last executing test programs: 22m27.010808638s ago: executing program 32 (id=476): r0 = getpid() r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x9}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff274, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[], 0x14}}, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4, @perf_config_ext={0x7, 0xf}, 0xa38, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180000000000000000"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x19, 0x0, 0xfcd8) 22m25.224150707s ago: executing program 33 (id=502): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000d00)={0x2, 0x80, 0x6d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x64}, 0x18, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1, 0xfffffffc}, 0x50) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xa}, 0x114244, 0x0, 0xafe8, 0x4, 0x7fff, 0x7fffffff}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdb, 0xdb, 0xb, [@type_tag={0x7, 0x0, 0x0, 0x12, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x8, [{0x1, 0x4, 0x6}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x4, 0x400}}, @ptr={0x1, 0x0, 0x0, 0x2, 0x3}, @ptr={0x3, 0x0, 0x0, 0x2, 0x4}, @datasec={0xb, 0x8, 0x0, 0xf, 0x3, [{0x1, 0x84, 0x70000000}, {0x2, 0x9, 0x2}, {0x5, 0xd422, 0x61}, {0x3, 0x0, 0x8}, {0x2, 0x4, 0x6244}, {0x5, 0x1, 0x69ab}, {0x3, 0x11}, {0x4, 0x101, 0x80000001}], "5e3dae"}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x4, [{0x10, 0x1, 0x3}]}]}, {0x0, [0x2e, 0x2e, 0x5f, 0x0, 0x61, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000500)=""/33, 0xff, 0x21, 0x0, 0xf, 0x10000}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0xa, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x959, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0xfffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x25, 0x5, 0x0) recvmsg$kcm(r4, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x40) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x14, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000100000000000000000000180100000000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b80)={r5, 0x2000012, 0xe, 0x0, &(0x7f0000000080)="63eced8e46000000000000000686", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xb}, 0x50) r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0xc3248, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000400), 0x4}, 0xc02, 0x1, 0x0, 0x9, 0x4, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x7ffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, 0x0, 0x8000) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="220000000400000010"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r7}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x7, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0xb6cb}, {{0x18, 0x1, 0x1, 0x0, r7}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x94) 22m18.830991452s ago: executing program 34 (id=518): socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffffeffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001940)='{', 0xffc0}], 0x14}, 0x80d1) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x3, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xec}, 0x94) r1 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r1, &(0x7f0000000340)={&(0x7f00000000c0), 0x10, &(0x7f0000000300)={0x0}, 0x1, 0x0, 0x0, 0x20008000}, 0x4000000) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x8000) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x3e}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r3 = openat$cgroup_devices(r2, &(0x7f0000000300)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r3, &(0x7f0000000680)=ANY=[@ANYBLOB='c 1:'], 0xa) bpf$PROG_LOAD(0x5, 0x0, 0x0) 22m12.835631838s ago: executing program 35 (id=469): socket$kcm(0x1e, 0x4, 0x0) socket$kcm(0xa, 0x1, 0x106) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x400, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, 0x0, &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x5, 0x5, &(0x7f0000000200)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYRES32=r0], 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x17, 0x0, 0x0, 0x0, 0x4}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x248, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000, 0x10001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x84) socket$kcm(0x21, 0x2, 0xa) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, 0x0, 0x8854) 19m17.290400914s ago: executing program 36 (id=2065): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r1, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000680)=@newqdisc={0xc8, 0x24, 0xf0b, 0x70bd2e, 0x0, {0x0, 0x0, 0x12, r2, {}, {0xffff, 0xffff}, {0xd}}, [@qdisc_kind_options=@q_cbq={{0x8}, {0x7c, 0x2, [@TCA_CBS_PARMS={0x18, 0x1, {0x5, '\x00', 0x6, 0x7, 0x7f6, 0x1}}, @TCA_CBS_PARMS={0x18, 0x1, {0x4, '\x00', 0x7, 0x8, 0x6}}, @TCA_CBS_PARMS={0x18, 0x1, {0x42, '\x00', 0x5, 0x4df, 0x7fffffff, 0x2}}, @TCA_CBS_PARMS={0x18, 0x1, {0x3, '\x00', 0x1, 0x8, 0x7ff, 0x1}}, @TCA_CBS_PARMS={0x18, 0x1, {0xd8, '\x00', 0x9, 0x0, 0x400, 0x887}}]}}, @qdisc_kind_options=@q_hfsc={{0x9}, {0x5, 0x2, @TCA_HFSC_USC={0x10, 0x3, {0xffffffff, 0xe8, 0x43d8}}}}]}, 0xc8}, 0x1, 0x0, 0x0, 0x8004001}, 0x0) 19m7.635779094s ago: executing program 37 (id=2150): socket$kcm(0xa, 0x1, 0x106) mount$bpf(0x0, 0x0, 0x0, 0x40028, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xc}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x50) socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER(r1, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000540)=ANY=[@ANYBLOB="94000000ed03100028bd7000fcdbdf251713548ced0cdc89325fc802a865ddb23ad17ceaf03a5f80b9bb62a776eb675261080a50475acefe3f92ca1bfea1c016cade9907c17b179d65f69cb294799d3a43ad2704b987201fee1de6942bf3723cc9fbf1cee98b6c782f8b9086b258bd"], 0x94}, 0x1, 0x0, 0x0, 0x880}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001040)=ANY=[@ANYBLOB="1c0000002500090122bd7000fcffffff3e0000000800030048"], 0x1c}, 0x1, 0x0, 0x0, 0x449d7}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, 0x0, 0x0) sendmsg$NFT_BATCH(r3, 0x0, 0x24044010) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x40f00, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = socket$kcm(0x10, 0x2, 0x4) socket$kcm(0x11, 0x2, 0x0) r6 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xc}, 0x16efa, 0x4, 0x98, 0x0, 0x2, 0x5, 0xfffc}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) sendmsg$kcm(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)="39000000140081ae10003c000500018311001f9f660fcf066505acb612f691f3bd3508abca1be6eeb89c44ebb37358582bdbb7d553b4e92155", 0x39}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r4) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) 18m51.656107223s ago: executing program 38 (id=2219): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x40f00, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000001100)={0x5, 0x80, 0x9, 0x8, 0xb, 0xfb, 0x0, 0x3c, 0xc002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x18842, 0x0, 0x7fffffff, 0x7, 0x9, 0x3, 0x7, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a1c, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x20, 0x400000, 0x0, 0x0, 0x0, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r0, 0x0, 0x8000) sendmsg$sock(r0, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x400c804) sendmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000940)='EO', 0x2}], 0x1, &(0x7f00000011c0)=ANY=[], 0x368}, 0x20044000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0xfffff000, 0x0, 0x0, 0x0, 0x0, 0x990d, 0x7000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r1, 0x4004743b, 0x0) socket$kcm(0x21, 0x2, 0x2) r2 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r2, 0x0, 0x60, 0x0, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)="d8000000180081064e81f782db4cb904021d080006007c09e8fe55a10a0015000500142603600e1208000f0000000401a80016002000014003000000035c0461c1d60008000000000000fb8000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f0f49e119c849ea6e5a0fc55e4cde205a214d6102d6dcbf33fb5ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6cc", 0xd8}], 0x1}, 0x0) sendmsg$inet(r3, &(0x7f0000000340)={&(0x7f0000000000)={0x2, 0x4e23, @private=0xa010102}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000040)='t', 0x1}], 0x1}, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x7, &(0x7f0000000180), 0x43) 14m8.7933344s ago: executing program 39 (id=3973): socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x880}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) close(0x3) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="24000000250009012cbd7000f9ffffff0200000008"], 0x24}, 0x1, 0x0, 0x0, 0x1000c957}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xffffffff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xc7ce, 0xad3f}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24000840}, 0x40) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) r2 = socket$kcm(0x2, 0x5, 0x84) r3 = socket$netlink(0x10, 0x3, 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$nl_route_sched(r3, &(0x7f00000013c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8080}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x78, &(0x7f00000000c0)=r4, 0x4) 14m8.15338629s ago: executing program 40 (id=3982): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x40f00, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a1f, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x20, 0x400000, 0x0, 0x0, 0x0, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) close(0x3) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0), 0xc) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x4040) syz_clone(0x20000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)=r4, 0x10) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000005000000000000000000000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x101}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r6, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r6, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x2) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000005c0)=@newqdisc={0x120, 0x24, 0xf0b, 0x70bd2e, 0x0, {0x0, 0x0, 0x12, r7, {}, {0xffff, 0xffff}, {0xe}}, [@qdisc_kind_options=@q_netem={{0xa}, {0xf0, 0x2, {{0x1, 0x3fe, 0x3, 0x7, 0x4}, [@TCA_NETEM_LOSS={0xd4, 0x5, 0x0, 0x1, [@NETEM_LOSS_GE={0x14, 0x2, {0x9, 0x2}}, @NETEM_LOSS_GI={0x18, 0x1, {0x7, 0x7, 0x8, 0x1, 0xc003}}, @NETEM_LOSS_GI={0x18, 0x1, {0xfffffff7, 0x6, 0xfff, 0x9, 0x3}}, @NETEM_LOSS_GE={0x14, 0x2, {0x40c, 0x6, 0x2}}, @NETEM_LOSS_GE={0x14, 0x2, {0xffffffff, 0x8, 0x3, 0x4}}, @NETEM_LOSS_GE={0x14, 0x2, {0x1, 0x6, 0x8, 0x3}}, @NETEM_LOSS_GE={0x14, 0x2, {0x7fffffff, 0x28, 0x3, 0x3}}, @NETEM_LOSS_GE={0x14, 0x2, {0x3, 0x60000, 0x9, 0x72b5}}, @NETEM_LOSS_GE={0x14, 0x2, {0x8, 0x80000000, 0x6, 0x4}}, @NETEM_LOSS_GE={0x14, 0x2, {0x8, 0x7, 0x4, 0x6}}]}]}}}]}, 0x120}, 0x1, 0x0, 0x0, 0xc000041}, 0x20008000) 12m50.529862725s ago: executing program 8 (id=4335): socket$kcm(0x2b, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000200"/31], 0x0, 0x26}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0xc0042, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfefffffc, 0x2, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x3fe, 0x3, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0xe80, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee6888035", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 12m47.086780216s ago: executing program 8 (id=4341): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x4, 0x6, 0x30b, 0x0, 0x0, {0x0, 0x0, 0x1}}, 0x14}, 0x1, 0x0, 0x0, 0x44}, 0x4) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)={0x24, 0x1, 0x4, 0x101, 0x0, 0x0, {0x5}, [@NFULA_CFG_CMD={0x5, 0x1, 0x2}, @NFULA_CFG_FLAGS={0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x31}, 0x20008888) 12m46.82878715s ago: executing program 8 (id=4343): socket$kcm(0xa, 0x1, 0x106) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000120000000000000000"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0}, 0x50) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000006000000040000000000000e0400000000000000000000000100000d0400000004000000040000000000000000000010040000000000000000000002030000000000000061"], 0x0, 0x5a, 0x0, 0x4, 0x80000}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r1, 0x20, &(0x7f0000000080)={&(0x7f0000001680)=""/4098, 0x1002, 0x0, 0x0}}, 0x10) 12m46.524610204s ago: executing program 8 (id=4345): mkdir(&(0x7f0000001a80)='./file0\x00', 0x1cb) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x989046, 0x0) mount$bpf(0x200000000000, &(0x7f0000000200)='.\x00', 0x0, 0x8b7840, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x84000, 0x0) mkdir(&(0x7f0000000140)='./file0/../file0\x00', 0x190) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x989046, 0x0) mount$bpf(0x200000000000, &(0x7f0000000440)='./file0/../file0\x00', 0x0, 0x2042, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='..