last executing test programs: 12m33.783456819s ago: executing program 32 (id=31): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0xf242, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xd, &(0x7f0000000040)=[{&(0x7f00000004c0)="2e00000010008188e6b62aa73772cc9f1ba1f848480000005e140602000000000e000a000d000000028000001294", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001d80)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000500)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000700)="ab76469092737287880420aa40", 0xd}], 0x1}, 0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001800)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000000900010073797a300000000048000000030a01020000000000000000010000000900030073797a320000000014000480080002400005000408000140000000000900010073797a300000000008000a4000000002"], 0x124}}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{}, 0x0, 0x0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000640)}, 0x20) socket$kcm(0x1e, 0x4, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x50) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x202, 0x0, 0xffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @loopback={0x0, 0xac14140c}}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x900}, 0x60) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x88, 0x90, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0xaba}, 0x0, 0x1, 0xffffffffffffffff, 0x4) mkdir(&(0x7f00000000c0)='./file0\x00', 0x42) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={@ifindex, 0xffffffffffffffff, 0x6, 0x0, 0xffffffffffffffff, @void, @value=r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x5, 0x0, 0x7, 0x9, 0x0, 0x2, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9, 0xfe00}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0x9, 0xfe04, 0xf1}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x9, 0x2, 0x0, r4}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe5}, 0x94) sendmsg$kcm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000013c0)}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2105, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}, 0x828, 0x0, 0x0, 0x6, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000002c0)="2e00000011008b88040f80ee59acbc04130800480f0000005e2900421803001825800000000000000280000c0012", 0x2e}], 0x1}, 0x0) 12m2.99167538s ago: executing program 33 (id=37): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x2000001946}, 0x100, 0x0, 0x0, 0x8, 0x1, 0x7fffffff, 0xfffc, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x922000000001, 0x106) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000004000)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) socket$kcm(0x11, 0x200000000000002, 0x300) r0 = socket$kcm(0x28, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x28, 0x8, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r3, 0x84, 0x84, 0x0, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c0000002500010125bd867d8fb09eeb361800000800030047"], 0x1c}, 0x1, 0x0, 0x0, 0x4048957}, 0x28040) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) r4 = openat$ppp(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x4004743d, 0x110e22fff6) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r2) r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4000004, 0x200000008}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xfffffffeffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r5) r7 = socket$kcm(0x23, 0x5, 0x0) sendmsg$kcm(r7, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x10004000) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89ed, 0x0) close(r1) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd, 0x2, @perf_config_ext={0x76, 0x1ef7}, 0x10ff2, 0x5, 0x98, 0x6, 0x2, 0x1, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) 11m45.196153602s ago: executing program 34 (id=39): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x80842111, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r1, 0x0, 0x40010002) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x3, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x17}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x3, 0x0, 0x1, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0x11, 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x8, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x3}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_config_ext={0xff, 0x4}, 0x100410, 0x200, 0x2, 0x1, 0x9, 0x1000009, 0x8, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xa8}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) socket$kcm(0x11, 0x2, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000020000000000000000ee000095"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r4, r5, 0x25, 0x0, @val=@kprobe_multi=@addrs={0x1, 0x0, 0x0, 0x0, 0x3}}, 0x30) r6 = perf_event_open(0x0, r0, 0x4, 0xffffffffffffffff, 0x1) r7 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x9549, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x76, 0x1ef6}, 0x117fa, 0x4, 0x0, 0x4, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r0, 0x1, r6, 0x2) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)={[{0x2b, 'perf_event'}, {0x2d, 'memory'}]}, 0x14) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)={0x24, 0x47, 0x107, 0xfffffffe, 0xffffffff, {0x3, 0x7c}, [@nested={0x8, 0x1, 0x0, 0x1, [@typed={0x4, 0x6}]}, @nested={0x8, 0x2, 0x0, 0x1, [@nested={0x4, 0xef}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x4048011}, 0xc000) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000140)='\x00') r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x8080}, 0x20004450) 11m31.415703848s ago: executing program 35 (id=38): perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x6}, 0x828, 0x0, 0x0, 0x0, 0x10000009, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x7) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2048001}, 0x8000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0xfcc9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x1a, &(0x7f0000000000)='/\x00\x02\x00\x00/\x00\x82q\xee\xe5\xa0\xbd\xc2\x98#YP\xee\x9c2\xbe\xf0\x81x\x97'}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000440)='./file0/../file0\x00', 0x0, 0x989046, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x104000, 0x0) socket$kcm(0x2, 0x200000000000001, 0x106) r1 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000440), 0x3d) close(r1) socket$nl_xfrm(0x10, 0x3, 0x6) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) mount$bpf(0x200000000000, 0x0, 0x0, 0x989046, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x989046, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x84000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x200000000000, 0x0, 0x0, 0x8b7848, 0x0) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d00), 0x8) 11m29.287894841s ago: executing program 36 (id=43): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x11, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xa}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xee74}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af3650400420008001d001b31a0e69ee517d34460bc0600e8ea2c0000a705251e6182949a3651f60a84c9f4d4938000e70e4509c5bb937762376e5eb58a72", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$kcm(0x1e, 0x5, 0x0) sendmsg$kcm(r3, &(0x7f0000000540)={&(0x7f0000000900)=@tipc=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="80", 0x1}], 0x1}, 0x0) recvmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000dc0)=""/243, 0xf3}], 0x1, &(0x7f0000000380)=""/2, 0x2}, 0x20) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000080)={0x54, 0x2, 0x6, 0x101, 0x0, 0x0, {0x7}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e20}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000888}, 0x20004000) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_rdma(0x10, 0x3, 0x14) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, 0x0, 0xd732828148db4cd2) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x20000000) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, 0x0, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x3c, 0x12, 0xa, 0x9, 0x0, 0x0, {0x2}, [@NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x9}]}], {0x14}}, 0x64}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)={{0x14}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0xa}}}, 0x86}, 0x1, 0x0, 0x0, 0x8085}, 0x0) r7 = getpid() syz_open_procfs$namespace(r7, &(0x7f0000000280)='ns/net\x00') 9m21.015590602s ago: executing program 37 (id=105): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r0 = getpid() r1 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x4, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff}, [@call={0x85, 0x0, 0x0, 0x79}]}, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r3, 0x0, 0x4840) r4 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="1b0000001a007f029e", 0x9}, {&(0x7f0000000200)="68cabf2dfb58fc0a01", 0x9}], 0x2}, 0x4000000) close(r4) syz_clone(0x2c9a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 9m18.921253623s ago: executing program 38 (id=111): socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0xfff}, 0xc) socket$kcm(0x21, 0x2, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x1, 0x7fff, 0x7fffffff, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = socket(0x840000000002, 0x3, 0xff) sendmsg$kcm(r0, &(0x7f0000002800)={&(0x7f0000001680)=@in={0x2, 0x4a20, @remote}, 0x80, 0x0}, 0x8000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f0000000040)}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuset.memory_pressure\x00', 0x26e1, 0x0) socketpair(0x1, 0x3, 0x0, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x2, 0x0, 0x0, 0x0, 0x480000000000000b, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x10880, 0x4, 0x98, 0x0, 0x2, 0xfffff274, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x24004800) r2 = socket$kcm(0xa, 0x3, 0x73) sendmsg$sock(r2, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x3, 0x10, &(0x7f0000000740)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8994, &(0x7f0000000200)={'bond0\x00', @local}) 7m58.785095896s ago: executing program 7 (id=329): bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5f, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={0x0, 0x3}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x2000c450) socket$nl_rdma(0x10, 0x3, 0x14) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000029c0)={0x0, 0x0, 0x0}, 0x0) 7m58.505340829s ago: executing program 7 (id=334): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f00000100c0)=r5, 0x4) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000180)=r5) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r6, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000000e0605080000000000000000070000020900020073797a320000"], 0x28}}, 0x2400c000) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x10, 0x2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a1d, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r7) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="200000001000010700000000000000000a0000000c0002006e6c3830323131"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x40050) 7m53.489984939s ago: executing program 6 (id=348): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x20000040) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x3}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socket$kcm(0x11, 0x3, 0x0) close(0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x20000000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)={0x2, 0x12, 0x9, 0x9, 0x2, 0x0, 0x70bd26, 0x25dfdbfb}, 0x10}}, 0x40010) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x8, 0xfb, 0x2, 0xfb, 0x0, 0x8, 0x24602, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x7fffffff, 0x1}, 0x104002, 0x0, 0x6, 0x9, 0x10001, 0x2, 0x2, 0x0, 0xcf, 0x0, 0x800}, 0x0, 0x6, 0xffffffffffffffff, 0x3) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000000c0)={0x54, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x54}}, 0x0) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000300)={0x2, 0x0, @private=0xa010102}, 0x10, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='0\x00\x00\x00\x00'], 0x48}, 0xc810) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8010}, 0x200000c0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) close(r0) 7m53.253937104s ago: executing program 6 (id=349): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0xc539, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x6}, 0x10da00, 0x0, 0x0, 0x4, 0x8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8b19, 0x0) socket$kcm(0x2d, 0x2, 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x40}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe40, 0x2b0, &(0x7f0000000100)="b9ff0b078059268cb89e14f088a82de0ffff202000000002000aac14140ce000006a49e832f0", 0x0, 0x28e, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = socket$kcm(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{}, &(0x7f0000000080)=0x1000000, &(0x7f0000000180)=r5}, 0x20) 7m52.814925332s ago: executing program 6 (id=350): perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) socket$kcm(0x2d, 0x2, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x10002) r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x284, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$kcm(0xa, 0x2, 0x0) sendmsg$inet(r3, &(0x7f0000000e00)={&(0x7f0000000180)={0x2, 0x4e24, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000d80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xa2}}], 0x18}, 0x4884) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xf}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x7e6eabe651273ea0, 0x0, &(0x7f0000000440)) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x4000) r5 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r5, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x400c044) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="d80000002000811f4e81f782db44b90402000000e8fe55a1180015000600142603600e1209000a0000000401a80016000a00114006000000036010fab94dcf5c0468c1d67f6f94007134cf6ee0808856e408e8d8ef52b49816277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9db22fe7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db70100000040fad95667e006d8df969b3ef35ce3bb9ad809d561cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e970100040000", 0xd8}], 0x1}, 0x0) 7m52.724867377s ago: executing program 9 (id=352): perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8020, 0x14000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8224, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x1, 0x82240, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x8}, 0x2102, 0x0, 0x0, 0x8, 0x43fd, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000250001012cbd7000fbfffffe5775d26a0800030047"], 0x1c}, 0x1, 0x0, 0x0, 0x4048957}, 0x28850) r1 = socket$kcm(0x21, 0x2, 0x2) setsockopt$sock_attach_bpf(r1, 0x110, 0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@bloom_filter={0x1e, 0x2, 0xffffffff, 0xce8, 0x4100, r0, 0x1ff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x3, 0x2}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x8902, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x8902, &(0x7f00000000c0)={r3}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x6, [@typedef={0x4, 0x0, 0x0, 0x7}, @typedef={0x4, 0x0, 0x0, 0x8, 0x1}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x0, [0x0, 0x0, 0x0, 0xda]}}, 0x0, 0x4e, 0x0, 0x1}, 0x28) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x48) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000800)=@deltaction={0x34, 0x31, 0x400, 0x70bd29, 0x25dfdbff, {}, [@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x10001}}, {0xc, 0xd, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xf80}}]}, @TCA_ACT_TAB={0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0xb33e77d68a6a4d02}, 0x80) close(0x3) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = socket$can_raw(0x1d, 0x3, 0x1) write$cgroup_subtree(r5, 0x0, 0x0) 7m52.703262579s ago: executing program 7 (id=353): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x4, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x1002, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x5}, 0x84c0, 0x2, 0xfffffffe, 0x0, 0x6, 0x0, 0xd8, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x8004, 0x7}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r2, 0x0, &(0x7f0000001700)=""/53}, 0x20) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000070900010073797a310000000014000000020a01020000000000000000010000031c000000000a0103000000000000000002000004080002400000000120000000050a0102000000000000000001000006090001"], 0x98}}, 0x200000d4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r2, 0x0, &(0x7f0000001700)=""/53}, 0x20) perf_event_open(0x0, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r4, 0x8b1a, &(0x7f0000000000)={'wlan1\x00', @random="0000230c1100"}) bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b14, &(0x7f0000000000)={'wlan1\x00', @random="0100008d8dff"}) r5 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000240), 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="9aed9dc184", 0x5}], 0x1}, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x60, 0x1, 0x9, 0x5, 0x0, 0x0, {0x2, 0x0, 0x7}, [@NFCTH_STATUS={0x8}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x3}, @NFCTH_TUPLE={0x18, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x10}}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}]}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0xa}}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_STATUS={0x8}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x13}]}, 0x60}, 0x1, 0x0, 0x0, 0x805}, 0x20000004) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=@newtaction={0x74, 0x30, 0x1, 0x0, 0x0, {}, [{0x60, 0x1, [@m_mpls={0x5c, 0x1, 0x0, 0x0, {{0x9}, {0x30, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x9d, 0x9, 0x7, 0x8, 0x4e19}, 0x1}}, @TCA_MPLS_PROTO={0x6, 0x4, 0x809b}, @TCA_MPLS_TC={0x5, 0x6, 0x3}]}, {0x4, 0x4}, {0xc}, {0xc}}}]}]}, 0x74}}, 0x0) socket$kcm(0x29, 0x7, 0x0) 7m51.717629918s ago: executing program 6 (id=355): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x4, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x1002, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x5}, 0x84c0, 0x2, 0xfffffffe, 0x0, 0x6, 0x0, 0xd8, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x8004, 0x7}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r2, 0x0, &(0x7f0000001700)=""/53}, 0x20) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000070900010073797a310000000014000000020a01020000000000000000010000031c000000000a0103000000000000000002000004080002400000000120000000050a0102000000000000000001000006090001"], 0x98}}, 0x200000d4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r2, 0x0, &(0x7f0000001700)=""/53}, 0x20) perf_event_open(0x0, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r4, 0x8b1a, &(0x7f0000000000)={'wlan1\x00', @random="0000230c1100"}) bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b14, &(0x7f0000000000)={'wlan1\x00', @random="0100008d8dff"}) r5 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000240), 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="9aed9dc184", 0x5}], 0x1}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=@newtaction={0x74, 0x30, 0x1, 0x0, 0x0, {}, [{0x60, 0x1, [@m_mpls={0x5c, 0x1, 0x0, 0x0, {{0x9}, {0x30, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x9d, 0x9, 0x7, 0x8, 0x4e19}, 0x1}}, @TCA_MPLS_PROTO={0x6, 0x4, 0x809b}, @TCA_MPLS_TC={0x5, 0x6, 0x3}]}, {0x4, 0x4}, {0xc}, {0xc}}}]}]}, 0x74}}, 0x0) socket$kcm(0x29, 0x7, 0x0) 7m51.381391152s ago: executing program 9 (id=358): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0xa, &(0x7f0000000080)=@framed={{0x18, 0x3, 0x0, 0x0, 0x4f}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x66}, @initr0, @alu={0x4, 0x0, 0x4, 0x3}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x13) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x9, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000002480)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x41, 0x0, 0x11}, 0x0) r2 = socket$kcm(0x2, 0x5, 0x84) sendmsg$IPSET_CMD_RENAME(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x64, &(0x7f0000000000)=r5, 0x10) sendmsg$inet(r2, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, 0x0}, 0x80d1) socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10, 0x0}, 0x40040d4) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x1e, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x88}]}, &(0x7f0000000040)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) 7m50.822465629s ago: executing program 7 (id=359): socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000001946}, 0x10401, 0x2, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x46, &(0x7f0000000600)=[@cred, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff]}}, @cred]}, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x4a, 0x1, 0x2, 0x0, 0x0, 0x84, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000001946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0xfffd, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10b8}, 0xff00) r1 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[], 0x50) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000880)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x50, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}, @NFTA_SET_DESC={0xc, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x80}]}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x78}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000000a0a0102"], 0x14}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x1a, 0x2, &(0x7f0000000300)=ANY=[@ANYBLOB="8527eb677d82"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) socket$kcm(0xa, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) 7m50.702670485s ago: executing program 9 (id=360): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0xc539, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x6}, 0x10da00, 0x0, 0x0, 0x4, 0x8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8b19, 0x0) socket$kcm(0x2d, 0x2, 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x40}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe40, 0x2b0, &(0x7f0000000100)="b9ff0b078059268cb89e14f088a82de0ffff202000000002000aac14140ce000006a49e832f0", 0x0, 0x28e, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = socket$kcm(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{}, &(0x7f0000000080)=0x1000000, &(0x7f0000000180)=r5}, 0x20) 7m49.742460094s ago: executing program 6 (id=363): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x4, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x1002, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x5}, 0x84c0, 0x2, 0xfffffffe, 0x0, 0x6, 0x0, 0xd8, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x8004, 0x7}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r2, 0x0, &(0x7f0000001700)=""/53}, 0x20) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000070900010073797a310000000014000000020a01020000000000000000010000031c000000000a0103000000000000000002000004080002400000000120000000050a0102000000000000000001000006090001"], 0x98}}, 0x200000d4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r2, 0x0, &(0x7f0000001700)=""/53}, 0x20) perf_event_open(0x0, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r4, 