, 0x8943, 0x0) close(0x3) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r5 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f00000008c0), 0x43) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000001540)=@tipc, 0x80, 0x0}, 0x0) r6 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x400000000000000b, 0xb54b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x4, 0x30f7cb41, 0xffff, 0x0, 0x2, 0x0, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 6.759596872s ago: executing program 3 (id=715): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x80, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x43, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000404000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x20) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=0xffffffffffffffff, 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x6, &(0x7f0000000800)=ANY=[@ANYBLOB="180000000400000000000000ff00000095000000000000001841000008000000000000000000000095000000000000005c7948a95af62463563d2c97bf49ccd3e643ecbdb8d1f6d2f63fe447305da30a50e4080b6554c0d992e9126f89598f000e2117d7434cc006409feffac3e7363d799fa0b3f84b7906eabba07bb5aa16743d1a77bc91cdf9bc25f9157e03"], &(0x7f00000001c0)='syzkaller\x00', 0x200, 0x0, 0x0, 0x41100, 0x68, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000440)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xf, 0x6, 0x200}, 0x10, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000600)=[{0x4, 0x3, 0xd, 0x8}, {0x1, 0x4, 0xd, 0x8}, {0x3, 0x1, 0x10, 0xc}, {0x5, 0x2, 0xb, 0x1}, {0x1, 0x2, 0xe, 0x2}, {0x1, 0x4, 0x10, 0x4}, {0x0, 0x2, 0x3, 0x4}, {0x2, 0x3, 0xb}, {0x5, 0x4, 0x1, 0xc}, {0x0, 0x5, 0x8, 0x9}], 0x10, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x4, &(0x7f0000000580)=@framed={{0x18, 0x5, 0x0, 0x0, 0x40000}, [@call={0x85, 0x0, 0x0, 0x7a}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1d, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @lsm=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) socket$kcm(0x29, 0x7, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) socket$kcm(0xa, 0x5, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="020000000400000008000000010000008000000096c709b16707be355d6a49d11ed0fe29c6bc4fd2953dfe525a731595e6f2c6641666decbbaa436acadd29bd407ed07f6146787f0d84b3aa0f7", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0xe) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffe00}, {}, {0x7, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffe00}, {}, {0x18, 0x3, 0x2, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0xc5}}]}, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079d}) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x159300, 0x0) socketpair(0x1, 0x1, 0x1, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) close(0x3) close(r3) 6.367628228s ago: executing program 1 (id=718): socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback=0x86652da295c9ade7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8ec, 0xc}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x35c4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2101, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb53a, 0x4, @perf_bp={0x0, 0x2}, 0x101222, 0x0, 0x0, 0x3, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="2c000000040a050000000000200000000a00000a0900030073797a31000000000900010073797a31"], 0x2c}}, 0x4080) socket$kcm(0x10, 0x400000002, 0x0) perf_event_open(0x0, 0x0, 0x5, r0, 0x1) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000180)="1400000017000b63d25a80648c2594f93da3c9", 0x13}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) unlink(&(0x7f0000000200)='./cgroup\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x88) sendmsg$kcm(r3, &(0x7f0000000340)={&(0x7f00000002c0)=@in6={0xa, 0x4e22, 0x0, @mcast1, 0x6}, 0x80, 0x0}, 0x8e8c5) sendmsg$inet(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000000)='n', 0xffb8}], 0x1}, 0x20000081) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x2000, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r5], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 4.999339241s ago: executing program 4 (id=723): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="1c0000001e006bcd9e3fe3dc6e0800000700000019000000", 0x18}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0xe07e872420dfef8a) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0xa2d40, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRES32=r2, @ANYBLOB='(\x00\x00', @ANYRES32=r2, @ANYBLOB, @ANYRES64=0x0], 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x5, 0x83501, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x8}, 0x942, 0x4, 0x200, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x30004020) setsockopt$sock_attach_bpf(r3, 0x6, 0x6, &(0x7f0000000740), 0x4) close(r1) socket$nl_generic(0x10, 0x3, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000e38c24179a0700000000000000000000004f806c3e41a764cbe1246f524c6c03c08dcc99b16056681d5edd5de4c691014b3a48519eb189f667b255243146ec54889314ac045cea6ff47395de14420b12bbc82d0a645ec31ec6a3fc2ae331282e3ecaec4136915e1d66bf2a0d026ab6ffa1617b3cdc9531c6e429faf4e492b08c06f46f66c7ade5fee87118ba6c2d590ff19dca1a84a1b8f8697e4870757c9b6597c9e2e20c703c41cb65257a1e56e370bceeed9d7c23ad1bb9099f9ed21093949745f2cb81dd77a42c7957acf6f5f94243ec702a9a2d5325b0302ec3f49affb7d158ed22c265c58e5b315549063cb248d499"], &(0x7f0000000000)='syzkaller\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000001c0)='rpc_clnt_new\x00', r4, 0x0, 0xffffffffffffffff}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_netfilter(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="003abd00fcd1aab129f341bc"], 0x14}}, 0x4) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) close(r6) recvmsg$unix(r5, &(0x7f00000013c0)={0x0, 0x0, 0x0}, 0x1c0) 4.191444884s ago: executing program 3 (id=724): bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000380)={&(0x7f0000000200)="b64b6779e728a585fc6d831c9c111ee3bf867c7fa20663508d961b5b0bc1d4eded804b84c8ee0b5e7b55af44aa8bf4a16c4d4aaf896a13f650a3b4f737945a9a179a6ceb93adadb8dd841258d0f04b02868cd415ab9bc48b055a8b3f92b143cb16138c216513a045af2101e7e3c507bedee404331171812cdaee", 0x0, 0x0, 0x0}, 0x38) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x0, 0x32, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='pids.current\x00', 0x26e1, 0x0) close(r0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0xc0042, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfefffffc, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x3fe, 0x3, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x0, 0x1944}, 0x2, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_config_ext={0x8, 0x100000830d}, 0x4500, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x12cd) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x2000c000) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2400000002030103000000000000000001000003080005400000001f0800044002000022"], 0x24}, 0x1, 0x0, 0x0, 0x44000}, 0x40) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, 0x0, 0x20048011) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000440)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWRULE={0x5c, 0x6, 0xa, 0x601, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @hash={{0x9}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_HASH_OFFSET={0x8, 0x6, 0x1, 0x0, 0x4}, @NFTA_HASH_DREG={0x8, 0x2, 0x1, 0x0, 0xe}, @NFTA_HASH_TYPE={0x8, 0x7, 0x1, 0x0, 0x1}]}}}]}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x84}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000840) 4.099144571s ago: executing program 4 (id=725): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0x10, 0x3, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000730000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x203}, 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x4, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) r0 = socket$kcm(0x28, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x12101) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x8003}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}, @NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0xc}, @NFTA_EXTHDR_OFFSET={0x8}, @NFTA_EXTHDR_TYPE={0x5, 0x2, 0x7}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0xcc}}, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) fstat(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, r3) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, r3) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)=ANY=[], 0x50) r4 = socket$kcm(0x2, 0x3, 0x106) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000540)={{0x14}, [@NFT_MSG_NEWRULE={0x70, 0x6, 0xa, 0x160b, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_RULE_EXPRESSIONS={0x44, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @osf={{0x8}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x4}]}}}, {0x28, 0x1, 0x0, 0x1, @nat={{0x8}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_NAT_TYPE={0x8}, @NFTA_NAT_REG_ADDR_MIN={0x8, 0x3, 0x1, 0x0, 0x14}, @NFTA_NAT_FAMILY={0x8, 0x2, 0x1, 0x0, 0x2}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x98}, 0x1, 0x0, 0x0, 0x850}, 0x4040080) sendmsg$inet(r4, &(0x7f0000000040)={&(0x7f0000000380)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000000000)=[{&(0x7f0000000600)="b9ed29d8fe490a060b483f2dd090fc6889ae6b84ce20c6f516c42bffaf777ddc7c6382ee0318c6adc8e79e6d6753c26b80c03c66", 0x34}], 0x1}, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r7, &(0x7f0000000000)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000080)) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 4.072791741s ago: executing program 0 (id=726): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0xc}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0xa3, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82348, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, @perf_config_ext={0x5, 0x875}, 0x2, 0x2000000, 0x0, 0x8, 0x4402, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2106, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r6 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f00000001c0)={0x5, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21d, 0x4, @perf_config_ext={0xffff8880b8622f20, 0x1}, 0x4000, 0x0, 0x0, 0x0, 0x8, 0x2, 0x2, 0x0, 0x2}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}, 0x202, 0x4, 0xffffffff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x16, 0x0, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb0100180000000000ff000c0000000629749e44cff30c00000007000000080000000000000f0500"/50], &(0x7f0000000040)=""/249, 0x2b, 0xf9, 0xa}, 0x28) sendmsg$NFT_BATCH(r3, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000340)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x6}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x18, 0x3, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}]}, {0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}]}, @NFT_MSG_DELSETELEM={0x2c, 0xe, 0xa, 0x201, 0x0, 0x0, {0xa}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0xd4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0xfd, &(0x7f00000004c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e140602000000000e000a001000000002900000121f", 0x2e}], 0x1}, 0x40) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r8, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001580)=@newqdisc={0x40, 0x24, 0xf0b, 0x70bd29, 0x0, {0x0, 0x0, 0x12, r9, {}, {0xffff, 0xffff}, {0xa}}, [@qdisc_kind_options=@q_hhf={{0x8}, {0x14, 0x2, [@TCA_HHF_ADMIT_BYTES={0x8}, @TCA_HHF_NON_HH_WEIGHT={0x8, 0x7, 0x5}]}}]}, 0x40}}, 0x4000810) bpf$TOKEN_CREATE(0x24, &(0x7f00000005c0)={0x0, r1}, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x6, 0x2, &(0x7f0000000440)=@raw=[@exit, @func={0x85, 0x0, 0x1, 0x0, 0x4}], &(0x7f0000000500)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41000, 0x6, '\x00', r9, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000580)={0x3, 0x4, 0xa9, 0xc425}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000005c0), &(0x7f0000000640)=[{0x3, 0x4, 0x2, 0x9}, {0x4, 0x3, 0xc, 0x5}, {0x2, 0x1, 0x6, 0x3}], 0x10, 0x5}, 0x94) 4.072426836s ago: executing program 1 (id=728): r0 = socket$kcm(0x2, 0x200000000000001, 0x106) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x40, 0x0, 0x0, 0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0x0, 0x5, 0x3, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async) r1 = socket$kcm(0x2, 0x1, 0x84) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, 0x0) (async) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @local}, 0xfc, 0x0}, 0x30004001) setsockopt$sock_attach_bpf(r0, 0x6, 0xd, &(0x7f0000000500), 0x49) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 3.996789087s ago: executing program 3 (id=729): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=@base={0xf, 0x4, 0x8, 0x1}, 0x50) close(0x3) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001380)={0xe, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000001800000000000000000000000000200095"], &(0x7f0000000200)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000240)=""/4096}, 0x94) 3.855247037s ago: executing program 3 (id=730): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000001946}, 0x10401, 0x2, 0x0, 0x5, 0x3fe, 0x7fffffff, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x400, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x24004004) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x9) socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x7400}, 0x4008054) socketpair(0x1, 0x1, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{}, &(0x7f0000000240), &(0x7f00000001c0)}, 