\x00') mount$bpf(0x200000000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x98d046, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x84000, 0x0) 12m46.218363547s ago: executing program 8 (id=4347): socket$netlink(0x10, 0x3, 0xe) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x48) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x4a, 0x0, 0xe5) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000340)="89000000120081ae08060cdc030000017f03e3f7000000006ee2ffca1b1f00ff0f00000000000050375ed08a56331dbf9ed78105001ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c00010004080c00bdad01409bbc7a46e39a54cbbda812176679df069163ce955fed0009d78f0a947ee2b49e33538afaeb2713f450ebd010a20ff27fff", 0x89}], 0x1, 0x0, 0x0, 0x7}, 0x20044810) 12m45.400361303s ago: executing program 8 (id=4353): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000f9ffffff000000007f000000850000009b0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000e0000008500"], 0x0, 0x4, 0x0, 0x0, 0x40f00, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffff8}, 0x94) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10040, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x2, 0x20000}, 0x0, 0x0, 0x0, 0x6, 0x7, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)=ANY=[@ANYRES32=r0, @ANYRES32, @ANYBLOB, @ANYBLOB], 0x10) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x1004) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000b80)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2106, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x28, 0x0, 0x10, 0x0, 0x0, 0x0, 0x10090, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x42fbd5dcab7bee29, @perf_bp={0x0, 0xd}, 0x106c48, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB], 0xcfa4) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0xa38, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0xb, 0x0, 0x0, 0x95, 0x0, 0x0, 0x41100, 0x4a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x9365, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x10000000}, 0x94) r4 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x107, 0x14, &(0x7f0000000000), 0x4) sendmsg$kcm(r4, &(0x7f0000001780)={&(0x7f00000003c0)=@caif, 0x80, 0x0}, 0x4008050) 12m44.785734838s ago: executing program 41 (id=4353): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000f9ffffff000000007f000000850000009b0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000e0000008500"], 0x0, 0x4, 0x0, 0x0, 0x40f00, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffff8}, 0x94) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x10040, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x2, 0x20000}, 0x0, 0x0, 0x0, 0x6, 0x7, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)=ANY=[@ANYRES32=r0, @ANYRES32, @ANYBLOB, @ANYBLOB], 0x10) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x1004) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000b80)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2106, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x28, 0x0, 0x10, 0x0, 0x0, 0x0, 0x10090, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x42fbd5dcab7bee29, @perf_bp={0x0, 0xd}, 0x106c48, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB], 0xcfa4) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0xa38, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0xb, 0x0, 0x0, 0x95, 0x0, 0x0, 0x41100, 0x4a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x9365, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x10000000}, 0x94) r4 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x107, 0x14, &(0x7f0000000000), 0x4) sendmsg$kcm(r4, &(0x7f0000001780)={&(0x7f00000003c0)=@caif, 0x80, 0x0}, 0x4008050) 8m2.589790114s ago: executing program 5 (id=6321): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18020000040000000000000000000000780000008a0076009500a30a86b60000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0xa2b00, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)={0x24, 0x25, 0x301, 0x670bd24, 0x25dfdbfb, {0x20}, [@typed={0x10, 0x15e, 0x0, 0x0, @binary="79857f734228a97ee62057e9"}]}, 0x24}, 0x1, 0x0, 0x0, 0x40008840}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x2a040, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x4, 0x7}, 0x0, 0x8e, 0x0, 0x1, 0x0, 0x8, 0xfffc, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) r2 = getpid() r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xa}, 0x114244, 0x0, 0xafe8, 0x4, 0x7fff, 0x7fffffff}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000002440)={@map=r5, 0x7, 0x0, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000840), &(0x7f00000023c0), 0x0}, 0x40) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="680000000206010300000000000000000a004000120003006269746d61703a69702c6d61630000000500040000000000090002"], 0x68}}, 0x8000) socket$nl_rdma(0x10, 0x3, 0x14) mount$bpf(0x0, 0x0, 0x0, 0x8000, &(0x7f00000001c0)={[], [{@obj_role={'obj_role', 0x3d, 'GPL\x00'}}]}) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0xfd, 0x0, 0x4, 0x0, 0x0, 0x10000000c, 0x42002, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc8, 0x2, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r8, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000180)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd632000fc04082f00db5b686158bbcfe8875a060305000023000000000000000000000000ac1414aa3a2008"], 0xfdef) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000250007002cbd7000000000007e6f3d4e027c0000"], 0x14}, 0x1, 0x0, 0x0, 0x24048851}, 0xc000) 8m1.609121882s ago: executing program 5 (id=6325): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x20000, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0x100000001}, 0x4000, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000001c0)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd304, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x27, 0x1}, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}], 0xc8}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x200}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) 8m1.403368614s ago: executing program 5 (id=6327): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0xb, 0x8, 0x7fe2, 0x1, 0x1, 0xffffffffffffffff, 0xfff}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r0, 0xffffffffffffffff}, &(0x7f0000000600), &(0x7f00000001c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffd}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0xd0}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r2}, 0xc) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c00000046000701fefffffffcdbdf2504"], 0x1c}}, 0xc000) perf_event_open(0x0, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x1, 0x106) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1947}, 0x0, 0x0, 0x0, 0x8, 0x402, 0x7fffffff, 0x1, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffbfffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = socket$kcm(0xa, 0x2, 0x0) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNDETACHFILTER(r6, 0x401054d6, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_crypto(r5, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@delrng={0x10, 0x14, 0x2, 0x70bd26, 0x25dfdbfd, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8015}, 0x20000010) sendmsg$nl_generic(r3, 0x0, 0x881) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r10 = socket$kcm(0x11, 0x2, 0x300) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$tipc(r11, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) recvmsg(r10, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000b80)=""/4096, 0x1000}], 0x8}, 0x0) sendmsg$NFT_BATCH(r9, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000940)={{0x14}, [@NFT_MSG_NEWRULE={0x78, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x4c, 0x4, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, @socket={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_SOCKET_KEY={0x8, 0x1, 0x1, 0x0, 0x2}]}}}, {0x24, 0x1, 0x0, 0x1, @queue={{0xa}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_QUEUE_SREG_QNUM={0x8, 0x4, 0x1, 0x0, 0x10}, @NFTA_QUEUE_FLAGS={0x6}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0xa0}}, 0x0) sendmsg$NFULNL_MSG_CONFIG(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2c, 0x1, 0x4, 0x5, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0x7f}, @NFULA_CFG_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x45}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x8000) sendmsg$nl_generic(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="1400000000"], 0x14}, 0x1, 0x0, 0x0, 0x4840}, 0x404c0c4) 8m0.564941512s ago: executing program 5 (id=6331): mkdir(&(0x7f0000001a80)='./file0\x00', 0x1cb) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x989046, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x84000, 0x0) mkdir(&(0x7f0000000140)='./file0/../file0\x00', 0x190) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x989046, 0x0) mount$bpf(0x200000000000, &(0x7f0000000440)='./file0/../file0\x00', 0x0, 0x2042, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='..\x00') mount$bpf(0x200000000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x98d046, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x84000, 0x0) 8m0.392080121s ago: executing program 5 (id=6333): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) close(r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000072"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r1) r2 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r2, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0x0, @empty}, 0x80, 0x0}, 0x20000001) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0f000000040000000400"], 0x50) r5 = socket$kcm(0x10, 0x400000007, 0x0) write$cgroup_subtree(r5, 0x0, 0xfe33) r6 = socket$kcm(0x10, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000000080)={r6}) r7 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socket$nl_rdma(0x10, 0x3, 0x14) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_generic(r7, 0x0, 0x4008094) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000540)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r4}, &(0x7f0000000000), &(0x7f00000000c0)=r1}, 0x20) recvmsg$unix(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000940)=""/199, 0xc7}], 0x1}, 0x10000) close(0x3) r8 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x18}}, 0x0) socket$kcm(0x2, 0xa, 0x2) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 7m59.989683468s ago: executing program 5 (id=6337): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x20000, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0x100000001}, 0x4000, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000001c0)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd304, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x27, 0x1}, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}], 0xc8}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x200}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) 7m59.412464523s ago: executing program 42 (id=6337): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x20000, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0x100000001}, 0x4000, 0x2, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000001c0)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd304, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x27, 0x1}, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}], 0xc8}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x200}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) 6m4.737805716s ago: executing program 4 (id=7031): r0 = perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x90, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1, @perf_config_ext={0x0, 0x1946}, 0x0, 0x9, 0x0, 0x8, 0x401, 0x7fffffff, 0x4, 0x0, 0xfffffffe, 0x0, 0xfffffffffffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="1400000036000701fefffffff6dbdf25037c0000"], 0x14}, 0x1, 0x0, 0x0, 0x4048011}, 0x8010) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r1, &(0x7f0000000280), &(0x7f0000000400)=@tcp6=r2, 0x2}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x7, 0x0, &(0x7f0000000100)="e0b9547ed387db", 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x94}, 0xc000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000100)={0x40000000, 0x0, &(0x7f0000000000)={&(0x7f0000001a40)=ANY=[@ANYBLOB="021800001c000000000000000000000005000600000000000a00030000000000000000000000000000000000000000000000000000000000020012000000000000000000fcffffff0600ff0000000000000000000000000000000000000000000000000001000000fe8000000000002100000000000000bb050005002b0000000a00000000000000fc01000000020000000200000000000000000000000000000800", @ANYRES64], 0xe0}}, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="340000003e000701fefffffff8ffffff02"], 0x34}, 0x1, 0x0, 0x0, 0x4000895}, 0xc000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xa2d40, 0x0) close(r6) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYRES16], 0x7c}, 0x1, 0x0, 0x0, 0xc}, 0x40085) sendmsg$NFT_BATCH(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000200)=ANY=[@ANYRES32, @ANYRESHEX=r0], 0x54}, 0x1, 0x0, 0x0, 0x24068045}, 0x4000000) socket$kcm(0x2b, 