0x8b1a, &(0x7f0000000000)={'wlan1\x00', @random="0000230c1100"}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b14, &(0x7f0000000000)={'wlan1\x00', @random="0100008d8dff"}) r5 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000240), 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="9aed9dc184", 0x5}], 0x1}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r6, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x60, 0x1, 0x9, 0x5, 0x0, 0x0, {0x2, 0x0, 0x7}, [@NFCTH_STATUS={0x8}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x3}, @NFCTH_TUPLE={0x18, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x10}}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}]}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0xa}}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_STATUS={0x8}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x13}]}, 0x60}, 0x1, 0x0, 0x0, 0x805}, 0x20000004) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=@newtaction={0x74, 0x30, 0x1, 0x0, 0x0, {}, [{0x60, 0x1, [@m_mpls={0x5c, 0x1, 0x0, 0x0, {{0x9}, {0x30, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x9d, 0x9, 0x7, 0x8, 0x4e19}, 0x1}}, @TCA_MPLS_PROTO={0x6, 0x4, 0x809b}, @TCA_MPLS_TC={0x5, 0x6, 0x3}]}, {0x4, 0x4}, {0xc}, {0xc}}}]}]}, 0x74}}, 0x0) socket$kcm(0x29, 0x7, 0x0) 7m49.739607584s ago: executing program 9 (id=364): socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_route(0x10, 0x3, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x1, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket(0x840000000002, 0x3, 0xff) socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x2, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$kcm(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000020000000000000002000004000000000000000002000000000000000000000002000000000000000100000000000001"], 0x0, 0x4e}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='freezer.parent_freezing\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x106) socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb8}, 0x42) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1d, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x4}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) 7m49.699561802s ago: executing program 7 (id=365): perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8020, 0x14000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8224, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x1, 0x82240, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x8}, 0x2102, 0x0, 0x0, 0x8, 0x43fd, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000250001012cbd7000fbfffffe5775d26a0800030047"], 0x1c}, 0x1, 0x0, 0x0, 0x4048957}, 0x28850) r1 = socket$kcm(0x21, 0x2, 0x2) setsockopt$sock_attach_bpf(r1, 0x110, 0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@bloom_filter={0x1e, 0x2, 0xffffffff, 0xce8, 0x4100, r0, 0x1ff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x3, 0x2}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x8902, &(0x7f0000000040)) 7m48.440892045s ago: executing program 7 (id=368): perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8020, 0x14000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8224, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x1, 0x82240, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x8}, 0x2102, 0x0, 0x0, 0x8, 0x43fd, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000250001012cbd7000fbfffffe5775d26a0800030047"], 0x1c}, 0x1, 0x0, 0x0, 0x4048957}, 0x28850) r1 = socket$kcm(0x21, 0x2, 0x2) setsockopt$sock_attach_bpf(r1, 0x110, 0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@bloom_filter={0x1e, 0x2, 0xffffffff, 0xce8, 0x4100, r0, 0x1ff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x3, 0x2}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x8902, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x8902, &(0x7f00000000c0)={r3}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x6, [@typedef={0x4, 0x0, 0x0, 0x7}, @typedef={0x4, 0x0, 0x0, 0x8, 0x1}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x0, [0x0, 0x0, 0x0, 0xda]}}, 0x0, 0x4e, 0x0, 0x1}, 0x28) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x48) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000800)=@deltaction={0x34, 0x31, 0x400, 0x70bd29, 0x25dfdbff, {}, [@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x10001}}, {0xc, 0xd, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xf80}}]}, @TCA_ACT_TAB={0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0xb33e77d68a6a4d02}, 0x80) close(0x3) bpf$MAP_CREATE(0x0, 0x0, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 7m48.409687612s ago: executing program 9 (id=369): perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8020, 0x14000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8224, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x1, 0x82240, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x8}, 0x2102, 0x0, 0x0, 0x8, 0x43fd, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000250001012cbd7000fbfffffe5775d26a0800030047"], 0x1c}, 0x1, 0x0, 0x0, 0x4048957}, 0x28850) r1 = socket$kcm(0x21, 0x2, 0x2) setsockopt$sock_attach_bpf(r1, 0x110, 0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@bloom_filter={0x1e, 0x2, 0xffffffff, 0xce8, 0x4100, r0, 0x1ff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x3, 0x2}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x8902, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x8902, &(0x7f00000000c0)={r3}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x6, [@typedef={0x4, 0x0, 0x0, 0x7}, @typedef={0x4, 0x0, 0x0, 0x8, 0x1}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x0, [0x0, 0x0, 0x0, 0xda]}}, 0x0, 0x4e, 0x0, 0x1}, 0x28) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x48) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000800)=@deltaction={0x34, 0x31, 0x400, 0x70bd29, 0x25dfdbff, {}, [@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x10001}}, {0xc, 0xd, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xf80}}]}, @TCA_ACT_TAB={0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0xb33e77d68a6a4d02}, 0x80) close(0x3) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = socket$can_raw(0x1d, 0x3, 0x1) write$cgroup_subtree(r5, 0x0, 0x0) 7m39.073405156s ago: executing program 6 (id=373): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x4, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x1002, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x5}, 0x84c0, 0x2, 0xfffffffe, 0x0, 0x6, 0x0, 0xd8, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x8004, 0x7}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r2, 0x0, &(0x7f0000001700)=""/53}, 0x20) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000070900010073797a310000000014000000020a01020000000000000000010000031c000000000a0103000000000000000002000004080002400000000120000000050a0102000000000000000001000006090001"], 0x98}}, 0x200000d4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r2, 0x0, &(0x7f0000001700)=""/53}, 0x20) perf_event_open(0x0, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r4, 0x8b1a, &(0x7f0000000000)={'wlan1\x00', @random="0000230c1100"}) bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b14, &(0x7f0000000000)={'wlan1\x00', @random="0100008d8dff"}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="9aed9dc184", 0x5}], 0x1}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r6, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x60, 0x1, 0x9, 0x5, 0x0, 0x0, {0x2, 0x0, 0x7}, [@NFCTH_STATUS={0x8}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x3}, @NFCTH_TUPLE={0x18, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x10}}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}]}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0xa}}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_STATUS={0x8}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x13}]}, 0x60}, 0x1, 0x0, 0x0, 0x805}, 0x20000004) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=@newtaction={0x74, 0x30, 0x1, 0x0, 0x0, {}, [{0x60, 0x1, [@m_mpls={0x5c, 0x1, 0x0, 0x0, {{0x9}, {0x30, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x9d, 0x9, 0x7, 0x8, 0x4e19}, 0x1}}, @TCA_MPLS_PROTO={0x6, 0x4, 0x809b}, @TCA_MPLS_TC={0x5, 0x6, 0x3}]}, {0x4, 0x4}, {0xc}, {0xc}}}]}]}, 0x74}}, 0x0) socket$kcm(0x29, 0x7, 0x0) 7m38.737014765s ago: executing program 9 (id=374): perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8020, 0x14000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8224, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x1, 0x82240, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x8}, 0x2102, 0x0, 0x0, 0x8, 0x43fd, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000250001012cbd7000fbfffffe5775d26a0800030047"], 0x1c}, 0x1, 0x0, 0x0, 0x4048957}, 0x28850) r1 = socket$kcm(0x21, 0x2, 0x2) setsockopt$sock_attach_bpf(r1, 0x110, 0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@bloom_filter={0x1e, 0x2, 0xffffffff, 0xce8, 0x4100, r0, 0x1ff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x3, 0x2}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x8902, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x8902, &(0x7f00000000c0)={r3}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x6, [@typedef={0x4, 0x0, 0x0, 0x7}, @typedef={0x4, 0x0, 0x0, 0x8, 0x1}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x0, [0x0, 0x0, 0x0, 0xda]}}, 0x0, 0x4e, 0x0, 0x1}, 0x28) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x48) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000800)=@deltaction={0x34, 0x31, 0x400, 0x70bd29, 0x25dfdbff, {}, [@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x10001}}, {0xc, 0xd, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xf80}}]}, @TCA_ACT_TAB={0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0xb33e77d68a6a4d02}, 0x80) close(0x3) bpf$MAP_CREATE(0x0, 0x0, 0x48) socket$can_raw(0x1d, 0x3, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 7m25.770825876s ago: executing program 39 (id=368): perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8020, 0x14000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8224, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x1, 0x82240, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x8}, 0x2102, 0x0, 0x0, 0x8, 0x43fd, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000250001012cbd7000fbfffffe5775d26a0800030047"], 0x1c}, 0x1, 0x0, 0x0, 0x4048957}, 0x28850) r1 = socket$kcm(0x21, 0x2, 0x2) setsockopt$sock_attach_bpf(r1, 0x110, 0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@bloom_filter={0x1e, 0x2, 0xffffffff, 0xce8, 0x4100, r0, 0x1ff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x3, 0x2}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x8902, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x8902, &(0x7f00000000c0)={r3}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x6, [@typedef={0x4, 0x0, 0x0, 0x7}, @typedef={0x4, 0x0, 0x0, 0x8, 0x1}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x0, [0x0, 0x0, 0x0, 0xda]}}, 0x0, 0x4e, 0x0, 0x1}, 0x28) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x48) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000800)=@deltaction={0x34, 0x31, 0x400, 0x70bd29, 0x25dfdbff, {}, [@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x10001}}, {0xc, 0xd, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xf80}}]}, @TCA_ACT_TAB={0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0xb33e77d68a6a4d02}, 0x80) close(0x3) bpf$MAP_CREATE(0x0, 0x0, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 7m25.327838018s ago: executing program 40 (id=371): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0xa, &(0x7f0000000080)=@framed={{0x18, 0x3, 0x0, 0x0, 0x4f}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x66}, @initr0, @alu={0x4, 0x0, 0x4, 0x3}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x13) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x800c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x9, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000002480)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x41, 0x0, 0x11}, 0x0) r2 = socket$kcm(0x2, 0x5, 0x84) sendmsg$IPSET_CMD_RENAME(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x2, 0x0, 0x9}, {0x10000002, 0x0, 0x0, 0xc}]}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x64, &(0x7f0000000000)=r5, 0x10) sendmsg$inet(r2, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, 0x0}, 0x80d1) socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10, 0x0}, 0x40040d4) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x1e, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x88}]}, &(0x7f0000000040)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) 7m25.210231906s ago: executing program 41 (id=372): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0xc539, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x6}, 0x10da00, 0x0, 0x0, 0x4, 0x8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8b19, 0x0) socket$kcm(0x2d, 0x2, 0x0) r2 = getpid() r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff, 0x40}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x40) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xffffffff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=@newsa={0x104, 0x1a, 0x7, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80, '\x00', 0xc}, @in=@private=0xa010100, 0xfffd, 0x0, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0xee00}, {@in6=@local, 0x0, 0x3c}, @in6=@loopback, {0x0, 0x10000000000000b5, 0x2, 0x6, 0xfffffffffffffffd}, {0x0, 0x200000, 0x3, 0xfffffffffffffffd}, {0x40000, 0x0, 0x2c12}, 0x70bd29, 0x0, 0xa, 0x0, 0x20, 0x68}, [@coaddr={0x14, 0xe, @in=@local}]}, 0x104}, 0x1, 0x0, 0x0, 0x4c0}, 0x4040000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe40, 0x2b0, &(0x7f0000000100)="b9ff0b078059268cb89e14f088a82de0ffff202000000002000aac14140ce000006a49e832f0", 0x0, 0x28e, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="12000000060000000400000002"], 0x48) r7 = socket$kcm(0xa, 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r6}, &(0x7f0000000080)=0x1000000, &(0x7f0000000180)=r7}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x541b, 0x0) 7m23.855026941s ago: executing program 42 (id=373): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x4, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x1002, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x5}, 0x84c0, 0x2, 0xfffffffe, 0x0, 0x6, 0x0, 0xd8, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x8004, 0x7}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r2, 0x0, &(0x7f0000001700)=""/53}, 0x20) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000070900010073797a310000000014000000020a01020000000000000000010000031c000000000a0103000000000000000002000004080002400000000120000000050a0102000000000000000001000006090001"], 0x98}}, 0x200000d4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r2, 0x0, &(0x7f0000001700)=""/53}, 0x20) perf_event_open(0x0, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r4, 0x8b1a, &(0x7f0000000000)={'wlan1\x00', @random="0000230c1100"}) bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b14, &(0x7f0000000000)={'wlan1\x00', @random="0100008d8dff"}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000140)="9aed9dc184", 0x5}], 0x1}, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r6, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x60, 0x1, 0x9, 0x5, 0x0, 0x0, {0x2, 0x0, 0x7}, [@NFCTH_STATUS={0x8}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x3}, @NFCTH_TUPLE={0x18, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x10}}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}]}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0xa}}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_STATUS={0x8}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x13}]}, 0x60}, 0x1, 0x0, 0x0, 0x805}, 0x20000004) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=@newtaction={0x74, 0x30, 0x1, 0x0, 0x0, {}, [{0x60, 0x1, [@m_mpls={0x5c, 0x1, 0x0, 0x0, {{0x9}, {0x30, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x9d, 0x9, 0x7, 0x8, 0x4e19}, 0x1}}, @TCA_MPLS_PROTO={0x6, 0x4, 0x809b}, @TCA_MPLS_TC={0x5, 0x6, 0x3}]}, {0x4, 0x4}, {0xc}, {0xc}}}]}]}, 0x74}}, 0x0) socket$kcm(0x29, 0x7, 0x0) 7m22.85709241s ago: executing program 43 (id=374): perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8020, 0x14000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8224, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x1, 0x82240, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x8}, 0x2102, 0x0, 0x0, 0x8, 0x43fd, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="1c000000250001012cbd7000fbfffffe5775d26a0800030047"], 0x1c}, 0x1, 0x0, 0x0, 0x4048957}, 0x28850) r1 = socket$kcm(0x21, 0x2, 0x2) setsockopt$sock_attach_bpf(r1, 0x110, 0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@bloom_filter={0x1e, 0x2, 0xffffffff, 0xce8, 0x4100, r0, 0x1ff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x3, 0x2}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x8902, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x8902, &(0x7f00000000c0)={r3}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x6, [@typedef={0x4, 0x0, 0x0, 0x7}, @typedef={0x4, 0x0, 0x0, 0x8, 0x1}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x2}]}]}, {0x0, [0x0, 0x0, 0x0, 0xda]}}, 0x0, 0x4e, 0x0, 0x1}, 0x28) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x48) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000800)=@deltaction={0x34, 0x31, 0x400, 0x70bd29, 0x25dfdbff, {}, [@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x10001}}, {0xc, 0xd, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xf80}}]}, @TCA_ACT_TAB={0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0xb33e77d68a6a4d02}, 0x80) close(0x3) bpf$MAP_CREATE(0x0, 0x0, 0x48) socket$can_raw(0x1d, 0x3, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1m39.26138826s ago: executing program 1 (id=1838): close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x66a38089, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x4, 0x599, 0x1, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r0, 0x0, 0x1ba8847c99}, 0x38) 1m37.96324684s ago: executing program 1 (id=1845): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0xc, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14}, [@call={0x85, 0x0, 0x0, 0x7}, @printk={@li, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xb0}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 1m37.865385694s ago: executing program 1 (id=1846): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007500000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r1}, 0xc) 1m37.718931151s ago: executing program 1 (id=1850): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x34c}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) 1m37.400072955s ago: executing program 1 (id=1857): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cpuset.memory_spread_page\x00', 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x12, 0x7, 0x4, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r3, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000140)=r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETFILTEREBPF(r5, 0x800454e1, &(0x7f0000000380)=r7) write$cgroup_devices(r6, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 1m30.961368926s ago: executing program 1 (id=1931): close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB='N-N:N/8'], 0x6a) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="09000000020000000400000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r4, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r5, &(0x7f0000000d40), 0x0}, 0x20) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000711841000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000080)=ANY=[], 0x7) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000000)={'vlan0\x00', @random="010000201000"}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="190000000400000004000000ffff01000000000077c583c50d3c78cdcbd1f314dc3c3b8b58f28c6f4431bfce4a06af73fdc6841936f2ea7cedd2b5e5f09488dfe246c29691274535d3ec912329d375a53f731ec78bd22093fced87dc4b2a2e8c7a9fd9f1212aafe5a26f73", @ANYRESDEC=0x0, @ANYRESHEX=r0, @ANYRES64, @ANYBLOB="000000000200"/22], 0x48) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r6, &(0x7f0000000100)={&(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x51, &(0x7f00000000c0), 0x4c}, 0x4010) openat$cgroup_pressure(r3, &(0x7f00000000c0)='memory.pressure\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8983, &(0x7f0000000080)) 1m17.17047238s ago: executing program 5 (id=2010): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a40)={&(0x7f0000000cc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000940)=""/222, 0x26, 0xde, 0x1}, 0x28) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x41, &(0x7f0000000100)=r1, 0x4) 1m16.151401436s ago: executing program 5 (id=2016): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, 0x0, 0x34}, 0x28) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x6, 0x6b, 0x6, 0x9, 0x0, 0x2689, 0x14400, 0x8db60a3619b14f70, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_bp={0x0}, 0x80, 0x4, 0x9, 0x2, 0x6, 0x4000000, 0x4, 0x0, 0x8, 0x0, 0x80000000}, 0x0, 0x3, 0xffffffffffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x1, 0x8, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x9}, 0x50) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, 0x25, r3, 0x8, &(0x7f0000000940)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffff9}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x8, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@jmp={0x5, 0x0, 0x4, 0x8, 0xb, 0xfffffffffffffff4, 0xb}, @ringbuf_query]}, &(0x7f0000000300)='syzkaller\x00', 0x977a, 0x32, &(0x7f0000000340)=""/50, 0x41100, 0x24, '\x00', 0x0, @fallback=0x2, r0, 0x8, &(0x7f0000000380)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x9, 0xef68}, 0x10, r2, 0xffffffffffffffff, 0x1, &(0x7f0000000580), &(0x7f0000000600)=[{0x4, 0x1, 0x7}], 0x10, 0x18000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r4}, 0xc) 1m15.826674133s ago: executing program 44 (id=1931): close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[@ANYBLOB='N-N:N/8'], 0x6a) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="09000000020000000400000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r4, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r5, &(0x7f0000000d40), 0x0}, 0x20) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000711841000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_netprio_ifpriomap(r6, &(0x7f0000000080)=ANY=[], 0x7) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000000)={'vlan0\x00', @random="010000201000"}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="190000000400000004000000ffff01000000000077c583c50d3c78cdcbd1f314dc3c3b8b58f28c6f4431bfce4a06af73fdc6841936f2ea7cedd2b5e5f09488dfe246c29691274535d3ec912329d375a53f731ec78bd22093fced87dc4b2a2e8c7a9fd9f1212aafe5a26f73", @ANYRESDEC=0x0, @ANYRESHEX=r0, @ANYRES64, @ANYBLOB="000000000200"/22], 0x48) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r6, &(0x7f0000000100)={&(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x51, &(0x7f00000000c0), 0x4c}, 0x4010) openat$cgroup_pressure(r3, &(0x7f00000000c0)='memory.pressure\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8983, &(0x7f0000000080)) 