0x20) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x202, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x5}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x5c, 0x3, 0xa, 0x301, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_CHAIN_HOOK={0x28, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x12}, @NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_DEV={0x14, 0x3, 'netdevsim0\x00'}]}]}], {0x14}}, 0xa4}}, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r1}, 0x8) socket$nl_netfilter(0x10, 0x3, 0xc) 3.8492267s ago: executing program 4 (id=731): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000004000000020000000000000f0400000000005f"], 0x0, 0x28}, 0x20) socket(0x26, 0x6, 0x1000) (async) r1 = socket(0x26, 0x6, 0x1000) socket$kcm(0x10, 0x2, 0x4) (async) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000280)="89000000120081ae08060cdc030000007f03e3f7000000006ee2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec0012100001400d0c0c00bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x20000000) sendmsg$NFT_MSG_GETGEN(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x10, 0xa, 0x801, 0x0, 0x0, {0x7, 0x0, 0x8}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x4040000) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x8, 0x8}, 0x50) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x8, 0x8}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000400850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000400850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x8}, 0x6018, 0x0, 0x2, 0x6, 0x3fe, 0x7ffffffc, 0x400, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0xa) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="d8000000210081044e81f782db44b90402000000000300000000150010001800feffffff09000d2000000401a80018000a000e4006000000036010fab94dcf5c0468c1d67f6f94007134cf6ee062e1c547cbc7225e6756cfb39b0590b4800089e408e8d8ef52b49816277cf4090000001fb791643a5ee4ce1b14d6d930dfe1d9db22fe7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db701000000eafad95667e006dcdf969b3ef35ce3bbbad809d561cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d939acd92637429397f632838", 0xd8}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async) r5 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r6, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x400002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x61]}}, 0x0, 0x1c}, 0x28) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x61]}}, 0x0, 0x1c}, 0x28) socketpair$unix(0x1, 0x2, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r8}, &(0x7f0000001d80), &(0x7f0000001d40)}, 0x20) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x10, 0xfb, 0xe, 0x3, 0x0, 0x7, 0x604, 0x9, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x1, 0x9}, 0xa222, 0x6, 0x8000, 0x6, 0x3c, 0x4, 0x9, 0x0, 0x3b, 0x0, 0x9e4}, 0x0, 0x1, 0xffffffffffffffff, 0x2) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x10, 0xfb, 0xe, 0x3, 0x0, 0x7, 0x604, 0x9, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x1, 0x9}, 0xa222, 0x6, 0x8000, 0x6, 0x3c, 0x4, 0x9, 0x0, 0x3b, 0x0, 0x9e4}, 0x0, 0x1, 0xffffffffffffffff, 0x2) socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80302, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0xffffffffffffffff, 0xb214}, 0x6018, 0x0, 0x2, 0x6, 0x3fe, 0x7ffffffc, 0x400, 0x0, 0x0, 0x0, 0xea4}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0xa) (async) r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80302, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0xffffffffffffffff, 0xb214}, 0x6018, 0x0, 0x2, 0x6, 0x3fe, 0x7ffffffc, 0x400, 0x0, 0x0, 0x0, 0xea4}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0xa) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB], &(0x7f0000000280)='GPL\x00'}, 0x94) perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x80, 0x1, 0xfd, 0x9, 0xe, 0x0, 0x1400000, 0x6020, 0xf, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x148ee840, 0x8}, 0x100001, 0x6, 0x7, 0x7, 0x100000001, 0x3, 0x4, 0x0, 0xffffffff, 0x0, 0x7}, 0xffffffffffffffff, 0x3, r9, 0x4) (async) r11 = perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x80, 0x1, 0xfd, 0x9, 0xe, 0x0, 0x1400000, 0x6020, 0xf, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x148ee840, 0x8}, 0x100001, 0x6, 0x7, 0x7, 0x100000001, 0x3, 0x4, 0x0, 0xffffffff, 0x0, 0x7}, 0xffffffffffffffff, 0x3, r9, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r11, 0x40042408, r10) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r11, 0x40042408, r10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r10, 0x5, 0x4, 0x0, &(0x7f0000000340)="04000000", 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0200000004000000040000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB="006c0000e5ffffff0400000000000000fd7e37030000000000000000"], 0x50) 3.740001926s ago: executing program 0 (id=733): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b34, &(0x7f0000000000)={'wlan1\x00', @random="0003230c1100"}) r0 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="36400000250091"], 0xfe33) r1 = socket$kcm(0x1e, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f00000008c0), 0x43) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000980)={0x24, 0x3f, 0x107, 0x70bd2c, 0x25dfdbfc, {0x4, 0x7c}, [@typed={0x4}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0x8, 0x20, 0x0, 0x0, @ipv4=@multicast1}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x20008884}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000001c0)="39000000140081ae0000dc676f97daf01e2357f9ffffffffffffff0521018701546fabca1b4e8a06a6580e88370200c54c1960b89c40ebb373", 0x39}], 0x1}, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000340)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)='%pi6 \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000004c0)={{r4}, &(0x7f0000000440), &(0x7f0000000480)='%pK \x00'}, 0x20) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000001000010000000000000000000100000a20000000000a01040000000000000000010080030900010073797a30000000002c000000030a01010000000000000000010000000900010073797a30000000000900030073797a310000000070000000060a010400000000000000000100000008000b400000000048000480440001800b000100657874686472000034000280080001400000000c080003400000000008000440000000220500020007000000080006400000000308000540000000ea0800010073797a30"], 0x248}, 0x1, 0x0, 0x0, 0x4880}, 0x0) r6 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r6, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000280), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0xf, &(0x7f0000000280)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x9, 0x1003, &(0x7f0000001e40)=""/4099, 0x0, 0x0, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1006}, 0x94) 3.523274968s ago: executing program 4 (id=734): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(0x0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = getpid() r4 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}) 3.522809289s ago: executing program 0 (id=735): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x7}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0xa) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB], 0x24}}, 0x0) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r3, &(0x7f0000005800)={0x0, 0x0, &(0x7f00000057c0)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x2800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x23, &(0x7f0000000000), 0x4) r5 = socket$kcm(0xa, 0x2, 0x88) sendmsg$inet(r5, &(0x7f0000001600)={&(0x7f0000001340)={0x2, 0x5, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000001580)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x23}, @remote}}}], 0x20}, 0x8000) sendmsg$sock(r5, &(0x7f0000000740)={&(0x7f0000000000)=@in6={0xa, 0x4e20, 0x8, @local, 0xb0}, 0x80, 0x0}, 0x4000004) 3.455447625s ago: executing program 4 (id=736): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x6b, 0x11, 0x3e}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x8}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x70) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0xe01cd5203e3a7448, 0x0, 0x0, 0x0, 0x10000, 0x800000, 0x9, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020023000b11d25a806f8c6394f90524fc60040f150047000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x4, 0x201, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7ff, 0x7fffffff, 0xffff, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x4000894) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x1fffffff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a, 0x10, &(0x7f0000000340), 0xd58495bc, 0x0, 0xffffffffffffffff, 0xffffffffffffff5b}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r2, 0x2000000, 0xfe7f, 0x0, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0x7ffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="850000002200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x0, &(0x7f0000000640)="348b0d151f8218e3c73697e48864", 0x0, 0x9, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x50) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000001500)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x40, 0x4, 0x6, 0x801, 0x0, 0x0, {0xa, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x40001}, 0x11) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) r4 = openat$cgroup_ro(r0, &(0x7f00000002c0)='blkio.bfq.io_service_bytes\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x200008, 0x830d}, 0x0, 0x2, 0x7, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1560}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r5 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r5, 0x84, 0x11, &(0x7f0000000000)=r8, 0x8) close(r4) socket$nl_generic(0x10, 0x3, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x8be36591130d22e5, 0x0) ioctl$TUNGETDEVNETNS(r4, 0x54e3, 0x0) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000480)="5c00000012006bab9a3fe3d86e17aa0b046b876c1d0048380019001931a0e69ee517d34460bc06000000a701251e6182949a3651f60a84c9f4d4938037e70e4509c51c268811000000000000000000002571cd53b9851b30599980bc", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000700)=""/164, 0xa4}, {&(0x7f0000004000)=""/4073, 0xfe9}, {&(0x7f0000002940)=""/4112, 0x1010}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000100)=""/159, 0x9f}, {&(0x7f0000000940)=""/199, 0xc7}], 0x6}, 0x40012100) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000001c0)={r4}) 3.436559365s ago: executing program 3 (id=737): socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback=0x86652da295c9ade7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8ec, 0xc}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x35c4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2101, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb53a, 0x4, @perf_bp={0x0, 0x2}, 0x101222, 0x0, 0x0, 0x3, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="2c000000040a050000000000200000000a00000a0900030073797a31000000000900010073797a31"], 0x2c}}, 0x4080) socket$kcm(0x10, 0x400000002, 0x0) perf_event_open(0x0, 0x0, 0x5, r0, 0x1) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000180)="1400000017000b63d25a80648c2594f93da3c9", 0x13}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) unlink(&(0x7f0000000200)='./cgroup\x00') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x2, 0x88) sendmsg$kcm(r3, &(0x7f0000000340)={&(0x7f00000002c0)=@in6={0xa, 0x4e22, 0x0, @mcast1, 0x6}, 0x80, 0x0}, 0x8e8c5) sendmsg$inet(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000000)='n', 0xffb8}], 0x1}, 0x20000081) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x2000, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r5], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 3.363380277s ago: executing program 2 (id=738): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="1c0000001e006bcd9e3fe3dc6e0800000700000019000000", 0x18}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x40000) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0xe07e872420dfef8a) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0xa2d40, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000040)="89000000120081ae08060cdc030000017f03e3f7000000006ee2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc00e6d782b7af4e76e00120c00010005080c00bdad01409bbc7a46e39a8285dcdf12176679df069163ce955fed0009d78f0a947ee2b49e33538afaeb2713f450ebd010a20ff27fff", 0x89}], 0x1}, 0xff0f000020000080) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000600)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB='&\x00'/12, @ANYRES32, @ANYBLOB="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", @ANYRES64=0x0], 0x20) close(r1) socket$nl_generic(0x10, 0x3, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="f500050000e43efe18110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000018000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000085000000110000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r5}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000001500), 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[], 0x50) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000012000000240000000800000085"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000c00000004000000010000840203000000000000030000000000000000000000000000010500000020000000000000000000000b02000000006100302e"], 0x0, 0x58}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000005c0)='sched_switch\x00', r7}, 0x18) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x4, 0xe76188a61d36c46a, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7c, 0x0, @perf_config_ext={0x3, 0x8001}, 0xc08, 0x2e, 0xfffffbff, 0x3, 0x6, 0x0, 0x6, 0x0, 0x20000004}, 0x0, 0xffffffffffffffff, r6, 0x1) sendmsg$inet(0xffffffffffffffff, 0x0, 0x8004) openat$tun(0xffffffffffffff9c, 0x0, 