0x1, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8922, &(0x7f0000000180)={'vlan0\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) 6m4.142550885s ago: executing program 4 (id=7032): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000007d40)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000004c0)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000480)='%pi6 \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={r1}, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x3, 0x11, &(0x7f0000000340)=ANY=[@ANYBLOB="180200000000000000000000020004008500000097000000b7080000000000007b8af8ff00000000b7080000ffffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d34, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0xb, 0x0, &(0x7f0000000100)="b34715ecd04550d3abc89b", 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 6m3.954616277s ago: executing program 4 (id=7034): r0 = socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x0, 0x0, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x49, 0x1, 0x0, 0x0, 0x0, 0x0, 0x82240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x3}, 0x8811, 0x0, 0x0, 0x8, 0x43fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="0000000000000400"]) r2 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x55, &(0x7f00000003c0)=[@rights={{0x14}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r2, 0x84, 0x6e, &(0x7f00000006c0), 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) socket$nl_xfrm(0x10, 0x3, 0x6) r5 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, 0x0, 0x40002120) setsockopt$sock_attach_bpf(r5, 0x84, 0x17, &(0x7f0000000000), 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r8 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r8, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r8, &(0x7f0000000000)={0x0, 0x3, 0x0}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000000c0)=ANY=[], 0x10) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x74, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509c5bb", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000c00)=""/4046, 0xfce}, {&(0x7f0000001c00)=""/4118, 0x1016}, {0x0}, {&(0x7f0000000240)=""/197, 0xc5}], 0x4}, 0x0) socket$isdn(0x22, 0x3, 0x24) recvmsg$kcm(r0, 0x0, 0x0) 6m2.915931236s ago: executing program 4 (id=7039): mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000020c0)={0x34, 0x40, 0x107, 0xfffffffe, 0x2, {0x1, 0x7c}, [@nested={0x4, 0x142}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0x6, 0x6, 0x0, 0x0, @str='\x80\n'}]}, @nested={0x10, 0x2, 0x0, 0x1, [@nested={0xc, 0x14, 0x0, 0x1, [@typed={0x8, 0xc, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}]}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x4048011}, 0xc800) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x24000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x200000000000, &(0x7f0000000000)='.\x00', 0x0, 0x8b7848, 0x0) 6m2.32338428s ago: executing program 4 (id=7043): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) close(r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000072"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r1) r2 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r2, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0x0, @empty}, 0x80, 0x0}, 0x20000001) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r3}, &(0x7f0000000000), &(0x7f00000000c0)=r1}, 0x20) recvmsg$unix(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000dc0)=[{0x0}], 0x1}, 0x10000) close(0x3) 6m1.875975049s ago: executing program 4 (id=7045): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x1}, 0x1000, 0x2, 0xffffff7e, 0x8, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1000000000000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x83240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9, 0x8}, 0xc02, 0x1, 0x0, 0x9, 0x4, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000320015062bbd7000fbdbdf250c"], 0x90}}, 0x0) 6m1.205375665s ago: executing program 43 (id=7045): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x1}, 0x1000, 0x2, 0xffffff7e, 0x8, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1000000000000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x83240, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9, 0x8}, 0xc02, 0x1, 0x0, 0x9, 0x4, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="90000000320015062bbd7000fbdbdf250c"], 0x90}}, 0x0) 5m28.924521526s ago: executing program 6 (id=7207): r0 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x6, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{0x0, 0x0, 0x80000000}, {0x1000000a, 0x4}], 0x10, 0x4}, 0x94) close(0x3) socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@ifindex, 0x1f, 0x0, 0x96, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r3, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0], 0x0, 0xa1, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0xa, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) r6 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000700), 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@ifindex=r5, r3, 0x19, 0x2010, 0x0, @value=r6, @void, @void, @void, r4}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x101, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x80, 0x0}, 0x404c0d5) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x64, &(0x7f0000000000)=r7, 0x1c) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x71, 0x5, 0x8, 0x8, 0x0, 0x1f, 0x1369a, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0, 0x1}, 0xb06, 0x3, 0x8, 0x1, 0x7f, 0x8800, 0x5, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1, 0x4, &(0x7f0000000340)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$NFT_BATCH(r8, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x1}, 0x1015, 0x2, 0xffffff7e, 0x8, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0xa) r9 = socket$kcm(0x18, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x40047452, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r10 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x84014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x2008, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r10, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000000000000, 0x2}, 0x0, 0x0, 0xfffff9e9, 0x0, 0x100000000, 0x1}) r11 = perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r11, 0x40042408, r12) socket$kcm(0x2, 0x1, 0x84) socket$kcm(0x2c, 0x3, 0x0) 5m28.691624334s ago: executing program 0 (id=7209): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$kcm(0x28, 0x5, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$sock_attach_bpf(r1, 0x28, 0x2, 0x0, 0x700) socket$kcm(0x29, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xe, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000fdffff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @sk_skb=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x2400, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x581c0, 0x0) r2 = socket$kcm(0x2, 0xa, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d2f, 0x80040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffe, 0x830d}, 0x212, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000840)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x5c, 0x3, 0x6, 0x101, 0x0, 0x0, {0x7, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20000040}, 0x20000000) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8915, &(0x7f0000000000)={'ipvlan0\x00', @random="0200ff7fffff"}) 5m28.331891793s ago: executing program 0 (id=7211): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[], 0x24}, 0x1, 0x0, 0x0, 0x42804}, 0x84) 5m28.28747542s ago: executing program 6 (id=7212): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x160b, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @numgen={{0xb}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_NG_MODULUS={0x8, 0x2, 0x1, 0x0, 0x50}, @NFTA_NG_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x5}}}, 0x78}, 0x1, 0x0, 0x0, 0x850}, 0x4040080) 5m28.075724469s ago: executing program 0 (id=7213): perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x4000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[], 0x0, 0x6a, 0x0, 0x0, 0x7fffffff}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='GPL\x00'}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c00000046000701fcffffff02000000017c0000080001"], 0x1c}, 0x1, 0x2300, 0x0, 0x488c4}, 0xc000) 5m27.845690428s ago: executing program 6 (id=7215): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000280)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000003780)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="0212970902000000e4a17c45c85686605e85da4a", 0x10}], 0x1}, 0x0) (fail_nth: 1) 5m26.757607238s ago: executing program 0 (id=7220): mkdir(&(0x7f0000001a80)='./file0\x00', 0x1cb) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x989046, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x200000000000, &(0x7f0000000200)='.\x00', 0x0, 0x8b7840, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x84000, 0x0) mkdir(&(0x7f0000000140)='./file0/../file0\x00', 0x190) mount$bpf(0x200000000000, &(0x7f00000001c0)='./file0/../file0\x00', 0x0, 0x989046, 0x0) mount$bpf(0x200000000000, &(0x7f0000000440)='./file0/../file0\x00', 0x0, 0x2042, 0x0) mount$bpf(0x200000000000, &(0x7f0000000200)='.\x00', 0x0, 0x8b7840, 0x0) (fail_nth: 1) 5m26.681977939s ago: executing program 6 (id=7221): mkdir(&(0x7f0000001a80)='./file0\x00', 0x1cb) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x2a, 0x107, 0xfffffffc, 0x0, {0x5, 0x7c}, [@typed={0x8, 0x1, 0x0, 0x0, @u32=0x7ffffffe}]}, 0x1c}, 0x1, 0x0, 0x0, 0x488c4}, 0xc000) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x989046, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x200000000000, &(0x7f0000000200)='.\x00', 0x0, 0x8b7840, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x84000, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f00000005c0)=ANY=[@ANYBLOB="020100090a0000000000000000000000030006002b20000002004e24ac1414aa0000000000000000030005000000000002000a01000000000000000000000000020013"], 0x50}, 0x1, 0x7}, 0x24000000) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)=@o_path={&(0x7f0000000080)='./file0/../file0\x00', r1, 0x4000, r2}, 0x18) mkdir(&(0x7f0000000140)='./file0/../file0\x00', 0x190) mount$bpf(0x200000000000, &(0x7f00000001c0)='./file0/../file0\x00', 0x0, 0x989046, 0x0) mount$bpf(0x200000000000, &(0x7f0000000440)='./file0/../file0\x00', 0x0, 0x2042, 0x0) mount$bpf(0x200000000000, &(0x7f0000000200)='.\x00', 0x0, 0x8b7840, 0x0) 5m26.41990869s ago: executing program 0 (id=7223): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[], 0x24}, 0x1, 0x0, 0x0, 0x42804}, 0x84) 5m26.395989683s ago: executing program 6 (id=7225): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x160b, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @numgen={{0xb}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_NG_DREG={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_NG_MODULUS={0x8, 0x2, 0x1, 0x0, 0x50}, @NFTA_NG_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}]}}}]}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x5}}}, 0x78}, 0x1, 0x0, 0x0, 0x850}, 0x4040080) 5m25.907846084s ago: executing program 6 (id=7227): socket$kcm(0x2, 0x3, 0x2) socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="02000000040000000800"], 0x50) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0x6}, 0x8000, 0x2, 0xfffffffe, 0x5, 0x9d1f, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x14000000, 0x0, 0x0, 0x0, &(0x7f0000000540), &(0x7f0000000580)) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{0x0}], 0x1}, 0x8801) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="440000000214010029bd7000fcdbdf250800010000000000080001000100000008004400", @ANYRES32, @ANYBLOB='\b\x00D\x00', @ANYRES32, @ANYBLOB="080004"], 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x40100) 5m25.109708802s ago: executing program 44 (id=7227): socket$kcm(0x2, 0x3, 0x2) socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="02000000040000000800"], 0x50) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0x6}, 0x8000, 0x2, 0xfffffffe, 0x5, 0x9d1f, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x14000000, 0x0, 0x0, 0x0, &(0x7f0000000540), &(0x7f0000000580)) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{0x0}], 0x1}, 0x8801) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="440000000214010029bd7000fcdbdf250800010000000000080001000100000008004400", @ANYRES32, @ANYBLOB='\b\x00D\x00', @ANYRES32, @ANYBLOB="080004"], 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x40100) 5m25.098558193s ago: executing program 0 (id=7231): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x959, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)="1400000010003507d25a806f8c6394f90324fc", 0x13}], 0x1}, 0x40800) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000200"/16], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd63"], 0xcfa4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 5m24.646129026s ago: executing program 45 (id=7231): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x959, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000000)="1400000010003507d25a806f8c6394f90324fc", 0x13}], 0x1}, 0x40800) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000200"/16], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd63"], 0xcfa4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 1m13.505799608s ago: executing program 7 (id=8884): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2501, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x828, 0x0, 0x0, 0x0, 0x10000, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xaf, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x97, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0x58, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r0, &(0x7f00000009c0)={&(0x7f0000000140)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000280)="cd0f6775072f2bad4a72872861af7aedba03d06a2c4272a32efc4136c35d7f22105be90ea09bcdb5456af75be7c6e26c551b1edd52f3880528c95253905df7044d608527c93e274f3e89d9eb858901cc32d567c11d1e80258a567f99d6b883b56a6a7b0a981abc54ddeaa8d9f3361a438afc1832caba8465641aafd7bd2dba8590ea74e406c9a6b4", 0x88}], 0x1, &(0x7f00000008c0)=[@ip_retopts={{0x54, 0x0, 0x7, {[@generic={0x82, 0xb, "2cc61b0cfb79d4f976"}, @ssrr={0x89, 0x23, 0xd2, [@multicast1, @loopback, @loopback, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x12}, @loopback, @broadcast]}, @rr={0x7, 0x13, 0x7e, [@remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x10}]}]}}}, @ip_retopts={{0x24, 0x0, 0x7, {[@timestamp={0x44, 0x14, 0x6c, 0x0, 0x7, [0xb, 0x3, 0x9, 0x9]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @empty, @private=0xa010102}}}, @ip_retopts={{0x40, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4}, @generic={0x44, 0xa, "da9345078142c321"}, @ra={0x94, 0x4, 0x1}, @ssrr={0x89, 0xf, 0x37, [@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010100]}, @lsrr={0x83, 0xb, 0xd3, [@rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @remote, @local}}}], 0x100}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001f80)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000002c0)) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8004001}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000004000)=ANY=[], &(0x7f00000003c0)='syzkaller\x00'}, 0x94) r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETIFF(r5, 0x400454da, &(0x7f0000000180)={'bridge0\x00', 0x1023}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[], 0x0, 0x1}, 0x94) socket$inet(0x2, 0x5, 0x81) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x50) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=@updpolicy={0xfc, 0x19, 0x200, 0x70bd2d, 0x0, {{@in6=@rand_addr=' \x01\x00', @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x0, 0x5, 0x0, 0x3, 0xa, 0x20, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xae, 0xfff, 0xffffffffffffffff, 0x400, 0xffffffffffffffff, 0x7fffffff, 0x10000}, {0x2, 0xa00, 0x40800000000000, 0x800000000000000}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3}, [@tmpl={0x44, 0x5, [{{@in=@empty, 0x4d4, 0x3c}, 0x0, @in6=@empty, 0x0, 0x1, 0x3, 0x0, 0x49}]}]}, 0xfc}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc000000190001002dbd70000000000064010100000000000000000000000000fc01000000000000000000000000000000000000000000000a0000"], 0xfc}}, 0x0) r7 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r7, &(0x7f0000002dc0)={&(0x7f0000001640)=@l2tp6={0xa, 0x0, 0x0, @local, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000002c0)='\t', 0x1}], 0x1}, 0x41) 1m12.952308191s ago: executing program 7 (id=8890): close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x40002000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x20000000, '\x00', 0x0, 0x0}, 0x50) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x5, 0x9, 0x0, 0x1, 0x1c}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x8}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x7}, {}, {}, {}, {0x18, 0x8, 0x2, 0x0, r3}, {}, {0x46, 0x0, 0x0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x5, 0x0, 0xb, 0x8}, {0x85, 0x0, 0x0, 0x42}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x1ff, 0x4, 0x0, 0x4, 0x0, 0xdffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = socket$kcm(0x2d, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000000c0)}], 0x1, 0x0, 0x0, 0x1f000000}, 0x600) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000340)={r5}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r6, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r6, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000ee7332d7a1dcd70173990a22a64c6d7e3566c9011083193fd2fc98e4a2219ae902a9eaa01fe0d7e0f0a5692f8efbeb72a69ba650ca1d00c028d0326457c340e2798b3fec508f0ec3234ea34e9fc894e923606dec568832777d8e0500000000000000000000000000000080"], &(0x7f00000007c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x40, '\x00', r7, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110e22fff6) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000180)}], 0x1}, 0x0) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x4008744b, &(0x7f0000000180)) 1m11.820419319s ago: executing program 7 (id=8900): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) socketpair(0x1, 0x1, 0x0, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8905, &(0x7f0000000080)) 1m8.698800035s ago: executing program 7 (id=8905): r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000002dc0)={&(0x7f0000001640)=@l2tp6={0xa, 0x0, 0x0, @local, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000002c0)='\t', 0x1}], 0x1}, 0x41) 1m8.436313751s ago: executing program 7 (id=8908): socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0xc}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xa}, 0x114244, 0x0, 0xafe8, 0x4, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x2000000830d}, 0x100, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="18000000000000000000000000000000711263000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x989046, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x40, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x3c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000780)={0x2, 0x80, 0xb, 0x5, 0xff, 0xf, 0x0, 0x7, 0x4010, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000740), 0x9}, 0x5888, 0x7342b635, 0x100, 0x4, 0x4e, 0xff, 0x2, 0x0, 0x80, 0x0, 0x9}, 0x0, 0xe, r0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newqdisc={0x5c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x9, 0x1}, {0x7}, {0xe, 0xd}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x401}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x491, 0x0, 0x0, 0x0, 0x8, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}, @TCA_INGRESS_BLOCK={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x90}, 0x4000c00) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0x3, &(0x7f0000000140)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x61, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x100}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r3, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa2, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0xfc, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x8, 0x0, r3, 0x10000, '\x00', r4, r5}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000700), 0xc}, 0x0, 0x2, 0x0, 0x9, 0x0, 0x3}, 0x0, 0x8, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) 1m6.421013979s ago: executing program 7 (id=8915): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xa}, 0x114244, 0x0, 0xafe8, 0x4, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x9c, 0x4, 0x4, 0x8, 0x0, 0x1f, 0x80208, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x800, 0x2, @perf_config_ext={0x8, 0x2}, 0x4, 0x7f, 0x7, 0x3, 0xffff, 0x3, 0xfffa, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x1) r2 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x1}, 0x1000, 0x2, 0xffffff7e, 0x8, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1000000000000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0xb701, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10002) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x40088d5) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = socket$kcm(0x23, 0x5, 0x0) close(r3) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4e}, 0x48) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x81}, 0x20000080) sendmsg$kcm(r2, 0x0, 0x0) 1m4.507904078s ago: executing program 2 (id=8926): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x142, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x9, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x122}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) recvmsg(r6, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 1m1.84744454s ago: executing program 3 (id=8931): r0 = socket$kcm(0xa, 0x1, 0x106) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x20000011) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @dev, 0x4}, 0x80, 0x0}, 0xe07e872420dfef8a) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$kcm(0x2, 0x200000000000001, 0x106) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef5}, 0x1beea, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$inet(r2, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @local}, 0xfc, 0x0}, 0x30004001) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000001ac0)={&(0x7f0000002a00)=ANY=[@ANYBLOB="2400000024000100263d7000fddbdf2504"], 0x24}, 0x1, 0x0, 0x0, 0x4000d}, 0x20000000) 1m1.693562981s ago: executing program 9 (id=8932): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xa}, 0x114244, 0x0, 0xafe8, 0x4, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x7fffffff, 0xb}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfe33) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=@updpolicy={0xb8, 0x19, 0x1, 0x70bd2d, 0x0, {{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xc, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xa00, 0x407ffffffffffe, 0x800000000000002}, 0x0, 0x0, 0x1, 0x0, 0x6}}, 0xb8}}, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@in6={0xa, 0x4e24, 0xff, @remote, 0x9}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000080)="1b", 0x1}], 0x1, &(0x7f00000001c0)=[@dstaddrv4={0x18, 0x84, 0x7, @loopback}, @dstaddrv4={0x18, 0x84, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x30, 0x44814}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x22000044) socket$netlink(0x10, 0x3, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, 0x0, 0xd11, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x84}, 0x4040010) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r4, &(0x7f0000000100), 0x0}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000d40)={0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000b00)={0x0, 0xf22fff7f, &(0x7f0000000180)=[{&(0x7f0000000080)="31de76fb398bc62d058b8a96924594f5476a0824be53f7a5949f80614c42391e4b80412938c955d34d37eb96ba7849c3eb823bb36724bd6f6d0219cfe5c884afcd2bdea5acf9c877c03dcdbbb3e47417b6707c27d4c5c1db1924071f6b6f23c7d199c799c9b0c41101e625fcdb7bbfd12a3eeeef4540a5698f058aaf6a141e5d333929b92a7f64e925bf0ef424c3ef29fcd5fd4721c547fde6abe4d47048b64511693624b0d786711abe4a66e250fcbfe95ac9037e58f331b26b6ed0d08e5c73ba4c49", 0xc00e}], 0x9, &(0x7f00000001c0)=[@ip_tos_int={{0x7ff4d4260000}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}, @ip_tos_u8={{0x11, 0x2}}, @ip_retopts={{0x0, 0x0, 0x7, {[@lsrr, @generic={0x0, 0x0, "96"}, @generic={0x0, 0x0, "206a77bdd1a004129054e7704a"}]}}}], 0xf}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000000c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWRULE={0x40, 0x6, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0xfffe}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_EXPRESSIONS={0x14, 0x4, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @xfrm={{0x9}, @void}}]}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x14, 0x1, 0x0, 0x0, {0x1}}}, 0x68}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000840) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r6) perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x9c, 0x4, 0x4, 0x8, 0x0, 0x1f, 0x80208, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x800, 0x2, @perf_config_ext={0x8, 0x2}, 0x4, 0x7f, 0x7, 0x3, 0xffff, 0x3, 0xfffa, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x1) socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x1}, 0x1000, 0x2, 0xffffff7e, 0x8, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1000000000000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0xb701, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 1m1.471517671s ago: executing program 2 (id=8934): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0xb, 0x8, 0x7fe2, 0x1, 0x1, 0xffffffffffffffff, 0xfff}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r0, 0xffffffffffffffff}, &(0x7f0000000600), &(0x7f00000001c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffd}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0xd0}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r2}, 0xc) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c00000046000701fefffffffcdbdf2504"], 0x1c}}, 