1m15.574049577s ago: executing program 5 (id=2024): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 1m14.942632441s ago: executing program 5 (id=2028): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x6, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0xfca804a0, 0xe, 0x0, &(0x7f00000002c0)="b8000005000000005baf2312bbc2", 0x0, 0x12002, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1m14.685781844s ago: executing program 5 (id=2032): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x23}, 0x50) 1m13.86939221s ago: executing program 5 (id=2035): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x403ac400, 0x0, 0x0, 0x0, 0x0, 0x0) 58.442556927s ago: executing program 45 (id=2035): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x403ac400, 0x0, 0x0, 0x0, 0x0, 0x0) 56.059386076s ago: executing program 8 (id=2129): r0 = socket(0xa, 0x3, 0xff) sendmsg$inet6(r0, &(0x7f0000001c00)={&(0x7f0000000180)={0xa, 0x6, 0x10001, @local, 0x1}, 0x1c, &(0x7f0000000000)=[{&(0x7f0000000200)="9eb103000000000000008bb5755f78a1a3e20600000040000000efa2a3bca5ac33", 0x21}], 0x1}, 0x20008b88) 55.862291228s ago: executing program 8 (id=2132): sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="500000000206030000000000000000000d0000000c000300686173683a69700005000400000000000900020073797a31000000000c000780080008400000005d05000500020000000500010006"], 0x50}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, 0x0, 0x4000084) 55.112099565s ago: executing program 8 (id=2133): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, 0x0, 0x0, 0x5, 0x97, &(0x7f00000001c0)=""/151}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000fcffffff850000002d000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x13bb711e) 54.479612097s ago: executing program 8 (id=2134): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x40001) 54.302829926s ago: executing program 8 (id=2135): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x11}, [@generic={0x71, 0x1, 0x1, 0x5}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 54.226941342s ago: executing program 8 (id=2137): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 38.824875172s ago: executing program 46 (id=2137): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 6.52344083s ago: executing program 3 (id=2371): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x80000000, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_clone(0x403ac400, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)) 6.477878172s ago: executing program 4 (id=2372): bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa16ae, 0x9, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x8}, 0x90, 0xa4, 0x2, 0x1, 0xa1, 0x9b9b, 0x8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x7, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x94e4, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffa, 0x4, @perf_bp={0x0, 0x6}, 0x19183, 0x1, 0x5, 0xb, 0xa, 0x904813a5, 0x4, 0x0, 0x0, 0x0, 0xffffffffffff0000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) 6.327718099s ago: executing program 4 (id=2374): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000005a0000008500000022000000180100002020702500000000002020200100000000000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000078850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_clone(0x62008011, 0x0, 0x24, 0x0, 0x0, 0x0) 2.601285074s ago: executing program 2 (id=2378): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="05000000050000000200000007"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r1}, 0xc) 2.547763915s ago: executing program 3 (id=2379): r0 = socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[], 0x1176}, 0x11) 2.467185646s ago: executing program 0 (id=2380): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@base={0xa, 0x4, 0xfff, 0x7, 0x88, 0xffffffffffffffff, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000e41621eb70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.361536043s ago: executing program 2 (id=2381): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0xf, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000009000000000000000500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014006500b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2a}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2004}, 0x94) 2.361264038s ago: executing program 4 (id=2382): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000ec0), 0x8000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000a00)={'syz_tun\x00', 0x112}) 2.345650696s ago: executing program 3 (id=2383): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) 2.171622151s ago: executing program 0 (id=2384): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xd, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0x8, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x7, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.121007278s ago: executing program 4 (id=2385): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x43, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)=r1}, 0x20) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3fd, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.119075323s ago: executing program 2 (id=2386): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="18030000ff0c00ff00000000041000008510004006c5ed69bb"], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e14f086dd", 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, 0x50) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x36) 2.031290015s ago: executing program 0 (id=2387): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x3}, 0x48) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) 1.687617714s ago: executing program 0 (id=2388): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000002000000b705000008000000850000006900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYRES32], 0x50) bpf$MAP_GET_NEXT_KEY(0x15, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000400)={r1, 0x0, 0x0}, 0x10) 1.456429949s ago: executing program 2 (id=2389): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000085000000a0000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000200), &(0x7f0000000240)='%+9llu \x00'}, 0x20) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$inet(r3, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x4800) 1.397329776s ago: executing program 3 (id=2390): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="05000000050000000200000007"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r1}, 0xc) 1.271832067s ago: executing program 4 (id=2391): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000011c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xc, 0x3}]}, @func={0x4, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, &(0x7f00000010c0)=""/217, 0x46, 0xd9, 0x1}, 0x28) 1.265169948s ago: executing program 3 (id=2392): r0 = socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[], 0x1176}, 0x11) 1.262349232s ago: executing program 0 (id=2393): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000008f080000000000000000000085"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={r0, 0x0, 0xe, 0x0, &(0x7f0000000b40)="e3006a670004ec67838717bd86dd", 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.136912417s ago: executing program 2 (id=2394): close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000006007b8af8ff00000000bfa200000000000007"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x1, 0x3f, 0x40, 0x42}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000001a40), 0x1003, r2}, 0x38) 1.03961923s ago: executing program 4 (id=2395): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x6, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1c, &(0x7f0000000440)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.007021637s ago: executing program 0 (id=2396): bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="c2fc1d17a6ed46a900", @ANYRES64, @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1f, 0xd, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b001e000500"], 0x48) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0xf}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000feffffff0000000000040000851000000200000085000000230000009500000000000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000400005a0b28037c00040000000000000400000000000000000000000000000d030000000000000000000009030000"], 0x0, 0x44}, 0x28) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="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"/329], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r8, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000180)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, &(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x84, &(0x7f0000000240)=[{}, {}], 0x10, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0xb8, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_tracing={0x1a, 0x6, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, [@cb_func={0x18, 0xa, 0x4, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000140)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x24, '\x00', r9, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600)={0x0, 0xb, 0xdf77, 0x4}, 0x10, 0x1a70d, r8, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x27, &(0x7f0000000500)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @ldst={0x2, 0x0, 0x3, 0xb, 0xa, 0x100, 0x4}, @ldst={0x940ab0bd9c80dc46, 0x1, 0x0, 0x5, 0x95fe2c0978ab337, 0x80, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc11}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @cb_func={0x18, 0x4}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffa}]}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000680)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x4, 0xc, 0x8b2, 0x9}, 0x10, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000880)=[{0x5, 0x4, 0x3, 0xb}, {0x0, 0x2, 0x6, 0x2}, {0x4, 0x2, 0xf, 0x2}, {0x2, 0x4, 0xfffffffc, 0xb}, {0x3, 0x4, 0x3, 0xc}, {0x2, 0x1, 0x5, 0x2}, {0x1, 0x5, 0x8, 0x7}], 0x10, 0x4}, 0x94) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f0000000180)=r5) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) 859.870857ms ago: executing program 3 (id=2397): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x6, 0x1c, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x17}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0xfca804a0, 0xd, 0x0, &(0x7f00000002c0)="b8000005000000005baf2312bb", 0x0, 0x12002, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 0s ago: executing program 2 (id=2398): r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x4044}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a500850000002d0000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') kernel console output (not intermixed with test programs): ngth. [ 499.139052][ T9340] netlink: 164 bytes leftover after parsing attributes in process `syz.1.533'. [ 499.638051][ T9336] delete_channel: no stack [ 501.572122][ T1300] ieee802154 phy0 wpan0: encryption failed: -22 [ 501.579299][ T1300] ieee802154 phy1 wpan1: encryption failed: -22 [ 502.067807][ T9387] netlink: 'syz.1.537': attribute type 1 has an invalid length. [ 502.352568][ T9406] netlink: 'syz.5.539': attribute type 1 has an invalid length. [ 503.380798][ T9429] netlink: 8 bytes leftover after parsing attributes in process `syz.8.544'. [ 504.584783][ T9438] sctp: [Deprecated]: syz.3.546 (pid 9438) Use of struct sctp_assoc_value in delayed_ack socket option. [ 504.584783][ T9438] Use struct sctp_sack_info instead [ 504.672572][ T30] audit: type=1107 audit(1772956707.864:8): pid=9431 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 504.932208][ T9433] delete_channel: no stack [ 504.939872][ T9426] syzkaller0: entered promiscuous mode [ 504.972643][ T9426] syzkaller0: entered allmulticast mode [ 505.448228][ T9457] sctp: [Deprecated]: syz.5.549 (pid 9457) Use of struct sctp_assoc_value in delayed_ack socket option. [ 505.448228][ T9457] Use struct sctp_sack_info instead [ 505.469166][ T30] audit: type=1107 audit(1772956708.734:9): pid=9449 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 506.340456][ T9481] sctp: [Deprecated]: syz.4.550 (pid 9481) Use of struct sctp_assoc_value in delayed_ack socket option. [ 506.340456][ T9481] Use struct sctp_sack_info instead [ 506.376821][ T9484] netlink: 8 bytes leftover after parsing attributes in process `syz.1.552'. [ 510.464353][ T9466] syzkaller0: entered promiscuous mode [ 510.470079][ T9466] syzkaller0: entered allmulticast mode [ 510.483770][ T9514] faux_driver regulatory: loading /lib/firmware/regulatory.db failed with error -4 [ 510.502973][ T9514] faux_driver regulatory: Direct firmware load for regulatory.db failed with error -4 [ 510.517661][ T9514] faux_driver regulatory: Falling back to sysfs fallback for: regulatory.db [ 510.803942][ T30] audit: type=1107 audit(1772956714.024:10): pid=9570 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 510.842618][ T9575] sctp: [Deprecated]: syz.3.560 (pid 9575) Use of struct sctp_assoc_value in delayed_ack socket option. [ 510.842618][ T9575] Use struct sctp_sack_info instead [ 511.165691][ T9579] netlink: 'syz.4.562': attribute type 27 has an invalid length. [ 511.182864][ T9579] netlink: 164 bytes leftover after parsing attributes in process `syz.4.562'. [ 513.332363][ T30] audit: type=1107 audit(1772956716.614:11): pid=9627 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 513.333050][ T9633] sctp: [Deprecated]: syz.4.568 (pid 9633) Use of struct sctp_assoc_value in delayed_ack socket option. [ 513.333050][ T9633] Use struct sctp_sack_info instead [ 515.532708][ T9582] netlink: 132 bytes leftover after parsing attributes in process `syz.5.563'. [ 515.943554][ T9698] netlink: 'syz.5.575': attribute type 27 has an invalid length. [ 515.951746][ T9698] netlink: 164 bytes leftover after parsing attributes in process `syz.5.575'. [ 516.390299][ T9705] sctp: [Deprecated]: syz.8.572 (pid 9705) Use of struct sctp_assoc_value in delayed_ack socket option. [ 516.390299][ T9705] Use struct sctp_sack_info instead [ 516.421781][ T30] audit: type=1107 audit(1772956719.564:12): pid=9694 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 516.466784][ T9703] sctp: [Deprecated]: syz.3.576 (pid 9703) Use of struct sctp_assoc_value in delayed_ack socket option. [ 516.466784][ T9703] Use struct sctp_sack_info instead [ 516.475243][ T30] audit: type=1107 audit(1772956719.694:13): pid=9699 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 519.198597][ T9751] netlink: 'syz.5.580': attribute type 27 has an invalid length. [ 519.218589][ T9751] netlink: 164 bytes leftover after parsing attributes in process `syz.5.580'. [ 519.363765][ T9758] netlink: 8 bytes leftover after parsing attributes in process `syz.1.582'. [ 519.429806][ T9767] sctp: [Deprecated]: syz.8.583 (pid 9767) Use of struct sctp_assoc_value in delayed_ack socket option. [ 519.429806][ T9767] Use struct sctp_sack_info instead [ 519.459071][ T30] audit: type=1107 audit(1772956722.714:14): pid=9759 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 519.723181][ T9776] netlink: 8 bytes leftover after parsing attributes in process `syz.3.584'. [ 519.739531][ T9754] syzkaller0: entered promiscuous mode [ 519.782495][ T9754] syzkaller0: entered allmulticast mode [ 519.881467][ T9765] syzkaller0: entered promiscuous mode [ 519.887863][ T9765] syzkaller0: entered allmulticast mode [ 524.005310][ T9784] netlink: 132 bytes leftover after parsing attributes in process `syz.4.585'. [ 524.349333][ T9851] netlink: 'syz.1.589': attribute type 27 has an invalid length. [ 524.378469][ T9859] netlink: 212340 bytes leftover after parsing attributes in process `syz.4.590'. [ 524.436952][ T9851] netlink: 164 bytes leftover after parsing attributes in process `syz.1.589'. [ 524.451528][ T9857] netlink: 212340 bytes leftover after parsing attributes in process `syz.8.592'. [ 524.472750][ T9859] openvswitch: netlink: Port 167772160 exceeds max allowable 65535 [ 524.504993][ T9857] openvswitch: netlink: Port 167772160 exceeds max allowable 65535 [ 524.516323][ T9863] netlink: 212340 bytes leftover after parsing attributes in process `syz.3.593'. [ 524.517310][ T9863] openvswitch: netlink: Port 167772160 exceeds max allowable 65535 [ 525.203720][ T30] audit: type=1107 audit(1772956728.494:15): pid=9877 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 525.933812][ T9886] delete_channel: no stack [ 526.184671][ T9899] netlink: 132 bytes leftover after parsing attributes in process `syz.5.601'. [ 526.331325][ T9906] netlink: 8 bytes leftover after parsing attributes in process `syz.4.603'. [ 526.974834][ T9923] sctp: [Deprecated]: syz.5.607 (pid 9923) Use of struct sctp_assoc_value in delayed_ack socket option. [ 526.974834][ T9923] Use struct sctp_sack_info instead [ 526.998532][ T30] audit: type=1107 audit(1772956730.244:16): pid=9916 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 527.048362][ T9901] syzkaller0: entered promiscuous mode [ 527.054501][ T9901] syzkaller0: entered allmulticast mode [ 527.324110][ T9927] netlink: 212340 bytes leftover after parsing attributes in process `syz.8.609'. [ 527.340330][ T9927] openvswitch: netlink: Port 167772160 exceeds max allowable 65535 [ 528.814159][ T9927] faux_driver regulatory: loading /lib/firmware/regulatory.db failed with error -4 [ 528.828240][ T9927] faux_driver regulatory: Direct firmware load for regulatory.db failed with error -4 [ 528.873481][ T9927] faux_driver regulatory: Falling back to sysfs fallback for: regulatory.db [ 529.168333][ T9945] sctp: [Deprecated]: syz.3.612 (pid 9945) Use of struct sctp_assoc_value in delayed_ack socket option. [ 529.168333][ T9945] Use struct sctp_sack_info instead [ 529.192586][ T30] audit: type=1107 audit(1772956732.454:17): pid=9940 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 529.303565][ T9944] netlink: 212340 bytes leftover after parsing attributes in process `syz.5.613'. [ 529.371730][ T9944] openvswitch: netlink: Port 167772160 exceeds max allowable 65535 [ 529.840027][ T9960] netlink: 132 bytes leftover after parsing attributes in process `syz.4.617'. [ 530.032965][ T30] audit: type=1107 audit(1772956733.324:18): pid=9961 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 530.046286][ T9964] sctp: [Deprecated]: syz.5.620 (pid 9964) Use of struct sctp_assoc_value in delayed_ack socket option. [ 530.046286][ T9964] Use struct sctp_sack_info instead [ 530.441022][ T9984] netlink: 8 bytes leftover after parsing attributes in process `syz.3.623'. [ 530.680519][ T9993] netlink: 8 bytes leftover after parsing attributes in process `syz.1.625'. [ 530.779403][ T9979] sctp: [Deprecated]: syz.4.622 (pid 9979) Use of struct sctp_assoc_value in delayed_ack socket option. [ 530.779403][ T9979] Use struct sctp_sack_info instead [ 530.956843][ T30] audit: type=1107 audit(1772956734.244:19): pid=9986 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 530.960236][ T9989] sctp: [Deprecated]: syz.8.624 (pid 9989) Use of struct sctp_assoc_value in delayed_ack socket option. [ 530.960236][ T9989] Use struct sctp_sack_info instead [ 531.108350][ T9988] syzkaller0: entered promiscuous mode [ 531.121380][ T9988] syzkaller0: entered allmulticast mode [ 531.492793][T10007] netlink: 'syz.4.628': attribute type 27 has an invalid length. [ 531.492801][T10010] netlink: 212340 bytes leftover after parsing attributes in process `syz.3.629'. [ 531.493103][T10007] netlink: 164 bytes leftover after parsing attributes in process `syz.4.628'. [ 531.502109][T10010] openvswitch: netlink: Port 167772160 exceeds max allowable 65535 [ 531.529451][T10013] netlink: 212340 bytes leftover after parsing attributes in process `syz.5.630'. [ 531.530628][T10013] openvswitch: netlink: Port 167772160 exceeds max allowable 65535 [ 532.416776][T10019] netlink: 'syz.4.631': attribute type 27 has an invalid length. [ 532.424953][T10019] netlink: 164 bytes leftover after parsing attributes in process `syz.4.631'. [ 534.538139][T10014] faux_driver regulatory: loading /lib/firmware/regulatory.db failed with error -4 [ 534.574704][T10014] faux_driver regulatory: Direct firmware load for regulatory.db failed with error -4 [ 534.587284][T10014] faux_driver regulatory: Falling back to sysfs fallback for: regulatory.db [ 534.784426][T10033] netlink: 132 bytes leftover after parsing attributes in process `syz.5.633'. [ 535.381542][T10052] netlink: 212340 bytes leftover after parsing attributes in process `syz.4.640'. [ 535.413073][T10056] sctp: [Deprecated]: syz.1.639 (pid 10056) Use of struct sctp_assoc_value in delayed_ack socket option. [ 535.413073][T10056] Use struct sctp_sack_info instead [ 535.435057][T10052] openvswitch: netlink: Port 167772160 exceeds max allowable 65535 [ 535.492371][T10058] netlink: 'syz.5.638': attribute type 27 has an invalid length. [ 535.514811][T10058] netlink: 164 bytes leftover after parsing attributes in process `syz.5.638'. [ 536.623885][ T30] audit: type=1107 audit(1772956739.904:20): pid=10074 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 536.652584][T10082] sctp: [Deprecated]: syz.3.641 (pid 10082) Use of struct sctp_assoc_value in delayed_ack socket option. [ 536.652584][T10082] Use struct sctp_sack_info instead [ 536.698227][T10075] sctp: [Deprecated]: syz.4.642 (pid 10075) Use of struct sctp_assoc_value in delayed_ack socket option. [ 536.698227][T10075] Use struct sctp_sack_info instead [ 536.731541][ T30] audit: type=1107 audit(1772956739.924:21): pid=10078 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 536.755203][T10083] sctp: [Deprecated]: syz.8.643 (pid 10083) Use of struct sctp_assoc_value in delayed_ack socket option. [ 536.755203][T10083] Use struct sctp_sack_info instead [ 536.755540][ T30] audit: type=1107 audit(1772956740.044:22): pid=10077 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 537.137710][T10093] netlink: 8 bytes leftover after parsing attributes in process `syz.4.646'. [ 537.756903][T10088] syzkaller0: entered promiscuous mode [ 537.762902][T10088] syzkaller0: entered allmulticast mode [ 537.775593][T10105] netlink: 132 bytes leftover after parsing attributes in process `syz.3.648'. [ 538.298212][T10118] netlink: 8 bytes leftover after parsing attributes in process `syz.1.652'. [ 538.425157][T10128] netlink: 8 bytes leftover after parsing attributes in process `syz.5.653'. [ 538.468036][T10129] netlink: 8 bytes leftover after parsing attributes in process `syz.8.654'. [ 538.974100][ T30] audit: type=1107 audit(1772956742.254:23): pid=10136 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 539.010980][T10137] sctp: [Deprecated]: syz.3.656 (pid 10137) Use of struct sctp_assoc_value in delayed_ack socket option. [ 539.010980][T10137] Use struct sctp_sack_info instead [ 539.289014][T10139] netlink: 'syz.3.657': attribute type 27 has an invalid length. [ 539.299293][T10139] netlink: 164 bytes leftover after parsing attributes in process `syz.3.657'. [ 541.203049][T10152] netlink: 'syz.8.662': attribute type 27 has an invalid length. [ 541.278581][T10152] netlink: 164 bytes leftover after parsing attributes in process `syz.8.662'. [ 541.787584][T10155] netlink: 'syz.5.660': attribute type 1 has an invalid length. [ 542.428048][T10176] netlink: 'syz.8.665': attribute type 27 has an invalid length. [ 542.528241][T10176] netlink: 164 bytes leftover after parsing attributes in