0x101000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x29b7af14d6c802e3) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1c00000004000000020000000000000001020000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="010000000200"/25], 0x48) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r8}, 0x10) 3.183293341s ago: executing program 2 (id=739): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={r0}) (async) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_HEADER(r2, &(0x7f0000000740)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000780)=ANY=[@ANYRES64=r0], 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x0) (async) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0}, 0x38) sendmsg$OSF_MSG_REMOVE(r1, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8010c}, 0xc, &(0x7f00000003c0)={&(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x710}}, 0x60008810) (async, rerun: 64) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) (rerun: 64) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="5c0000000206030000000000000000000000000705000100070000000900020073790d310000000014e105ffffffffffff00000008001240000000a7050005000200000005000400010000000d000300686173683a6e657400000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x20004000) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x15, 0x5, &(0x7f0000000140)=ANY=[@ANYRES64=r0], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="180000001014020327bd7000fedbdf25d69837c5f9b669fb"], 0x18}, 0x1, 0x0, 0x0, 0x4400}, 0x2010) r5 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x8080}, 0x30008000) r6 = syz_clone(0xc8148000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x400000000000000b, 0xad44b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffd, 0x1, @perf_config_ext={0x8, 0x9}, 0x11efa, 0x3, 0x98, 0x1, 0x81, 0x32f7cb41, 0x0, 0x0, 0x0, 0x0, 0x100024}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) socket$nl_netfilter(0x10, 0x3, 0xc) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r4) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) (async, rerun: 64) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000e1b2afc2ecf79a1aa8ff266be6b8d3523451d809b2cdf42a18c890bfec375dcbed652c660ff9206b9e5c62ff0a064324dd0a0eb8de5273c914705325f97b9f6de50465b1026278", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000300"/28], 0x50) (rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r10}, &(0x7f0000000480)=0x12, &(0x7f0000000080)=r9}, 0x20) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000006c0)={{0x1}, &(0x7f0000000400), &(0x7f0000000600)='%pK \x00'}, 0x20) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000700)={&(0x7f0000000000), 0x0, &(0x7f0000001100)="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", &(0x7f00000007c0)="60940304ca59767f8af8e89748123a2eb925ad4c08ebd3f6c7842eb8cf027f9187146b9832a8df7fde54c18b8cc96ee0c7c2da536c682118bfbc810269a6cde6e0d3210c610979b0a1a7e7000087080058038cff613181e4044c9bd0c8f56eb988289e349ab3219bba802951e6bf7e5c9e11708615948100a358cf", 0x3, r10, 0x4}, 0x38) (async) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) (async, rerun: 64) r11 = socket$kcm(0x10, 0x2, 0x0) (rerun: 64) sendmsg$kcm(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 3.086962161s ago: executing program 1 (id=740): bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000380)={&(0x7f0000000200)="b64b6779e728a585fc6d831c9c111ee3bf867c7fa20663508d961b5b0bc1d4eded804b84c8ee0b5e7b55af44aa8bf4a16c4d4aaf896a13f650a3b4f737945a9a179a6ceb93adadb8dd841258d0f04b02868cd415ab9bc48b055a8b3f92b143cb16138c216513a045af2101e7e3c507bedee404331171812cdaeea4e6808ca6b7046c38", 0x0, 0x0, 0x0}, 0x38) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x0, 0x32, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='pids.current\x00', 0x26e1, 0x0) close(r0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0xc0042, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfefffffc, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x3fe, 0x3, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x0, 0x1944}, 0x2, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_config_ext={0x8, 0x100000830d}, 0x4500, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x12cd) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x2000c000) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2400000002030103000000000000000001000003080005400000001f0800044002000022"], 0x24}, 0x1, 0x0, 0x0, 0x44000}, 0x40) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, 0x0, 0x20048011) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000440)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWRULE={0x5c, 0x6, 0xa, 0x601, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @hash={{0x9}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_HASH_OFFSET={0x8, 0x6, 0x1, 0x0, 0x4}, @NFTA_HASH_DREG={0x8, 0x2, 0x1, 0x0, 0xe}, @NFTA_HASH_TYPE={0x8, 0x7, 0x1, 0x0, 0x1}]}}}]}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x84}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000840) 1.137911378s ago: executing program 0 (id=741): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0x10, 0x3, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000730000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x203}, 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x4, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) r0 = socket$kcm(0x28, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x12101) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x8003}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}, @NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0xc}, @NFTA_EXTHDR_OFFSET={0x8}, @NFTA_EXTHDR_TYPE={0x5, 0x2, 0x7}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0xcc}}, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) fstat(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, r3) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, r3) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)=ANY=[], 0x50) r4 = socket$kcm(0x2, 0x3, 0x106) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000540)={{0x14}, [@NFT_MSG_NEWRULE={0x70, 0x6, 0xa, 0x160b, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_RULE_EXPRESSIONS={0x44, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @osf={{0x8}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x4}]}}}, {0x28, 0x1, 0x0, 0x1, @nat={{0x8}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_NAT_TYPE={0x8}, @NFTA_NAT_REG_ADDR_MIN={0x8, 0x3, 0x1, 0x0, 0x14}, @NFTA_NAT_FAMILY={0x8, 0x2, 0x1, 0x0, 0x2}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x98}, 0x1, 0x0, 0x0, 0x850}, 0x4040080) sendmsg$inet(r4, &(0x7f0000000040)={&(0x7f0000000380)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000000000)=[{&(0x7f0000000600)="b9ed29d8fe490a060b483f2dd090fc6889ae6b84ce20c6f516c42bffaf777ddc7c6382ee0318c6adc8e79e6d6753c26b80c03c66", 0x34}], 0x1}, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r7, &(0x7f0000000000)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000080)) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 1.083372249s ago: executing program 2 (id=742): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=@base={0xf, 0x4, 0x8, 0x1}, 0x50) close(0x3) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001380)={0xe, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018000000000000000000000000003f0095"], &(0x7f0000000200)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000240)=""/4096}, 0x94) 984.012664ms ago: executing program 2 (id=743): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000340)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x41}, @call={0x85, 0x0, 0x0, 0x7d}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2000}, 0x94) socket$kcm(0x10, 0x2, 0x4) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x100000001}, 0x100021, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x8}, 0x6018, 0x0, 0x2, 0x6, 0x3fe, 0x7ffffffc, 0x400, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0xa, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x7, 0x1, 0x0, 0x0, 0x0, 0x6, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x400, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x20000, 0x0, 0x8000000000000000}, 0x0, 0xffffffffefffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x10558, 0x2, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, 0x0, 0x400c0c0) r2 = socket$can_raw(0x1d, 0x3, 0x1) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00'}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r3, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r3, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) sendmsg$can_raw(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x1d, r4}, 0x10, &(0x7f0000000140)={&(0x7f00000011c0)=@canfd={{0x1, 0x1, 0x1}, 0x12, 0x1, 0x0, 0x0, "46d41cca00dd28c48369b8a702162100a698205aef4f3e7a4fa2d5cf92a026e889b9754dd9eb732022f37301b0a7b99a60d004636d21a9011ee2b1510c43f94f"}, 0x48}, 0x1, 0x0, 0x0, 0xd100}, 0x20000000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0x3100, 0x0, &(0x7f0000000140), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) 653.169009ms ago: executing program 1 (id=744): socket$kcm(0x10, 0x2, 0x0) socket$kcm(0xa, 0x5, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x8004, 0x0, 0x0, 0x8a3e50467166edd3, 0x7, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000001000010700000000000000000a0000000600010017"], 0x1c}}, 0x0) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, 0x0, 0x8040) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x40800) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="040000000400000004", @ANYRES32, @ANYBLOB, @ANYRES32], 0x50) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x110819, 0x0, 0x0, 0x3, 0x800, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xd, 0x0, &(0x7f0000000640)="348b0d151f8218e3c73697e488", 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r3, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d003900", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = socket$kcm(0x22, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x80044944, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={r2}, 0x4) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f0000003700)={0x0, 0x0, &(0x7f00000036c0)={&(0x7f0000003440)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x2}}, [@NFT_MSG_NEWSET={0x54, 0x9, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x40}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_POLICY={0x8}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x9}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0xc2}]}], {0x14}}, 0x7c}, 0x1, 0x0, 0x0, 0x40080c0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x57}, 0x80) r9 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r8}, 0x8) close(r9) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r8, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 551.163391ms ago: executing program 4 (id=745): sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x2, 0x5, 0x84) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8800000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) socket$nl_netfilter(0x10, 0x3, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x1, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80002, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x1}, 0x6018, 0x0, 0x2, 0x6, 0x3fe, 0x7ffffffc, 0x400, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x16, 0x10, &(0x7f0000000040)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffff5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x8300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet6(r2, &(0x7f0000002280)={&(0x7f0000001e40)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b005000000000000290000003600000000b2"], 0x5b0}, 0x20008001) sendmsg$inet6(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000840)="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", 0x470}], 0x1}, 0x20000044) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0xf242, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x29, 0x2, 0x0) close(r4) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x1, @perf_bp={0x0, 0xb}, 0x14105, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa540c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x604, 0x2}, 0x0, 0x2, 0x10001, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) r5 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r5, &(0x7f0000003780)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="0213020902000000e4a17c4e2ca18baa", 0x10}], 0x1}, 0x0) 361.180888ms ago: executing program 2 (id=746): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000000004, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8800000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b4000000000000007910280000000000", @ANYRESDEC], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xa4, &(0x7f000000cf3d)=""/164, 0x0, 0x25, '\x00', 0x0, @sk_reuseport}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_netfilter(0x10, 0x3, 0xc) socket$kcm(0xa, 0x1, 0x106) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000200)=ANY=[], &(0x7f00000003c0)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000140)='contention_end\x00', r3}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x448d3}, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000100000000018010000786c6c2500000000002020200600000000000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000070000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e502000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r6) sendmsg$nl_xfrm(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@flushpolicy={0x10, 0x1d, 0x1}, 0x10}}, 0x0) 193.000855ms ago: executing