0xc000) perf_event_open(0x0, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x1, 0x106) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1947}, 0x0, 0x0, 0x0, 0x8, 0x402, 0x7fffffff, 0x1, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffbfffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = socket$kcm(0xa, 0x2, 0x0) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNDETACHFILTER(r6, 0x401054d6, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_crypto(r5, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@delrng={0x10, 0x14, 0x2, 0x70bd26, 0x25dfdbfd, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8015}, 0x20000010) sendmsg$nl_generic(r3, &(0x7f0000001840)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001800)={&(0x7f0000003a40)={0x12f4, 0x33, 0x725, 0x70bd28, 0x25dfdbfb, {0xe}, [@nested={0x1db, 0x134, 0x0, 0x1, [@generic="b5a007d5ee341e0771a8dc4df85982", @nested={0x4, 0x4b}, @typed={0xe, 0x55, 0x0, 0x0, @str='syzkaller\x00'}, @nested={0x1b4, 0x10a, 0x0, 0x1, [@generic="727cd28eb29c5ab56352df338b99e29bba0da5fe0f4ca252055ca1e31047099fa3642e26d6e4aa7ad04566e4e68df73796f3e7e150ec3ccfa7a91675733f2f03348c6d025fc1e9ea82071b61f4559a63cb9f51606c36e7ca647174810db02ea8b8c5adccddf307ffa537c76a6316f724db2cf162487208ddb40799a944f3116fb58fef5134236a66694eb6a4aecd1158eb86b9ed841a14c7d5ef4dc5138314fefb16df5ef58a62779bcf2cc9e2fc21256840fa366bf0ed8c682682ca", @generic="aa6649acfdadbcbdf3d1e6103a6c7eee71d242b77706b2c80f262093fcce52007d1245dbad5fb6cc1a8bdc2bdeb9c29964ff719e768fee7ae82ccda3c8ef1c1c727725583fd13f9753b5d78007ddee6d52135953f793dd6cf9163def967d3498b7d2f1d2f2f552350b358102c5877d550618f9ea8fef664fe01ee392076671f87d37ea810ac6174b0c17f154078df420afd2e8dc3261f3933467b5bf64d0432cd2c88b6e087c08e61b2a8319b5b10390eed654334329903d15b4595216a01c8607f6dc678d3f01284a5f8948c1d5a824c9a65640689b0e89edebc452fcf75da394d852dcaddec5626847db1c27690a40828494d3"]}]}, @typed={0x1004, 0x13c, 0x0, 0x0, @binary="ea4bdf076cb46cb7db16f5762c209543958fd09d9b279535cdbfed670cffa26644ee53b453ce1b35885a5eb300ca1f41457b1d67a207eb0232ed4bf990d2c10e7b08eb176f9eddbbd6af652e1eda9c1385dcf4b5b8e12438986065f11df92b05a412dc9cbc33686b93ff2539465fd1683400d6d4d7c1f2f46b7dcff3461b031ed91237e2cbb091f766d475a9743a6d8d60d11282c2ffff5aca61aba0ced4e151291bde9a96c24b9e4337c1e839fba360324805dad956585660df2d3a15f3685fe46724cfa0fe3623d3f1b23dd5f77c19f71d25a36c69775015323bbbc4b9774c2170bd24a839a3701237c442851d8c0ad42e3241c31e9ef034912d4ea9f4e2b9b177db67f2b00d770415e9d48701b9bc02cda9aaacf402883ec3766a3695d6f91a411a4eca7b74bc237e3c4c7c17655ec3e0213409e374f9b68b458dca87f294ac8a80bc396996fd50ac5aeef29f52b01729b2ecbb4ed4702ca147bd0e1640e7f5b35d219aa0c7b2bacaba3796287dbc10b0e039cb317f9a8c1f4aad6fbe3afb8eec5227abeb138efa1eb1a85dd5b3a6bdf6180fd18604454fcba525c9e235311343aa219ee93b77eb9acbb199c815f3756f248d8962fff8a7fc5c862498488ea7256578cd2aa60fc48753645a4d9085e63e927b04bf6e3c820704bd05f7da21d2fcc6cb34bd3faa1114e8a8441b3d8091f853973fd931ffeca0173e0ce4d4691bb47d02ebab3ddc5496627a23986ba6242f2c5c98b8c0c2180bead709a6082b65df1ba2032ee24a5e2fb9fecb2ab631104f66cc5c5ed29d1161ac6134563bd271325418c1a2fa7922d452cbb668b03c01b282042ebe6fe37d1c20ffb611013cfcf6301ea12806b086221773dea359d676c650f84830d69471a832c737388fc1ab64653308e66608f5ead24a788e008076ac54f42f97ee467b4618417a1ee32faea90d87aeaf42dbf4b4fac40066f5ba0d07f86203c321d4d8508ce8aac4cdba05520ce0c1f1ce92f8cd36a3e6f5017c8f7ef93d39bf1f128c937b997f5e6b6a981e215e2c96b6d511f7b079f872843af3e47f88ca34180a0bbcb4b77c266d669c6f92ea5a8a787436ae885039b04406b1208e575843019dbb82d1786d8cf7500e48fecd5acedb93b4ca49bfce85bf00488a82870b7b7ff77c99eb7eb84376d7a2ce730e06ffcfe4d4d6a4327fc1601001a47417365f932e0a5022fbbf982162b4dc1a74b53c3573f866f1a80070ce040aa6a0dd12a3b14573fd8c4d09b59c741890141a74bdedfa13adf5afde9c9753a1cc996e177ce01c933a779cd26a22ad0af7688e5ec5953ff3d6350ae1cdcffb586196c9d6821f6e7c3c7208db404eea6e6b289303ca75dc9f928822102780de6be58bd711408c5ab2437ba56121f09069e1a6a5284d4e1a303e3cd86f32042961b02df2e430db06a0b71d7a5b2da4987e9d051d7205ab03a5d66d4e7f9219e3d6c0fd1c4c598320709335ace9813eec2b17995b82ff53c5240ee62bc5fe11dd8ea0c4028cc80b5e9bb9884eb7a8a691fd0f55b6454b25900b6541309af6c408cff566b3e837ffbc84ec15b116532b7cc47fa660c3733be8c56dca45942b3f4591e038b32d75ff4e7fe23efa4e099b33e32548a40cf5ed0f742cfc5877bfe6adc37e5d7179465aff5bbf0f29051a6e0885f6e45a1111f502f0e6052d0483a724608cfc974ccea8125b14d6eb1ce30accf1897f37f1dd32a69193af50ab3416c4b1be6471c4da5fe685d15abf5ba0e92c43d01993bd78498145858df33361a1673cbed6d53c1794ca61487fb7f75362b3d26e38dba2270cd0ba9a7b1de151e8b29f770009e193da845331be18124d4c1f35e3a0be0e1aec7ceda6361ca2eafecd6b2554d31ba111e0599fa8658a3169aafcaffef098439d1c564c3380c13be399757c9820ea5d56304cc01cbd56075d607762dfc03d61ac366a0d3d4e615b5adc9c52d6ffa4c411f76a96e538d28b7b4d8e90ae92810809b318c8a20c800e09e4bd65ad541f8ced6aa860abb49bee97887c378d6371482b2fd600f18eeb662a70adfa0d1bbaa43f005213e2c5c626e55b007a01b1d38242a0794cbdd75beae71572926792daa222a6a31de0b90548a92e55c5d9d92eb2d472947a80385cf2f38af9dd3e300f9d94ddbcbd22605e560eab5ea54c359bd25688a196536184c74ebb1568380e5ec196880c2ca2565d2f3b561dc80b04d457707916dc54cf40932cb804c1bab2ff9b759fbf684b973d927a67af11ca7d2169bc411f957817988e5aca5b29a2e32174493ed373c68ead65d461377b9a0a269660fc06ba0f9c4f6feb3320757f2b1ac1811dc9a0ba26d09f4786f436ae58fef88a350551c2ab37e4690aed53933a5b8d67a56da01759b5269f07f3131bf29f441cf8d0e99145aa5ff6667ee3ea759b7005b01bebb108e216e2eeef545ad18ff58d056d1c5976f0056c773c392d2f27d2d0c183b7470ce0f61dcb3bba367388c8b297d29f755778ecf56dadb236521f88b13031a4a48653cafb7980de37504205a085c3c2ea27e3057a6e385a3c990343e4b19c77816f448f933f4495a02aeb9067271bbc7d4e8b74f3ec158239cfde333ef64a709bb06f29bf70881e55782a491dba244d5b7ff9defab62686e70794b5341d899f4c6f6afb422d399305440a2d4403d84f90a8df961774d937857b9e001ab42ec5d321ea9c8e2116c1348d46063d6ec4ffbc5c10cf6db3ab4809cafa0fd8e3d4aeb74cdca08e65b9ec442b7df8a9bdf1a021d89599bf15838b34064ff67469b9eca7e74c07bf6ec95da328d748a66fbd583a12633cf37f41c553ff95a0ecf89b53552b026b52fa08eacbaf373186e98a26c4c71aeadadb30e80e55ff75325af77d5411460f7572a43a16a79b4bb78731233290ed7d3ba9738ef9f1f48205f298a587b14dc9617ae93a0c101b46e35efe594edc5a2ba406d2ac287acd0d360b44fb75839635a349b2ee5b6781b3a5d271cba9f7a362b4b94dc74f6515bf26d97746adbad5078a595b72bb82d9ea3dd5b3dc00d137b9b6579671a26306a0b551307ba6eed71bed353ce43b59d30f793190829414b5175493e2d1733429bba6fdd61097f9ef8b361dc576c52a34b651f7784cc650db376aea8f5ccf65a0c6377d30b82fcf3d6afbf6911d955a9cb0f27b24c889f657383be0e44889beea5865700f777e0ab2abc3e7b5f01e52f71fd6f2495efe8c0f6c75404d9b25263c9fd6f48aa18079edb9f1cdef4cdbae9a1c6d024489c3ff713c76f3558fb0b118a0fbd272e22c15a7d06c2afdce5f89e78287730ff21c78b7b9419eb3166934e3ec08671546652fd278f6e0c10820b0427fa509abba53ed6f8ca250fce8407bf033e3d7771551fdc29edc34978517916ab644e99c626e90bf4f76c2b4980bbfc6be9cda4d344c4461cbf9fbed369b8df46ec7d10dadc93262cb0802b776b31a8c1105c3a22c33033e7588ddb238499e7d4675ca4a328f90d8e9415ca3ac7e5ae068d3da96c5bc314b1e65a47d95a1d993e4ca0fcdc1600f6554ded42e1799335ab7652040f8ea7493e65952a118d6cfc528c62970ccd38fd91f5e6e30bfba1962d002aaa101abda2c9ed12f2c91c7a21fe65cc795ab791613adcf755823522ba40f8627efeb70100731ab3f51f9b787fabf10b92badf58f529b4faef051cdf42ad47a23c6651d1ee30ab449897fc6a1656ad5928dda0d8019ad5427c8d05e202575d99d87ffcc9afde5fe478a1290dcc6a7bb14fba9a63e7afe484fc390770c1370a9dd8f2413bb5921ca5ffdc0a92706aa1d9b349b10a77006d1cba715b1689b2a790ccd82315f670514baf113dd35ce32e3768e4c24d666f22ed5a5019d5f5da320ed11f8ec659862429dcf5f2f58441e3e87b79797f4ea0276fb151ff8a87a4935fa8b73af382a52891ab86a706c42d3e8f6a3d40c9f8be87a3c23154cff8b6b259d3a07c6c31a103c23e5f5eaeed0b3c77bf7675286129788618cfcf7676956638d7fc47ab7800ea46192ee7eefdc968aaaf079e2c74843118f88dbb8a1df5f2f2030a9b7a73b1582059e0ea3c51400c6c481c4f12d8a594a02e4aea602403b5e60340d53fb3a0b7a4373a47ef93c93781e264aff3dd674d954d63bc4a97cc17a2ef727bf4d0ee628451e231a5e8f9be3b8cfab9ccb759ac07e7666f48c130e1133e19acae31f66e692d4c8c5f4e7403424c72170a1eb095611a3328ecd69b1095a8ce049e7754327c55bbc930815a18dbc4f8088acb40f25f736db1ff617e1f88bbb04dbf9bfe4fd6332b1aded16411a42a854a51203335541906c85fd7d48978a23d6d84a1513c52c756db3ca45013670cfc9989eac5c6de0d0634fca56a48d5e41b4999da4773b06f62dd68b4b3466314ee0d3e00b5ee2d3782c22d8a641b7caa2daed76ada295b3a75fab7dc9a6899fec043891c79984b3c55828059517ab67c62d9f1ecb5c897794ab51c6e89c03f30cad2467a90980d367c6cf2308c2ba6809965a076e82b32a4e8ec3be688c7aa5dbedb711e85e941897ec18443209bfaa1eedc980d529e449fd3c085af6e9a09f0def1ae490738eaf6232e8ea69c1ddbb2493bb6d86ea51e023340e547524c60404331fc3e5bd93eb56d2c9a679be7f1ce0633be2cd7e6e22b7df0325a0347c2d26ccab4bff90afa578e31a49178f4ee7c5dab40d1718ee46546ea1532f61bf26d647ad3f3d43e96a2d12cc116d65ee4868bc2e3101effa3d3f00bb94e9952b45f5d9a884a01a735125efd650d4812ff2a4fd18fe3395799b3de89965ab8f385a9faf7a785e27deb9c9f45e36e9ef43c3a7b2c753a204bd69a9af47f8b95d92a3cf18b3b1b654bd15738b12bb1d4c2a83b88765a4754e6a13c2e5b6abba926daae1ec5da24a7f113c050630a21e97adab4f9394f2276b6433273ab12c45f9ce416e0f1a54d9202bc8f8a43e48955549d4ad60ea54ef0bb70253e12c257de2e0030624d092e15f3e271ce8dd8b16ef53be2cc4802eaa0d03b10e703058425c774ec87c2eb07d8efce589ac6c1633b1675dc7f1b0cbb2e523836d3dd7028a4bb41508367ba0166d299279e23c0b0539bc4b061f2f228265094427c01be1b3fb223dc8f068e34026e630195ef6d275e220e749d1d267689d7ea503d3dcec92eec4d8464a0f1b3289d60a07c2e617ad43195b3178fa8f8c235353267cbea4371f5f138d3f5174af0fe48eccf87a9e9d46bbd45768b65828f25ab44349165eef847d78638b6770035821e23fe4bd5ded715d1085ce620b44e033b99bb083fa49a73799b088245c8cab1f298b4f404643f061946e0d2ee6b06297bf744a6b27e599485682d1c8945e6fdf1fc9230434e8384aea9a602b3e1495898cb6dfa7461791952eabe3d5698c3f269a9e26b563620106953b92fc04d961d7fa2191076200d351744ce2d5413e409586b6552841c36807d8a8c3a4018a674e4dc68737b12fcb3ec17e25e315e015505f16f16794a0321802a004d33662ae489e101c849606f10f46b3f51cd1f81742f6881d1df47be0d68ab2fb57273420d02a78a91515796c69f0a3deb737d3758e8166f38e2c0a2567c7cfbc705264a94d248e888d6333c88cb1ad00ed56739c4480a4199aebdf1e7622767c8a9a067cf45ecbd94969ec25cbfcbfff46c033239afcadfae76ce98d6bde4c78dbc6604a14c8d8d348f9a3d69330ac21bfe43a6e780b4b870588740f1c00dde7753de2c982a1047fcfbfc655e32bd6f80375be25d28f92e682c5ddc43de5c140d6fcd5f0724e"}, @typed={0x8, 0xd1, 0x0, 0x0, @pid}, @generic="43e868e27ba623a46c0dfd79568660c98f6b35a4124da1828a6a85ff548d23e4c75ed0474aaaf11780e07fceb450c45f93d24b7c33b7486e4ed73864c0cfb71c9bb034601fa84030f6dfc02d9b6e955db3490db4b41a4f36b87010d2013a9cdcb9b54281d541272c6330b837a0b1784ada6683845b034553afd6827f6755f3f141475380052cdaa4f6bd6d8598bc23dc87fb21b1f0f6ac0680fc75b98fd2e48677c1796c9e1e8c49a0f91e9ded8bd645d8e1c15371e5405faaea996279e8d69423bc5562e5f50cf2877f8c4458789603abc285c2dcbd30246669f939034856f1de6e3f16e0cb6d155eed6de69d63a8f51afe9d169696"]}, 0x12f4}, 0x1, 0x0, 0x0, 0x200000c0}, 0x881) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r10 = socket$kcm(0x11, 0x2, 0x300) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$tipc(r11, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) recvmsg(r10, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000b80)=""/4096, 0x1000}], 0x8}, 0x0) sendmsg$NFT_BATCH(r9, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000940)={{0x14}, [@NFT_MSG_NEWRULE={0x78, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x4c, 0x4, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, @socket={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_SOCKET_KEY={0x8, 0x1, 0x1, 0x0, 0x2}]}}}, {0x24, 0x1, 0x0, 0x1, @queue={{0xa}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_QUEUE_SREG_QNUM={0x8, 0x4, 0x1, 0x0, 0x10}, @NFTA_QUEUE_FLAGS={0x6}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0xa0}}, 0x0) sendmsg$NFULNL_MSG_CONFIG(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, 0x1, 0x4, 0x5, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFULA_CFG_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x45}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000040}, 0x8000) sendmsg$nl_generic(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="1400000000"], 0x14}, 0x1, 0x0, 0x0, 0x4840}, 0x404c0c4) 1m0.616550003s ago: executing program 2 (id=8936): r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[], 0x10}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x100, 0x0, 0x0, 0x8, 0x1, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x8, 0x830b}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x3000c085) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000100)=r2, 0x4) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x1c}, 0x1, 0x0, 0x0, 0xc001}, 0x2400c010) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)={0x14, 0x38, 0x301, 0x270bd26, 0x25dfdc03, {0xe}}, 0x14}, 0x1, 0x0, 0x0, 0x20000004}, 0x20004814) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x50028, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x7}, 0x0, 0xfffffffffffffffd, 0x0, 0x4, 0x6, 0xc07, 0xfffd, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0xc) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20029, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0xf}, 0x806, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r5, 0x0, 0x4000080) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x54}, 