process `syz.8.665'. [ 543.441525][ T30] audit: type=1107 audit(1772956746.704:24): pid=10187 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 543.540872][T10188] sctp: [Deprecated]: syz.5.669 (pid 10188) Use of struct sctp_assoc_value in delayed_ack socket option. [ 543.540872][T10188] Use struct sctp_sack_info instead [ 543.868452][T10195] netlink: 8 bytes leftover after parsing attributes in process `syz.8.671'. [ 544.096903][T10206] netlink: 'syz.5.673': attribute type 27 has an invalid length. [ 544.128707][T10206] netlink: 164 bytes leftover after parsing attributes in process `syz.5.673'. [ 544.216096][T10198] syzkaller0: entered promiscuous mode [ 544.260338][T10198] syzkaller0: entered allmulticast mode [ 544.471691][T10205] netlink: 'syz.4.672': attribute type 1 has an invalid length. [ 544.778713][T10224] netlink: 212340 bytes leftover after parsing attributes in process `syz.5.676'. [ 544.825375][T10224] openvswitch: netlink: Port 167772160 exceeds max allowable 65535 [ 545.154025][T10238] netlink: 8 bytes leftover after parsing attributes in process `syz.4.677'. [ 546.475828][T10213] syzkaller0: entered promiscuous mode [ 546.481369][T10213] syzkaller0: entered allmulticast mode [ 546.493732][T10228] faux_driver regulatory: loading /lib/firmware/regulatory.db failed with error -4 [ 546.503602][T10228] faux_driver regulatory: Direct firmware load for regulatory.db failed with error -4 [ 546.520058][T10228] faux_driver regulatory: Falling back to sysfs fallback for: regulatory.db [ 546.973664][T10246] netlink: 'syz.3.678': attribute type 1 has an invalid length. [ 548.713909][T10257] netlink: 8 bytes leftover after parsing attributes in process `syz.4.682'. [ 549.382128][T10253] syzkaller0: entered promiscuous mode [ 549.500426][T10279] sctp: [Deprecated]: syz.5.688 (pid 10279) Use of struct sctp_assoc_value in delayed_ack socket option. [ 549.500426][T10279] Use struct sctp_sack_info instead [ 549.505170][ T30] audit: type=1107 audit(1772956752.784:25): pid=10276 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 549.572581][T10253] syzkaller0: entered allmulticast mode [ 549.725478][ T5845] Bluetooth: hci4: command 0x0406 tx timeout [ 549.726174][ T6152] Bluetooth: hci2: command 0x0406 tx timeout [ 549.731922][ T5845] Bluetooth: hci3: command 0x0406 tx timeout [ 550.136474][T10282] netlink: 212340 bytes leftover after parsing attributes in process `syz.8.689'. [ 550.148315][T10282] openvswitch: netlink: Port 167772160 exceeds max allowable 65535 [ 550.392954][T10304] netlink: 8 bytes leftover after parsing attributes in process `syz.3.690'. [ 551.878121][T10288] faux_driver regulatory: loading /lib/firmware/regulatory.db failed with error -4 [ 551.903425][T10288] faux_driver regulatory: Direct firmware load for regulatory.db failed with error -4 [ 551.916740][T10288] faux_driver regulatory: Falling back to sysfs fallback for: regulatory.db [ 552.141936][ T30] audit: type=1107 audit(1772956755.424:26): pid=10308 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 552.184197][T10309] sctp: [Deprecated]: syz.1.692 (pid 10309) Use of struct sctp_assoc_value in delayed_ack socket option. [ 552.184197][T10309] Use struct sctp_sack_info instead [ 552.398791][T10316] netlink: 212340 bytes leftover after parsing attributes in process `syz.4.694'. [ 552.411124][T10316] openvswitch: netlink: Port 167772160 exceeds max allowable 65535 [ 552.712197][ T30] audit: type=1107 audit(1772956755.994:27): pid=10321 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 552.808188][T10322] sctp: [Deprecated]: syz.1.697 (pid 10322) Use of struct sctp_assoc_value in delayed_ack socket option. [ 552.808188][T10322] Use struct sctp_sack_info instead [ 552.827256][T10326] netlink: 'syz.3.696': attribute type 1 has an invalid length. [ 553.067816][T10331] netlink: 8 bytes leftover after parsing attributes in process `syz.8.698'. [ 553.849162][T10357] sctp: [Deprecated]: syz.3.700 (pid 10357) Use of struct sctp_assoc_value in delayed_ack socket option. [ 553.849162][T10357] Use struct sctp_sack_info instead [ 553.852851][ T30] audit: type=1107 audit(1772956757.124:28): pid=10343 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 554.114021][T10351] delete_channel: no stack [ 554.454180][T10371] netlink: 8 bytes leftover after parsing attributes in process `syz.5.706'. [ 554.856357][ T5845] Bluetooth: hci5: command 0x0406 tx timeout [ 554.861758][T10366] syzkaller0: entered promiscuous mode [ 554.862498][ T5846] Bluetooth: hci6: command 0x0406 tx timeout [ 554.918357][T10366] syzkaller0: entered allmulticast mode [ 555.218894][T10383] netlink: 212340 bytes leftover after parsing attributes in process `syz.3.708'. [ 555.231432][T10383] openvswitch: netlink: Port 167772160 exceeds max allowable 65535 [ 555.995797][T10404] netlink: 'syz.4.711': attribute type 1 has an invalid length. [ 557.210747][T10389] faux_driver regulatory: loading /lib/firmware/regulatory.db failed with error -4 [ 557.262779][T10389] faux_driver regulatory: Direct firmware load for regulatory.db failed with error -4 [ 557.303198][T10389] faux_driver regulatory: Falling back to sysfs fallback for: regulatory.db [ 557.561856][T10416] netlink: 212340 bytes leftover after parsing attributes in process `syz.5.715'. [ 557.606070][T10416] openvswitch: netlink: Port 167772160 exceeds max allowable 65535 [ 557.615524][T10417] netlink: 8 bytes leftover after parsing attributes in process `syz.1.712'. [ 558.472581][ T30] audit: type=1107 audit(1772956761.734:29): pid=10424 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 558.498070][T10425] sctp: [Deprecated]: syz.3.716 (pid 10425) Use of struct sctp_assoc_value in delayed_ack socket option. [ 558.498070][T10425] Use struct sctp_sack_info instead [ 558.621152][T10411] syzkaller0: entered promiscuous mode [ 558.685170][T10411] syzkaller0: entered allmulticast mode [ 558.776835][T10436] netlink: 8 bytes leftover after parsing attributes in process `syz.5.717'. [ 561.021126][T10462] netlink: 'syz.8.721': attribute type 27 has an invalid length. [ 561.054708][ T30] audit: type=1107 audit(1772956764.334:30): pid=10459 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 561.057358][T10460] sctp: [Deprecated]: syz.3.722 (pid 10460) Use of struct sctp_assoc_value in delayed_ack socket option. [ 561.057358][T10460] Use struct sctp_sack_info instead [ 561.111410][T10462] netlink: 164 bytes leftover after parsing attributes in process `syz.8.721'. [ 561.143352][T10465] netlink: 212340 bytes leftover after parsing attributes in process `syz.4.724'. [ 561.169490][T10465] openvswitch: netlink: Port 167772160 exceeds max allowable 65535 [ 561.983342][T10498] netlink: 'syz.5.727': attribute type 1 has an invalid length. [ 562.447721][T10490] netlink: 212340 bytes leftover after parsing attributes in process `syz.4.728'. [ 562.459237][T10490] openvswitch: netlink: Port 167772160 exceeds max allowable 65535 [ 562.511173][T10504] netlink: 'syz.5.732': attribute type 27 has an invalid length. [ 562.528370][T10504] netlink: 164 bytes leftover after parsing attributes in process `syz.5.732'. [ 562.680500][T10512] netlink: 8 bytes leftover after parsing attributes in process `syz.1.734'. [ 562.835133][T10514] netlink: 'syz.8.735': attribute type 27 has an invalid length. [ 562.862971][T10514] netlink: 164 bytes leftover after parsing attributes in process `syz.8.735'. [ 563.017470][ T1300] ieee802154 phy0 wpan0: encryption failed: -22 [ 563.023991][ T1300] ieee802154 phy1 wpan1: encryption failed: -22 [ 563.134287][T10530] netlink: 212340 bytes leftover after parsing attributes in process `syz.3.738'. [ 563.243945][T10530] openvswitch: netlink: Port 167772160 exceeds max allowable 65535 [ 563.287803][T10532] sctp: [Deprecated]: syz.4.737 (pid 10532) Use of struct sctp_assoc_value in delayed_ack socket option. [ 563.287803][T10532] Use struct sctp_sack_info instead [ 563.298912][ T30] audit: type=1107 audit(1772956766.574:31): pid=10520 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 563.367440][T10510] syzkaller0: entered promiscuous mode [ 563.398703][T10510] syzkaller0: entered allmulticast mode [ 564.009566][ T30] audit: type=1107 audit(1772956767.294:32): pid=10536 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 564.033870][T10538] sctp: [Deprecated]: syz.5.739 (pid 10538) Use of struct sctp_assoc_value in delayed_ack socket option. [ 564.033870][T10538] Use struct sctp_sack_info instead [ 566.373977][T10579] netlink: 'syz.3.741': attribute type 1 has an invalid length. [ 566.489526][T10583] sctp: [Deprecated]: syz.8.743 (pid 10583) Use of struct sctp_assoc_value in delayed_ack socket option. [ 566.489526][T10583] Use struct sctp_sack_info instead [ 566.507332][ T30] audit: type=1107 audit(1772956769.774:33): pid=10582 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 568.299669][T10605] netlink: 'syz.4.746': attribute type 27 has an invalid length. [ 568.424699][T10605] netlink: 164 bytes leftover after parsing attributes in process `syz.4.746'. [ 568.730207][T10606] netlink: 'syz.3.745': attribute type 1 has an invalid length. [ 569.379503][T10622] netlink: 212340 bytes leftover after parsing attributes in process `syz.5.751'. [ 569.403815][T10622] openvswitch: netlink: Port 167772160 exceeds max allowable 65535 [ 569.421850][T10627] netlink: 212340 bytes leftover after parsing attributes in process `syz.3.753'. [ 569.612575][T10635] sctp: [Deprecated]: syz.4.754 (pid 10635) Use of struct sctp_assoc_value in delayed_ack socket option. [ 569.612575][T10635] Use struct sctp_sack_info instead [ 569.631713][ T30] audit: type=1107 audit(1772956772.894:34): pid=10628 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 569.821994][T10627] openvswitch: netlink: Port 167772160 exceeds max allowable 65535 [ 569.974627][T10632] netlink: 212340 bytes leftover after parsing attributes in process `syz.1.755'. [ 570.028319][T10632] openvswitch: netlink: Port 167772160 exceeds max allowable 65535 [ 570.087481][T10642] netlink: 8 bytes leftover after parsing attributes in process `syz.8.756'. [ 570.523093][T10639] syzkaller0: entered promiscuous mode [ 570.539423][T10639] syzkaller0: entered allmulticast mode [ 570.899262][T10662] netlink: 212340 bytes leftover after parsing attributes in process `syz.5.761'. [ 570.933462][T10662] openvswitch: netlink: Port 167772160 exceeds max allowable 65535 [ 571.091935][T10663] sctp: [Deprecated]: syz.4.760 (pid 10663) Use of struct sctp_assoc_value in delayed_ack socket option. [ 571.091935][T10663] Use struct sctp_sack_info instead [ 571.120659][ T30] audit: type=1107 audit(1772956774.364:35): pid=10657 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 574.342727][T10704] netlink: 'syz.3.770': attribute type 27 has an invalid length. [ 574.362403][T10704] netlink: 164 bytes leftover after parsing attributes in process `syz.3.770'. [ 574.526277][T10706] delete_channel: no stack [ 574.987201][T10715] sctp: [Deprecated]: syz.8.772 (pid 10715) Use of struct sctp_assoc_value in delayed_ack socket option. [ 574.987201][T10715] Use struct sctp_sack_info instead [ 578.103845][T10770] delete_channel: no stack [ 578.813542][T10780] sctp: [Deprecated]: syz.1.781 (pid 10780) Use of struct sctp_assoc_value in delayed_ack socket option. [ 578.813542][T10780] Use struct sctp_sack_info instead [ 578.820633][T10785] netlink: 8 bytes leftover after parsing attributes in process `syz.3.782'. [ 578.876209][T10787] netlink: 'syz.4.776': attribute type 9 has an invalid length. [ 578.998178][T10787] netlink: 'syz.4.776': attribute type 11 has an invalid length. [ 579.172920][T10787] netlink: 'syz.4.776': attribute type 12 has an invalid length. [ 579.221925][T10787] netlink: 210020 bytes leftover after parsing attributes in process `syz.4.776'. [ 579.338534][T10787] netlink: 4 bytes leftover after parsing attributes in process `syz.4.776'. [ 579.376986][T10801] netlink: 8 bytes leftover after parsing attributes in process `syz.8.784'. [ 579.572326][T10783] syzkaller0: entered promiscuous mode [ 579.642773][T10783] syzkaller0: entered allmulticast mode [ 579.871992][T10815] sctp: [Deprecated]: syz.1.785 (pid 10815) Use of struct sctp_assoc_value in delayed_ack socket option. [ 579.871992][T10815] Use struct sctp_sack_info instead [ 580.520246][T10822] netlink: 'syz.1.788': attribute type 9 has an invalid length. [ 580.534543][T10822] netlink: 'syz.1.788': attribute type 11 has an invalid length. [ 580.543761][T10822] netlink: 'syz.1.788': attribute type 12 has an invalid length. [ 580.563680][T10822] netlink: 210020 bytes leftover after parsing attributes in process `syz.1.788'. [ 580.621663][T10822] netlink: 4 bytes leftover after parsing attributes in process `syz.1.788'. [ 582.979816][T10799] syzkaller0: entered promiscuous mode [ 582.986622][T10799] syzkaller0: entered allmulticast mode [ 583.146792][T10850] netlink: 'syz.5.795': attribute type 9 has an invalid length. [ 583.160910][T10850] netlink: 'syz.5.795': attribute type 11 has an invalid length. [ 583.170287][T10850] netlink: 'syz.5.795': attribute type 12 has an invalid length. [ 583.178798][T10850] netlink: 210020 bytes leftover after parsing attributes in process `syz.5.795'. [ 583.190787][T10850] netlink: 4 bytes leftover after parsing attributes in process `syz.5.795'. [ 586.255317][ T30] audit: type=1107 audit(1772956789.544:36): pid=10872 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 586.308000][T10877] sctp: [Deprecated]: syz.1.801 (pid 10877) Use of struct sctp_assoc_value in delayed_ack socket option. [ 586.308000][T10877] Use struct sctp_sack_info instead [ 587.465935][T10899] netlink: 52 bytes leftover after parsing attributes in process `syz.4.807'. [ 587.549488][T10898] delete_channel: no stack [ 588.079662][T10911] netlink: 'syz.3.808': attribute type 1 has an invalid length. [ 588.267854][T10917] netlink: 8 bytes leftover after parsing attributes in process `syz.4.810'. [ 588.632929][T10914] syzkaller0: entered promiscuous mode [ 588.638292][T10927] netlink: 212408 bytes leftover after parsing attributes in process `syz.8.811'. [ 588.641904][T10914] syzkaller0: entered allmulticast mode [ 589.139617][T10937] netlink: 'syz.3.814': attribute type 9 has an invalid length. [ 589.153754][T10937] netlink: 'syz.3.814': attribute type 11 has an invalid length. [ 589.172722][T10937] netlink: 'syz.3.814': attribute type 12 has an invalid length. [ 589.192016][T10937] netlink: 210020 bytes leftover after parsing attributes in process `syz.3.814'. [ 589.263724][T10937] netlink: 4 bytes leftover after parsing attributes in process `syz.3.814'. [ 589.452035][T10954] netlink: 8 bytes leftover after parsing attributes in process `syz.1.816'. [ 589.779657][T10935] delete_channel: no stack [ 589.886668][T10955] netlink: 'syz.3.817': attribute type 1 has an invalid length. [ 591.825325][T10981] netlink: 'syz.4.821': attribute type 9 has an invalid length. [ 591.833749][T10981] netlink: 'syz.4.821': attribute type 11 has an invalid length. [ 591.841502][T10981] netlink: 'syz.4.821': attribute type 12 has an invalid length. [ 591.894368][T10981] netlink: 210020 bytes leftover after parsing attributes in process `syz.4.821'. [ 591.943569][T10981] netlink: 4 bytes leftover after parsing attributes in process `syz.4.821'. [ 594.117314][T11032] netlink: 'syz.3.836': attribute type 27 has an invalid length. [ 594.142646][T11032] netlink: 164 bytes leftover after parsing attributes in process `syz.3.836'. [ 594.346125][T11042] netlink: 212340 bytes leftover after parsing attributes in process `syz.8.838'. [ 594.388497][T11042] openvswitch: netlink: Key 0 has unexpected len 4 expected 0 [ 595.142199][T11060] netlink: 212340 bytes leftover after parsing attributes in process `syz.1.839'. [ 595.198994][T11060] openvswitch: netlink: Key 0 has unexpected len 4 expected 0 [ 596.591125][T11085] netlink: 212368 bytes leftover after parsing attributes in process `syz.5.846'. [ 596.792094][T11090] netlink: 8 bytes leftover after parsing attributes in process `syz.3.848'. [ 596.977354][T11098] netlink: 212340 bytes leftover after parsing attributes in process `syz.8.850'. [ 597.027021][T11098] openvswitch: netlink: Message has 8 unknown bytes. [ 597.477366][T11107] netlink: 212340 bytes leftover after parsing attributes in process `syz.4.851'. [ 597.493113][T11089] syzkaller0: entered promiscuous mode [ 597.512533][T11089] syzkaller0: entered allmulticast mode [ 597.541536][T11107] openvswitch: netlink: Message has 8 unknown bytes. [ 598.096858][T11124] netlink: 8 bytes leftover after parsing attributes in process `syz.4.856'. [ 598.529666][T11122] syzkaller0: entered promiscuous mode [ 598.542479][T11122] syzkaller0: entered allmulticast mode [ 604.515828][T11194] netlink: 212368 bytes leftover after parsing attributes in process `syz.8.866'. [ 604.568255][T11199] netlink: 'syz.4.870': attribute type 27 has an invalid length. [ 604.629582][T11199] netlink: 164 bytes leftover after parsing attributes in process `syz.4.870'. [ 605.668163][T11218] netlink: 212368 bytes leftover after parsing attributes in process `syz.5.874'. [ 606.010457][T11228] netlink: 8 bytes leftover after parsing attributes in process `syz.4.875'. [ 606.791425][T11223] syzkaller0: entered promiscuous mode [ 606.823411][T11223] syzkaller0: entered allmulticast mode [ 607.145013][T11249] netlink: 212408 bytes leftover after parsing attributes in process `syz.3.882'. [ 608.135453][T11254] delete_channel: no stack [ 609.733187][T11272] netlink: 'syz.8.887': attribute type 9 has an invalid length. [ 609.776673][T11285] netlink: 8 bytes leftover after parsing attributes in process `syz.1.889'. [ 609.786097][T11272] netlink: 'syz.8.887': attribute type 11 has an invalid length. [ 609.842545][T11272] netlink: 'syz.8.887': attribute type 12 has an invalid length. [ 609.889039][T11272] netlink: 210020 bytes leftover after parsing attributes in process `syz.8.887'. [ 609.988912][T11272] netlink: 4 bytes leftover after parsing attributes in process `syz.8.887'. [ 610.555204][T11282] syzkaller0: entered promiscuous mode [ 610.582484][T11282] syzkaller0: entered allmulticast mode [ 610.739001][T11304] netlink: 8 bytes leftover after parsing attributes in process `syz.8.896'. [ 613.414460][T11302] syzkaller0: entered promiscuous mode [ 613.420105][T11302] syzkaller0: entered allmulticast mode [ 614.227852][T11345] netlink: 'syz.4.908': attribute type 27 has an invalid length. [ 614.237841][T11345] netlink: 164 bytes leftover after parsing attributes in process `syz.4.908'. [ 615.274041][T11359] netlink: 212408 bytes leftover after parsing attributes in process `syz.4.913'. [ 616.702810][T11363] faux_driver regulatory: loading /lib/firmware/regulatory.db failed with error -4 [ 616.745517][T11363] faux_driver regulatory: Direct firmware load for regulatory.db failed with error -4 [ 616.803512][T11363] faux_driver regulatory: Falling back to sysfs fallback for: regulatory.db [ 617.267429][T11382] netlink: 8 bytes leftover after parsing attributes in process `syz.8.919'. [ 617.655283][T11394] netlink: 212340 bytes leftover after parsing attributes in process `syz.1.921'. [ 617.679219][T11394] openvswitch: netlink: Port 167772160 exceeds max allowable 65535 [ 617.846695][T11375] syzkaller0: entered promiscuous mode [ 617.900019][T11375] syzkaller0: entered allmulticast mode [ 618.894506][T11423] netlink: 8 bytes leftover after parsing attributes in process `syz.4.927'. [ 620.540733][T11437] netlink: 'syz.1.932': attribute type 27 has an invalid length. [ 620.567341][T11437] netlink: 164 bytes leftover after parsing attributes in process `syz.1.932'. [ 622.516116][T11477] netlink: 8 bytes leftover after parsing attributes in process `syz.1.944'. [ 623.288128][T11414] syzkaller0: entered promiscuous mode [ 623.298304][T11414] syzkaller0: entered allmulticast mode [ 623.348081][T11471] netlink: 132 bytes leftover after parsing attributes in process `syz.5.946'. [ 623.412019][T11467] syzkaller0: entered promiscuous mode [ 623.418442][T11467] syzkaller0: entered allmulticast mode [ 624.447957][ T1300] ieee802154 phy0 wpan0: encryption failed: -22 [ 624.462555][ T1300] ieee802154 phy1 wpan1: encryption failed: -22 [ 627.204946][ T30] audit: type=1107 audit(1772956830.484:37): pid=11515 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 627.241770][T11516] sctp: [Deprecated]: syz.4.958 (pid 11516) Use of struct sctp_assoc_value in delayed_ack socket option. [ 627.241770][T11516] Use struct sctp_sack_info instead [ 628.582074][T11526] netlink: 132 bytes leftover after parsing attributes in process `syz.4.962'. [ 630.844350][T11568] syzkaller0: entered promiscuous mode [ 630.849905][T11568] syzkaller0: entered allmulticast mode [ 631.511909][T11597] netlink: 8 bytes leftover after parsing attributes in process `syz.4.974'. [ 636.949411][T11629] netlink: 8 bytes leftover after parsing attributes in process `syz.5.984'. [ 636.982233][T11626] syzkaller0: entered promiscuous mode [ 637.005131][T11626] syzkaller0: entered allmulticast mode [ 638.620439][T11672] netlink: 8 bytes leftover after parsing attributes in process `syz.3.992'. [ 640.964329][T11700] sctp: [Deprecated]: syz.8.1005 (pid 11700) Use of struct sctp_assoc_value in delayed_ack socket option. [ 640.964329][T11700] Use struct sctp_sack_info instead [ 641.279850][ T30] audit: type=1107 audit(1772956844.564:38): pid=11701 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 641.286248][T11702] sctp: [Deprecated]: syz.8.1006 (pid 11702) Use of struct sctp_assoc_value in delayed_ack socket option. [ 641.286248][T11702] Use struct sctp_sack_info instead [ 641.923208][T11714] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1009'. [ 642.408020][T11710] syzkaller0: entered promiscuous mode [ 642.442483][T11710] syzkaller0: entered allmulticast mode [ 642.851850][T11744] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1012'. [ 646.169870][T11777] sctp: [Deprecated]: syz.5.1027 (pid 11777) Use of struct sctp_assoc_value in delayed_ack socket option. [ 646.169870][T11777] Use struct sctp_sack_info instead [ 647.714101][T11726] syzkaller0: entered promiscuous mode [ 647.719651][T11726] syzkaller0: entered allmulticast mode [ 649.430466][T11808] netlink: 8 bytes leftover after parsing attributes in process `syz.5.1034'. [ 649.431905][ T30] audit: type=1107 audit(1772956852.714:39): pid=11802 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='' [ 649.760003][T11800] syzkaller0: entered promiscuous mode [ 649.902470][T11800] syzkaller0: entered allmulticast mode [ 650.304179][T11829] netlink: 'syz.4.1041': attribute type 27 has an invalid length. [ 650.395783][T11829] netlink: 164 bytes leftover after parsing attributes in process `syz.4.1041'. [ 650.844753][T11849] netlink: 212340 bytes leftover after parsing attributes in process `syz.1.1046'. [ 650.855034][T11849] openvswitch: netlink: Message has 8 unknown bytes. [ 651.047513][T11856] FAULT_INJECTION: forcing a failure. [ 651.047513][T11856] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 651.095598][T11856] CPU: 0 UID: 0 PID: 11856 Comm: syz.1.1048 Not tainted syzkaller #0 PREEMPT(full) [ 651.095629][T11856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 651.095641][T11856] Call Trace: [ 651.095649][T11856] [ 651.095658][T11856] dump_stack_lvl+0xe8/0x150 [ 651.095693][T11856] should_fail_ex+0x412/0x560 [ 651.095797][T11856] _copy_from_user+0x2d/0xb0 [ 651.095852][T11856] __sys_bpf+0x229/0x950 [ 651.095886][T11856] ? __pfx___sys_bpf+0x10/0x10 [ 651.095935][T11856] ? ksys_write+0x242/0x270 [ 651.095960][T11856] ? __pfx_ksys_write+0x10/0x10 [ 651.095992][T11856] __x64_sys_bpf+0x7c/0x90 [ 651.096020][T11856] do_syscall_64+0x14d/0xf80 [ 651.096067][T11856] ? trace_irq_disable+0x3b/0x150 [ 651.096094][T11856] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 651.096114][T11856] ? clear_bhb_loop+0x40/0x90 [ 651.096140][T11856] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 651.096161][T11856] RIP: 0033:0x7fe1a0b9c799 [ 651.096180][T11856] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 651.096198][T11856] RSP: 002b:00007fe1a1a35028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 651.096221][T11856] RAX: ffffffffffffffda RBX: 00007fe1a0e15fa0 RCX: 00007fe1a0b9c799 [ 651.096236][T11856] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 651.096250][T11856] RBP: 00007fe1a1a35090 R08: 0000000000000000 R09: 0000000000000000 [ 651.096262][T11856] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 651.096274][T11856] R13: 00007fe1a0e16038 R14: 00007fe1a0e15fa0 R15: 00007ffe5526a7a8 [ 651.096309][T11856] [ 651.434412][T11862] netlink: 'syz.1.1050': attribute type 1 has an invalid length. [ 651.442274][T11862] netlink: 5 bytes leftover after parsing attributes in process `syz.1.1050'. [ 651.476613][T11865] FAULT_INJECTION: forcing a failure. [ 651.476613][T11865] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 651.502947][T11865] CPU: 0 UID: 0 PID: 11865 Comm: syz.8.1051 Not tainted syzkaller #0 PREEMPT(full) [ 651.502978][T11865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 651.502992][T11865] Call Trace: [ 651.502999][T11865] [ 651.503008][T11865] dump_stack_lvl+0xe8/0x150 [ 651.503041][T11865] should_fail_ex+0x412/0x560 [ 651.503074][T11865] _copy_from_user+0x2d/0xb0 [ 651.503107][T11865] __sys_bpf+0x229/0x950 [ 651.503140][T11865] ? __pfx___sys_bpf+0x10/0x10 [ 651.503186][T11865] ? ksys_write+0x242/0x270 [ 651.503220][T11865] ? __pfx_ksys_write+0x10/0x10 [ 651.503250][T11865] __x64_sys_bpf+0x7c/0x90 [ 651.503278][T11865] do_syscall_64+0x14d/0xf80 [ 651.503297][T11865] ? trace_irq_disable+0x3b/0x150 [ 651.503325][T11865] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 651.503346][T11865] ? clear_bhb_loop+0x40/0x90 [ 651.503371][T11865] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 651.503390][T11865] RIP: 0033:0x7f62a919c799 [ 651.503410][T11865] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 651.503428][T11865] RSP: 002b:00007f62aa129028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 651.503449][T11865] RAX: ffffffffffffffda RBX: 00007f62a9415fa0 RCX: 00007f62a919c799 [ 651.503463][T11865] RDX: 0000000000000050 RSI: 0000200000000680 RDI: 000000000000000a [ 651.503476][T11865] RBP: 00007f62aa129090 R08: 0000000000000000 R09: 0000000000000000 [ 651.503489][T11865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 651.503501][T11865] R13: 00007f62a9416038 R14: 00007f62a9415fa0 R15: 00007ffeb13168e8 [ 651.503534][T11865] [ 651.756065][T11868] FAULT_INJECTION: forcing a failure. [ 651.756065][T11868] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 651.768444][T11869] FAULT_INJECTION: forcing a failure. [ 651.768444][T11869] name failslab, interval 1, probability 0, space 0, times 1 [ 651.782005][T11869] CPU: 0 UID: 0 PID: 11869 Comm: syz.1.1052 Not tainted syzkaller #0 PREEMPT(full) [ 651.782032][T11869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 651.782045][T11869] Call Trace: [ 651.782053][T11869] [ 651.782060][T11869] dump_stack_lvl+0xe8/0x150 [ 651.782094][T11869] should_fail_ex+0x412/0x560 [ 651.782124][T11869] should_failslab+0xa8/0x100 [ 651.782150][T11869] kmem_cache_alloc_node_noprof+0x8f/0x690 [ 651.782171][T11869] ? cgroup1_freezing+0x20/0x350 [ 651.782197][T11869] ? cgroup1_freezing+0x20/0x350 [ 651.782221][T11869] ? dup_task_struct+0x57/0x9a0 [ 651.782253][T11869] dup_task_struct+0x57/0x9a0 [ 651.782276][T11869] ? _raw_spin_unlock_irq+0x23/0x50 [ 651.782394][T11869] copy_process+0x508/0x3cf0 [ 651.782425][T11869] ? kstrtoull+0x12f/0x1d0 [ 651.782478][T11869] ? kstrtouint+0x6e/0xe0 [ 651.782507][T11869] ? get_pid_task+0x20/0x1f0 [ 651.782528][T11869] ? __pfx_copy_process+0x10/0x10 [ 651.782555][T11869] ? get_pid_task+0x20/0x1f0 [ 651.782570][T11869] ? get_pid_task+0x20/0x1f0 [ 651.782595][T11869] kernel_clone+0x248/0x8e0 [ 651.782628][T11869] ? __pfx_kernel_clone+0x10/0x10 [ 651.782664][T11869] ? __mutex_unlock_slowpath+0x1bd/0x7d0 [ 651.782698][T11869] __x64_sys_clone+0x1b6/0x230 [ 651.782729][T11869] ? __pfx___x64_sys_clone+0x10/0x10 [ 651.782775][T11869] ? __pfx_ksys_write+0x10/0x10 [ 651.782809][T11869] do_syscall_64+0x14d/0xf80 [ 651.782827][T11869] ? trace_irq_disable+0x3b/0x150 [ 651.782854][T11869] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 651.782875][T11869] ? clear_bhb_loop+0x40/0x90 [ 651.782900][T11869] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 651.782920][T11869] RIP: 0033:0x7fe1a0b9c799 [ 651.782942][T11869] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 651.782959][T11869] RSP: 002b:00007fe1a1a34fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 651.782979][T11869] RAX: ffffffffffffffda RBX: 00007fe1a0e15fa0 RCX: 00007fe1a0b9c799 [ 651.782991][T11869] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000011 [ 651.783000][T11869] RBP: 00007fe1a1a35090 R08: 0000000000000000 R09: 0000000000000000 [ 651.783011][T11869] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 651.783020][T11869] R13: 00007fe1a0e16038 R14: 00007fe1a0e15fa0 R15: 00007ffe5526a7a8 [ 651.783046][T11869] [ 652.028134][T11868] CPU: 1 UID: 0 PID: 11868 Comm: syz.4.1054 Not tainted syzkaller #0 PREEMPT(full) [ 652.028163][T11868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 652.028176][T11868] Call Trace: [ 652.028184][T11868] [ 652.028193][T11868] dump_stack_lvl+0xe8/0x150 [ 652.028227][T11868] should_fail_ex+0x412/0x560 [ 652.028259][T11868] _copy_from_user+0x2d/0xb0 [ 652.028292][T11868] __sys_bpf+0x229/0x950 [ 652.028325][T11868] ? __pfx___sys_bpf+0x10/0x10 [ 652.028372][T11868] ? ksys_write+0x242/0x270 [ 652.028397][T11868] ? __pfx_ksys_write+0x10/0x10 [ 652.028427][T11868] __x64_sys_bpf+0x7c/0x90 [ 652.028456][T11868] do_syscall_64+0x14d/0xf80 [ 652.028474][T11868] ? trace_irq_disable+0x3b/0x150 [ 652.028502][T11868] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 652.028523][T11868] ? clear_bhb_loop+0x40/0x90 [ 652.028548][T11868] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 652.028568][T11868] RIP: 0033:0x7f12f4d9c799 [ 652.028588][T11868] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 652.028605][T11868] RSP: 002b:00007f12f5c86028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 652.028627][T11868] RAX: ffffffffffffffda RBX: 00007f12f5015fa0 RCX: 00007f12f4d9c799 [ 652.028641][T11868] RDX: 0000000000000094 RSI: 0000200000000840 RDI: 0000000000000005 [ 652.028654][T11868] RBP: 00007f12f5c86090 R08: 0000000000000000 R09: 0000000000000000 [ 652.028667][T11868] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 652.028679][T11868] R13: 00007f12f5016038 R14: 00007f12f5015fa0 R15: 00007ffd8c88a328 [ 652.028712][T11868] [ 652.347642][T11880] netlink: 64 bytes leftover after parsing attributes in process `syz.8.1055'. [ 652.415471][T11876] netlink: 4975 bytes leftover after parsing attributes in process `syz.8.1055'. [ 652.442504][T11876] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 652.484190][T11883] netlink: 'syz.1.1056': attribute type 27 has an invalid length. [ 652.504717][T11883] netlink: 164 bytes leftover after parsing attributes in process `syz.1.1056'. [ 652.511985][T11876] netlink: 'syz.8.1055': attribute type 14 has an invalid length. [ 652.535566][T11876] netlink: 164 bytes leftover after parsing attributes in process `syz.8.1055'. [ 652.579530][T11886] netlink: 8 bytes leftover after parsing attributes in process `syz.8.1055'. [ 652.663511][T11890] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1057'. [ 652.916360][T11897] Driver unsupported XDP return value 0 on prog (id 615) dev N/A, expect packet loss! [ 653.920931][T11881] syzkaller0: entered promiscuous mode [ 653.931729][T11881] syzkaller0: entered allmulticast mode [ 654.173670][T11908] FAULT_INJECTION: forcing a failure. [ 654.173670][T11908] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 654.197697][T11908] CPU: 0 UID: 0 PID: 11908 Comm: syz.1.1063 Not tainted syzkaller #0 PREEMPT(full) [ 654.197729][T11908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 654.197741][T11908] Call Trace: [ 654.197753][T11908] [ 654.197766][T11908] dump_stack_lvl+0xe8/0x150 [ 654.197821][T11908] should_fail_ex+0x412/0x560 [ 654.197892][T11908] _copy_from_user+0x2d/0xb0 [ 654.197941][T11908] ___sys_sendmsg+0x1c6/0x360 [ 654.198090][T11908] ? __pfx____sys_sendmsg+0x10/0x10 [ 654.198164][T11908] ? __pfx_perf_trace_lock_acquire+0x10/0x10 [ 654.198367][T11908] ? __fget_files+0x2a/0x420 [ 654.198404][T11908] ? __fget_files+0x3a0/0x420 [ 654.198516][T11908] __x64_sys_sendmsg+0x1bd/0x2a0 [ 654.198568][T11908] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 654.198658][T11908] ? __pfx_ksys_write+0x10/0x10 [ 654.198759][T11908] do_syscall_64+0x14d/0xf80 [ 654.198785][T11908] ? trace_irq_disable+0x3b/0x150 [ 654.198817][T11908] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 654.198846][T11908] ? clear_bhb_loop+0x40/0x90 [ 654.198898][T11908] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 654.198924][T11908] RIP: 0033:0x7fe1a0b9c799 [ 654.198957][T11908] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 654.198975][T11908] RSP: 002b:00007fe1a1a35028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 654.198998][T11908] RAX: ffffffffffffffda RBX: 00007fe1a0e15fa0 RCX: 00007fe1a0b9c799 [ 654.199012][T11908] RDX: 0000000000008010 RSI: 0000200000000000 RDI: 0000000000000005 [ 654.199026][T11908] RBP: 00007fe1a1a35090 R08: 0000000000000000 R09: 0000000000000000 [ 654.199039][T11908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 654.199051][T11908] R13: 00007fe1a0e16038 R14: 00007fe1a0e15fa0 R15: 00007ffe5526a7a8 [ 654.199168][T11908] [ 654.449759][T11911] __nla_validate_parse: 2 callbacks suppressed [ 654.449782][T11911] netlink: 20 bytes leftover after parsing attributes in process `syz.8.1062'. [ 654.486938][T11911] netlink: 20 bytes leftover after parsing attributes in process `syz.8.1062'. [ 655.108068][T11927] netlink: 'syz.3.1067': attribute type 10 has an invalid length. [ 656.535568][T11936] FAULT_INJECTION: forcing a failure. [ 656.535568][T11936] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 656.549885][T11936] CPU: 0 UID: 0 PID: 11936 Comm: syz.3.1070 Not tainted syzkaller #0 PREEMPT(full) [ 656.549913][T11936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 656.549925][T11936] Call Trace: [ 656.549932][T11936] [ 656.549940][T11936] dump_stack_lvl+0xe8/0x150 [ 656.549974][T11936] should_fail_ex+0x412/0x560 [ 656.550006][T11936] _copy_from_user+0x2d/0xb0 [ 656.550038][T11936] ___sys_sendmsg+0x1c6/0x360 [ 656.550067][T11936] ? __pfx____sys_sendmsg+0x10/0x10 [ 656.550118][T11936] ? __fget_files+0x2a/0x420 [ 656.550162][T11936] ? __fget_files+0x2a/0x420 [ 656.550187][T11936] ? __fget_files+0x3a0/0x420 [ 656.550230][T11936] __x64_sys_sendmsg+0x1bd/0x2a0 [ 656.550253][T11936] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 656.550287][T11936] ? __pfx_ksys_write+0x10/0x10 [ 656.550324][T11936] do_syscall_64+0x14d/0xf80 [ 656.550342][T11936] ? trace_irq_disable+0x3b/0x150 [ 656.550369][T11936] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 656.550389][T11936] ? clear_bhb_loop+0x40/0x90 [ 656.550414][T11936] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 656.550431][T11936] RIP: 0033:0x7f67e679c799 [ 656.550449][T11936] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 656.550464][T11936] RSP: 002b:00007f67e76ee028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 656.550483][T11936] RAX: ffffffffffffffda RBX: 00007f67e6a15fa0 RCX: 00007f67e679c799 [ 656.550495][T11936] RDX: 0000000000000000 RSI: 0000200000009b40 RDI: 0000000000000003 [ 656.550507][T11936] RBP: 00007f67e76ee090 R08: 0000000000000000 R09: 0000000000000000 [ 656.550518][T11936] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 656.550528][T11936] R13: 00007f67e6a16038 R14: 00007f67e6a15fa0 R15: 00007fff4b4d0088 [ 656.550564][T11936] [ 656.987995][T11939] netlink: 'syz.3.1071': attribute type 27 has an invalid length. [ 656.996164][T11939] netlink: 164 bytes leftover after parsing attributes in process `syz.3.1071'. [ 658.041466][T11912] netlink: 44 bytes leftover after parsing attributes in process `syz.8.1062'. [ 658.187056][T11946] syzkaller0: entered promiscuous mode [ 658.193274][T11946] syzkaller0: entered allmulticast mode [ 658.227805][T11955] FAULT_INJECTION: forcing a failure. [ 658.227805][T11955] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 658.271914][T11955] CPU: 1 UID: 0 PID: 11955 Comm: syz.8.1075 Not tainted syzkaller #0 PREEMPT(full) [ 658.271944][T11955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 658.271956][T11955] Call Trace: [ 658.271976][T11955] [ 658.271995][T11955] dump_stack_lvl+0xe8/0x150 [ 658.272091][T11955] should_fail_ex+0x412/0x560 [ 658.272237][T11955] _copy_from_user+0x2d/0xb0 [ 658.272318][T11955] ___sys_sendmsg+0x1c6/0x360 [ 658.272383][T11955] ? perf_trace_run_bpf_submit+0xee/0x170 [ 658.272496][T11955] ? __pfx____sys_sendmsg+0x10/0x10 [ 658.272922][T11955] ? __fget_files+0x2a/0x420 [ 658.273159][T11955] ? __fget_files+0x2a/0x420 [ 658.273210][T11955] ? __fget_files+0x3a0/0x420 [ 658.273451][T11955] __x64_sys_sendmsg+0x1bd/0x2a0 [ 658.273553][T11955] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 658.273756][T11955] ? __pfx_ksys_write+0x10/0x10 [ 658.274000][T11955] do_syscall_64+0x14d/0xf80 [ 658.274037][T11955] ? trace_irq_disable+0x3b/0x150 [ 658.274077][T11955] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 658.274120][T11955] ? clear_bhb_loop+0x40/0x90 [ 658.274222][T11955] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 658.274268][T11955] RIP: 0033:0x7f62a919c799 [ 658.274322][T11955] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 658.274340][T11955] RSP: 002b:00007f62aa129028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 658.274362][T11955] RAX: ffffffffffffffda RBX: 00007f62a9415fa0 RCX: 00007f62a919c799 [ 658.274376][T11955] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 658.274388][T11955] RBP: 00007f62aa129090 R08: 0000000000000000 R09: 0000000000000000 [ 658.274401][T11955] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 658.274413][T11955] R13: 00007f62a9416038 R14: 00007f62a9415fa0 R15: 00007ffeb13168e8 [ 658.274742][T11955] [ 658.386882][T11964] openvswitch: netlink: ct_state flags 020000e0 unsupported [ 658.552193][T11965] FAULT_INJECTION: forcing a failure. [ 658.552193][T11965] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 658.594236][T11965] CPU: 1 UID: 0 PID: 11965 Comm: syz.1.1077 Not tainted syzkaller #0 PREEMPT(full) [ 658.594266][T11965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 658.594279][T11965] Call Trace: [ 658.594287][T11965] [ 658.594297][T11965] dump_stack_lvl+0xe8/0x150 [ 658.594330][T11965] should_fail_ex+0x412/0x560 [ 658.594362][T11965] _copy_from_user+0x2d/0xb0 [ 658.594394][T11965] do_ip_vs_set_ctl+0x353/0xaf0 [ 658.594524][T11965] ? trace_contention_end+0x2e/0x150 [ 658.594562][T11965] ? __pfx_do_ip_vs_set_ctl+0x10/0x10 [ 658.594610][T11965] ? __mutex_unlock_slowpath+0x1bd/0x7d0 [ 658.594639][T11965] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 658.594678][T11965] nf_setsockopt+0x26f/0x290 [ 658.594726][T11965] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 658.594774][T11965] smc_setsockopt+0x249/0xac0 [ 658.594852][T11965] ? __pfx_smc_setsockopt+0x10/0x10 [ 658.594877][T11965] ? aa_sock_opt_perm+0xff/0x1a0 [ 658.594933][T11965] ? bpf_lsm_socket_setsockopt+0x9/0x20 [ 658.594956][T11965] ? __pfx_smc_setsockopt+0x10/0x10 [ 658.594985][T11965] do_sock_setsockopt+0x17c/0x1b0 [ 658.595042][T11965] __x64_sys_setsockopt+0x13d/0x1b0 [ 658.595078][T11965] do_syscall_64+0x14d/0xf80 [ 658.595097][T11965] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 658.595127][T11965] ? clear_bhb_loop+0x40/0x90 [ 658.595152][T11965] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 658.595172][T11965] RIP: 0033:0x7fe1a0b9c799 [ 658.595193][T11965] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 658.595210][T11965] RSP: 002b:00007fe1a1a35028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 658.595233][T11965] RAX: ffffffffffffffda RBX: 00007fe1a0e15fa0 RCX: 00007fe1a0b9c799 [ 658.595247][T11965] RDX: 0000000000000485 RSI: 0000000000000000 RDI: 0000000000000005 [ 658.595259][T11965] RBP: 00007fe1a1a35090 R08: 0000000000000000 R09: 0000000000000000 [ 658.595271][T11965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 658.595282][T11965] R13: 00007fe1a0e16038 R14: 00007fe1a0e15fa0 R15: 00007ffe5526a7a8 [ 658.595313][T11965] [ 658.837429][T11971] netlink: 'syz.5.1076': attribute type 22 has an invalid length. [ 659.554202][T11982] netlink: 'syz.1.1081': attribute type 27 has an invalid length. [ 659.756879][T11982] netlink: 164 bytes leftover after parsing attributes in process `syz.1.1081'. [ 660.122853][T11979] netlink: 16 bytes leftover after parsing attributes in process `syz.8.1080'. [ 660.697589][T11992] netlink: 'syz.1.1082': attribute type 27 has an invalid length. [ 660.705897][T11992] netlink: 164 bytes leftover after parsing attributes in process `syz.1.1082'. [ 660.961973][T11996] netlink: 6 bytes leftover after parsing attributes in process `syz.1.1084'. [ 661.671770][T12004] FAULT_INJECTION: forcing a failure. [ 661.671770][T12004] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 661.688773][T12004] CPU: 0 UID: 0 PID: 12004 Comm: syz.8.1087 Not tainted syzkaller #0 PREEMPT(full) [ 661.688801][T12004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 661.688813][T12004] Call Trace: [ 661.688820][T12004] [ 661.688828][T12004] dump_stack_lvl+0xe8/0x150 [ 661.688860][T12004] should_fail_ex+0x412/0x560 [ 661.688890][T12004] _copy_from_user+0x2d/0xb0 [ 661.688920][T12004] __sys_bpf+0x229/0x950 [ 661.688951][T12004] ? __pfx___sys_bpf+0x10/0x10 [ 661.688994][T12004] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 661.689023][T12004] ? ksys_write+0x242/0x270 [ 661.689046][T12004] ? __pfx_ksys_write+0x10/0x10 [ 661.689073][T12004] __x64_sys_bpf+0x7c/0x90 [ 661.689099][T12004] do_syscall_64+0x14d/0xf80 [ 661.689118][T12004] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 661.689137][T12004] ? clear_bhb_loop+0x40/0x90 [ 661.689161][T12004] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 661.689179][T12004] RIP: 0033:0x7f62a919c799 [ 661.689198][T12004] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 661.689215][T12004] RSP: 002b:00007f62aa129028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 661.689236][T12004] RAX: ffffffffffffffda RBX: 00007f62a9415fa0 RCX: 00007f62a919c799 [ 661.689249][T12004] RDX: 0000000000000048 RSI: 0000200000000200 RDI: 0000000000000000 [ 661.689260][T12004] RBP: 00007f62aa129090 R08: 0000000000000000 R09: 0000000000000000 [ 661.689270][T12004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 661.689281][T12004] R13: 00007f62a9416038 R14: 00007f62a9415fa0 R15: 00007ffeb13168e8 [ 661.689310][T12004] [ 662.905037][T12013] bpf: Bad value for 'uid' [ 663.989292][T12040] netlink: 212340 bytes leftover after parsing attributes in process `syz.3.1094'. [ 664.008481][T12040] openvswitch: netlink: Port 167772160 exceeds max allowable 65535 [ 666.033361][T12087] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1100'. [ 666.233718][T12099] netlink: 8 bytes leftover after parsing attributes in process `syz.5.1103'. [ 666.709157][T12089] syzkaller0: entered promiscuous mode [ 666.738046][T12089] syzkaller0: entered allmulticast mode [ 666.858403][T12084] syzkaller0: entered promiscuous mode [ 666.864176][T12084] syzkaller0: entered allmulticast mode [ 666.931936][T12095] syzkaller0: entered promiscuous mode [ 666.975480][T12095] syzkaller0: entered allmulticast mode [ 667.506682][T12119] netlink: 212340 bytes leftover after parsing attributes in process `syz.3.1107'. [ 667.826183][T12119] openvswitch: netlink: Port 167772160 exceeds max allowable 65535 [ 668.389753][T12124] netlink: 'syz.8.1109': attribute type 3 has an invalid length. [ 668.513145][T12124] netlink: 'syz.8.1109': attribute type 6 has an invalid length. [ 669.438580][T12132] FAULT_INJECTION: forcing a failure. [ 669.438580][T12132] name failslab, interval 1, probability 0, space 0, times 0 [ 669.455278][T12132] CPU: 1 UID: 0 PID: 12132 Comm: syz.8.1111 Not tainted syzkaller #0 PREEMPT(full) [ 669.455309][T12132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 669.455330][T12132] Call Trace: [ 669.455339][T12132] [ 669.455356][T12132] dump_stack_lvl+0xe8/0x150 [ 669.455389][T12132] should_fail_ex+0x412/0x560 [ 669.455420][T12132] should_failslab+0xa8/0x100 [ 669.455446][T12132] __kmalloc_noprof+0xe8/0x760 [ 669.455468][T12132] ? bpf_test_init+0x9f/0x150 [ 669.455572][T12132] bpf_test_init+0x9f/0x150 [ 669.455600][T12132] bpf_prog_test_run_skb+0x36f/0x1c90 [ 669.455638][T12132] ? __fget_files+0x2a/0x420 [ 669.455665][T12132] ? __fget_files+0x3a0/0x420 [ 669.455689][T12132] ? __fget_files+0x2a/0x420 [ 669.455720][T12132] ? __pfx_bpf_prog_test_run_skb+0x10/0x10 [ 669.455745][T12132] bpf_prog_test_run+0x2c7/0x340 [ 669.455769][T12132] __sys_bpf+0x643/0x950 [ 669.455800][T12132] ? __pfx___sys_bpf+0x10/0x10 [ 669.455844][T12132] ? ksys_write+0x242/0x270 [ 669.455867][T12132] ? __pfx_ksys_write+0x10/0x10 [ 669.455896][T12132] __x64_sys_bpf+0x7c/0x90 [ 669.455923][T12132] do_syscall_64+0x14d/0xf80 [ 669.455940][T12132] ? trace_irq_disable+0x3b/0x150 [ 669.455966][T12132] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 669.455985][T12132] ? clear_bhb_loop+0x40/0x90 [ 669.456009][T12132] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 669.456028][T12132] RIP: 0033:0x7f62a919c799 [ 669.456048][T12132] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 669.456064][T12132] RSP: 002b:00007f62aa129028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 669.456086][T12132] RAX: ffffffffffffffda RBX: 00007f62a9415fa0 RCX: 00007f62a919c799 [ 669.456100][T12132] RDX: 0000000000000050 RSI: 0000200000000680 RDI: 000000000000000a [ 669.456112][T12132] RBP: 00007f62aa129090 R08: 0000000000000000 R09: 0000000000000000 [ 669.456124][T12132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 669.456135][T12132] R13: 00007f62a9416038 R14: 00007f62a9415fa0 R15: 00007ffeb13168e8 [ 669.456168][T12132] [ 669.968553][T12134] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 673.704434][T12176] FAULT_INJECTION: forcing a failure. [ 673.704434][T12176] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 673.759358][T12176] CPU: 0 UID: 0 PID: 12176 Comm: syz.3.1119 Not tainted syzkaller #0 PREEMPT(full) [ 673.759387][T12176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 673.759399][T12176] Call Trace: [ 673.759407][T12176] [ 673.759416][T12176] dump_stack_lvl+0xe8/0x150 [ 673.759451][T12176] should_fail_ex+0x412/0x560 [ 673.759483][T12176] _copy_to_user+0x31/0xb0 [ 673.759516][T12176] simple_read_from_buffer+0xe1/0x170 [ 