program 0 (id=747): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(0x0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = getpid() r4 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0x0, 0x80feffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}) 71.503395ms ago: executing program 2 (id=748): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000200)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000180000003d030100000000009500f000000000006926000000000000bf67000000000000560602000f020000d706000020000090620a04ff0ee60000bf250000000000002d350000000000006507000002080000070700004c0000001f75000000000000bf54000000000000070400000400f9ffcd35010000000000ce040000000000001c000000000000009500000000000000db13d5d8b741f2cdaabc8383c8f56bb5df3083d20f8c2bf304000000815dcf0066d7ded3c5c49a08a503ea6d54f7f3125a8200578ac0836d6454745e70a27444003c5b20451b624db6f5320e9befc1e00b8b32917c4d30d16b7edb732bc3ac330b16c442aff70d27659bc58e296b16750c5577c848754b4894b07f15bab1c640a5c0c4fd62f9db829b301ef67fd2b2736f3af0c54af2412313b17c4c8081c4ed0572261960e227d34cfbfdb247bc2351c9d8363a8cb18b7330604da78b0aba47545f9a25a80dd7d28a5ae41824f611dd2de6dd581c52698f9542a444a8a3969946faded5275c00"/420], &(0x7f0000000100)='GPL\x00'}, 0x48) 33.915931ms ago: executing program 3 (id=749): r0 = socket$nl_route(0x10, 0x3, 0x0) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000000c0)="6880a642beaf34317f0dd3122a90ad0d2b", 0x11}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x4) (async) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)={0x14, 0x37, 0x301, 0x70bd24, 0xfffffffc, {0x7}}, 0x14}, 0x1, 0x0, 0x0, 0x448d3}, 0x0) socket$inet6(0xa, 0x1, 0x100) (async) sendmsg$inet(r1, &(0x7f0000000540)={0x0, 0xc027, &(0x7f0000000340)=[{&(0x7f00000000c0)="97eb000014006bcd9e", 0xeb97}], 0x1, 0x0, 0x0, 0x1f000000}, 0x600) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x10001, 0x1, 0x9, 0x40110, r1, 0x5, '\x00', r3, r4, 0x0, 0x5, 0xb, 0xc}, 0x50) (async) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newtaction={0x48, 0x30, 0x9, 0x0, 0x0, {}, [{0x34, 0x1, [@m_mpls={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4, 0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0xe4ffffff}}}}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x0) 0s ago: executing program 0 (id=750): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000d80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000240)=ANY=[@ANYBLOB=' \x00\x00\x00m\x00', @ANYBLOB="8b", @ANYRESHEX=r1], 0xfe33) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x1c, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000020000007b8a00fe00000000bfa200000000000007020000f8ffffffb703000008000000b704000002ec0000850000008200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000000000008500000008000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.221' (ED25519) to the list of known hosts. [ 75.205333][ T5816] cgroup: Unknown subsys name 'net' [ 75.375776][ T5816] cgroup: Unknown subsys name 'cpuset' [ 75.384130][ T5816] cgroup: Unknown subsys name 'rlimit' Setting up swapspace version 1, size = 127995904 bytes [ 76.752444][ T5816] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 80.840561][ T5831] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 80.849444][ T5831] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 80.857383][ T5831] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 80.865632][ T5831] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 80.874970][ T5831] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 80.889645][ T5831] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 80.897752][ T5831] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 80.920065][ T5840] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 80.928352][ T5840] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 80.935994][ T5842] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 80.943269][ T5840] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 80.952518][ T5840] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 80.960344][ T5840] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 80.967497][ T5842] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 80.976015][ T5842] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 80.984740][ T5837] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 80.988454][ T5151] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 81.000680][ T5151] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 81.008447][ T5151] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 81.016531][ T5151] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 81.019900][ T5837] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 81.031790][ T5837] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 81.040306][ T5151] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 81.048359][ T5151] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 81.055029][ T5837] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 81.520149][ T5827] chnl_net:caif_netlink_parms(): no params data found [ 81.604922][ T5828] chnl_net:caif_netlink_parms(): no params data found [ 81.838555][ T5827] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.846956][ T5827] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.856340][ T5827] bridge_slave_0: entered allmulticast mode [ 81.864569][ T5827] bridge_slave_0: entered promiscuous mode [ 81.896605][ T5834] chnl_net:caif_netlink_parms(): no params data found [ 81.918603][ T5827] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.926248][ T5827] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.933552][ T5827] bridge_slave_1: entered allmulticast mode [ 81.941592][ T5827] bridge_slave_1: entered promiscuous mode [ 82.051958][ T5843] chnl_net:caif_netlink_parms(): no params data found [ 82.095022][ T5828] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.113668][ T5828] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.121667][ T5828] bridge_slave_0: entered allmulticast mode [ 82.138008][ T5828] bridge_slave_0: entered promiscuous mode [ 82.167739][ T5827] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.192769][ T5828] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.200010][ T5828] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.207650][ T5828] bridge_slave_1: entered allmulticast mode [ 82.215209][ T5828] bridge_slave_1: entered promiscuous mode [ 82.228159][ T5827] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.246865][ T5836] chnl_net:caif_netlink_parms(): no params data found [ 82.340521][ T5828] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.371741][ T5827] team0: Port device team_slave_0 added [ 82.393376][ T5828] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.425812][ T5827] team0: Port device team_slave_1 added [ 82.431867][ T5834] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.439150][ T5834] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.446493][ T5834] bridge_slave_0: entered allmulticast mode [ 82.453884][ T5834] bridge_slave_0: entered promiscuous mode [ 82.504867][ T5834] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.512736][ T5834] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.519885][ T5834] bridge_slave_1: entered allmulticast mode [ 82.527169][ T5834] bridge_slave_1: entered promiscuous mode [ 82.580636][ T5828] team0: Port device team_slave_0 added [ 82.615476][ T5843] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.623095][ T5843] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.630266][ T5843] bridge_slave_0: entered allmulticast mode [ 82.637903][ T5843] bridge_slave_0: entered promiscuous mode [ 82.646659][ T5828] team0: Port device team_slave_1 added [ 82.666752][ T5827] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 82.673798][ T5827] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 82.699835][ T5827] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 82.741811][ T5843] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.749179][ T5843] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.756670][ T5843] bridge_slave_1: entered allmulticast mode [ 82.764108][ T5843] bridge_slave_1: entered promiscuous mode [ 82.781071][ T5827] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 82.788148][ T5827] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 82.814300][ T5827] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 82.827979][ T5834] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.859579][ T5828] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 82.866655][ T5828] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 82.892642][ T5828] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 82.913200][ T5834] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.922804][ T5836] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.929958][ T5836] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.937508][ T5836] bridge_slave_0: entered allmulticast mode [ 82.944561][ T5836] bridge_slave_0: entered promiscuous mode [ 82.965717][ T5828] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 82.972777][ T5828] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 82.999434][ T5828] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 83.003042][ T5151] Bluetooth: hci0: command tx timeout [ 83.044488][ T5836] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.051631][ T5836] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.059132][ T5836] bridge_slave_1: entered allmulticast mode [ 83.065281][ T5842] Bluetooth: hci2: command tx timeout [ 83.065711][ T5151] Bluetooth: hci1: command tx timeout [ 83.072965][ T5836] bridge_slave_1: entered promiscuous mode [ 83.086113][ T5843] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 83.142518][ T5842] Bluetooth: hci3: command tx timeout [ 83.146968][ T5151] Bluetooth: hci4: command tx timeout [ 83.157441][ T5843] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.184245][ T5828] hsr_slave_0: entered promiscuous mode [ 83.190638][ T5828] hsr_slave_1: entered promiscuous mode [ 83.199400][ T5834] team0: Port device team_slave_0 added [ 83.234399][ T5827] hsr_slave_0: entered promiscuous mode [ 83.240849][ T5827] hsr_slave_1: entered promiscuous mode [ 83.247216][ T5827] debugfs: 'hsr0' already exists in 'hsr' [ 83.253226][ T5827] Cannot create hsr debugfs directory [ 83.263105][ T5834] team0: Port device team_slave_1 added [ 83.271093][ T5836] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 83.327330][ T5836] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.350119][ T5843] team0: Port device team_slave_0 added [ 83.406910][ T5843] team0: Port device team_slave_1 added [ 83.439484][ T5834] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 83.446715][ T5834] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 83.472899][ T5834] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 83.485458][ T5836] team0: Port device team_slave_0 added [ 83.513541][ T5834] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 83.520508][ T5834] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 83.546640][ T5834] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 83.568453][ T5836] team0: Port device team_slave_1 added [ 83.617042][ T5843] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 83.624202][ T5843] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 83.650390][ T5843] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 83.668747][ T5843] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 83.675781][ T5843] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 83.702145][ T5843] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 83.771734][ T5836] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 83.779399][ T5836] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 83.805911][ T5836] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 83.854886][ T5836] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 83.861852][ T5836] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 83.888107][ T5836] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 83.919736][ T5834] hsr_slave_0: entered promiscuous mode [ 83.926079][ T5834] hsr_slave_1: entered promiscuous mode [ 83.932086][ T5834] debugfs: 'hsr0' already exists in 'hsr' [ 83.938071][ T5834] Cannot create hsr debugfs directory [ 83.989009][ T5843] hsr_slave_0: entered promiscuous mode [ 83.995493][ T5843] hsr_slave_1: entered promiscuous mode [ 84.001530][ T5843] debugfs: 'hsr0' already exists in 'hsr' [ 84.007909][ T5843] Cannot create hsr debugfs directory [ 84.153194][ T5836] hsr_slave_0: entered promiscuous mode [ 84.159512][ T5836] hsr_slave_1: entered promiscuous mode [ 84.167129][ T5836] debugfs: 'hsr0' already exists in 'hsr' [ 84.173033][ T5836] Cannot create hsr debugfs directory [ 84.290849][ T5827] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 84.304313][ T5827] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 84.315470][ T5827] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 84.369539][ T5827] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 84.534832][ T5828] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 84.546004][ T5828] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 84.566779][ T5828] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 84.595422][ T5828] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 84.670741][ T5834] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 84.681231][ T5834] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 84.701557][ T5834] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 84.721903][ T5834] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 84.795528][ T5843] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 84.806971][ T5843] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 84.837226][ T5843] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 84.847995][ T5843] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 84.962668][ T5836] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 84.974857][ T5836] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 84.986508][ T5836] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 84.997655][ T5836] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 85.065896][ T5828] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.075357][ T5151] Bluetooth: hci0: command tx timeout [ 85.089373][ T5827] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.142001][ T5827] 8021q: adding VLAN 0 to HW filter on device team0 [ 85.152842][ T5151] Bluetooth: hci1: command tx timeout [ 85.155591][ T5842] Bluetooth: hci2: command tx timeout [ 85.174180][ T5828] 8021q: adding VLAN 0 to HW filter on device team0 [ 85.212287][ T156] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.219635][ T156] bridge0: port 1(bridge_slave_0) entered forwarding state [ 85.227871][ T5842] Bluetooth: hci4: command tx timeout [ 85.233728][ T5151] Bluetooth: hci3: command tx timeout [ 85.250968][ T2981] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.258165][ T2981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 85.268920][ T2981] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.276053][ T2981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 85.307810][ T5843] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.330751][ T156] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.337941][ T156] bridge0: port 2(bridge_slave_1) entered forwarding state [ 85.354372][ T5834] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.406238][ T5834] 8021q: adding VLAN 0 to HW filter on device team0 [ 85.446997][ T5843] 8021q: adding VLAN 0 to HW filter on device team0 [ 85.460213][ T156] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.467349][ T156] bridge0: port 1(bridge_slave_0) entered forwarding state [ 85.489625][ T2981] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.496850][ T2981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 85.510644][ T2981] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.517877][ T2981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 85.576189][ T2981] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.583401][ T2981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 85.621870][ T5836] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.728931][ T5836] 8021q: adding VLAN 0 to HW filter on device team0 [ 85.795126][ T2964] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.802433][ T2964] bridge0: port 1(bridge_slave_0) entered forwarding state [ 85.827814][ T156] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.835017][ T156] bridge0: port 2(bridge_slave_1) entered forwarding state [ 85.931194][ T5827] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 86.041196][ T5828] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 86.128298][ T5827] veth0_vlan: entered promiscuous mode [ 86.219038][ T5827] veth1_vlan: entered promiscuous mode [ 86.245319][ T5834] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 86.294563][ T5828] veth0_vlan: entered promiscuous mode [ 86.328338][ T5828] veth1_vlan: entered promiscuous mode [ 86.358527][ T5827] veth0_macvtap: entered promiscuous mode [ 86.375015][ T5843] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 86.401371][ T5827] veth1_macvtap: entered promiscuous mode [ 86.436856][ T5828] veth0_macvtap: entered promiscuous mode [ 86.463514][ T5827] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 86.475098][ T5834] veth0_vlan: entered promiscuous mode [ 86.492136][ T5834] veth1_vlan: entered promiscuous mode [ 86.499956][ T5828] veth1_macvtap: entered promiscuous mode [ 86.511795][ T5827] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 86.526893][ T5836] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 86.575522][ T2964] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.587337][ T2964] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.641692][ T2964] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.651209][ T79] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.695705][ T5828] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 86.706605][ T5843] veth0_vlan: entered promiscuous mode [ 86.732928][ T5828] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 86.787588][ T5834] veth0_macvtap: entered promiscuous mode [ 86.797664][ T79] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.807195][ T79] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.844875][ T79] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.859082][ T5843] veth1_vlan: entered promiscuous mode [ 86.873733][ T5834] veth1_macvtap: entered promiscuous mode [ 86.895883][ T79] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.918351][ T79] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 86.929584][ T79] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 86.949624][ T5834] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 86.986447][ T5834] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 87.004366][ T89] cfg80211: failed to load regulatory.db [ 87.038457][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.047708][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.083946][ T2964] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 87.087454][ T5843] veth0_macvtap: entered promiscuous mode [ 87.091794][ T2964] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 87.107399][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.116456][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.144172][ T5842] Bluetooth: hci0: command tx timeout [ 87.150256][ T5836] veth0_vlan: entered promiscuous mode [ 87.158451][ T5843] veth1_macvtap: entered promiscuous mode [ 87.180598][ T3034] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 87.189806][ T3034] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 87.227119][ T5842] Bluetooth: hci1: command tx timeout [ 87.232644][ T5151] Bluetooth: hci2: command tx timeout [ 87.241294][ T5827] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 87.246652][ T5836] veth1_vlan: entered promiscuous mode [ 87.270160][ T5843] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 87.282972][ T5843] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 87.303509][ T5842] Bluetooth: hci4: command tx timeout [ 87.309450][ T5842] Bluetooth: hci3: command tx timeout [ 87.362870][ T2981] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.380947][ T2981] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 87.403498][ T2981] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 87.416037][ T79] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.428836][ T79] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.461107][ T79] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.501424][ T12] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 87.513888][ T12] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 87.668826][ T156] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 87.678348][ T5836] veth0_macvtap: entered promiscuous mode [ 87.687337][ T156] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 87.722149][ T5949] Zero length message leads to an empty skb [ 87.809640][ T5836] veth1_macvtap: entered promiscuous mode [ 87.829409][ T156] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 87.846575][ T156] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 87.907232][ T5836] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 88.042083][ T12] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 88.056561][ T5836] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 88.080820][ T12] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 88.142685][ T3034] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.172606][ T3034] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.221972][ T3034] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.235098][ T3034] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.391984][ C1] hrtimer: interrupt took 39622 ns [ 88.519366][ T5965] ======================================================= [ 88.519366][ T5965] WARNING: The mand mount option has been deprecated and [ 88.519366][ T5965] and is ignored by this kernel. Remove the mand [ 88.519366][ T5965] option from the mount to silence this warning. [ 88.519366][ T5965] ======================================================= [ 88.713804][ T12] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 88.772616][ T12] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 88.899882][ T5969] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 88.934503][ T5969] netlink: 'syz.0.10': attribute type 10 has an invalid length. [ 88.948307][ T5969] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 89.002647][ T5969] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 89.077379][ T5969] bond0: (slave batadv_slave_0): Enslaving as an active interface with an up link [ 89.144691][ T5976] netlink: 'syz.1.11': attribute type 10 has an invalid length. [ 89.222433][ T5842] Bluetooth: hci0: command tx timeout [ 89.302583][ T5842] Bluetooth: hci1: command tx timeout [ 89.308135][ T5151] Bluetooth: hci2: command tx timeout [ 89.315122][ T5978] netlink: 'syz.3.12': attribute type 10 has an invalid length. [ 89.383812][ T5151] Bluetooth: hci3: command tx timeout [ 89.383823][ T5842] Bluetooth: hci4: command tx timeout [ 89.429215][ T5976] veth1_macvtap: left promiscuous mode [ 89.487451][ T5965] netlink: 'syz.2.9': attribute type 10 has an invalid length. [ 89.488236][ T2981] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 89.495918][ T5965] netlink: 56823 bytes leftover after parsing attributes in process `syz.2.9'. [ 89.523741][ T2981] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 89.533283][ T5978] veth1_vlan: entered allmulticast mode [ 89.554081][ T5978] team0: Device veth1_vlan failed to register rx_handler [ 89.898040][ T5988] netlink: 'syz.3.15': attribute type 1 has an invalid length. [ 89.914248][ T5985] netlink: 'syz.2.14': attribute type 29 has an invalid length. [ 89.966934][ T5985] netlink: 'syz.2.14': attribute type 10 has an invalid length. [ 89.985701][ T5988] netlink: 'syz.3.15': attribute type 22 has an invalid length. [ 90.002093][ T5988] netlink: 4 bytes leftover after parsing attributes in process `syz.3.15'. [ 90.585037][ T5985] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.805802][ T5985] team0: Port device bond0 added [ 90.942079][ T5999] netlink: 182 bytes leftover after parsing attributes in process `syz.4.17'. [ 91.266812][ T5985] syz.2.14 (5985) used greatest stack depth: 17976 bytes left [ 91.456655][ T6001] netlink: del zone limit has 4 unknown bytes [ 91.470715][ T6001] netlink: 12 bytes leftover after parsing attributes in process `syz.2.18'. [ 91.487353][ T6003] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 91.505931][ T6003] netlink: 64 bytes leftover after parsing attributes in process `syz.4.19'. [ 91.564296][ T6008] netlink: 'syz.2.18': attribute type 13 has an invalid length. [ 91.819574][ T6013] netlink: 12 bytes leftover after parsing attributes in process `syz.0.21'. [ 91.842954][ T6013] netlink: 12 bytes leftover after parsing attributes in process `syz.0.21'. [ 91.897483][ T6013] netlink: 'syz.0.21': attribute type 4 has an invalid length. [ 92.215122][ T6013] syzkaller0: entered promiscuous mode [ 92.244338][ T6013] syzkaller0: entered allmulticast mode [ 92.768966][ T6024] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 93.961388][ T6018] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.969674][ T6018] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.999070][ T6018] bridge0: entered allmulticast mode [ 94.194028][ T6038] netlink: 16 bytes leftover after parsing attributes in process `syz.0.29'. [ 94.255540][ T6041] netlink: 'syz.4.30': attribute type 10 has an invalid length. [ 94.265194][ T6041] netlink: 40 bytes leftover after parsing attributes in process `syz.4.30'. [ 94.309929][ T6041] batman_adv: batadv0: Adding interface: veth1_virt_wifi [ 94.324807][ T6041] batman_adv: batadv0: The MTU of interface veth1_virt_wifi is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 94.364646][ T6041] batman_adv: batadv0: Interface activated: veth1_virt_wifi [ 94.435139][ T6044] netlink: 32 bytes leftover after parsing attributes in process `syz.4.30'. [ 96.001513][ T6064] netlink: 'syz.4.37': attribute type 21 has an invalid length. [ 96.042475][ T6064] netlink: 'syz.4.37': attribute type 20 has an invalid length. [ 96.211488][ T6081] netlink: 'syz.0.39': attribute type 2 has an invalid length. [ 96.287449][ T6084] warning: `syz.1.41' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211 [ 96.305224][ T6084] __nla_validate_parse: 1 callbacks suppressed [ 96.305241][ T6084] netlink: 9286 bytes leftover after parsing attributes in process `syz.1.41'. [ 96.341112][ T6087] netlink: 16 bytes leftover after parsing attributes in process `syz.3.43'. [ 96.377079][ T6080] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 96.605374][ T6090] netlink: 'syz.4.44': attribute type 5 has an invalid length. [ 96.613191][ T6090] netlink: 'syz.4.44': attribute type 9 has an invalid length. [ 96.621181][ T6090] netlink: 209852 bytes leftover after parsing attributes in process `syz.4.44'. [ 96.686328][ T6097] netlink: 'syz.0.46': attribute type 1 has an invalid length. [ 96.698635][ T6097] netlink: 'syz.0.46': attribute type 10 has an invalid length. [ 96.885367][ T6105] C: renamed from team_slave_0 (while UP) [ 96.918918][ T6105] netlink: 152 bytes leftover after