0x1, 0x0, 0x0, 0x4048041}, 0x4000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000b40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8b07, &(0x7f0000000040)={'wlan1\x00', @random="8dffffff0600"}) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x1ff003, 0x66, 0x7f, 0x1}, 0x48) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x40, r7}, 0x38) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r4, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x54, 0x4, 0x8, 0x3, 0x0, 0x0, {0x7, 0x0, 0x3}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}]}, 0x54}, 0x1, 0x0, 0x0, 0x4001851}, 0x20000004) socket$nl_netfilter(0x10, 0x3, 0xc) 1m0.505824647s ago: executing program 9 (id=8937): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000140), 0x7}, 0x20, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001480)={&(0x7f0000001400)=ANY=[@ANYBLOB="20000000081401"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x20008000) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002b80)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0xfffffdd5, [@typedef={0xa, 0x0, 0x0, 0x8, 0x2}, @struct={0x6, 0x7, 0x0, 0x4, 0x0, 0x9, [{0x9, 0x3, 0x7}, {0xb, 0x4, 0x9}, {0x8, 0x5, 0xf}, {0x6, 0x4, 0xfffffeff}, {0x0, 0x3, 0x7}, {0xa, 0x4, 0x9}, {0x8, 0x3, 0x4}]}, @fwd={0x8}]}, {0x0, [0x0, 0x2e, 0x30]}}, &(0x7f0000001b80)=""/4096, 0x95, 0x1000, 0x1, 0x1, 0x10000}, 0x28) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000e2ff1700141e17fdb0714eae60427b00000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x2000000830d}, 0x100, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r4 = socket$kcm(0xa, 0x5, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000100), 0x2, 0x0) r6 = socket$kcm(0xa, 0x2, 0x0) r7 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000200)={r7}) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="68020000000501040000000000000000050000065402010003"], 0x268}, 0x1, 0x0, 0x0, 0x40001}, 0x4000080) sendmsg$sock(r6, &(0x7f0000000400)={&(0x7f0000000580)=@in6={0xa, 0x4e21, 0xfffffffc, @empty, 0x3ff}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x25, 0x103}}], 0x18}, 0x0) recvmsg$kcm(r6, &(0x7f0000001b40)={0x0, 0x0, 0x0}, 0x40002000) r9 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r9, 0x0, 0x485, 0x0, 0x0) recvmsg(r4, 0x0, 0x23) bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)=@o_path={0x0, 0x0, 0x0, r5}, 0x18) r10 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4048011}, 0xc000) r11 = socket$kcm(0xa, 0x2, 0x73) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x541b, &(0x7f0000000240)) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x10, 0x2, 0x0) 1m0.38882624s ago: executing program 3 (id=8938): socket$kcm(0x10, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0x0, 0x40009060}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1080a2, 0x0, 0x6, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[], 0x50) socket$kcm(0x10, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0x60}, 0x1, 0x0, 0x0, 0x2002c0c4}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000680)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x60}, 0x94) r2 = socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000005c0)=@newqdisc={0x24, 0x24, 0xf0b, 0x70bd2e, 0x0, {0x0, 0x0, 0x12, 0x0, {}, {0xffff, 0xffff}, {0x2}}}, 0x24}, 0x1, 0x0, 0x0, 0x8004001}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b40)={0x0, &(0x7f0000000dc0)=""/209, 0x0, 0xd1, 0x0, 0x5}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x3, 0x0, &(0x7f00000002c0)='syzkaller\x00'}, 0x94) perf_event_open(0x0, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x8) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)={0x18, 0x32, 0x107, 0xfffffffe, 0x25dfdbfc, {0x4, 0x7c}, [@nested={0x4, 0x1}]}, 0x18}, 0x1, 0x0, 0x0, 0x240080d1}, 0x8010) socket$kcm(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2005d33, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x274, 0xff}, 0x0, 0x6, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)="d8000000310081044e81f782db44b904021d080005000000e8fe55a1180015000600142603600e12090021000000", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f375ffff86dd6317ce62070000000000000000431ccaf57b00000000000000000104"], 0xfe1b) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x7, 0xc, 0xff, 0xe, 0x0, 0x4, 0x98004, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0xfffffffffffffffc, 0x5}, 0x0, 0x6172, 0x2, 0x4, 0x7, 0x4, 0x7f, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xf) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="851000000000000018100000", @ANYRES32, @ANYBLOB="f0f605748aed0000000000000c00000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) 1m0.007515195s ago: executing program 3 (id=8940): bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1000000004000000080000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000f3000000000000000000000000000000005afbf5b7"], 0x50) socketpair(0x18, 0x1, 0xf, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8b35, &(0x7f0000000080)={'wlan1\x00', @random="02000000000a"}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc010}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpid() bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ceb71c0010ec90db133c22a690ae70800000000000"], 0xfe1b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=@raw=[@func, @map_fd, @exit, @jmp={0x5, 0x0, 0x4}], 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000000)=ANY=[], &(0x7f0000000840)='syzkaller\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 59.986542229s ago: executing program 1 (id=8941): r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000001f00)="89000000120081ae08060cdc030000017f03e3f7000000006ee2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c0001000c080c00bdad0140310068ad639a8ace8680210bc28b80", 0x67}], 0x1}, 0xff0f000020000080) socket$kcm(0x11, 0x200000000000002, 0x300) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500), 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) socket$key(0xf, 0x3, 0x2) 59.668520926s ago: executing program 1 (id=8942): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000001000000e27f000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040), 0x80000002, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000900000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000180)=r2, 0x4) r3 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x3, @remote, 0x5, 0x3}, 0x80, 0x0}, 0x2600c055) (fail_nth: 2) 59.562279357s ago: executing program 3 (id=8943): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@newsa={0x19c, 0x10, 0x1, 0x70bc2c, 0x0, {{@in6=@mcast2, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0xecdf, 0x0, 0x0, 0xa}, {@in6=@ipv4={'\x00', '\xff\xff', @multicast1}, 0x0, 0x32}, @in6=@empty, {0xfffffffffffffffe, 0xfffffffffffffffe, 0x3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x9}, {0x1, 0x400800, 0x9, 0x292}, {0x1000}, 0x0, 0x3507, 0x2, 0x4, 0x0, 0x2c}, [@algo_crypt={0x60, 0x2, {{'cbc(twofish)\x00'}, 0xc0, "6e000bfff000002000ff8000000000000000000100001800"}}, @algo_auth_trunc={0x4c, 0x14, {{'hmac(sha256)\x00'}, 0x0, 0x60}}]}, 0x19c}}, 0x44050) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_clone(0x20102400, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x81ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0x7fff, 0x0, 0x0, 0x0, 0x20}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e502000000000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) sendmsg$IPSET_CMD_SWAP(r2, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, 0x6, 0x6, 0x401, 0x0, 0x0, {0xa, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x24048000) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xfffffffd}, 0xfffffedf, 0x10, &(0x7f0000000040)={0x5}, 0x0, 0x0, 0xffffffffffffffff, 0xe}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r6, 0x2f00020b, 0xe40, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf4ec9f7b986", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0xb}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r7, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000073010f000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14}, 0x90) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r8, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="360affffffb00000620a00000000000007000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0x3, &(0x7f000000cf3d)=""/195}, 0x23) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000300)={0x5c, 0x2, 0x6, 0x801, 0x0, 0x0, {0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0xffffff22, 0x6, 0x1, 0x0, 0x470}]}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4020045}, 0x0) 59.448708756s ago: executing program 9 (id=8944): syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x8, 0x830b}, 0x0, 0x2, 0xfffffffe, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="180000002500010324bd5502ffdbdf250100"], 0x18}, 0x1, 0x0, 0x0, 0x4008}, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000a0300e0000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000010a0000070900010073797a31000000000900030073797a32000000001400000011000100"/111], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8020, 0x91120, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x101000, 0x2, @perf_bp={&(0x7f0000000040), 0x2}, 0x1306, 0x2, 0x0, 0x8, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket(0x2d, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES64=r0, @ANYRES8=r1], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={r5, 0x0, 0x0}, 0x20) sendmsg$IPSET_CMD_SAVE(r4, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x20000050) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="9feb010018000000000000000c0000f30b"], 0x0, 0x26, 0x0, 0x1, 0x5}, 0x28) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r6, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f00000007c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x40, '\x00', r7}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0100000005000000fd090e008400000000000000", @ANYRES32, @ANYBLOB="feffffff00"/20, @ANYRES32=r7, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) 57.783373961s ago: executing program 9 (id=8945): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x8, 0x10000830b}, 0x0, 0x0, 0xfffffffe, 0x9, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x3, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10122, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000000c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x55, &(0x7f0000000540)=[{}], 0x8, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0xda, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xe1, '\x00', r4, 0xffffffffffffffff, 0x2, 0x3, 0x2}, 0x50) setsockopt$sock_attach_bpf(r1, 0x6, 0x9, &(0x7f00000001c0), 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xffc9, 0x0, &(0x7f0000002d40)="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", &(0x7f0000000040), 0x3, 0x0, 0x33, 0x6f, &(0x7f0000000100)="46cc00117877b1d08f679b92d46ce23b736d0feb470f4e1d46f158db88cf3de81ac77bccb45147c5d8b3964b10d7310feec810", &(0x7f0000000240)="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", 0x2, 0x0, 0x7ffc}, 0x21) 57.580973044s ago: executing program 1 (id=8946): sendmsg$key(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x2, 0x17, 0xd, 0x3, 0x5, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_type={0x1, 0x14, 0x4}, @sadb_sa={0x2, 0x1, 0x4d3, 0x0, 0x8, 0x10, 0x1, 0x20000000}]}, 0x28}}, 0x20000040) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r7 = perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, 0xffffffffffffffff) r10 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0xf}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) sendmsg$OSF_MSG_REMOVE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x42000810}, 0x4040000) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="9feb010018000000000000005a000000070000000600000006000000000000930200000004000000000000010000000036003d060b0000000300000f0200000002000000030000000600000002000000018000000200000005000000ff070000000000003c820c000000000000050800000000"], &(0x7f0000000040)=""/43, 0x7a, 0x2b, 0x0, 0x7}, 0x28) sendmsg$IPSET_CMD_PROTOCOL(r11, &(0x7f0000000740)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000200)={0x24, 0x1, 0x6, 0x101, 0x0, 0x0, {0x2, 0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x8004}, 0x28000004) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0xd, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRESDEC=r7, @ANYRESDEC=r3, @ANYRES64=r8, @ANYRESOCT=r5, @ANYRES32=r10, @ANYRESDEC=r4], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x6}, 0x10, 0x0, r8, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) sendmsg$IPCTNL_MSG_EXP_NEW(r6, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000140)=ANY=[@ANYBLOB="3800000000020108003ac1000000000003000005240001800c00028005000100210000090c00028005000100920000000600034000000000"], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x448d3}, 0x40800) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) close(r12) socket$kcm(0xa, 