673.759551][T12176] proc_fail_nth_read+0x1bb/0x230 [ 673.759593][T12176] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 673.759625][T12176] ? rw_verify_area+0x2a6/0x4d0 [ 673.759646][T12176] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 673.759676][T12176] vfs_read+0x20c/0xa70 [ 673.759697][T12176] ? fdget_pos+0x246/0x320 [ 673.759732][T12176] ? __pfx___mutex_lock+0x10/0x10 [ 673.759754][T12176] ? __pfx_vfs_read+0x10/0x10 [ 673.759778][T12176] ? __fget_files+0x2a/0x420 [ 673.759810][T12176] ? __fget_files+0x3a0/0x420 [ 673.759838][T12176] ? __fget_files+0x2a/0x420 [ 673.759876][T12176] ksys_read+0x150/0x270 [ 673.759901][T12176] ? __pfx_ksys_read+0x10/0x10 [ 673.759936][T12176] do_syscall_64+0x14d/0xf80 [ 673.759954][T12176] ? trace_irq_disable+0x3b/0x150 [ 673.759982][T12176] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 673.760004][T12176] ? clear_bhb_loop+0x40/0x90 [ 673.760029][T12176] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 673.760049][T12176] RIP: 0033:0x7f67e675cfce [ 673.760068][T12176] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 673.760085][T12176] RSP: 002b:00007f67e76edfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 673.760108][T12176] RAX: ffffffffffffffda RBX: 00007f67e76ee6c0 RCX: 00007f67e675cfce [ 673.760123][T12176] RDX: 000000000000000f RSI: 00007f67e76ee0a0 RDI: 0000000000000003 [ 673.760135][T12176] RBP: 00007f67e76ee090 R08: 0000000000000000 R09: 0000000000000000 [ 673.760147][T12176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 673.760159][T12176] R13: 00007f67e6a16038 R14: 00007f67e6a15fa0 R15: 00007fff4b4d0088 [ 673.760193][T12176] [ 674.038470][T12177] syzkaller0: entered promiscuous mode [ 674.044722][T12177] syzkaller0: entered allmulticast mode [ 674.077963][T12182] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1123'. [ 674.385229][T12189] sctp: [Deprecated]: syz.3.1124 (pid 12189) Use of struct sctp_assoc_value in delayed_ack socket option. [ 674.385229][T12189] Use struct sctp_sack_info instead [ 674.403851][T12197] netlink: 'syz.5.1122': attribute type 10 has an invalid length. [ 674.403881][T12197] netlink: 40 bytes leftover after parsing attributes in process `syz.5.1122'. [ 676.300566][T12197] team0: entered promiscuous mode [ 676.316148][T12197] team_slave_0: entered promiscuous mode [ 676.322424][T12197] team_slave_1: entered promiscuous mode [ 676.333176][T12197] team0: entered allmulticast mode [ 676.342862][T12197] team_slave_0: entered allmulticast mode [ 676.348860][T12197] team_slave_1: entered allmulticast mode [ 676.362236][T12197] bridge0: port 3(team0) entered blocking state [ 676.379568][T12197] bridge0: port 3(team0) entered disabled state [ 676.392791][T12197] bridge0: port 3(team0) entered blocking state [ 676.399419][T12197] bridge0: port 3(team0) entered forwarding state [ 676.633475][T12221] netlink: 'syz.3.1129': attribute type 2 has an invalid length. [ 676.654814][T12221] netlink: 'syz.3.1129': attribute type 2 has an invalid length. [ 676.822980][T12219] can: request_module (can-proto-4) failed. [ 676.947981][T12235] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1132'. [ 676.982636][T12240] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1131'. [ 677.067618][T12239] : entered promiscuous mode [ 677.440400][T12227] syzkaller0: entered promiscuous mode [ 677.461100][T12227] syzkaller0: entered allmulticast mode [ 677.613070][T12232] syzkaller0: entered promiscuous mode [ 677.629174][T12232] syzkaller0: entered allmulticast mode [ 679.879114][T12276] tmpfs: Bad value for 'gid' [ 679.894101][T12276] tmpfs: Bad value for 'gid' [ 680.574974][T12294] FAULT_INJECTION: forcing a failure. [ 680.574974][T12294] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 680.635998][T12294] CPU: 0 UID: 0 PID: 12294 Comm: syz.5.1145 Not tainted syzkaller #0 PREEMPT(full) [ 680.636033][T12294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 680.636046][T12294] Call Trace: [ 680.636054][T12294] [ 680.636062][T12294] dump_stack_lvl+0xe8/0x150 [ 680.636096][T12294] should_fail_ex+0x412/0x560 [ 680.636127][T12294] _copy_to_user+0x31/0xb0 [ 680.636159][T12294] simple_read_from_buffer+0xe1/0x170 [ 680.636192][T12294] proc_fail_nth_read+0x1bb/0x230 [ 680.636233][T12294] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 680.636264][T12294] ? rw_verify_area+0x2a6/0x4d0 [ 680.636284][T12294] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 680.636313][T12294] vfs_read+0x20c/0xa70 [ 680.636332][T12294] ? fdget_pos+0x246/0x320 [ 680.636365][T12294] ? __pfx___mutex_lock+0x10/0x10 [ 680.636386][T12294] ? __pfx_vfs_read+0x10/0x10 [ 680.636410][T12294] ? __fget_files+0x2a/0x420 [ 680.636442][T12294] ? __fget_files+0x3a0/0x420 [ 680.636468][T12294] ? __fget_files+0x2a/0x420 [ 680.636504][T12294] ksys_read+0x150/0x270 [ 680.636529][T12294] ? __pfx_ksys_read+0x10/0x10 [ 680.636561][T12294] do_syscall_64+0x14d/0xf80 [ 680.636579][T12294] ? trace_irq_disable+0x3b/0x150 [ 680.636605][T12294] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 680.636625][T12294] ? clear_bhb_loop+0x40/0x90 [ 680.636650][T12294] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 680.636670][T12294] RIP: 0033:0x7f09b475cfce [ 680.636688][T12294] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 680.636706][T12294] RSP: 002b:00007f09b5633fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 680.636729][T12294] RAX: ffffffffffffffda RBX: 00007f09b56346c0 RCX: 00007f09b475cfce [ 680.636742][T12294] RDX: 000000000000000f RSI: 00007f09b56340a0 RDI: 0000000000000005 [ 680.636755][T12294] RBP: 00007f09b5634090 R08: 0000000000000000 R09: 0000000000000000 [ 680.636766][T12294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 680.636778][T12294] R13: 00007f09b4a16038 R14: 00007f09b4a15fa0 R15: 00007fff555d6498 [ 680.636810][T12294] [ 681.139320][T12301] netlink: 'syz.4.1147': attribute type 27 has an invalid length. [ 681.148206][T12301] netlink: 164 bytes leftover after parsing attributes in process `syz.4.1147'. [ 682.368939][T12328] netlink: 8 bytes leftover after parsing attributes in process `syz.8.1152'. [ 683.418821][T12314] netlink: 822 bytes leftover after parsing attributes in process `syz.5.1150'. [ 683.428391][T12314] veth0_to_bond: invalid flags given to default FDB implementation [ 683.602179][T12319] syzkaller0: entered promiscuous mode [ 683.602992][T12334] netlink: 'syz.3.1153': attribute type 10 has an invalid length. [ 683.621675][T12319] syzkaller0: entered allmulticast mode [ 683.632711][T12334] netlink: 40 bytes leftover after parsing attributes in process `syz.3.1153'. [ 684.648884][T12365] netlink: 8 bytes leftover after parsing attributes in process `syz.5.1160'. [ 684.800366][T12367] netlink: 'syz.4.1161': attribute type 27 has an invalid length. [ 684.810164][T12367] netlink: 164 bytes leftover after parsing attributes in process `syz.4.1161'. [ 684.970044][T12373] sctp: [Deprecated]: syz.4.1162 (pid 12373) Use of struct sctp_assoc_value in delayed_ack socket option. [ 684.970044][T12373] Use struct sctp_sack_info instead [ 685.887329][ T1300] ieee802154 phy0 wpan0: encryption failed: -22 [ 685.897645][ T1300] ieee802154 phy1 wpan1: encryption failed: -22 [ 686.226042][T12334] team0: entered promiscuous mode [ 686.231301][T12334] team_slave_0: entered promiscuous mode [ 686.238779][T12334] team_slave_1: entered promiscuous mode [ 686.245454][T12334] team0: entered allmulticast mode [ 686.250601][T12334] team_slave_0: entered allmulticast mode [ 686.257078][T12334] team_slave_1: entered allmulticast mode [ 686.266506][T12334] bridge0: port 3(team0) entered blocking state [ 686.274397][T12334] bridge0: port 3(team0) entered disabled state [ 686.285631][T12334] bridge0: port 3(team0) entered blocking state [ 686.292142][T12334] bridge0: port 3(team0) entered forwarding state [ 686.301587][T12342] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1155'. [ 686.323965][T12342] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1155'. [ 686.404531][T12365] : entered promiscuous mode [ 686.505220][T12384] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1166'. [ 686.793230][T12393] netlink: 'syz.4.1168': attribute type 1 has an invalid length. [ 686.862488][T12393] netlink: 'syz.4.1168': attribute type 2 has an invalid length. [ 686.912531][T12393] netlink: 'syz.4.1168': attribute type 1 has an invalid length. [ 686.921470][T12393] netlink: 16 bytes leftover after parsing attributes in process `syz.4.1168'. [ 686.930377][T12394] netlink: 'syz.5.1167': attribute type 2 has an invalid length. [ 687.063932][T12380] syzkaller0: entered promiscuous mode [ 687.069576][T12380] syzkaller0: entered allmulticast mode [ 687.187328][T12394] : entered promiscuous mode [ 687.299445][T12405] netlink: 'syz.8.1170': attribute type 2 has an invalid length. [ 687.388309][T12407] sctp: [Deprecated]: syz.3.1171 (pid 12407) Use of struct sctp_assoc_value in delayed_ack socket option. [ 687.388309][T12407] Use struct sctp_sack_info instead [ 687.738947][T12416] netlink: 'syz.5.1172': attribute type 27 has an invalid length. [ 687.878270][T12416] netlink: 164 bytes leftover after parsing attributes in process `syz.5.1172'. [ 688.719550][T12433] netlink: 8 bytes leftover after parsing attributes in process `syz.8.1175'. [ 689.839500][T12446] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1176'. [ 689.986454][T12446] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1176'. [ 690.749942][T12459] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1181'. [ 690.876936][T12449] delete_channel: no stack [ 691.388397][T12469] sctp: [Deprecated]: syz.5.1185 (pid 12469) Use of struct sctp_assoc_value in delayed_ack socket option. [ 691.388397][T12469] Use struct sctp_sack_info instead [ 691.558356][T12471] netlink: 232 bytes leftover after parsing attributes in process `syz.5.1186'. [ 691.568000][T12471] netlink: 12 bytes leftover after parsing attributes in process `syz.5.1186'. [ 691.577840][T12471] netlink: 8 bytes leftover after parsing attributes in process `syz.5.1186'. [ 692.132684][T12458] netlink: 60 bytes leftover after parsing attributes in process `syz.3.1182'. [ 692.152934][T12472] netlink: 44 bytes leftover after parsing attributes in process `syz.5.1186'. [ 692.504153][T12478] netlink: 'syz.3.1188': attribute type 27 has an invalid length. [ 692.562723][T12478] netlink: 164 bytes leftover after parsing attributes in process `syz.3.1188'. [ 699.526474][T12536] FAULT_INJECTION: forcing a failure. [ 699.526474][T12536] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 699.553851][T12536] CPU: 1 UID: 0 PID: 12536 Comm: syz.5.1195 Not tainted syzkaller #0 PREEMPT(full) [ 699.553880][T12536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 699.553891][T12536] Call Trace: [ 699.553899][T12536] [ 699.553907][T12536] dump_stack_lvl+0xe8/0x150 [ 699.553940][T12536] should_fail_ex+0x412/0x560 [ 699.553971][T12536] _copy_from_iter+0x1d3/0x1670 [ 699.554085][T12536] ? rcu_is_watching+0x15/0xb0 [ 699.554118][T12536] ? __pfx__copy_from_iter+0x10/0x10 [ 699.554150][T12536] ? netlink_sendmsg+0x650/0xb40 [ 699.554202][T12536] ? skb_put+0x11b/0x210 [ 699.554233][T12536] netlink_sendmsg+0x6c0/0xb40 [ 699.554268][T12536] ? __pfx_netlink_sendmsg+0x10/0x10 [ 699.554297][T12536] ? aa_sock_msg_perm+0xf1/0x1b0 [ 699.554333][T12536] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 699.554359][T12536] ____sys_sendmsg+0x972/0x9f0 [ 699.554388][T12536] ? __pfx_____sys_sendmsg+0x10/0x10 [ 699.554417][T12536] ? import_iovec+0x73/0xa0 [ 699.554449][T12536] ___sys_sendmsg+0x2a5/0x360 [ 699.554474][T12536] ? __pfx____sys_sendmsg+0x10/0x10 [ 699.554521][T12532] FAULT_INJECTION: forcing a failure. [ 699.554521][T12532] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 699.554528][T12536] ? __fget_files+0x2a/0x420 [ 699.554557][T12536] ? __fget_files+0x3a0/0x420 [ 699.554595][T12536] __x64_sys_sendmsg+0x1bd/0x2a0 [ 699.554615][T12536] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 699.554629][T12536] ? perf_trace_preemptirq_template+0xb2/0x350 [ 699.554666][T12536] ? __pfx_ksys_write+0x10/0x10 [ 699.554697][T12536] do_syscall_64+0x14d/0xf80 [ 699.554714][T12536] ? trace_irq_disable+0x3b/0x150 [ 699.554738][T12536] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 699.554757][T12536] ? clear_bhb_loop+0x40/0x90 [ 699.554780][T12536] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 699.554798][T12536] RIP: 0033:0x7f09b479c799 [ 699.554816][T12536] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 699.554833][T12536] RSP: 002b:00007f09b5634028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 699.554853][T12536] RAX: ffffffffffffffda RBX: 00007f09b4a15fa0 RCX: 00007f09b479c799 [ 699.554867][T12536] RDX: 0000000000004000 RSI: 0000200000005cc0 RDI: 0000000000000003 [ 699.554879][T12536] RBP: 00007f09b5634090 R08: 0000000000000000 R09: 0000000000000000 [ 699.554890][T12536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 699.554900][T12536] R13: 00007f09b4a16038 R14: 00007f09b4a15fa0 R15: 00007fff555d6498 [ 699.554929][T12536] [ 699.772075][T12540] netlink: 68 bytes leftover after parsing attributes in process `syz.8.1191'. [ 699.826535][T12532] CPU: 1 UID: 0 PID: 12532 Comm: syz.3.1193 Not tainted syzkaller #0 PREEMPT(full) [ 699.826566][T12532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 699.826579][T12532] Call Trace: [ 699.826587][T12532] [ 699.826596][T12532] dump_stack_lvl+0xe8/0x150 [ 699.826627][T12532] should_fail_ex+0x412/0x560 [ 699.826658][T12532] _copy_from_user+0x2d/0xb0 [ 699.826687][T12532] sock_do_ioctl+0x195/0x320 [ 699.826714][T12532] ? __pfx_sock_do_ioctl+0x10/0x10 [ 699.826734][T12532] ? __mutex_unlock_slowpath+0x1bd/0x7d0 [ 699.826772][T12532] sock_ioctl+0x5c6/0x7f0 [ 699.826796][T12532] ? __pfx_sock_ioctl+0x10/0x10 [ 699.826820][T12532] ? security_file_ioctl+0x19/0x2a0 [ 699.826917][T12532] ? bpf_lsm_file_ioctl+0x9/0x20 [ 699.826941][T12532] ? __pfx_sock_ioctl+0x10/0x10 [ 699.826963][T12532] __se_sys_ioctl+0xfc/0x170 [ 699.826989][T12532] do_syscall_64+0x14d/0xf80 [ 699.827007][T12532] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 699.827026][T12532] ? clear_bhb_loop+0x40/0x90 [ 699.827058][T12532] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 699.827077][T12532] RIP: 0033:0x7f67e679c799 [ 699.827097][T12532] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 699.827113][T12532] RSP: 002b:00007f67e76ee028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 699.827135][T12532] RAX: ffffffffffffffda RBX: 00007f67e6a15fa0 RCX: 00007f67e679c799 [ 699.827149][T12532] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 0000000000000009 [ 699.827161][T12532] RBP: 00007f67e76ee090 R08: 0000000000000000 R09: 0000000000000000 [ 699.827173][T12532] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 699.827184][T12532] R13: 00007f67e6a16038 R14: 00007f67e6a15fa0 R15: 00007fff4b4d0088 [ 699.827215][T12532] [ 700.040963][T12544] netlink: 'syz.1.1192': attribute type 4 has an invalid length. [ 700.051217][T12544] A link change request failed with some changes committed already. Interface netdevsim0 may have been left with an inconsistent configuration, please check. [ 700.215500][T12552] sctp: [Deprecated]: syz.5.1197 (pid 12552) Use of struct sctp_assoc_value in delayed_ack socket option. [ 700.215500][T12552] Use struct sctp_sack_info instead [ 700.490989][T12554] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1198'. [ 700.646618][T12561] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1199'. [ 700.782216][T12556] syzkaller0: entered promiscuous mode [ 700.789748][T12556] syzkaller0: entered allmulticast mode [ 700.792651][T12562] netlink: 'syz.5.1201': attribute type 27 has an invalid length. [ 700.813105][T12562] netlink: 164 bytes leftover after parsing attributes in process `syz.5.1201'. [ 702.609849][T12583] netlink: 14601 bytes leftover after parsing attributes in process `syz.4.1206'. [ 702.957358][T12593] netlink: 'syz.5.1210': attribute type 1 has an invalid length. [ 702.965844][T12593] netlink: 'syz.5.1210': attribute type 2 has an invalid length. [ 702.974427][T12593] netlink: 'syz.5.1210': attribute type 1 has an invalid length. [ 703.287913][T12598] sctp: [Deprecated]: syz.5.1211 (pid 12598) Use of struct sctp_assoc_value in delayed_ack socket option. [ 703.287913][T12598] Use struct sctp_sack_info instead [ 703.747340][T12612] FAULT_INJECTION: forcing a failure. [ 703.747340][T12612] name failslab, interval 1, probability 0, space 0, times 0 [ 703.760392][T12612] CPU: 0 UID: 0 PID: 12612 Comm: syz.8.1216 Not tainted syzkaller #0 PREEMPT(full) [ 703.760421][T12612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 703.760432][T12612] Call Trace: [ 703.760441][T12612] [ 703.760449][T12612] dump_stack_lvl+0xe8/0x150 [ 703.760481][T12612] should_fail_ex+0x412/0x560 [ 703.760510][T12612] should_failslab+0xa8/0x100 [ 703.760535][T12612] __kmalloc_noprof+0xe8/0x760 [ 703.760555][T12612] ? sk_prot_alloc+0xe7/0x210 [ 703.760589][T12612] sk_prot_alloc+0xe7/0x210 [ 703.760614][T12612] ? sk_alloc+0x27/0x390 [ 703.760643][T12612] sk_alloc+0x3a/0x390 [ 703.760674][T12612] bpf_prog_test_run_skb+0x3ed/0x1c90 [ 703.760713][T12612] ? __fget_files+0x2a/0x420 [ 703.760739][T12612] ? __fget_files+0x3a0/0x420 [ 703.760765][T12612] ? __fget_files+0x2a/0x420 [ 703.760797][T12612] ? __pfx_bpf_prog_test_run_skb+0x10/0x10 [ 703.760823][T12612] bpf_prog_test_run+0x2c7/0x340 [ 703.760846][T12612] __sys_bpf+0x643/0x950 [ 703.760876][T12612] ? __pfx___sys_bpf+0x10/0x10 [ 703.760921][T12612] ? ksys_write+0x242/0x270 [ 703.760944][T12612] ? __pfx_ksys_write+0x10/0x10 [ 703.760971][T12612] __x64_sys_bpf+0x7c/0x90 [ 703.760999][T12612] do_syscall_64+0x14d/0xf80 [ 703.761016][T12612] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 703.761035][T12612] ? clear_bhb_loop+0x40/0x90 [ 703.761056][T12612] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 703.761073][T12612] RIP: 0033:0x7f62a919c799 [ 703.761091][T12612] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 703.761106][T12612] RSP: 002b:00007f62aa129028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 703.761125][T12612] RAX: ffffffffffffffda RBX: 00007f62a9415fa0 RCX: 00007f62a919c799 [ 703.761138][T12612] RDX: 0000000000000050 RSI: 0000200000000680 RDI: 000000000000000a [ 703.761149][T12612] RBP: 00007f62aa129090 R08: 0000000000000000 R09: 0000000000000000 [ 703.761160][T12612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 703.761171][T12612] R13: 00007f62a9416038 R14: 00007f62a9415fa0 R15: 00007ffeb13168e8 [ 703.761201][T12612] [ 704.067331][T12616] netlink: 28 bytes leftover after parsing attributes in process `syz.8.1217'. [ 704.227812][T12619] FAULT_INJECTION: forcing a failure. [ 704.227812][T12619] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 704.242101][T12619] CPU: 0 UID: 0 PID: 12619 Comm: syz.8.1218 Not tainted syzkaller #0 PREEMPT(full) [ 704.242130][T12619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 704.242141][T12619] Call Trace: [ 704.242148][T12619] [ 704.242156][T12619] dump_stack_lvl+0xe8/0x150 [ 704.242190][T12619] should_fail_ex+0x412/0x560 [ 704.242223][T12619] prepare_alloc_pages+0x22a/0x650 [ 704.242259][T12619] __alloc_frozen_pages_noprof+0x12f/0x380 [ 704.242301][T12619] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 704.242338][T12619] ? __pfx_policy_nodemask+0x10/0x10 [ 704.242362][T12619] ? kasan_save_track+0x3e/0x80 [ 704.242380][T12619] ? __kasan_kmalloc+0x93/0xb0 [ 704.242404][T12619] ? __pfx_perf_trace_lock_acquire+0x10/0x10 [ 704.242431][T12619] ? bpf_prog_alloc+0x3c/0x1a0 [ 704.242455][T12619] alloc_pages_bulk_noprof+0x558/0x700 [ 704.242489][T12619] ? alloc_pages_noprof+0xbd/0x190 [ 704.242519][T12619] __kasan_populate_vmalloc+0xc1/0x1d0 [ 704.242548][T12619] alloc_vmap_area+0xd73/0x14b0 [ 704.242589][T12619] ? __pfx_alloc_vmap_area+0x10/0x10 [ 704.242605][T12619] ? __kasan_kmalloc+0x93/0xb0 [ 704.242631][T12619] ? __get_vm_area_node+0x13f/0x300 [ 704.242647][T12619] ? __kmalloc_cache_node_noprof+0x248/0x6b0 [ 704.242668][T12619] ? bpf_prog_alloc_no_stats+0x4a/0x4f0 [ 704.242687][T12619] __get_vm_area_node+0x1f8/0x300 [ 704.242714][T12619] __vmalloc_node_range_noprof+0x372/0x1730 [ 704.242734][T12619] ? bpf_prog_alloc_no_stats+0x4a/0x4f0 [ 704.242757][T12619] ? perf_trace_lock_acquire+0x109/0x440 [ 704.242794][T12619] ? __lock_acquire+0x6b5/0x2cf0 [ 704.242838][T12619] ? __pfx___vmalloc_node_range_noprof+0x10/0x10 [ 704.242859][T12619] ? aa_file_perm+0x192/0x15e0 [ 704.242901][T12619] ? bpf_prog_alloc_no_stats+0x4a/0x4f0 [ 704.242916][T12619] __vmalloc_noprof+0xd2/0x120 [ 704.242935][T12619] ? bpf_prog_alloc_no_stats+0x4a/0x4f0 [ 704.242958][T12619] bpf_prog_alloc_no_stats+0x4a/0x4f0 [ 704.243003][T12619] bpf_prog_alloc+0x3c/0x1a0 [ 704.243025][T12619] bpf_prog_load+0x7ba/0x1ae0 [ 704.243067][T12619] ? __pfx_bpf_prog_load+0x10/0x10 [ 704.243119][T12619] ? bpf_lsm_bpf+0x9/0x20 [ 704.243141][T12619] ? security_bpf+0x7e/0x2d0 [ 704.243252][T12619] __sys_bpf+0x618/0x950 [ 704.243292][T12619] ? __pfx___sys_bpf+0x10/0x10 [ 704.243342][T12619] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 704.243368][T12619] ? ksys_write+0x242/0x270 [ 704.243393][T12619] ? __pfx_ksys_write+0x10/0x10 [ 704.243425][T12619] __x64_sys_bpf+0x7c/0x90 [ 704.243452][T12619] do_syscall_64+0x14d/0xf80 [ 704.243469][T12619] ? trace_irq_disable+0x3b/0x150 [ 704.243494][T12619] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 704.243513][T12619] ? clear_bhb_loop+0x40/0x90 [ 704.243539][T12619] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 704.243558][T12619] RIP: 0033:0x7f62a919c799 [ 704.243579][T12619] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 704.243594][T12619] RSP: 002b:00007f62aa129028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 704.243615][T12619] RAX: ffffffffffffffda RBX: 00007f62a9415fa0 RCX: 00007f62a919c799 [ 704.243629][T12619] RDX: 0000000000000094 RSI: 0000200000000840 RDI: 0000000000000005 [ 704.243641][T12619] RBP: 00007f62aa129090 R08: 0000000000000000 R09: 0000000000000000 [ 704.243652][T12619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 704.243663][T12619] R13: 00007f62a9416038 R14: 00007f62a9415fa0 R15: 00007ffeb13168e8 [ 704.243703][T12619] [ 704.594706][T12619] syz.8.1218: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=/,mems_allowed=0-1 [ 704.617820][T12619] CPU: 0 UID: 0 PID: 12619 Comm: syz.8.1218 Not tainted syzkaller #0 PREEMPT(full) [ 704.617847][T12619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 704.617859][T12619] Call Trace: [ 704.617868][T12619] [ 704.617877][T12619] dump_stack_lvl+0xe8/0x150 [ 704.617914][T12619] warn_alloc+0x249/0x340 [ 704.617939][T12619] ? kasan_quarantine_put+0xbb/0x1f0 [ 704.617965][T12619] ? __pfx_warn_alloc+0x10/0x10 [ 704.617989][T12619] ? __get_vm_area_node+0x211/0x300 [ 704.618005][T12619] ? __kmalloc_cache_node_noprof+0x248/0x6b0 [ 704.618039][T12619] ? bpf_prog_alloc_no_stats+0x4a/0x4f0 [ 704.618060][T12619] ? __get_vm_area_node+0x211/0x300 [ 704.618090][T12619] __vmalloc_node_range_noprof+0x397/0x1730 [ 704.618118][T12619] ? perf_trace_lock_acquire+0x109/0x440 [ 704.618158][T12619] ? __lock_acquire+0x6b5/0x2cf0 [ 704.618203][T12619] ? __pfx___vmalloc_node_range_noprof+0x10/0x10 [ 704.618226][T12619] ? aa_file_perm+0x192/0x15e0 [ 704.618269][T12619] ? bpf_prog_alloc_no_stats+0x4a/0x4f0 [ 704.618286][T12619] __vmalloc_noprof+0xd2/0x120 [ 