parsing attributes in process `syz.1.49'. [ 97.272386][ T6122] netlink: 24 bytes leftover after parsing attributes in process `syz.0.52'. [ 97.344035][ T6125] netlink: 16 bytes leftover after parsing attributes in process `syz.2.55'. [ 97.496491][ T6128] netlink: 'syz.3.56': attribute type 39 has an invalid length. [ 97.747917][ T6128] hsr_slave_0 (unregistering): left promiscuous mode [ 97.825662][ T6140] netlink: 'syz.0.58': attribute type 1 has an invalid length. [ 98.222081][ T6143] netlink: 24 bytes leftover after parsing attributes in process `syz.4.61'. [ 101.057415][ T6192] Driver unsupported XDP return value 0 on prog (id 67) dev N/A, expect packet loss! [ 101.301685][ T6201] pim6reg1: entered promiscuous mode [ 101.322478][ T6201] pim6reg1: entered allmulticast mode [ 101.340196][ T6203] validate_nla: 3 callbacks suppressed [ 101.340231][ T6203] netlink: 'syz.2.78': attribute type 10 has an invalid length. [ 101.398243][ T6205] netlink: 'syz.3.80': attribute type 3 has an invalid length. [ 101.417259][ T6205] netlink: 'syz.3.80': attribute type 2 has an invalid length. [ 101.432639][ T6205] netlink: 'syz.3.80': attribute type 5 has an invalid length. [ 101.447416][ T6205] netlink: 199796 bytes leftover after parsing attributes in process `syz.3.80'. [ 101.465859][ T6201] netlink: 14 bytes leftover after parsing attributes in process `syz.0.77'. [ 104.070544][ T6203] bridge0: port 3(netdevsim0) entered blocking state [ 104.077828][ T6203] bridge0: port 3(netdevsim0) entered disabled state [ 104.085983][ T6203] netdevsim netdevsim2 netdevsim0: entered allmulticast mode [ 104.109899][ T6203] netdevsim netdevsim2 netdevsim0: entered promiscuous mode [ 105.011152][ T6259] netlink: 'syz.4.94': attribute type 39 has an invalid length. [ 105.143366][ T6250] syzkaller0: entered promiscuous mode [ 105.170573][ T6250] syzkaller0: entered allmulticast mode [ 105.305741][ T6265] sit0: entered promiscuous mode [ 107.394132][ T6339] netlink: 'syz.4.107': attribute type 13 has an invalid length. [ 107.402062][ T6339] netlink: 'syz.4.107': attribute type 58 has an invalid length. [ 107.430687][ T6339] netlink: 152 bytes leftover after parsing attributes in process `syz.4.107'. [ 108.636242][ T6267] netlink: 763 bytes leftover after parsing attributes in process `syz.0.96'. [ 108.646379][ T6279] C: renamed from team_slave_0 (while UP) [ 108.654610][ T6279] netlink: 'syz.2.99': attribute type 3 has an invalid length. [ 108.662546][ T6279] netlink: 152 bytes leftover after parsing attributes in process `syz.2.99'. [ 108.676018][ T6279] A link change request failed with some changes committed already. Interface C may have been left with an inconsistent configuration, please check. [ 108.778695][ T6355] netlink: 40 bytes leftover after parsing attributes in process `syz.0.111'. [ 108.938157][ T6363] netlink: 4 bytes leftover after parsing attributes in process `syz.4.114'. [ 109.018247][ T6367] netlink: 'syz.4.114': attribute type 21 has an invalid length. [ 109.053427][ T6367] netlink: 128 bytes leftover after parsing attributes in process `syz.4.114'. [ 109.303744][ T6376] netlink: 152 bytes leftover after parsing attributes in process `syz.1.117'. [ 109.697294][ T6390] netlink: 'syz.1.121': attribute type 10 has an invalid length. [ 109.727332][ T6390] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 109.755080][ T6390] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 109.821131][ T6397] netlink: 12 bytes leftover after parsing attributes in process `syz.1.121'. [ 109.847584][ T6392] netlink: 132 bytes leftover after parsing attributes in process `syz.3.122'. [ 109.907035][ T6390] netlink: 'syz.1.121': attribute type 10 has an invalid length. [ 109.944016][ T6390] netlink: 40 bytes leftover after parsing attributes in process `syz.1.121'. [ 109.988754][ T6397] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 109.996412][ T6397] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 110.016274][ T6397] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 110.028488][ T6397] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 110.069473][ T6397] bond0: (slave batadv0): Releasing backup interface [ 110.097404][ T6403] netlink: 'syz.3.126': attribute type 27 has an invalid length. [ 110.124196][ T6404] netlink: 'syz.3.126': attribute type 27 has an invalid length. [ 110.957284][ T6429] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 111.404134][ T30] audit: type=1107 audit(1760737772.281:2): pid=6443 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 111.416831][ T6444] netlink: 'syz.3.141': attribute type 11 has an invalid length. [ 111.471345][ T6452] netlink: 'syz.3.141': attribute type 21 has an invalid length. [ 111.582661][ T6457] netlink: 'syz.4.145': attribute type 7 has an invalid length. [ 119.537252][ T6514] netlink: 'syz.0.159': attribute type 1 has an invalid length. [ 120.593700][ T6533] __nla_validate_parse: 6 callbacks suppressed [ 120.593719][ T6533] netlink: 28 bytes leftover after parsing attributes in process `syz.4.165'. [ 120.656276][ T6533] netlink: 28 bytes leftover after parsing attributes in process `syz.4.165'. [ 121.537265][ T6546] syzkaller0: entered promiscuous mode [ 121.551212][ T6546] syzkaller0: entered allmulticast mode [ 124.430026][ T6579] : port 1(veth0_to_bridge) entered blocking state [ 124.437385][ T6579] : port 1(veth0_to_bridge) entered disabled state [ 124.447229][ T6579] veth0_to_bridge: entered allmulticast mode [ 124.458801][ T6579] veth0_to_bridge: entered promiscuous mode [ 125.200986][ T6614] netlink: 12 bytes leftover after parsing attributes in process `syz.1.190'. [ 126.499086][ T6648] netlink: 16 bytes leftover after parsing attributes in process `syz.2.200'. [ 128.765446][ T6690] netlink: 16 bytes leftover after parsing attributes in process `syz.3.212'. [ 129.072800][ T6698] netlink: 16 bytes leftover after parsing attributes in process `syz.3.217'. [ 129.205885][ T6710] syz.2.221 uses obsolete (PF_INET,SOCK_PACKET) [ 129.344970][ T6707] can: request_module (can-proto-0) failed. [ 129.702531][ T6724] netlink: 36 bytes leftover after parsing attributes in process `syz.3.224'. [ 129.711436][ T6724] netlink: 35 bytes leftover after parsing attributes in process `syz.3.224'. [ 129.734339][ T6725] netlink: 40 bytes leftover after parsing attributes in process `syz.3.224'. [ 129.738809][ T6724] netlink: 35 bytes leftover after parsing attributes in process `syz.3.224'. [ 129.949150][ T6730] netlink: 16 bytes leftover after parsing attributes in process `syz.1.228'. [ 130.008957][ T6732] netlink: 'syz.4.227': attribute type 3 has an invalid length. [ 130.018794][ T6732] netlink: 12 bytes leftover after parsing attributes in process `syz.4.227'. [ 130.044044][ T6732] netlink: 'syz.4.227': attribute type 3 has an invalid length. [ 130.051971][ T6732] netlink: 12 bytes leftover after parsing attributes in process `syz.4.227'. [ 130.857188][ T6746] netlink: 'syz.2.231': attribute type 13 has an invalid length. [ 130.898708][ T6750] netlink: 'syz.2.231': attribute type 1 has an invalid length. [ 131.271149][ T6777] netlink: 'syz.3.242': attribute type 22 has an invalid length. [ 131.570590][ T6787] netlink: 'syz.4.245': attribute type 1 has an invalid length. [ 131.612351][ T6787] netlink: 'syz.4.245': attribute type 2 has an invalid length. [ 132.012559][ T6807] __nla_validate_parse: 7 callbacks suppressed [ 132.012578][ T6807] netlink: 60 bytes leftover after parsing attributes in process `syz.0.251'. [ 132.126962][ T6807] netlink: 60 bytes leftover after parsing attributes in process `syz.0.251'. [ 132.351831][ T6822] netlink: 20 bytes leftover after parsing attributes in process `syz.4.255'. [ 132.370846][ T6819] netlink: 8 bytes leftover after parsing attributes in process `syz.4.255'. [ 132.595616][ T6828] netlink: 16 bytes leftover after parsing attributes in process `syz.2.258'. [ 132.755135][ T30] audit: type=1107 audit(1760737793.651:3): pid=6832 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg=' 6ju);!rIyoP,ϱTG^1#车$Lr #YOQsyfs$ª8=1l<|>5nk !TNJ'j!n ր' [ 132.757441][ T6833] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 133.067587][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 133.076018][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 133.195637][ T6846] .3c: renamed from veth0_to_hsr (while UP) [ 133.269304][ T6845] netlink: 199836 bytes leftover after parsing attributes in process `syz.3.260'. [ 135.240375][ T6870] netlink: 16 bytes leftover after parsing attributes in process `syz.3.272'. [ 135.385401][ T6880] netlink: 16 bytes leftover after parsing attributes in process `syz.1.274'. [ 136.175637][ T6894] netlink: 'syz.0.278': attribute type 10 has an invalid length. [ 136.483329][ T6901] tc_dump_action: action bad kind [ 136.744515][ T6916] netlink: zone id is out of range [ 136.973955][ T6914] netlink: 20 bytes leftover after parsing attributes in process `syz.3.283'. [ 136.996263][ T6922] netlink: 'syz.4.285': attribute type 3 has an invalid length. [ 137.586692][ T6924] netlink: 16186 bytes leftover after parsing attributes in process `syz.3.286'. [ 137.905115][ T6926] netlink: 16 bytes leftover after parsing attributes in process `syz.3.287'. [ 138.862881][ T6945] netlink: 'syz.1.295': attribute type 5 has an invalid length. [ 138.874397][ T6945] netlink: 'syz.1.295': attribute type 5 has an invalid length. [ 138.910810][ T6951] netlink: 48 bytes leftover after parsing attributes in process `syz.4.297'. [ 138.944515][ T6946] netlink: 128 bytes leftover after parsing attributes in process `syz.3.296'. [ 138.955041][ T6946] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 139.058520][ T6956] netlink: 16 bytes leftover after parsing attributes in process `syz.0.298'. [ 139.998663][ T6986] netlink: 8 bytes leftover after parsing attributes in process `syz.4.310'. [ 140.086926][ T6996] netlink: 16 bytes leftover after parsing attributes in process `syz.1.313'. [ 140.548468][ T7003] netlink: 12 bytes leftover after parsing attributes in process `syz.1.316'. [ 140.651723][ T7003] netlink: 4595 bytes leftover after parsing attributes in process `syz.1.316'. [ 141.015092][ T7033] netlink: 16 bytes leftover after parsing attributes in process `syz.4.327'. [ 141.409010][ T7043] FAULT_INJECTION: forcing a failure. [ 141.409010][ T7043] name failslab, interval 1, probability 0, space 0, times 1 [ 141.435838][ T7043] CPU: 0 UID: 0 PID: 7043 Comm: syz.0.329 Not tainted syzkaller #0 PREEMPT(full) [ 141.435868][ T7043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 141.435884][ T7043] Call Trace: [ 141.435892][ T7043] [ 141.435900][ T7043] dump_stack_lvl+0x189/0x250 [ 141.435935][ T7043] ? __pfx____ratelimit+0x10/0x10 [ 141.435962][ T7043] ? __pfx_dump_stack_lvl+0x10/0x10 [ 141.435981][ T7043] ? __pfx__printk+0x10/0x10 [ 141.436005][ T7043] ? __pfx___might_resched+0x10/0x10 [ 141.436032][ T7043] should_fail_ex+0x414/0x560 [ 141.436063][ T7043] should_failslab+0xa8/0x100 [ 141.436087][ T7043] __kmalloc_noprof+0xcb/0x7f0 [ 141.436105][ T7043] ? kfree+0x4d/0x6d0 [ 141.436118][ T7043] ? tomoyo_realpath_from_path+0xe3/0x5d0 [ 141.436146][ T7043] tomoyo_realpath_from_path+0xe3/0x5d0 [ 141.436168][ T7043] ? tomoyo_domain+0xd9/0x130 [ 141.436195][ T7043] ? tomoyo_path_number_perm+0x1bc/0x5a0 [ 141.436271][ T7043] tomoyo_path_number_perm+0x1e8/0x5a0 [ 141.436299][ T7043] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 141.436362][ T7043] ? __fget_files+0x2a/0x420 [ 141.436387][ T7043] ? __fget_files+0x3a0/0x420 [ 141.436407][ T7043] ? __fget_files+0x2a/0x420 [ 141.436431][ T7043] security_file_ioctl+0xcb/0x2d0 [ 141.436457][ T7043] __se_sys_ioctl+0x47/0x170 [ 141.436476][ T7043] do_syscall_64+0xfa/0xfa0 [ 141.436493][ T7043] ? lockdep_hardirqs_on+0x9c/0x150 [ 141.436510][ T7043] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 141.436527][ T7043] ? clear_bhb_loop+0x60/0xb0 [ 141.436548][ T7043] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 141.436565][ T7043] RIP: 0033:0x7fc697d8efc9 [ 141.436588][ T7043] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 141.436602][ T7043] RSP: 002b:00007fc698b63038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 141.436621][ T7043] RAX: ffffffffffffffda RBX: 00007fc697fe5fa0 RCX: 00007fc697d8efc9 [ 141.436634][ T7043] RDX: 0000200000000040 RSI: 000000004008240b RDI: 0000000000000003 [ 141.436645][ T7043] RBP: 00007fc698b63090 R08: 0000000000000000 R09: 0000000000000000 [ 141.436655][ T7043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 141.436665][ T7043] R13: 00007fc697fe6038 R14: 00007fc697fe5fa0 R15: 00007ffedbb9bdc8 [ 141.436696][ T7043] [ 141.436704][ T7043] ERROR: Out of memory at tomoyo_realpath_from_path. [ 142.205190][ T7070] netlink: 'syz.2.337': attribute type 3 has an invalid length. [ 143.127326][ T7096] FAULT_INJECTION: forcing a failure. [ 143.127326][ T7096] name failslab, interval 1, probability 0, space 0, times 0 [ 143.199702][ T7096] CPU: 1 UID: 0 PID: 7096 Comm: syz.3.347 Not tainted syzkaller #0 PREEMPT(full) [ 143.199728][ T7096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 143.199738][ T7096] Call Trace: [ 143.199746][ T7096] [ 143.199753][ T7096] dump_stack_lvl+0x189/0x250 [ 143.199778][ T7096] ? __pfx____ratelimit+0x10/0x10 [ 143.199806][ T7096] ? __pfx_dump_stack_lvl+0x10/0x10 [ 143.199825][ T7096] ? __pfx__printk+0x10/0x10 [ 143.199852][ T7096] ? __pfx___might_resched+0x10/0x10 [ 143.199873][ T7096] ? fs_reclaim_acquire+0x7d/0x100 [ 143.199901][ T7096] should_fail_ex+0x414/0x560 [ 143.199934][ T7096] should_failslab+0xa8/0x100 [ 143.199958][ T7096] __kmalloc_noprof+0xcb/0x7f0 [ 143.199977][ T7096] ? tomoyo_encode+0x28b/0x550 [ 143.200005][ T7096] tomoyo_encode+0x28b/0x550 [ 143.200032][ T7096] tomoyo_realpath_from_path+0x58d/0x5d0 [ 143.200055][ T7096] ? tomoyo_domain+0xd9/0x130 [ 143.200083][ T7096] ? tomoyo_path_number_perm+0x1bc/0x5a0 [ 143.200109][ T7096] tomoyo_path_number_perm+0x1e8/0x5a0 [ 143.200138][ T7096] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 143.200165][ T7096] ? ksys_write+0x1cb/0x250 [ 143.200229][ T7096] ? __fget_files+0x2a/0x420 [ 143.200262][ T7096] ? __fget_files+0x3a0/0x420 [ 143.200282][ T7096] ? __fget_files+0x2a/0x420 [ 143.200308][ T7096] security_file_ioctl+0xcb/0x2d0 [ 143.200336][ T7096] __se_sys_ioctl+0x47/0x170 [ 143.200357][ T7096] do_syscall_64+0xfa/0xfa0 [ 143.200374][ T7096] ? lockdep_hardirqs_on+0x9c/0x150 [ 143.200392][ T7096] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 143.200409][ T7096] ? clear_bhb_loop+0x60/0xb0 [ 143.200431][ T7096] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 143.200448][ T7096] RIP: 0033:0x7f9fccd8efc9 [ 143.200465][ T7096] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 143.200478][ T7096] RSP: 002b:00007f9fcdc7b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 143.200498][ T7096] RAX: ffffffffffffffda RBX: 00007f9fccfe5fa0 RCX: 00007f9fccd8efc9 [ 143.200511][ T7096] RDX: 0000200000000040 RSI: 000000004008240b RDI: 0000000000000003 [ 143.200522][ T7096] RBP: 00007f9fcdc7b090 R08: 0000000000000000 R09: 0000000000000000 [ 143.200532][ T7096] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 143.200543][ T7096] R13: 00007f9fccfe6038 R14: 00007f9fccfe5fa0 R15: 00007fffa53f72a8 [ 143.200578][ T7096] [ 143.200599][ T7096] ERROR: Out of memory at tomoyo_realpath_from_path. [ 144.318843][ T7116] __nla_validate_parse: 3 callbacks suppressed [ 144.318878][ T7116] netlink: 16 bytes leftover after parsing attributes in process `syz.3.353'. [ 145.159924][ T7122] netlink: 56 bytes leftover after parsing attributes in process `syz.4.355'. [ 145.760145][ T7143] netlink: 'syz.2.360': attribute type 10 has an invalid length. [ 145.813292][ T7143] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 145.956000][ T7150] netlink: 'syz.1.363': attribute type 10 has an invalid length. [ 146.013205][ T7150] lo: entered promiscuous mode [ 146.023903][ T7150] bond0: (slave lo): enslaved VLAN challenged slave. Adding VLANs will be blocked as long as it is part of bond. [ 146.049521][ T7153] netlink: 188 bytes leftover after parsing attributes in process `syz.3.364'. [ 146.072517][ T7151] netlink: 60 bytes leftover after parsing attributes in process `syz.1.363'. [ 146.100517][ T7150] netlink: 60 bytes leftover after parsing attributes in process `syz.1.363'. [ 146.268655][ T7168] netlink: 8 bytes leftover after parsing attributes in process `syz.0.371'. [ 146.383263][ T7168] netlink: 48 bytes leftover after parsing attributes in process `syz.0.371'. [ 146.787403][ T7188] netlink: 'syz.3.377': attribute type 2 has an invalid length. [ 147.112516][ T7209] netlink: 'syz.0.383': attribute type 4 has an invalid length. [ 147.134088][ T7209] netlink: 152 bytes leftover after parsing attributes in process `syz.0.383'. [ 147.225632][ T7209] A link change request failed with some changes committed already. Interface hsr_slave_1 may have been left with an inconsistent configuration, please check. [ 147.565913][ T7225] netlink: 104 bytes leftover after parsing attributes in process `syz.2.389'. [ 147.708115][ T7237] netlink: 'syz.4.391': attribute type 10 has an invalid length. [ 147.896683][ T7245] netlink: 16 bytes leftover after parsing attributes in process `syz.2.394'. [ 148.431080][ T7261] netlink: 'syz.0.400': attribute type 39 has an invalid length. [ 148.685204][ T7266] syzkaller0: entered promiscuous mode [ 148.690744][ T7266] syzkaller0: entered allmulticast mode [ 149.222773][ T7279] netlink: 'syz.2.404': attribute type 2 has an invalid length. [ 149.230619][ T7279] netlink: 'syz.2.404': attribute type 8 has an invalid length. [ 149.805219][ T7293] netlink: 'syz.2.410': attribute type 10 has an invalid length. [ 149.863299][ T7293] bond0: (slave dummy0): Releasing backup interface [ 149.874720][ T7298] netlink: 'syz.2.410': attribute type 10 has an invalid length. [ 150.080717][ T7293] team0: Port device dummy0 added [ 150.125969][ T7298] team0: Port device dummy0 removed [ 150.171999][ T7298] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 150.848238][ T7321] __nla_validate_parse: 1 callbacks suppressed [ 150.848259][ T7321] netlink: 4 bytes leftover after parsing attributes in process `syz.2.418'. [ 151.498223][ T7328] netlink: zone id is out of range [ 151.507517][ T7328] netlink: zone id is out of range [ 151.522806][ T7328] netlink: zone id is out of range [ 151.538700][ T7328] netlink: zone id is out of range [ 151.569545][ T7330] netlink: 'syz.4.421': attribute type 2 has an invalid length. [ 151.612612][ T7330] netlink: 137592 bytes leftover after parsing attributes in process `syz.4.421'. [ 151.628791][ T7330] nbd: socks must be embedded in a SOCK_ITEM attr [ 151.918348][ T7328] netlink: set zone limit has 8 unknown bytes [ 151.946730][ T7342] IPv6: Can't replace route, no match found [ 152.493202][ T7356] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 152.526051][ T7351] netlink: 'syz.4.426': attribute type 10 has an invalid length. [ 152.545245][ T7351] netlink: 56823 bytes leftover after parsing attributes in process `syz.4.426'. [ 152.569599][ T7353] netlink: 'syz.2.427': attribute type 10 has an invalid length. [ 152.745578][ T7353] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 152.989775][ T7353] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 153.339628][ T7353] bond0: (slave batadv_slave_0): Enslaving as an active interface with an up link [ 153.519215][ T7364] netlink: 24 bytes leftover after parsing attributes in process `syz.2.431'. [ 154.753770][ T7379] netlink: 16 bytes leftover after parsing attributes in process `syz.0.433'. [ 155.310609][ T7391] netlink: 'syz.0.438': attribute type 10 has an invalid length. [ 155.355425][ T7391] veth1_vlan: entered allmulticast mode [ 155.734077][ T7391] team0: Device veth1_vlan failed to register rx_handler [ 156.579713][ T7413] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 156.608663][ T7413] netlink: 'syz.4.443': attribute type 10 has an invalid length. [ 156.627187][ T7413] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 156.729728][ T7413] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 156.921996][ T7413] bond0: (slave batadv_slave_0): Enslaving as an active interface with an up link [ 157.056418][ T7425] netlink: del zone limit has 4 unknown bytes [ 157.070560][ T7425] netlink: 12 bytes leftover after parsing attributes in process `syz.1.446'. [ 157.139135][ T7424] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 157.151710][ T7424] netlink: 64 bytes leftover after parsing attributes in process `syz.0.448'. [ 157.173347][ T7428] netlink: 'syz.1.446': attribute type 13 has an invalid length. [ 157.913807][ T7435] netlink: 16 bytes leftover after parsing attributes in process `syz.4.452'. [ 158.082291][ T7441] netlink: 112 bytes leftover after parsing attributes in process `syz.0.453'. [ 158.273802][ T7449] netlink: 16 bytes leftover after parsing attributes in process `syz.4.454'. [ 159.000373][ T7459] netlink: 'syz.0.457': attribute type 12 has an invalid length. [ 159.042587][ T7459] netlink: 9472 bytes leftover after parsing attributes in process `syz.0.457'. [ 161.573592][ T7460] netlink: 'syz.4.458': attribute type 23 has an invalid length. [ 161.765225][ T7482] netlink: 68 bytes leftover after parsing attributes in process `syz.0.463'. [ 161.811475][ T7485] netlink: 12 bytes leftover after parsing attributes in process `syz.1.461'. [ 161.823573][ T7485] netlink: 12 bytes leftover after parsing attributes in process `syz.1.461'. [ 161.852429][ T7485] netlink: 'syz.1.461': attribute type 4 has an invalid length. [ 162.040691][ T7485] syzkaller0: entered promiscuous mode [ 162.052966][ T7485] syzkaller0: entered allmulticast mode [ 162.162029][ T7488] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.171279][ T7488] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.205137][ T7488] bridge0: entered allmulticast mode [ 162.228025][ T7491] netlink: 16 bytes leftover after parsing attributes in process `syz.0.466'. [ 162.359002][ T7488] bridge_slave_1: left allmulticast mode [ 162.380242][ T7488] bridge_slave_1: left promiscuous mode [ 162.402328][ T7488] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.856997][ T7488] bridge_slave_0: left allmulticast mode [ 162.863258][ T7488] bridge_slave_0: left promiscuous mode [ 162.869672][ T7488] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.244354][ T7512] netlink: 16 bytes leftover after parsing attributes in process `syz.4.472'. [ 163.265922][ T7512] FAULT_INJECTION: forcing a failure. [ 163.265922][ T7512] name failslab, interval 1, probability 0, space 0, times 0 [ 163.279844][ T7512] CPU: 1 UID: 0 PID: 7512 Comm: syz.4.472 Not tainted syzkaller #0 PREEMPT(full) [ 163.279883][ T7512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 163.279899][ T7512] Call Trace: [ 163.279906][ T7512] [ 163.279914][ T7512] dump_stack_lvl+0x189/0x250 [ 163.279938][ T7512] ? __pfx____ratelimit+0x10/0x10 [ 163.279964][ T7512] ? __pfx_dump_stack_lvl+0x10/0x10 [ 163.279982][ T7512] ? __pfx__printk+0x10/0x10 [ 163.280006][ T7512] ? __pfx___might_resched+0x10/0x10 [ 163.280026][ T7512] ? fs_reclaim_acquire+0x7d/0x100 [ 163.280051][ T7512] should_fail_ex+0x414/0x560 [ 163.280082][ T7512] should_failslab+0xa8/0x100 [ 163.280105][ T7512] __kmalloc_noprof+0xcb/0x7f0 [ 163.280122][ T7512] ? tomoyo_encode+0x28b/0x550 [ 163.280147][ T7512] tomoyo_encode+0x28b/0x550 [ 163.280172][ T7512] tomoyo_realpath_from_path+0x58d/0x5d0 [ 163.280193][ T7512] ? tomoyo_domain+0xd9/0x130 [ 163.280215][ T7512] ? tomoyo_path_number_perm+0x1bc/0x5a0 [ 163.280236][ T7512] tomoyo_path_number_perm+0x1e8/0x5a0 [ 163.280260][ T7512] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 163.280282][ T7512] ? trace_call_bpf+0x7af/0xb50 [ 163.280335][ T7512] ? __fget_files+0x2a/0x420 [ 163.280357][ T7512] ? __fget_files+0x3a0/0x420 [ 163.280372][ T7512] ? __fget_files+0x2a/0x420 [ 163.280393][ T7512] security_file_ioctl+0xcb/0x2d0 [ 163.280415][ T7512] __se_sys_ioctl+0x47/0x170 [ 163.280432][ T7512] do_syscall_64+0xfa/0xfa0 [ 163.280449][ T7512] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 163.280463][ T7512] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 163.280477][ T7512] ? clear_bhb_loop+0x60/0xb0 [ 163.280495][ T7512] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 163.280509][ T7512] RIP: 0033:0x7f9caa58efc9 [ 163.280524][ T7512] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 163.280545][ T7512] RSP: 002b:00007f9cab3f4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 163.280562][ T7512] RAX: ffffffffffffffda RBX: 00007f9caa7e6090 RCX: 00007f9caa58efc9 [ 163.280572][ T7512] RDX: 0000200000002280 RSI: 0000000000008922 RDI: 0000000000000004 [ 163.280581][ T7512] RBP: 00007f9cab3f4090 R08: 0000000000000000 R09: 0000000000000000 [ 163.280590][ T7512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 163.280598][ T7512] R13: 00007f9caa7e6128 R14: 00007f9caa7e6090 R15: 00007ffd6c41bcd8 [ 163.280625][ T7512] [ 163.280698][ T7512] ERROR: Out of memory at tomoyo_realpath_from_path. [ 164.700103][ T7518] netlink: 'syz.4.476': attribute type 21 has an invalid length. [ 164.736919][ T7518] netlink: 16 bytes leftover after parsing attributes in process `syz.4.476'. [ 164.837078][ T7523] netlink: 332 bytes leftover after parsing attributes in process `syz.1.477'. [ 164.857236][ T7528] netlink: 300 bytes leftover after parsing attributes in process `syz.0.479'. [ 165.138508][ T7538] netlink: 16 bytes leftover after parsing attributes in process `syz.3.481'. [ 166.361235][ T7586] netlink: 'syz.1.497': attribute type 21 has an invalid length. [ 166.911157][ T7621] netlink: 16 bytes leftover after parsing attributes in process `syz.3.509'. [ 166.988850][ T7629] netlink: 16 bytes leftover after parsing attributes in process `syz.2.511'. [ 167.155114][ T7633] netlink: 68 bytes leftover after parsing attributes in process `syz.2.512'. [ 168.000839][ T7648] netlink: 68 bytes leftover after parsing attributes in process `syz.1.515'. [ 168.171875][ T7662] netlink: 16 bytes leftover after parsing attributes in process `syz.0.520'. [ 168.224622][ T7668] netlink: 72 bytes leftover after parsing attributes in process `syz.2.521'. [ 168.241146][ T7668] netlink: 72 bytes leftover after parsing attributes in process `syz.2.521'. [ 168.291481][ T7660] netlink: 'syz.2.521': attribute type 1 has an invalid length. [ 168.356190][ T7672] netlink: 'syz.3.523': attribute type 10 has an invalid length. [ 168.364060][ T7672] netlink: 168 bytes leftover after parsing attributes in process `syz.3.523'. [ 168.680717][ T7660] netlink: 2 bytes leftover after parsing attributes in process `syz.2.521'. [ 168.865844][ T7677] netlink: 'syz.4.524': attribute type 2 has an invalid length. [ 170.675093][ T7734] netlink: 'syz.2.541': attribute type 1 has an invalid length. [ 170.684535][ T7734] netlink: 8 bytes leftover after parsing attributes in process `syz.2.541'. [ 171.784282][ T7772] netlink: 84 bytes leftover after parsing attributes in process `syz.3.552'. [ 173.069955][ T7805] netlink: 16 bytes leftover after parsing attributes in process `syz.4.564'. [ 173.079910][ T7804] netlink: 16 bytes leftover after parsing attributes in process `syz.4.564'. [ 174.524657][ T7834] netlink: 16 bytes leftover after parsing attributes in process `syz.4.573'. [ 175.608771][ T7890] pim6reg1: entered allmulticast mode [ 175.627281][ T7890] pim6reg1: entered