0x2, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8b18, &(0x7f0000000940)={'wlan1\x00', @random="010000000700"}) ioctl$SIOCSIFHWADDR(r12, 0x8b06, &(0x7f0000000080)={'wlan1\x00', @random="02000000000a"}) 52.680511869s ago: executing program 2 (id=8947): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0xb, 0x8, 0x7fe2, 0x1, 0x1, 0xffffffffffffffff, 0xfff}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r0, 0xffffffffffffffff}, &(0x7f0000000600), &(0x7f00000001c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffd}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0xd0}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r2}, 0xc) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c00000046000701fefffffffcdbdf2504"], 0x1c}}, 0xc000) perf_event_open(0x0, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x1, 0x106) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1947}, 0x0, 0x0, 0x0, 0x8, 0x402, 0x7fffffff, 0x1, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffbfffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = socket$kcm(0xa, 0x2, 0x0) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNDETACHFILTER(r6, 0x401054d6, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_crypto(r5, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@delrng={0x10, 0x14, 0x2, 0x70bd26, 0x25dfdbfd, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8015}, 0x20000010) sendmsg$nl_generic(r3, &(0x7f0000001840)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001800)={&(0x7f0000003a40)={0x12f4, 0x33, 0x725, 0x70bd28, 0x25dfdbfb, {0xe}, [@nested={0x1db, 0x134, 0x0, 0x1, [@generic="b5a007d5ee341e0771a8dc4df85982", @nested={0x4, 0x4b}, @typed={0xe, 0x55, 0x0, 0x0, @str='syzkaller\x00'}, @nested={0x1b4, 0x10a, 0x0, 0x1, [@generic="727cd28eb29c5ab56352df338b99e29bba0da5fe0f4ca252055ca1e31047099fa3642e26d6e4aa7ad04566e4e68df73796f3e7e150ec3ccfa7a91675733f2f03348c6d025fc1e9ea82071b61f4559a63cb9f51606c36e7ca647174810db02ea8b8c5adccddf307ffa537c76a6316f724db2cf162487208ddb40799a944f3116fb58fef5134236a66694eb6a4aecd1158eb86b9ed841a14c7d5ef4dc5138314fefb16df5ef58a62779bcf2cc9e2fc21256840fa366bf0ed8c682682ca", @generic="aa6649acfdadbcbdf3d1e6103a6c7eee71d242b77706b2c80f262093fcce52007d1245dbad5fb6cc1a8bdc2bdeb9c29964ff719e768fee7ae82ccda3c8ef1c1c727725583fd13f9753b5d78007ddee6d52135953f793dd6cf9163def967d3498b7d2f1d2f2f552350b358102c5877d550618f9ea8fef664fe01ee392076671f87d37ea810ac6174b0c17f154078df420afd2e8dc3261f3933467b5bf64d0432cd2c88b6e087c08e61b2a8319b5b10390eed654334329903d15b4595216a01c8607f6dc678d3f01284a5f8948c1d5a824c9a65640689b0e89edebc452fcf75da394d852dcaddec5626847db1c27690a40828494d3"]}]}, @typed={0x1004, 0x13c, 0x0, 0x0, @binary="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"}, @typed={0x8, 0xd1, 0x0, 0x0, @pid}, @generic="43e868e27ba623a46c0dfd79568660c98f6b35a4124da1828a6a85ff548d23e4c75ed0474aaaf11780e07fceb450c45f93d24b7c33b7486e4ed73864c0cfb71c9bb034601fa84030f6dfc02d9b6e955db3490db4b41a4f36b87010d2013a9cdcb9b54281d541272c6330b837a0b1784ada6683845b034553afd6827f6755f3f141475380052cdaa4f6bd6d8598bc23dc87fb21b1f0f6ac0680fc75b98fd2e48677c1796c9e1e8c49a0f91e9ded8bd645d8e1c15371e5405faaea996279e8d69423bc5562e5f50cf2877f8c4458789603abc285c2dcbd30246669f939034856f1de6e3f16e0cb6d155eed6de69d63a8f51afe9d169696"]}, 0x12f4}, 0x1, 0x0, 0x0, 0x200000c0}, 0x881) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r10 = socket$kcm(0x11, 0x2, 0x300) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$tipc(r11, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) recvmsg(r10, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000b80)=""/4096, 0x1000}], 0x8}, 0x0) sendmsg$NFT_BATCH(r9, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000940)={{0x14}, [@NFT_MSG_NEWRULE={0x78, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x4c, 0x4, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, @socket={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_SOCKET_KEY={0x8, 0x1, 0x1, 0x0, 0x2}]}}}, {0x24, 0x1, 0x0, 0x1, @queue={{0xa}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_QUEUE_SREG_QNUM={0x8, 0x4, 0x1, 0x0, 0x10}, @NFTA_QUEUE_FLAGS={0x6}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0xa0}}, 0x0) sendmsg$NFULNL_MSG_CONFIG(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2c, 0x1, 0x4, 0x5, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0x7f}, @NFULA_CFG_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x45}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x8000) sendmsg$nl_generic(r7, 0x0, 0x404c0c4) 50.746702284s ago: executing program 9 (id=8948): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x2426f2ea, 0x6ee}, 0x100, 0x0, 0x0, 0x6, 0x1, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0x4040c04) ioctl$TUNGETVNETLE(r0, 0x40107447, &(0x7f0000000180)) 50.648025039s ago: executing program 46 (id=8915): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xa}, 0x114244, 0x0, 0xafe8, 0x4, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x9c, 0x4, 0x4, 0x8, 0x0, 0x1f, 0x80208, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x800, 0x2, @perf_config_ext={0x8, 0x2}, 0x4, 0x7f, 0x7, 0x3, 0xffff, 0x3, 0xfffa, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x1) r2 = socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x1}, 0x1000, 0x2, 0xffffff7e, 0x8, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1000000000000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0xb701, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10002) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x40088d5) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = socket$kcm(0x23, 0x5, 0x0) close(r3) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d030100000000009500000c000000006926000000000000bf67000000000000150600000fff070067060000200000006a0200000ee60000bf050000000000003d350000000000006507000002000000070700004a0000000f75000000000000bf54000000000000070400000400f9ff4e53010000000000840400000000000073720000000000009500000000000000db13d5d8b741f2cdaabc8383caf56b8c2b84a8d09535a1574aefc97d8addaa65b925cd3ded25b8b9e2a095d2c51ef45c5588ec78c7f32946b17cecfe54c53ab530c58b67851b7e0e82452a083b98a6aa766401047d150203b0417edef332233b081df18961d6822d133bf73b18e509402a4de1c2ea17f04537fc211576846ac629d1d93265ba474580047a9dc88de358ce795731891a2031de4e09740c64e5306f991ed4785a9773a433e0db9c1a7d4ab9d658ce9cfdb4db3bed62bcb2bc91ddcdfac2e6d4421c49fb6641cbf56914e76702f673b586c767562a90a3967093b000e3806f825f1d0da2a304e06543b56d35235d78b7a7fe912971aab876022e96f5143b6234f5a6b701690b07fb664a44e22b72e843e7cf55f394cf75d1cd3ee79a25fb98cc45b3fde43e42e150d4a2fddd9a9767748ca3522443097c55dc97c09d38485b18ad2cff787338bab324336f50c97b751f2ed2c4281858b428d1b2c1194b06f9bb7ffcc95c1bcf"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4e}, 0x48) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x81}, 0x20000080) sendmsg$kcm(r2, 0x0, 0x0) 50.620720742s ago: executing program 1 (id=8950): socket$kcm(0x10, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0x0, 0x40009060}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1080a2, 0x0, 0x6, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[], 0x50) socket$kcm(0x10, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0x60}, 0x1, 0x0, 0x0, 0x2002c0c4}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000680)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x60}, 0x94) r2 = socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000005c0)=@newqdisc={0x24, 0x24, 0xf0b, 0x70bd2e, 0x0, {0x0, 0x0, 0x12, 0x0, {}, {0xffff, 0xffff}, {0x2}}}, 0x24}, 0x1, 0x0, 0x0, 0x8004001}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b40)={0x0, &(0x7f0000000dc0)=""/209, 0x0, 0xd1, 0x0, 0x5}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x3, 0x0, &(0x7f00000002c0)='syzkaller\x00'}, 0x94) perf_event_open(0x0, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x8) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)={0x18, 0x32, 0x107, 0xfffffffe, 0x25dfdbfc, {0x4, 0x7c}, [@nested={0x4, 0x1}]}, 0x18}, 0x1, 0x0, 0x0, 0x240080d1}, 0x8010) socket$kcm(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2005d33, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x274, 0xff}, 0x0, 0x6, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)="d8000000310081044e81f782db44b904021d080005000000e8fe55a1180015000600142603600e12090021000000", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f375ffff86dd6317ce62070000000000000000431ccaf57b00000000000000000104"], 0xfe1b) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x7, 0xc, 0xff, 0xe, 0x0, 0x4, 0x98004, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0xfffffffffffffffc, 0x5}, 0x0, 0x6172, 0x2, 0x4, 0x7, 0x4, 0x7f, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xf) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="851000000000000018100000", @ANYRES32, @ANYBLOB="f0f605748aed0000000000000c00000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) 50.386642222s ago: executing program 2 (id=8951): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x142, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x9, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x122}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r6, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 50.327415665s ago: executing program 3 (id=8952): r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000001f00)="89000000120081ae08060cdc030000017f03e3f7000000006ee2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c0001000c080c00bdad0140310068ad639a8ace8680210bc28b805508bc7a46e39a8285dcdf12176679df06", 0x78}], 0x1}, 0xff0f000020000080) socket$kcm(0x11, 0x200000000000002, 0x300) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500), 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) socket$key(0xf, 0x3, 0x2) 50.064062734s ago: executing program 3 (id=8953): close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x40002000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x20000000, '\x00', 0x0, 0x0}, 0x50) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x5, 0x9, 0x0, 0x1, 0x1c}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x8}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x7}, {}, {}, {}, {0x18, 0x8, 0x2, 0x0, r3}, {}, {0x46, 0x0, 0x0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x5, 0x0, 0xb, 0x8}, {0x85, 0x0, 0x0, 0x42}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x1ff, 0x4, 0x0, 0x4, 0x0, 0xdffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = socket$kcm(0x2d, 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000000c0)}], 0x1, 0x0, 0x0, 0x1f000000}, 0x600) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000340)={r5}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r6, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r6, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000ee7332d7a1dcd70173990a22a64c6d7e3566c9011083193fd2fc98e4a2219ae902a9eaa01fe0d7e0f0a5692f8efbeb72a69ba650ca1d00c028d0326457c340e2798b3fec508f0ec3234ea34e9fc894e923606dec568832777d8e0500000000000000000000000000000080"], &(0x7f00000007c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x40, '\x00', r7, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110e22fff6) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000180)}], 0x1}, 0x0) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x4008744b, &(0x7f0000000180)) 50.021410408s ago: executing program 1 (id=8954): bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1000000004000000080000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000f3000000000000000000000000000000005afbf5b7"], 0x50) socketpair(0x18, 0x1, 0xf, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8b35, &(0x7f0000000080)={'wlan1\x00', @random="02000000000a"}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc010}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpid() bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ceb71c0010ec90db133c22a690ae70800000000000"], 0xfe1b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=@raw=[@func, @map_fd, @exit, @jmp={0x5, 0x0, 0x4}], 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000000)=ANY=[], &(0x7f0000000840)='syzkaller\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 49.687645246s ago: executing program 2 (id=8955): socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0xc}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xa}, 0x114244, 0x0, 0xafe8, 0x4, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x2000000830d}, 0x100, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="18000000000000000000000000000000711263000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x989046, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x40, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x3c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000780)={0x2, 0x80, 0xb, 0x5, 0xff, 0xf, 0x0, 0x7, 0x4010, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000740), 0x9}, 0x5888, 0x7342b635, 0x100, 0x4, 0x4e, 0xff, 0x2, 0x0, 0x80, 0x0, 0x9}, 0x0, 0xe, r0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newqdisc={0x5c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x9, 