704.618306][T12619] ? bpf_prog_alloc_no_stats+0x4a/0x4f0 [ 704.618328][T12619] bpf_prog_alloc_no_stats+0x4a/0x4f0 [ 704.618354][T12619] bpf_prog_alloc+0x3c/0x1a0 [ 704.618378][T12619] bpf_prog_load+0x7ba/0x1ae0 [ 704.618419][T12619] ? __pfx_bpf_prog_load+0x10/0x10 [ 704.618468][T12619] ? bpf_lsm_bpf+0x9/0x20 [ 704.618489][T12619] ? security_bpf+0x7e/0x2d0 [ 704.618514][T12619] __sys_bpf+0x618/0x950 [ 704.618544][T12619] ? __pfx___sys_bpf+0x10/0x10 [ 704.618591][T12619] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 704.618616][T12619] ? ksys_write+0x242/0x270 [ 704.618639][T12619] ? __pfx_ksys_write+0x10/0x10 [ 704.618669][T12619] __x64_sys_bpf+0x7c/0x90 [ 704.618695][T12619] do_syscall_64+0x14d/0xf80 [ 704.618712][T12619] ? trace_irq_disable+0x3b/0x150 [ 704.618736][T12619] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 704.618754][T12619] ? clear_bhb_loop+0x40/0x90 [ 704.618778][T12619] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 704.618796][T12619] RIP: 0033:0x7f62a919c799 [ 704.618816][T12619] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 704.618832][T12619] RSP: 002b:00007f62aa129028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 704.618851][T12619] RAX: ffffffffffffffda RBX: 00007f62a9415fa0 RCX: 00007f62a919c799 [ 704.618864][T12619] RDX: 0000000000000094 RSI: 0000200000000840 RDI: 0000000000000005 [ 704.618876][T12619] RBP: 00007f62aa129090 R08: 0000000000000000 R09: 0000000000000000 [ 704.618887][T12619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 704.618898][T12619] R13: 00007f62a9416038 R14: 00007f62a9415fa0 R15: 00007ffeb13168e8 [ 704.618935][T12619] [ 704.619003][T12619] Mem-Info: [ 704.895736][T12619] active_anon:7579 inactive_anon:0 isolated_anon:0 [ 704.895736][T12619] active_file:4263 inactive_file:40158 isolated_file:0 [ 704.895736][T12619] unevictable:768 dirty:364 writeback:0 [ 704.895736][T12619] slab_reclaimable:11628 slab_unreclaimable:106036 [ 704.895736][T12619] mapped:32417 shmem:1378 pagetables:1905 [ 704.895736][T12619] sec_pagetables:0 bounce:0 [ 704.895736][T12619] kernel_misc_reclaimable:0 [ 704.895736][T12619] free:1312325 free_pcp:7519 free_cma:0 [ 704.953117][T12619] Node 0 active_anon:30280kB inactive_anon:0kB active_file:17052kB inactive_file:160440kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:129720kB dirty:1484kB writeback:0kB shmem:3976kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB kernel_stack:13176kB pagetables:7508kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 704.993480][T12619] Node 1 active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:192kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:1536kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB kernel_stack:32kB pagetables:140kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 705.025838][T12619] Node 0 DMA free:15360kB boost:0kB min:208kB low:260kB high:312kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 705.058890][T12619] lowmem_reserve[]: 0 2492 2493 2493 2493 [ 705.064820][T12619] Node 0 DMA32 free:1293560kB boost:0kB min:34200kB low:42748kB high:51296kB reserved_highatomic:0KB free_highatomic:0KB active_anon:30228kB inactive_anon:0kB active_file:17052kB inactive_file:160440kB unevictable:1536kB writepending:1496kB zspages:0kB present:3129332kB managed:2552776kB mlocked:0kB bounce:0kB free_pcp:30972kB local_pcp:20980kB free_cma:0kB [ 705.105795][T12619] lowmem_reserve[]: 0 0 0 0 0 [ 705.110702][T12619] Node 0 Normal free:0kB boost:0kB min:8kB low:8kB high:8kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:1048580kB managed:884kB mlocked:0kB bounce:0kB free_pcp:4kB local_pcp:0kB free_cma:0kB [ 705.141208][T12619] lowmem_reserve[]: 0 0 0 0 0 [ 705.146113][T12619] Node 1 Normal free:3940284kB boost:0kB min:55688kB low:69608kB high:83528kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:192kB unevictable:1536kB writepending:0kB zspages:0kB present:4194300kB managed:4111100kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 705.182612][T12619] lowmem_reserve[]: 0 0 0 0 0 [ 705.188315][T12619] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 705.211649][T12619] Node 0 DMA32: 5630*4kB (UM) 3146*8kB (UM) 989*16kB (UME) 154*32kB (UME) 55*64kB (UME) 21*128kB (UME) 231*256kB (UME) 163*512kB (UME) 99*1024kB (UME) 44*2048kB (UME) 216*4096kB (UM) = 1293464kB [ 705.231321][T12619] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 705.243020][T12619] Node 1 Normal: 3*4kB (UM) 6*8kB (UM) 8*16kB (UM) 8*32kB (UM) 8*64kB (UM) 2*128kB (UM) 3*256kB (UM) 4*512kB (UM) 2*1024kB (UM) 1*2048kB (U) 960*4096kB (M) = 3940284kB [ 705.260379][T12619] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 705.270107][T12619] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 705.279611][T12619] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 705.291299][T12619] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 705.302599][T12619] 45797 total pagecache pages [ 705.307501][T12619] 0 pages in swap cache [ 705.311843][T12619] Free swap = 124996kB [ 705.316748][T12619] Total swap = 124996kB [ 705.321035][T12619] 2097051 pages RAM [ 705.326442][T12619] 0 pages HighMem/MovableOnly [ 705.331144][T12619] 427021 pages reserved [ 705.335672][T12619] 0 pages cma reserved [ 705.619109][T12627] FAULT_INJECTION: forcing a failure. [ 705.619109][T12627] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 705.639600][T12627] CPU: 0 UID: 0 PID: 12627 Comm: syz.8.1222 Not tainted syzkaller #0 PREEMPT(full) [ 705.639629][T12627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 705.639641][T12627] Call Trace: [ 705.639650][T12627] [ 705.639658][T12627] dump_stack_lvl+0xe8/0x150 [ 705.639691][T12627] should_fail_ex+0x412/0x560 [ 705.639723][T12627] _copy_from_user+0x2d/0xb0 [ 705.639752][T12627] ____sys_sendmsg+0x308/0x9f0 [ 705.639781][T12627] ? __pfx_____sys_sendmsg+0x10/0x10 [ 705.639810][T12627] ? import_iovec+0x73/0xa0 [ 705.639842][T12627] ___sys_sendmsg+0x2a5/0x360 [ 705.639867][T12627] ? __pfx____sys_sendmsg+0x10/0x10 [ 705.639923][T12627] ? __fget_files+0x2a/0x420 [ 705.639950][T12627] ? __fget_files+0x3a0/0x420 [ 705.639987][T12627] __x64_sys_sendmsg+0x1bd/0x2a0 [ 705.640009][T12627] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 705.640038][T12627] ? __pfx_ksys_write+0x10/0x10 [ 705.640070][T12627] do_syscall_64+0x14d/0xf80 [ 705.640088][T12627] ? trace_irq_disable+0x3b/0x150 [ 705.640114][T12627] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 705.640133][T12627] ? clear_bhb_loop+0x40/0x90 [ 705.640157][T12627] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 705.640175][T12627] RIP: 0033:0x7f62a919c799 [ 705.640195][T12627] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 705.640222][T12627] RSP: 002b:00007f62aa129028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 705.640245][T12627] RAX: ffffffffffffffda RBX: 00007f62a9415fa0 RCX: 00007f62a919c799 [ 705.640259][T12627] RDX: 0000000020008100 RSI: 0000200000000340 RDI: 0000000000000004 [ 705.640272][T12627] RBP: 00007f62aa129090 R08: 0000000000000000 R09: 0000000000000000 [ 705.640283][T12627] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 705.640294][T12627] R13: 00007f62a9416038 R14: 00007f62a9415fa0 R15: 00007ffeb13168e8 [ 705.640326][T12627] [ 705.979998][T12629] sctp: [Deprecated]: syz.8.1223 (pid 12629) Use of struct sctp_assoc_value in delayed_ack socket option. [ 705.979998][T12629] Use struct sctp_sack_info instead [ 707.110358][T12608] netlink: 'syz.5.1215': attribute type 3 has an invalid length. [ 707.119131][T12613] netlink: 152 bytes leftover after parsing attributes in process `syz.5.1215'. [ 707.236795][T12635] mac80211_hwsim hwsim31 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 707.354746][T12642] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1227'. [ 707.439042][T12643] netlink: 'syz.5.1230': attribute type 10 has an invalid length. [ 707.533517][T12643] geneve0: entered promiscuous mode [ 708.239782][T12672] netlink: 164 bytes leftover after parsing attributes in process `syz.8.1235'. [ 708.246916][T12670] sctp: [Deprecated]: syz.3.1234 (pid 12670) Use of struct sctp_assoc_value in delayed_ack socket option. [ 708.246916][T12670] Use struct sctp_sack_info instead [ 708.308391][T12643] bond0: (slave geneve0): Enslaving as an active interface with an up link [ 708.658647][T12657] delete_channel: no stack [ 708.820914][T12692] netlink: 8 bytes leftover after parsing attributes in process `syz.8.1238'. [ 709.179683][T12686] syzkaller0: entered promiscuous mode [ 709.195535][T12686] syzkaller0: entered allmulticast mode [ 709.623980][T12703] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1241'. [ 709.657144][T12703] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1241'. [ 710.057678][ T12] wlan1: Trigger new scan to find an IBSS to join [ 711.457408][T12725] sctp: [Deprecated]: syz.1.1249 (pid 12725) Use of struct sctp_assoc_value in delayed_ack socket option. [ 711.457408][T12725] Use struct sctp_sack_info instead [ 713.002537][ T134] wlan1: Trigger new scan to find an IBSS to join [ 715.620770][T12705] netlink: 65039 bytes leftover after parsing attributes in process `syz.3.1242'. [ 715.836419][T12739] netlink: 'syz.4.1254': attribute type 9 has an invalid length. [ 715.854182][T12739] netlink: 4975 bytes leftover after parsing attributes in process `syz.4.1254'. [ 715.904203][T12739] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 715.965320][ T36] wlan1: Trigger new scan to find an IBSS to join [ 716.091237][T12735] netlink: 24 bytes leftover after parsing attributes in process `syz.5.1252'. [ 716.102670][T12745] netlink: 76 bytes leftover after parsing attributes in process `syz.1.1255'. [ 716.121105][ T36] wlan1: Creating new IBSS network, BSSID 82:99:ac:f4:f6:5e [ 717.634773][T12763] syzkaller0: entered promiscuous mode [ 717.701071][T12763] syzkaller0: entered allmulticast mode [ 721.206253][T12816] syzkaller0: entered promiscuous mode [ 721.211797][T12816] syzkaller0: entered allmulticast mode [ 731.060002][T12960] syzkaller0: entered promiscuous mode [ 731.076055][T12960] syzkaller0: entered allmulticast mode [ 731.494061][T12969] nr0: port 1(hsr0) entered blocking state [ 731.512578][T12969] nr0: port 1(hsr0) entered disabled state [ 731.520093][T12969] hsr0: entered allmulticast mode [ 731.526328][T12969] hsr_slave_0: entered allmulticast mode [ 731.532134][T12969] hsr_slave_1: entered allmulticast mode [ 731.540211][T12969] hsr0: entered promiscuous mode [ 732.511639][T12976] syzkaller0: entered promiscuous mode [ 732.542064][T12976] syzkaller0: entered allmulticast mode [ 733.336970][T12977] syzkaller0: entered promiscuous mode [ 733.343578][T12977] syzkaller0: entered allmulticast mode [ 733.458312][T12999] bridge0: port 2(bridge_slave_1) entered disabled state [ 733.465777][T12999] bridge0: port 1(bridge_slave_0) entered disabled state [ 733.486776][T12999] bridge0: entered allmulticast mode [ 736.682850][T13010] syzkaller0: tun_chr_ioctl cmd 1074025681 [ 739.174375][T13050] sit0: entered allmulticast mode [ 744.569123][T13219] syzkaller0: entered promiscuous mode [ 744.589050][T13219] syzkaller0: entered allmulticast mode [ 744.614879][T13219] PF_CAN: dropped non conform CAN skbuff: dev type 65534, len 65487 [ 746.605882][T13309] netlink: 8 bytes leftover after parsing attributes in process `syz.8.1478'. [ 747.338904][ T1300] ieee802154 phy0 wpan0: encryption failed: -22 [ 747.346539][ T1300] ieee802154 phy1 wpan1: encryption failed: -22 [ 747.436498][T13336] netlink: 'syz.4.1491': attribute type 2 has an invalid length. [ 747.483708][T13336] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1491'. [ 748.398412][T13358] pimreg: tun_chr_ioctl cmd 2147767517 [ 749.309950][T13384] netlink: 484 bytes leftover after parsing attributes in process `syz.3.1512'. [ 750.014094][T13402] netlink: 'syz.5.1521': attribute type 2 has an invalid length. [ 750.053781][T13402] netlink: 'syz.5.1521': attribute type 2 has an invalid length. [ 753.693428][T13530] syzkaller0: entered allmulticast mode [ 753.757961][T13538] netlink: 484 bytes leftover after parsing attributes in process `syz.4.1575'. [ 756.421525][T13667] syzkaller0: entered promiscuous mode [ 756.452201][T13667] syzkaller0: entered allmulticast mode [ 761.327811][T13848] syzkaller0: entered promiscuous mode [ 761.333628][T13848] syzkaller0: entered allmulticast mode [ 763.235959][T13881] syzkaller0: create flow: hash 4273299897 index 1 [ 763.257415][T13872] syzkaller0: entered promiscuous mode [ 763.298956][T13872] syzkaller0: entered allmulticast mode [ 763.531829][T13886] syzkaller0: delete flow: hash 4273299897 index 1 [ 765.082112][T13897] syzkaller0: entered promiscuous mode [ 765.092804][T13897] syzkaller0: entered allmulticast mode [ 767.995484][T13979] tap0: tun_chr_ioctl cmd 1074025677 [ 768.000933][T13979] tap0: linktype set to 769 [ 771.933217][T14119] netlink: 484 bytes leftover after parsing attributes in process `syz.5.1833'. [ 773.995930][T14160] netlink: 484 bytes leftover after parsing attributes in process `syz.1.1850'. [ 774.290930][T14172] syzkaller0: entered promiscuous mode [ 774.313358][T14172] syzkaller0: entered allmulticast mode [ 778.115897][T14270] netlink: 'syz.8.1901': attribute type 2 has an invalid length. [ 778.847767][T14296] netlink: 'syz.5.1914': attribute type 2 has an invalid length. [ 780.157885][T14322] netlink: 'syz.5.1926': attribute type 2 has an invalid length. [ 782.113483][T14348] netlink: 'syz.8.1937': attribute type 2 has an invalid length. [ 783.144297][T14364] syzkaller0: entered promiscuous mode [ 783.214973][T14364] syzkaller0: entered allmulticast mode [ 784.265997][T14379] netlink: 'syz.5.1949': attribute type 2 has an invalid length. [ 791.041516][T14429] bridge0: port 3(team0) entered disabled state [ 791.048276][T14429] bridge0: port 2(bridge_slave_1) entered disabled state [ 791.055765][T14429] bridge0: port 1(bridge_slave_0) entered disabled state [ 791.096411][T14429] bridge0: entered allmulticast mode [ 791.120640][T14432] bridge0: port 3(team0) entered blocking state [ 791.127209][T14432] bridge0: port 3(team0) entered forwarding state [ 791.134005][T14432] bridge0: port 2(bridge_slave_1) entered blocking state [ 791.141192][T14432] bridge0: port 2(bridge_slave_1) entered forwarding state [ 791.148829][T14432] bridge0: port 1(bridge_slave_0) entered blocking state [ 791.156248][T14432] bridge0: port 1(bridge_slave_0) entered forwarding state [ 791.187956][T14432] bridge0: entered promiscuous mode [ 797.596363][ T5145] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 797.609778][ T5145] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 797.618979][ T5145] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 797.627227][ T5145] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 797.635626][ T5145] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 799.722810][ T5145] Bluetooth: hci0: command tx timeout [ 801.894568][ T5145] Bluetooth: hci0: command tx timeout [ 803.972641][ T5145] Bluetooth: hci0: command tx timeout [ 806.050144][ T5145] Bluetooth: hci0: command tx timeout [ 807.295837][T14731] netlink: 'syz.3.2096': attribute type 2 has an invalid length. [ 809.346999][ T1300] ieee802154 phy0 wpan0: encryption failed: -22 [ 809.353493][ T1300] ieee802154 phy1 wpan1: encryption failed: -22 [ 809.806466][T14753] netlink: 'syz.3.2106': attribute type 2 has an invalid length. [ 811.508615][T14775] syzkaller0: entered promiscuous mode [ 811.515849][T14775] syzkaller0: entered allmulticast mode [ 813.296124][ T6154] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 813.314819][ T6154] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 813.323592][ T6154] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 813.333644][ T6154] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 813.343047][ T6154] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 815.405923][ T5145] Bluetooth: hci1: command tx timeout [ 815.458072][T14790] veth0_vlan: entered allmulticast mode [ 817.501614][ T5145] Bluetooth: hci1: command tx timeout [ 819.565514][ T5145] Bluetooth: hci1: command tx timeout [ 821.642772][ T5145] Bluetooth: hci1: command tx timeout [ 823.128475][T14951] netlink: 'syz.4.2187': attribute type 2 has an invalid length. [ 824.152427][T14849] syzkaller0: entered promiscuous mode [ 824.157963][T14849] syzkaller0: entered allmulticast mode [ 830.402561][T14585] chnl_net:caif_netlink_parms(): no params data found [ 830.482708][T14970] : port 1(ip6gretap0) entered blocking state [ 830.489357][T14970] : port 1(ip6gretap0) entered disabled state [ 830.507016][T14970] ip6gretap0: entered allmulticast mode [ 830.514039][T14970] ip6gretap0: entered promiscuous mode [ 830.559115][T14781] chnl_net:caif_netlink_parms(): no params data found [ 832.496331][ T12] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 833.081051][ T6154] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 833.090310][ T6154] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 833.098782][ T6154] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 833.124463][ T6154] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 833.132133][ T6154] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 833.367394][T14585] bridge0: port 1(bridge_slave_0) entered blocking state [ 833.375909][T14585] bridge0: port 1(bridge_slave_0) entered disabled state [ 833.388536][T14585] bridge_slave_0: entered allmulticast mode [ 833.397216][T14585] bridge_slave_0: entered promiscuous mode [ 835.738706][ T6154] Bluetooth: hci6: command tx timeout [ 836.557194][ T12] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 836.653279][T14781] bridge0: port 1(bridge_slave_0) entered blocking state [ 836.660480][T14781] bridge0: port 1(bridge_slave_0) entered disabled state [ 836.685282][T14781] bridge_slave_0: entered allmulticast mode [ 836.703456][T14781] bridge_slave_0: entered promiscuous mode [ 836.724790][T14781] bridge0: port 2(bridge_slave_1) entered blocking state [ 836.732705][T14781] bridge0: port 2(bridge_slave_1) entered disabled state [ 836.739959][T14781] bridge_slave_1: entered allmulticast mode [ 836.754494][T14781] bridge_slave_1: entered promiscuous mode [ 836.766528][T14585] bridge0: port 2(bridge_slave_1) entered blocking state [ 836.774446][T14585] bridge0: port 2(bridge_slave_1) entered disabled state [ 836.781929][T14585] bridge_slave_1: entered allmulticast mode [ 836.790572][T14585] bridge_slave_1: entered promiscuous mode [ 836.856760][T14585] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 837.234908][ T12] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 837.816467][T14585] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 837.939079][ T6154] Bluetooth: hci6: command tx timeout [ 837.988140][T14781] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 838.010011][T14781] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 838.355016][ T12] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 838.395566][T14585] team0: Port device team_slave_0 added [ 838.408310][T14585] team0: Port device team_slave_1 added [ 838.484237][T14585] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 838.491588][T14585] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 838.521143][T14585] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 838.534373][T14585] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 838.541346][T14585] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 838.568068][T14585] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 838.612836][T14781] team0: Port device team_slave_0 added [ 838.622100][T14781] team0: Port device team_slave_1 added [ 838.828355][T14781] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 838.845105][T14781] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 838.925988][T14781] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 839.205750][T14781] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 839.252634][T14781] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 839.320946][T14781] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 839.550970][T15056] netlink: 20 bytes leftover after parsing attributes in process `syz.4.2224'. [ 839.555796][T14585] hsr_slave_0: entered promiscuous mode [ 839.567329][T14585] hsr_slave_1: entered promiscuous mode [ 839.864423][T14781] hsr_slave_0: entered promiscuous mode [ 839.893575][T14781] hsr_slave_1: entered promiscuous mode [ 839.930265][T14781] debugfs: 'hsr0' already exists in 'hsr' [ 839.952699][T14781] Cannot create hsr debugfs directory [ 839.958620][T14995] chnl_net:caif_netlink_parms(): no params data found [ 839.966529][ T6154] Bluetooth: hci6: command tx timeout [ 840.885731][ T12] bridge0: port 3(team0) entered disabled state [ 840.964720][ T12] bridge_slave_1: left allmulticast mode [ 840.970429][ T12] bridge_slave_1: left promiscuous mode [ 841.008781][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 841.174327][ T12] bridge_slave_0: left allmulticast mode [ 841.202897][ T12] bridge_slave_0: left promiscuous mode [ 841.208729][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 841.932220][ T12] bond0 (unregistering): (slave geneve0): Releasing backup interface [ 841.986728][T15115] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2243'. [ 842.042797][ T6154] Bluetooth: hci6: command tx timeout [ 842.086432][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 842.126670][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 842.147165][ T12] bond0 (unregistering): Released all slaves [ 842.377056][T15103] syzkaller0: entered promiscuous mode [ 842.383300][T15103] syzkaller0: entered allmulticast mode [ 842.416678][ T12] : left promiscuous mode [ 842.477143][T14995] bridge0: port 1(bridge_slave_0) entered blocking state [ 842.485805][T14995] bridge0: port 1(bridge_slave_0) entered disabled state [ 842.500745][T14995] bridge_slave_0: entered allmulticast mode [ 842.510195][T14995] bridge_slave_0: entered promiscuous mode [ 842.526349][T14995] bridge0: port 2(bridge_slave_1) entered blocking state [ 842.533677][T14995] bridge0: port 2(bridge_slave_1) entered disabled state [ 842.540997][T14995] bridge_slave_1: entered allmulticast mode [ 842.550120][T14995] bridge_slave_1: entered promiscuous mode [ 842.896327][T15138] netlink: 484 bytes leftover after parsing attributes in process `syz.4.2253'. [ 843.429960][T15154] netlink: 484 bytes leftover after parsing attributes in process `syz.4.2261'. [ 845.210787][ T12] : left promiscuous mode [ 845.449040][T14995] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 845.588255][T14995] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 845.966248][T14995] team0: Port device team_slave_0 added [ 846.074640][T15176] netlink: 484 bytes leftover after parsing attributes in process `syz.3.2269'. [ 846.151289][T14995] team0: Port device team_slave_1 added [ 846.453497][ T12] hsr_slave_0: left promiscuous mode [ 846.471625][ T12] hsr_slave_1: left promiscuous mode [ 846.488574][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 846.502382][ T12] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 846.516519][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 846.535256][ T12] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 846.568627][ T12] veth1_macvtap: left promiscuous mode [ 846.582538][ T12] veth0_macvtap: left promiscuous mode [ 846.593344][ T12] veth1_vlan: left promiscuous mode [ 846.600288][ T12] veth0_vlan: left promiscuous mode [ 847.116327][ T12] team_slave_1 (unregistering): left promiscuous mode [ 847.123206][ T12] team_slave_1 (unregistering): left allmulticast mode [ 847.136411][ T12] team0 (unregistering): Port device team_slave_1 removed [ 847.165510][ T12] team_slave_0 (unregistering): left promiscuous mode [ 847.172419][ T12] team_slave_0 (unregistering): left allmulticast mode [ 847.181207][ T12] team0 (unregistering): Port device team_slave_0 removed [ 847.338964][T15207] netlink: 484 bytes leftover after parsing attributes in process `syz.3.2277'. [ 848.099633][T14995] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 848.722814][T14995] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 849.009078][T14995] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 849.077136][T15209] syzkaller0: entered promiscuous mode [ 849.082788][T15209] syzkaller0: entered allmulticast mode [ 850.429328][T14995] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 850.439626][T14995] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 850.468123][T14995] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 850.630569][T14995] hsr_slave_0: entered promiscuous mode [ 850.638189][T14995] hsr_slave_1: entered promiscuous mode [ 850.645114][T14995] debugfs: 'hsr0' already exists in 'hsr' [ 850.650861][T14995] Cannot create hsr debugfs directory [ 850.747131][T14585] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 850.757570][T14585] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 850.820721][T14585] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 850.844907][T14585] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 851.159638][ T12] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 851.294263][ T12] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 851.436572][ T12] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 851.585863][ T12] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 852.381034][T14585] 8021q: adding VLAN 0 to HW filter on device bond0 [ 852.545523][T14781] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 852.589305][T14781] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 852.669572][T15258] Set syz1 is full, maxelem 10763 reached [ 852.788673][T14781] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 852.967963][T14585] 8021q: adding VLAN 0 to HW filter on device team0 [ 853.064812][T14781] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 853.466391][ T83] bridge0: port 1(bridge_slave_0) entered blocking state [ 853.473766][ T83] bridge0: port 1(bridge_slave_0) entered forwarding state [ 853.733681][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 853.740953][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 853.876533][ T12] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 854.029401][ T12] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 854.138873][ T12] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 854.240490][T14781] 8021q: adding VLAN 0 to HW filter on device bond0 [ 854.316484][ T12] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 854.506369][T14781] 8021q: adding VLAN 0 to HW filter on device team0 [ 854.550163][T14585] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 854.685546][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 854.692805][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 854.789074][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 854.796494][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 854.971592][ T12] bridge_slave_1: left allmulticast mode [ 854.996336][ T12] bridge_slave_1: left promiscuous mode [ 855.002184][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 855.057143][ T12] bridge_slave_0: left allmulticast mode [ 855.072639][ T12] bridge_slave_0: left promiscuous mode [ 855.079566][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 855.150843][ T12] bridge_slave_1: left allmulticast mode [ 855.170525][ T12] bridge_slave_1: left promiscuous mode [ 855.192962][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 855.268146][ T12] bridge_slave_0: left allmulticast mode [ 855.276130][ T12] bridge_slave_0: left promiscuous mode [ 855.281965][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 855.334877][ T12] hsr0: left allmulticast mode [ 855.342710][ T12] hsr_slave_0: left allmulticast mode [ 855.348131][ T12] hsr_slave_1: left allmulticast mode [ 855.372186][ T12] hsr0: left promiscuous mode [ 855.426133][ T12] nr0: port 1(hsr0) entered disabled state [ 856.115885][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 856.141572][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 856.157438][ T12] bond0 (unregistering): Released all slaves [ 856.497701][T15363] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 856.510544][T15363] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 856.522373][T15363] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 856.530447][T15363] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 856.548423][T15363] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 856.578483][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 856.604154][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 856.637035][ T12] bond0 (unregistering): Released all slaves [ 856.805163][T14995] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 856.880152][T14995] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 856.978131][T14995] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 857.076935][T14995] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 858.360354][T14781] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 858.603641][ T6154] Bluetooth: hci2: command tx timeout [ 858.632197][T14995] 8021q: adding VLAN 0 to HW filter on device bond0 [ 858.703333][T14995] 8021q: adding VLAN 0 to HW filter on device team0 [ 858.874759][ T1154] bridge0: port 1(bridge_slave_0) entered blocking state [ 858.881970][ T1154] bridge0: port 1(bridge_slave_0) entered forwarding state [ 858.903409][ T1154] bridge0: port 2(bridge_slave_1) entered blocking state [ 858.910628][ T1154] bridge0: port 2(bridge_slave_1) entered forwarding state [ 858.935069][T15360] chnl_net:caif_netlink_parms(): no params data found [ 859.017550][T14781] veth0_vlan: entered promiscuous mode [ 859.125961][ T12] hsr_slave_0: left promiscuous mode [ 859.154955][ T12] hsr_slave_1: left promiscuous mode [ 859.161402][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 859.195148][ T12] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 859.208040][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 859.224366][ T12] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 859.246545][ T12] hsr_slave_0: left promiscuous mode [ 859.260331][ T12] hsr_slave_1: left promiscuous mode [ 859.268590][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 859.276407][ T12] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 859.292205][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 859.312398][ T12] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 859.350104][ T12] veth1_macvtap: left promiscuous mode [ 859.359977][ T12] veth0_macvtap: left promiscuous mode [ 859.366022][ T12] veth1_vlan: left promiscuous mode [ 859.371348][ T12] veth0_vlan: left promiscuous mode [ 859.379014][ T12] veth1_macvtap: left promiscuous mode [ 859.385094][ T12] veth0_macvtap: left promiscuous mode [ 859.390985][ T12] veth1_vlan: left promiscuous mode [ 860.000013][ T12] team0 (unregistering): Port device team_slave_1 removed [ 860.041629][ T12] team0 (unregistering): Port device team_slave_0 removed [ 860.473843][ T12] team0 (unregistering): Port device team_slave_1 removed [ 860.489402][ T12] team0 (unregistering): Port device team_slave_0 removed [ 860.656796][T14781] veth1_vlan: entered promiscuous mode [ 860.683235][ T6154] Bluetooth: hci2: command tx timeout [ 860.899761][T15360] bridge0: port 1(bridge_slave_0) entered blocking state [ 860.942580][T15360] bridge0: port 1(bridge_slave_0) entered disabled state [ 860.966974][T15360] bridge_slave_0: entered allmulticast mode [ 860.990257][T15360] bridge_slave_0: entered promiscuous mode [ 861.011528][T14781] veth0_macvtap: entered promiscuous mode [ 861.039294][T15360] bridge0: port 2(bridge_slave_1) entered blocking state [ 861.051369][T15360] bridge0: port 2(bridge_slave_1) entered disabled state [ 861.068104][T15360] bridge_slave_1: entered allmulticast mode [ 861.094849][T15360] bridge_slave_1: entered promiscuous mode [ 861.213503][T14781] veth1_macvtap: entered promiscuous mode [ 861.237754][T15360] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 861.282104][T14781] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 861.315643][T15360] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 861.359494][T14781] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 861.398424][ T49] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 861.498244][ T49] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 861.533081][ T49] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 861.541856][ T49] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 861.635419][T15360] team0: Port device team_slave_0 added [ 861.752226][T15360] team0: Port device team_slave_1 added [ 861.868037][T15360] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 861.885544][T15360] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 861.930397][T15360] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 862.018626][T15360] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 862.033442][T15360] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 862.069547][T15360] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 862.247624][ T36] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 862.272572][ T36] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 862.285836][T14995] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 862.349847][T15360] hsr_slave_0: entered promiscuous mode [ 862.370120][T15360] hsr_slave_1: entered promiscuous mode [ 862.377486][T15360] debugfs: 'hsr0' already exists in 'hsr' [ 862.383927][T15360] Cannot create hsr debugfs directory [ 862.510894][ T83] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 862.535664][ T83] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 862.763634][ T6154] Bluetooth: hci2: command tx timeout [ 862.941732][T14995] veth0_vlan: entered promiscuous mode [ 863.993394][T14995] veth1_vlan: entered promiscuous mode [ 864.206878][T14995] veth0_macvtap: entered promiscuous mode [ 864.280574][T14995] veth1_macvtap: entered promiscuous mode [ 864.425803][T14995] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 864.591293][T14995] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 864.635384][ T134] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 864.741894][ T134] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 864.755402][ T134] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 864.835498][ T134] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 864.853025][ T6154] Bluetooth: hci2: command tx timeout [ 864.928554][ T12] bridge_slave_1: left allmulticast mode [ 864.940138][ T12] bridge_slave_1: left promiscuous mode [ 864.966862][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 864.986752][ T12] bridge_slave_0: left allmulticast mode [ 864.992630][ T12] bridge_slave_0: left promiscuous mode [ 864.998619][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 865.414219][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 865.427041][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 865.437128][ T12] bond0 (unregistering): Released all slaves [ 865.601718][ T12] hsr_slave_0: left promiscuous mode [ 865.620119][ T12] hsr_slave_1: left promiscuous mode [ 865.626803][ T12] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 865.635147][ T12] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 865.925954][ T12] team0 (unregistering): Port device team_slave_1 removed [ 865.951938][ T12] team0 (unregistering): Port device team_slave_0 removed [ 866.217731][T15641] syzkaller0: entered promiscuous mode [ 866.228180][T15641] syzkaller0: entered allmulticast mode [ 868.168923][ T13] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 868.184384][ T13] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 868.441714][ T1154] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 868.480038][ T1154] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 868.613277][T15360] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 868.657564][T15360] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 868.723058][T15360] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 868.760535][T15360] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 869.511462][T15360] 8021q: adding VLAN 0 to HW filter on device bond0 [ 869.861879][T15360] 8021q: adding VLAN 0 to HW filter on device team0 [ 870.006003][ T134] bridge0: port 1(bridge_slave_0) entered blocking state [ 870.013259][ T134] bridge0: port 1(bridge_slave_0) entered forwarding state [ 870.222223][ T134] bridge0: port 2(bridge_slave_1) entered blocking state [ 870.229470][ T134] bridge0: port 2(bridge_slave_1) entered forwarding state [ 870.237205][ T1300] ieee802154 phy0 wpan0: encryption failed: -22 [ 870.252392][ T1300] ieee802154 phy1 wpan1: encryption failed: -22 [ 871.568858][T15773] ------------[ cut here ]------------ [ 871.574476][T15773] verifier bug: REG INVARIANTS VIOLATION (true_reg1): range bounds violation u64=[0xffffdfcd, 0xffffffffffffdfcc] s64=[0x80000000ffffdfcd, 0x7fffffffffffdfcc] u32=[0xffffdfcd, 0xffffdfcc] s32=[0xffffdfcd, 0xffffdfcc] var_off=(0xffffdfcc, 0xffffffff00000000) [ 871.599467][T15773] WARNING: kernel/bpf/verifier.c:2823 at reg_bounds_sanity_check+0x201/0xc30, CPU#1: syz.4.2395/15773 [ 871.610546][T15773] Modules linked in: SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 871.614732][T15773] CPU: 1 UID: 0 PID: 15773 Comm: syz.4.2395 Not tainted syzkaller #0 PREEMPT(full) [ 871.624592][T15773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 871.634955][T15773] RIP: 0010:reg_bounds_sanity_check+0x3e6/0xc30 [ 871.641244][T15773] Code: 98 00 00 00 4c 8b 8c 24 88 00 00 00 41 ff 34 24 41 57 55 41 55 ff b4 24 f0 00 00 00 ff b4 24 a8 00 00 00 ff b4 24 c0 00 00 00 <67> 48 0f b9 3a 48 83 c4 38 49 bf 00 00 00 00 00 fc ff df 48 8b 84 [ 871.662021][T15773] RSP: 0018:ffffc90003466eb0 EFLAGS: 00010246 [ 871.668615][T15773] RAX: dffffc0000000000 RBX: 1ffff1100d6e384a RCX: 00000000ffffdfcd [ 871.676717][T15773] RDX: ffffffff8bd47160 RSI: ffffffff8bd4fa80 RDI: ffffffff90158ef0 [ 871.685437][T15773] RBP: 00000000ffffdfcc R08: ffffffffffffdfcc R09: 80000000ffffdfcd [ 871.693731][T15773] R10: ffff88806b71c358 R11: 1ffff1100d6e3850 R12: ffff88806b71c250 [ 871.701735][T15773] R13: 00000000ffffdfcd R14: 1ffff1100d6e3849 R15: 00000000ffffdfcc [ 871.709838][T15773] FS: 00007f12f5c866c0(0000) GS:ffff888125563000(0000) knlGS:0000000000000000 [ 871.719143][T15773] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 871.726326][T15773] CR2: 00007f1890b456b8 CR3: 00000000329b6000 CR4: 00000000003526f0 [ 871.734619][T15773] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 871.743094][T15773] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 871.751105][T15773] Call Trace: [ 871.754838][T15773] [ 871.757880][T15773] reg_set_min_max+0x264/0x340 [ 871.762976][T15773] check_cond_jmp_op+0x1dbb/0x31a0 [ 871.768144][T15773] ? __pfx_check_cond_jmp_op+0x10/0x10 [ 871.773979][T15773] ? kfree+0x1c1/0x630 [ 871.778083][T15773] ? do_check+0x6326/0x10690 [ 871.782778][T15773] ? bpf_reset_stack_write_marks+0x1eb/0x260 [ 871.788805][T15773] do_check+0x7970/0x10690 [ 871.793428][T15773] ? __pfx_do_check+0x10/0x10 [ 871.798133][T15773] ? init_func_state+0x1ab2/0x28d0 [ 871.803660][T15773] do_check_common+0x19c8/0x25b0 [ 871.808735][T15773] bpf_check+0x5f3e/0x1ce00 [ 871.813377][T15773] ? __lock_acquire+0x6b5/0x2cf0 [ 871.818393][T15773] ? __pfx___mutex_trylock_common+0x10/0x10 [ 871.824999][T15773] ? __lock_acquire+0x6b5/0x2cf0 [ 871.829983][T15773] ? css_rstat_updated+0x23a/0x530 [ 871.835528][T15773] ? __pfx_css_rstat_updated+0x10/0x10 [ 871.841029][T15773] ? irqentry_exit+0x59e/0x620 [ 871.845959][T15773] ? __lock_acquire+0x6b5/0x2cf0 [ 871.850944][T15773] ? __pfx_bpf_check+0x10/0x10 [ 871.856265][T15773] ? lockdep_hardirqs_on+0x7a/0x110 [ 871.861521][T15773] ? irqentry_exit+0x59e/0x620 [ 871.866866][T15773] ? trace_irq_disable+0x3b/0x150 [ 871.871942][T15773] ? ktime_get_with_offset+0x93/0x2a0 [ 871.877453][T15773] ? seqcount_lockdep_reader_access+0xea/0x100 [ 871.884551][T15773] ? __asan_memset+0x22/0x50 [ 871.889182][T15773] ? bpf_lsm_bpf_prog_load+0x9/0x20 [ 871.895171][T15773] ? security_bpf_prog_load+0x125/0x3c0 [ 871.900773][T15773] bpf_prog_load+0x1484/0x1ae0 [ 871.905742][T15773] ? __pfx_bpf_prog_load+0x10/0x10 [ 871.910916][T15773] ? bpf_lsm_bpf+0x9/0x20 [ 871.915353][T15773] ? security_bpf+0x7e/0x2d0 [ 871.919990][T15773] __sys_bpf+0x618/0x950 [ 871.924572][T15773] ? __pfx___sys_bpf+0x10/0x10 [ 871.929487][T15773] ? __pfx_sched_clock_cpu+0x10/0x10 [ 871.934908][T15773] __x64_sys_bpf+0x7c/0x90 [ 871.939362][T15773] do_syscall_64+0x14d/0xf80 [ 871.944043][T15773] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 871.950141][T15773] ? clear_bhb_loop+0x40/0x90 [ 871.955154][T15773] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 871.962192][T15773] RIP: 0033:0x7f12f4d9c799 [ 871.966936][T15773] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 871.986934][T15773] RSP: 002b:00007f12f5c86028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 871.995438][T15773] RAX: ffffffffffffffda RBX: 00007f12f5015fa0 RCX: 00007f12f4d9c799 [ 872.003498][T15773] RDX: 0000000000000048 RSI: 00002000000054c0 RDI: 0000000000000005 [ 872.011588][T15773] RBP: 00007f12f4e32bd9 R08: 0000000000000000 R09: 0000000000000000 [ 872.019940][T15773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 872.028020][T15773] R13: 00007f12f5016038 R14: 00007f12f5015fa0 R15: 00007ffd8c88a328 [ 872.036090][T15773] [ 872.039141][T15773] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 872.046449][T15773] CPU: 1 UID: 0 PID: 15773 Comm: syz.4.2395 Not tainted syzkaller #0 PREEMPT(full) [ 872.055857][T15773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 872.066029][T15773] Call Trace: [ 872.069319][T15773] [ 872.072257][T15773] vpanic+0x56c/0xa60 [ 872.076261][T15773] ? __pfx__printk+0x10/0x10 [ 872.080855][T15773] ? __pfx_vpanic+0x10/0x10 [ 872.085366][T15773] ? is_bpf_text_address+0x292/0x2b0 [ 872.090657][T15773] ? is_bpf_text_address+0x26/0x2b0 [ 872.095869][T15773] panic+0xc5/0xd0 [ 872.099687][T15773] ? __pfx_panic+0x10/0x10 [ 872.104124][T15773] __warn+0x315/0x4f0 [ 872.108116][T15773] ? reg_bounds_sanity_check+0x201/0xc30 [ 872.113754][T15773] ? reg_bounds_sanity_check+0x201/0xc30 [ 872.119389][T15773] __report_bug+0x29a/0x540 [ 872.123977][T15773] ? __pfx_stack_trace_save+0x10/0x10 [ 872.129356][T15773] ? reg_bounds_sanity_check+0x201/0xc30 [ 872.134994][T15773] ? __pfx___report_bug+0x10/0x10 [ 872.140034][T15773] ? check_cond_jmp_op+0x1c5b/0x31a0 [ 872.145330][T15773] ? do_check+0x7970/0x10690 [ 872.150012][T15773] ? do_check_common+0x19c8/0x25b0 [ 872.155122][T15773] ? bpf_check+0x5f3e/0x1ce00 [ 872.159818][T15773] ? bpf_prog_load+0x1484/0x1ae0 [ 872.164763][T15773] ? __sys_bpf+0x618/0x950 [ 872.169188][T15773] ? __x64_sys_bpf+0x7c/0x90 [ 872.173959][T15773] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 872.180033][T15773] report_bug_entry+0x19a/0x290 [ 872.184897][T15773] ? reg_bounds_sanity_check+0x3e6/0xc30 [ 872.190535][T15773] ? reg_bounds_sanity_check+0x3eb/0xc30 [ 872.196203][T15773] handle_bug+0xce/0x200 [ 872.200452][T15773] exc_invalid_op+0x1a/0x50 [ 872.204958][T15773] asm_exc_invalid_op+0x1a/0x20 [ 872.209810][T15773] RIP: 0010:reg_bounds_sanity_check+0x3e6/0xc30 [ 872.216065][T15773] Code: 98 00 00 00 4c 8b 8c 24 88 00 00 00 41 ff 34 24 41 57 55 41 55 ff b4 24 f0 00 00 00 ff b4 24 a8 00 00 00 ff b4 24 c0 00 00 00 <67> 48 0f b9 3a 48 83 c4 38 49 bf 00 00 00 00 00 fc ff df 48 8b 84 [ 872.235759][T15773] RSP: 0018:ffffc90003466eb0 EFLAGS: 00010246 [ 872.241830][T15773] RAX: dffffc0000000000 RBX: 1ffff1100d6e384a RCX: 00000000ffffdfcd [ 872.249812][T15773] RDX: ffffffff8bd47160 RSI: ffffffff8bd4fa80 RDI: ffffffff90158ef0 [ 872.257787][T15773] RBP: 00000000ffffdfcc R08: ffffffffffffdfcc R09: 80000000ffffdfcd [ 872.265760][T15773] R10: ffff88806b71c358 R11: 1ffff1100d6e3850 R12: ffff88806b71c250 [ 872.273827][T15773] R13: 00000000ffffdfcd R14: 1ffff1100d6e3849 R15: 00000000ffffdfcc [ 872.281851][T15773] reg_set_min_max+0x264/0x340 [ 872.286630][T15773] check_cond_jmp_op+0x1dbb/0x31a0 [ 872.291757][T15773] ? __pfx_check_cond_jmp_op+0x10/0x10 [ 872.297225][T15773] ? kfree+0x1c1/0x630 [ 872.301304][T15773] ? do_check+0x6326/0x10690 [ 872.305899][T15773] ? bpf_reset_stack_write_marks+0x1eb/0x260 [ 872.311893][T15773] do_check+0x7970/0x10690 [ 872.316369][T15773] ? __pfx_do_check+0x10/0x10 [ 872.321047][T15773] ? init_func_state+0x1ab2/0x28d0 [ 872.326167][T15773] do_check_common+0x19c8/0x25b0 [ 872.331118][T15773] bpf_check+0x5f3e/0x1ce00 [ 872.335644][T15773] ? __lock_acquire+0x6b5/0x2cf0 [ 872.340706][T15773] ? __pfx___mutex_trylock_common+0x10/0x10 [ 872.346616][T15773] ? __lock_acquire+0x6b5/0x2cf0 [ 872.351584][T15773] ? css_rstat_updated+0x23a/0x530 [ 872.356790][T15773] ? __pfx_css_rstat_updated+0x10/0x10 [ 872.362265][T15773] ? irqentry_exit+0x59e/0x620 [ 872.367047][T15773] ? __lock_acquire+0x6b5/0x2cf0 [ 872.372004][T15773] ? __pfx_bpf_check+0x10/0x10 [ 872.376775][T15773] ? lockdep_hardirqs_on+0x7a/0x110 [ 872.382076][T15773] ? irqentry_exit+0x59e/0x620 [ 872.386856][T15773] ? trace_irq_disable+0x3b/0x150 [ 872.392279][T15773] ? ktime_get_with_offset+0x93/0x2a0 [ 872.397692][T15773] ? seqcount_lockdep_reader_access+0xea/0x100 [ 872.403865][T15773] ? __asan_memset+0x22/0x50 [ 872.408464][T15773] ? bpf_lsm_bpf_prog_load+0x9/0x20 [ 872.413677][T15773] ? security_bpf_prog_load+0x125/0x3c0 [ 872.419321][T15773] bpf_prog_load+0x1484/0x1ae0 [ 872.424102][T15773] ? __pfx_bpf_prog_load+0x10/0x10 [ 872.429232][T15773] ? bpf_lsm_bpf+0x9/0x20 [ 872.433567][T15773] ? security_bpf+0x7e/0x2d0 [ 872.438161][T15773] __sys_bpf+0x618/0x950 [ 872.442421][T15773] ? __pfx___sys_bpf+0x10/0x10 [ 872.447275][T15773] ? __pfx_sched_clock_cpu+0x10/0x10 [ 872.452675][T15773] __x64_sys_bpf+0x7c/0x90 [ 872.457102][T15773] do_syscall_64+0x14d/0xf80 [ 872.461706][T15773] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 872.467777][T15773] ? clear_bhb_loop+0x40/0x90 [ 872.472479][T15773] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 872.478568][T15773] RIP: 0033:0x7f12f4d9c799 [ 872.482991][T15773] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 872.502713][T15773] RSP: 002b:00007f12f5c86028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 872.511154][T15773] RAX: ffffffffffffffda RBX: 00007f12f5015fa0 RCX: 00007f12f4d9c799 [ 872.519161][T15773] RDX: 0000000000000048 RSI: 00002000000054c0 RDI: 0000000000000005 [ 872.527156][T15773] RBP: 00007f12f4e32bd9 R08: 0000000000000000 R09: 0000000000000000 [ 872.535134][T15773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 872.543198][T15773] R13: 00007f12f5016038 R14: 00007f12f5015fa0 R15: 00007ffd8c88a328 [ 872.551193][T15773] [ 872.554733][T15773] Kernel Offset: disabled [ 872.559078][T15773] Rebooting in 86400 seconds..