promiscuous mode [ 175.741546][ T7883] syzkaller0: entered promiscuous mode [ 175.774773][ T30] audit: type=1107 audit(1760737836.671:4): pid=7892 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 176.884532][ T7930] netlink: 188 bytes leftover after parsing attributes in process `syz.4.604'. [ 177.878189][ T7895] netlink: 132 bytes leftover after parsing attributes in process `syz.0.593'. [ 178.083079][ T7936] netlink: 16 bytes leftover after parsing attributes in process `syz.4.607'. [ 180.620572][ T8005] netlink: 'syz.0.626': attribute type 13 has an invalid length. [ 180.807223][ T8005] netlink: 'syz.0.626': attribute type 58 has an invalid length. [ 181.051828][ T8005] netlink: 152 bytes leftover after parsing attributes in process `syz.0.626'. [ 181.527794][ T8013] netlink: 'syz.1.628': attribute type 4 has an invalid length. [ 181.859407][ T8027] netlink: 152 bytes leftover after parsing attributes in process `syz.0.633'. [ 182.466142][ T8039] netlink: 5 bytes leftover after parsing attributes in process `syz.2.636'. [ 183.098597][ T8060] netlink: 16 bytes leftover after parsing attributes in process `syz.4.641'. [ 183.939188][ T8094] netlink: 152 bytes leftover after parsing attributes in process `syz.2.650'. [ 184.413113][ T8101] netlink: 5 bytes leftover after parsing attributes in process `syz.0.653'. [ 184.473402][ T8112] netlink: 36 bytes leftover after parsing attributes in process `syz.3.658'. [ 184.763492][ T8119] netlink: 'syz.4.660': attribute type 10 has an invalid length. [ 184.800740][ T8119] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 184.825451][ T8119] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 184.863507][ T8119] netlink: 12 bytes leftover after parsing attributes in process `syz.4.660'. [ 184.884133][ T8119] netlink: 'syz.4.660': attribute type 10 has an invalid length. [ 184.891911][ T8119] netlink: 40 bytes leftover after parsing attributes in process `syz.4.660'. [ 184.908828][ T8119] batadv0: entered promiscuous mode [ 184.914739][ T8119] batadv0: entered allmulticast mode [ 184.927224][ T8119] bond0: (slave batadv0): Releasing backup interface [ 184.967850][ T8119] A link change request failed with some changes committed already. Interface batadv0 may have been left with an inconsistent configuration, please check. [ 184.986205][ T8124] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 184.996361][ T8124] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 185.018824][ T8126] netlink: 'syz.2.662': attribute type 13 has an invalid length. [ 185.030619][ T8126] netlink: 'syz.2.662': attribute type 58 has an invalid length. [ 185.031587][ T8124] batman_adv: batadv0: Interface deactivated: veth1_virt_wifi [ 185.039450][ T8126] netlink: 152 bytes leftover after parsing attributes in process `syz.2.662'. [ 185.063206][ T8124] batman_adv: batadv0: Removing interface: veth1_virt_wifi [ 185.537782][ T8132] netlink: 8 bytes leftover after parsing attributes in process `syz.4.664'. [ 185.566546][ T8132] IPv6: NLM_F_CREATE should be specified when creating new route [ 186.019925][ T8149] netlink: 48 bytes leftover after parsing attributes in process `syz.3.671'. [ 186.092395][ T8155] netlink: 'syz.2.675': attribute type 10 has an invalid length. [ 186.153909][ T8155] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 186.165997][ T8155] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 186.232341][ T8155] netlink: 12 bytes leftover after parsing attributes in process `syz.2.675'. [ 186.263307][ T8155] netlink: 'syz.2.675': attribute type 10 has an invalid length. [ 186.279919][ T8155] batadv0: entered promiscuous mode [ 186.291403][ T8155] batadv0: entered allmulticast mode [ 186.356595][ T8155] bond0: (slave batadv0): Releasing backup interface [ 186.667338][ T8170] netlink: 'syz.3.678': attribute type 10 has an invalid length. [ 186.689480][ T8155] bridge0: port 4(batadv0) entered blocking state [ 186.696864][ T8155] bridge0: port 4(batadv0) entered disabled state [ 186.750653][ T8162] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 186.758635][ T8162] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 186.869372][ T8162] bridge0: port 4(batadv0) entered disabled state [ 186.917628][ T8170] team0: Port device dummy0 added [ 187.703801][ T8189] netlink: 'syz.4.685': attribute type 4 has an invalid length. [ 187.711586][ T8189] netlink: 'syz.4.685': attribute type 17 has an invalid length. [ 187.982412][ T8199] netlink: 'syz.3.688': attribute type 33 has an invalid length. [ 188.141088][ T8204] __nla_validate_parse: 5 callbacks suppressed [ 188.141103][ T8204] netlink: 180 bytes leftover after parsing attributes in process `syz.4.690'. [ 188.258485][ T8219] netlink: 'syz.1.692': attribute type 1 has an invalid length. [ 188.288389][ T8219] netlink: 4 bytes leftover after parsing attributes in process `syz.1.692'. [ 188.582553][ T8214] netlink: 60 bytes leftover after parsing attributes in process `syz.1.692'. [ 188.689503][ T8219] netlink: 60 bytes leftover after parsing attributes in process `syz.1.692'. [ 188.747286][ T8214] netlink: 60 bytes leftover after parsing attributes in process `syz.1.692'. [ 188.771727][ T5151] Bluetooth: hci0: unexpected subevent 0x12 length: 150 > 5 [ 190.514676][ T8265] netlink: 16 bytes leftover after parsing attributes in process `syz.2.705'. [ 190.691506][ T8278] netlink: 'syz.1.707': attribute type 10 has an invalid length. [ 190.727313][ T8278] team0: Port device dummy0 added [ 190.749494][ T8280] netlink: 28 bytes leftover after parsing attributes in process `syz.0.709'. [ 190.762694][ T8280] netlink: 28 bytes leftover after parsing attributes in process `syz.0.709'. [ 191.538920][ T8292] syzkaller0: entered promiscuous mode [ 191.548299][ T8292] syzkaller0: entered allmulticast mode [ 192.203826][ T8320] netlink: 24 bytes leftover after parsing attributes in process `syz.4.721'. [ 193.402213][ T8318] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 193.409739][ T8318] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 193.682692][ T8335] netlink: 'syz.0.726': attribute type 10 has an invalid length. [ 193.916757][ T8344] netlink: 4 bytes leftover after parsing attributes in process `syz.4.731'. [ 193.967655][ T8351] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.733'. [ 193.980711][ T8351] openvswitch: netlink: Key 32 has unexpected len 4 expected 2 [ 193.994841][ T8351] netlink: 4 bytes leftover after parsing attributes in process `syz.0.733'. [ 194.564102][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 194.570458][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 194.615752][ T8372] netlink: 52 bytes leftover after parsing attributes in process `syz.2.739'. [ 195.883195][ T8374] netlink: 60 bytes leftover after parsing attributes in process `syz.4.736'. [ 196.923151][ T8379] netlink: 60 bytes leftover after parsing attributes in process `syz.4.736'. [ 197.752898][ T8409] Oops: general protection fault, probably for non-canonical address 0xfbd5a5d5a0000003: 0000 [#1] SMP KASAN PTI [ 197.764829][ T8409] KASAN: maybe wild-memory-access in range [0xdead4ead00000018-0xdead4ead0000001f] [ 197.774132][ T8409] CPU: 0 UID: 0 PID: 8409 Comm: syz.3.749 Not tainted syzkaller #0 PREEMPT(full) [ 197.783327][ T8409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 197.793371][ T8409] RIP: 0010:smc_diag_dump_proto+0x4bc/0x1fc0 [ 197.799357][ T8409] Code: 80 3c 2f 00 74 08 48 89 df e8 70 07 2a f7 4c 8b 23 4d 85 e4 0f 84 26 02 00 00 48 89 5c 24 30 49 83 c4 18 4c 89 e0 48 c1 e8 03 <42> 80 3c 28 00 74 08 4c 89 e7 e8 45 07 2a f7 4d 8b 2c 24 49 83 c5 [ 197.818948][ T8409] RSP: 0018:ffffc90003edef60 EFLAGS: 00010a06 [ 197.825015][ T8409] RAX: 1bd5a9d5a0000003 RBX: ffff88805a4b8648 RCX: ffff888025a5bc80 [ 197.832971][ T8409] RDX: 0000000000000000 RSI: 0000000080000001 RDI: 0000000000000000 [ 197.840923][ T8409] RBP: ffffc90003edf2b0 R08: ffff88805a4b805f R09: 1ffff1100b49700b [ 197.848877][ T8409] R10: dffffc0000000000 R11: ffffed100b49700c R12: dead4ead00000018 [ 197.856833][ T8409] R13: dffffc0000000000 R14: ffff88805a4b8000 R15: 1ffff1100b4970c9 [ 197.864790][ T8409] FS: 00007f9fcdc396c0(0000) GS:ffff888125d0c000(0000) knlGS:0000000000000000 [ 197.873704][ T8409] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 197.880270][ T8409] CR2: 000020000000e000 CR3: 000000007f1d8000 CR4: 00000000003526f0 [ 197.888226][ T8409] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 197.896181][ T8409] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 197.904152][ T8409] Call Trace: [ 197.907418][ T8409] [ 197.910347][ T8409] ? perf_trace_run_bpf_submit+0xf9/0x170 [ 197.916069][ T8409] ? __pfx_smc_diag_dump_proto+0x10/0x10 [ 197.921688][ T8409] ? __lruvec_stat_mod_folio+0x6f/0x2e0 [ 197.927228][ T8409] ? __phys_addr+0xd3/0x180 [ 197.931717][ T8409] ? __kasan_kmalloc_large+0x85/0xa0 [ 197.936986][ T8409] ? rcu_is_watching+0x15/0xb0 [ 197.941744][ T8409] ? rcu_is_watching+0x15/0xb0 [ 197.946497][ T8409] ? trace_kmalloc+0x1f/0xd0 [ 197.951082][ T8409] ? __kmalloc_node_track_caller_noprof+0x587/0x800 [ 197.957660][ T8409] ? __alloc_skb+0x142/0x2d0 [ 197.962249][ T8409] ? __build_skb_around+0x262/0x3f0 [ 197.967445][ T8409] smc_diag_dump+0x59/0xa0 [ 197.971849][ T8409] netlink_dump+0x6e4/0xe90 [ 197.976348][ T8409] ? __pfx_netlink_dump+0x10/0x10 [ 197.981362][ T8409] ? __netlink_lookup+0x7db/0x8a0 [ 197.986381][ T8409] ? netlink_lookup+0x30/0x200 [ 197.991133][ T8409] ? netlink_lookup+0x30/0x200 [ 197.995892][ T8409] ? netlink_lookup+0x30/0x200 [ 198.000646][ T8409] __netlink_dump_start+0x5cb/0x7e0 [ 198.005837][ T8409] smc_diag_handler_dump+0x178/0x210 [ 198.011116][ T8409] ? __pfx_smc_diag_handler_dump+0x10/0x10 [ 198.016911][ T8409] ? __pfx_smc_diag_dump+0x10/0x10 [ 198.022016][ T8409] ? sock_diag_lock_handler+0x19/0x290 [ 198.027462][ T8409] ? sock_diag_lock_handler+0x19/0x290 [ 198.032910][ T8409] sock_diag_rcv_msg+0x4cc/0x600 [ 198.037840][ T8409] netlink_rcv_skb+0x208/0x470 [ 198.042595][ T8409] ? __pfx_sock_diag_rcv_msg+0x10/0x10 [ 198.048056][ T8409] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 198.053347][ T8409] ? netlink_deliver_tap+0x2e/0x1b0 [ 198.058547][ T8409] netlink_unicast+0x82f/0x9e0 [ 198.063311][ T8409] ? __pfx_netlink_unicast+0x10/0x10 [ 198.068584][ T8409] ? netlink_sendmsg+0x642/0xb30 [ 198.073520][ T8409] ? skb_put+0x11b/0x210 [ 198.077755][ T8409] netlink_sendmsg+0x805/0xb30 [ 198.082512][ T8409] ? __pfx_netlink_sendmsg+0x10/0x10 [ 198.087786][ T8409] ? aa_sock_msg_perm+0xf1/0x1d0 [ 198.092710][ T8409] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 198.097981][ T8409] ? __pfx_netlink_sendmsg+0x10/0x10 [ 198.103255][ T8409] __sock_sendmsg+0x21c/0x270 [ 198.107922][ T8409] ____sys_sendmsg+0x505/0x830 [ 198.112673][ T8409] ? __pfx_____sys_sendmsg+0x10/0x10 [ 198.117951][ T8409] ? import_iovec+0x74/0xa0 [ 198.122441][ T8409] ___sys_sendmsg+0x21f/0x2a0 [ 198.127101][ T8409] ? __pfx____sys_sendmsg+0x10/0x10 [ 198.132312][ T8409] ? __fget_files+0x2a/0x420 [ 198.136888][ T8409] ? __fget_files+0x3a0/0x420 [ 198.141554][ T8409] __x64_sys_sendmsg+0x19b/0x260 [ 198.146476][ T8409] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 198.151918][ T8409] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 198.158494][ T8409] ? do_syscall_64+0xbe/0xfa0 [ 198.163154][ T8409] do_syscall_64+0xfa/0xfa0 [ 198.167638][ T8409] ? lockdep_hardirqs_on+0x9c/0x150 [ 198.172820][ T8409] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 198.178873][ T8409] ? clear_bhb_loop+0x60/0xb0 [ 198.183556][ T8409] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 198.189433][ T8409] RIP: 0033:0x7f9fccd8efc9 [ 198.193860][ T8409] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 198.213450][ T8409] RSP: 002b:00007f9fcdc39038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 198.221852][ T8409] RAX: ffffffffffffffda RBX: 00007f9fccfe6180 RCX: 00007f9fccd8efc9 [ 198.229811][ T8409] RDX: 0000000000000600 RSI: 0000200000000540 RDI: 0000000000000004 [ 198.237767][ T8409] RBP: 00007f9fcce11f91 R08: 0000000000000000 R09: 0000000000000000 [ 198.245755][ T8409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 198.253719][ T8409] R13: 00007f9fccfe6218 R14: 00007f9fccfe6180 R15: 00007fffa53f72a8 [ 198.261684][ T8409] [ 198.264689][ T8409] Modules linked in: [ 198.269671][ T8409] ---[ end trace 0000000000000000 ]--- [ 198.277176][ T8409] RIP: 0010:smc_diag_dump_proto+0x4bc/0x1fc0 [ 198.283482][ T8409] Code: 80 3c 2f 00 74 08 48 89 df e8 70 07 2a f7 4c 8b 23 4d 85 e4 0f 84 26 02 00 00 48 89 5c 24 30 49 83 c4 18 4c 89 e0 48 c1 e8 03 <42> 80 3c 28 00 74 08 4c 89 e7 e8 45 07 2a f7 4d 8b 2c 24 49 83 c5 [ 198.303234][ T8409] RSP: 0018:ffffc90003edef60 EFLAGS: 00010a06 [ 198.309326][ T8409] RAX: 1bd5a9d5a0000003 RBX: ffff88805a4b8648 RCX: ffff888025a5bc80 [ 198.317364][ T8409] RDX: 0000000000000000 RSI: 0000000080000001 RDI: 0000000000000000 [ 198.325389][ T8409] RBP: ffffc90003edf2b0 R08: ffff88805a4b805f R09: 1ffff1100b49700b [ 198.333457][ T8409] R10: dffffc0000000000 R11: ffffed100b49700c R12: dead4ead00000018 [ 198.341453][ T8409] R13: dffffc0000000000 R14: ffff88805a4b8000 R15: 1ffff1100b4970c9 [ 198.349529][ T8409] FS: 00007f9fcdc396c0(0000) GS:ffff888125d0c000(0000) knlGS:0000000000000000 [ 198.358600][ T8409] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 198.365285][ T8409] CR2: 000020000000e000 CR3: 000000007f1d8000 CR4: 00000000003526f0 [ 198.373710][ T8409] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 198.381943][ T8409] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 198.389984][ T8409] Kernel panic - not syncing: Fatal exception [ 198.396189][ T8409] Kernel Offset: disabled [ 198.400500][ T8409] Rebooting in 86400 seconds..