0x1}, {0x7}, {0xe, 0xd}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x401}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x491, 0x0, 0x0, 0x0, 0x8, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}, @TCA_INGRESS_BLOCK={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x90}, 0x4000c00) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0x3, &(0x7f0000000140)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x61, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x100}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r3, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa2, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0xfc, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x8, 0x0, r3, 0x10000, '\x00', r4, r5}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000700), 0xc}, 0x0, 0x2, 0x0, 0x9, 0x0, 0x3}, 0x0, 0x8, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) 49.407505885s ago: executing program 1 (id=8956): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xa}, 0x114244, 0x0, 0xafe8, 0x4, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x7fffffff, 0xb}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfe33) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=@updpolicy={0xb8, 0x19, 0x1, 0x70bd2d, 0x0, {{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xc, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xa00, 0x407ffffffffffe, 0x800000000000002}, 0x0, 0x0, 0x1, 0x0, 0x6}}, 0xb8}}, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@in6={0xa, 0x4e24, 0xff, @remote, 0x9}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000080)="1b", 0x1}], 0x1, &(0x7f00000001c0)=[@dstaddrv4={0x18, 0x84, 0x7, @loopback}, @dstaddrv4={0x18, 0x84, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x30, 0x44814}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x22000044) socket$netlink(0x10, 0x3, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, 0x0, 0xd11, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x84}, 0x4040010) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r4, &(0x7f0000000100), 0x0}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000d40)={0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000b00)={0x0, 0xf22fff7f, &(0x7f0000000180)=[{&(0x7f0000000080)="31de76fb398bc62d058b8a96924594f5476a0824be53f7a5949f80614c42391e4b80412938c955d34d37eb96ba7849c3eb823bb36724bd6f6d0219cfe5c884afcd2bdea5acf9c877c03dcdbbb3e47417b6707c27d4c5c1db1924071f6b6f23c7d199c799c9b0c41101e625fcdb7bbfd12a3eeeef4540a5698f058aaf6a141e5d333929b92a7f64e925bf0ef424c3ef29fcd5fd4721c547fde6abe4d47048b64511693624b0d786711abe4a66e250fcbfe95ac9037e58f331b26b6ed0d08e5c73ba4c49", 0xc00e}], 0x9, &(0x7f00000001c0)=[@ip_tos_int={{0x7ff4d4260000}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}, @ip_tos_u8={{0x11, 0x2}}, @ip_retopts={{0x0, 0x0, 0x7, {[@lsrr, @generic={0x0, 0x0, "96"}, @generic={0x0, 0x0, "206a77bdd1a004129054e7704a"}]}}}], 0xf}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000000c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWRULE={0x40, 0x6, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0xfffe}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_EXPRESSIONS={0x14, 0x4, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @xfrm={{0x9}, @void}}]}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x14, 0x1, 0x0, 0x0, {0x1}}}, 0x68}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000840) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r6) perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x9c, 0x4, 0x4, 0x8, 0x0, 0x1f, 0x80208, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x800, 0x2, @perf_config_ext={0x8, 0x2}, 0x4, 0x7f, 0x7, 0x3, 0xffff, 0x3, 0xfffa, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x1) socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x1}, 0x1000, 0x2, 0xffffff7e, 0x8, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1000000000000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0xb701, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 49.334153606s ago: executing program 9 (id=8957): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x8, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x4}, 0x50) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x1ff, 0x4, 0x0, 0x4, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001800010324bd7002fadbdfdd4a"], 0x14}}, 0x8854) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x3, 0xb, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0x75, 0x0, 0x0, 0x0, 0x40002}, [@printk={@li}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x100000}, 0x94) r3 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="33fe00004a00530c8e5eb88edc5a9c0e0a9b80"], 0xfe33) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfe33) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff000000000200000009000100"], 0x7c}}, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9e, 0x9e, 0x4, [@typedef={0x5, 0x0, 0x0, 0x8, 0x1}, @fwd={0x7}, @datasec={0x1, 0x5, 0x0, 0xf, 0x2, [{0x3, 0x0, 0x7f}, {0x1, 0x6, 0x2}, {0x3, 0x101, 0x400}, {0x3, 0xc, 0xf6}, {0x4, 0x0, 0x40}], "6312"}, @enum64={0xa, 0x2, 0x0, 0x13, 0x0, 0x8, [{0xb, 0x5, 0x1ff}, {0xc, 0x4, 0x8}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3, 0xffffffff}}]}, {0x0, [0x30, 0x2e]}}, &(0x7f0000000800)=""/238, 0xbc, 0xee, 0x1, 0x3, 0x10000}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_tracing={0x1a, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7}, [@map_idx={0x18, 0x3, 0x5, 0x0, 0x3}]}, &(0x7f00000004c0)='GPL\x00', 0xb, 0x0, 0x0, 0x41100, 0x11, '\x00', 0x0, 0xa, r5, 0x8, &(0x7f0000000940)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x80000000}, 0x10, 0x50a0, 0xffffffffffffffff, 0x1, &(0x7f00000009c0)=[r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0], &(0x7f0000000a00)=[{0x0, 0x2, 0x8, 0x7}], 0x10, 0x3}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000001a00)={0x2, 0x3, 0x0, 0x7, 0xa, 0x0, 0x700, 0x0, [@sadb_x_policy={0x8, 0x12, 0x4, 0x1, 0x0, 0x0, 0x3, {0x6, 0xff, 0x8e, 0x8, 0x0, 0x1, 0x0, @in6=@private0, @in=@rand_addr=0x64010100}}]}, 0x50}, 0x1, 0x7}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="18020000b05d07000000000000000080000085000000750006009500009080e62db5a15d6f3790424e38e235540000100000"], 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x8}, 0x94) r8 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x200400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x1a4e, 0x0, 0x0, 0x7, 0x0, 0xbfff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe69, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) sendmsg$unix(r6, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x24004044) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) 0s ago: executing program 47 (id=8956): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xa}, 0x114244, 0x0, 0xafe8, 0x4, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x0, 0x8, 0x7fff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x7fffffff, 0xb}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfe33) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=@updpolicy={0xb8, 0x19, 0x1, 0x70bd2d, 0x0, {{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xc, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xa00, 0x407ffffffffffe, 0x800000000000002}, 0x0, 0x0, 0x1, 0x0, 0x6}}, 0xb8}}, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@in6={0xa, 0x4e24, 0xff, @remote, 0x9}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000080)="1b", 0x1}], 0x1, &(0x7f00000001c0)=[@dstaddrv4={0x18, 0x84, 0x7, @loopback}, @dstaddrv4={0x18, 0x84, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x30, 0x44814}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x22000044) socket$netlink(0x10, 0x3, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, 0x0, 0xd11, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x84}, 0x4040010) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r4, &(0x7f0000000100), 0x0}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000d40)={0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000b00)={0x0, 0xf22fff7f, &(0x7f0000000180)=[{&(0x7f0000000080)="31de76fb398bc62d058b8a96924594f5476a0824be53f7a5949f80614c42391e4b80412938c955d34d37eb96ba7849c3eb823bb36724bd6f6d0219cfe5c884afcd2bdea5acf9c877c03dcdbbb3e47417b6707c27d4c5c1db1924071f6b6f23c7d199c799c9b0c41101e625fcdb7bbfd12a3eeeef4540a5698f058aaf6a141e5d333929b92a7f64e925bf0ef424c3ef29fcd5fd4721c547fde6abe4d47048b64511693624b0d786711abe4a66e250fcbfe95ac9037e58f331b26b6ed0d08e5c73ba4c49", 0xc00e}], 0x9, &(0x7f00000001c0)=[@ip_tos_int={{0x7ff4d4260000}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}, @ip_tos_u8={{0x11, 0x2}}, @ip_retopts={{0x0, 0x0, 0x7, {[@lsrr, @generic={0x0, 0x0, "96"}, @generic={0x0, 0x0, "206a77bdd1a004129054e7704a"}]}}}], 0xf}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000000c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWRULE={0x40, 0x6, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0xfffe}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_EXPRESSIONS={0x14, 0x4, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @xfrm={{0x9}, @void}}]}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x14, 0x1, 0x0, 0x0, {0x1}}}, 0x68}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000840) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r6) perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x9c, 0x4, 0x4, 0x8, 0x0, 0x1f, 0x80208, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x800, 0x2, @perf_config_ext={0x8, 0x2}, 0x4, 0x7f, 0x7, 0x3, 0xffff, 0x3, 0xfffa, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x9, r0, 0x1) socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x1}, 0x1000, 0x2, 0xffffff7e, 0x8, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1000000000000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0xb701, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) kernel console output (not intermixed with test programs): o 1000 [ 1328.457052][ T1352] netlink: 65035 bytes leftover after parsing attributes in process `syz.7.8298'. [ 1328.986495][ T1332] infiniband syz2: set active [ 1328.992208][T22265] lo speed is unknown, defaulting to 1000 [ 1328.998190][ T1332] infiniband syz2: added lo [ 1329.011097][ T1332] workqueue: Failed to create a rescuer kthread for wq "ib_mad1": -EINTR [ 1329.016868][ T1332] infiniband syz2: Couldn't open port 1 [ 1329.031158][ T1332] smbdirect: ib_dev[syz2]: added: IB_CA max_fast_reg_page_list_len=512 device_cap_flags=0x1c001223c76 kernel_cap_flags=0x14 page_size_cap=0xfffff000 [ 1329.055814][ T1332] smbdirect: ib_dev[syz2]: num_ports=1 max_qp_rd_atom=128 max_qp_init_rd_atom=128 max_sgl_rd=0 max_sge_rd=32 max_cqe=32767 max_qp_wr=1048576 max_send_sge=32 max_recv_sge=32 [ 1329.073235][ T1332] smbdirect: ib_dev[syz2]PORT[1]: iwarp=0 ib=0 roce=1 v1=0 v2=1 core_cap_flags=0x803005 [ 1329.157682][ T1332] RDS/IB: syz2: added [ 1329.170575][ T1332] smc: adding ib device syz2 with port count 1 [ 1329.186131][ T1332] smc: ib device syz2 port 1 has no pnetid [ 1329.202440][ T5828] lo speed is unknown, defaulting to 1000 [ 1329.234709][ T1332] lo speed is unknown, defaulting to 1000 [ 1330.134295][ T1332] lo speed is unknown, defaulting to 1000 [ 1330.264548][ T1395] __nla_validate_parse: 3 callbacks suppressed [ 1330.264568][ T1395] netlink: 8 bytes leftover after parsing attributes in process `syz.7.8315'. [ 1330.324319][ T1399] FAULT_INJECTION: forcing a failure. [ 1330.324319][ T1399] name failslab, interval 1, probability 0, space 0, times 0 [ 1330.366243][ T1399] CPU: 0 UID: 0 PID: 1399 Comm: syz.2.8317 Not tainted syzkaller #0 PREEMPT(full) [ 1330.366268][ T1399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1330.366279][ T1399] Call Trace: [ 1330.366289][ T1399] [ 1330.366299][ T1399] dump_stack_lvl+0xe8/0x150 [ 1330.366341][ T1399] should_fail_ex+0x412/0x560 [ 1330.366396][ T1399] should_failslab+0xa8/0x100 [ 1330.366430][ T1399] __kmalloc_noprof+0xe8/0x760 [ 1330.366457][ T1399] ? tomoyo_encode+0x28b/0x550 [ 1330.366499][ T1399] tomoyo_encode+0x28b/0x550 [ 1330.366546][ T1399] tomoyo_realpath_from_path+0x58d/0x5d0 [ 1330.366582][ T1399] ? tomoyo_domain+0xd7/0x130 [ 1330.366626][ T1399] ? tomoyo_path_number_perm+0x219/0x630 [ 1330.366655][ T1399] tomoyo_path_number_perm+0x246/0x630 [ 1330.366691][ T1399] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 1330.366719][ T1399] ? perf_trace_run_bpf_submit+0xee/0x170 [ 1330.366844][ T1399] ? __fget_files+0x2a/0x420 [ 1330.366882][ T1399] ? __fget_files+0x2a/0x420 [ 1330.366909][ T1399] ? __fget_files+0x3a0/0x420 [ 1330.366936][ T1399] ? __fget_files+0x2a/0x420 [ 1330.366977][ T1399] security_file_ioctl+0xc3/0x2a0 [ 1330.367010][ T1399] __se_sys_ioctl+0x47/0x170 [ 1330.367036][ T1399] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1330.367061][ T1399] do_syscall_64+0x15f/0xf80 [ 1330.367085][ T1399] ? trace_irq_disable+0x3b/0x140 [ 1330.367113][ T1399] ? clear_bhb_loop+0x40/0x90 [ 1330.367148][ T1399] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1330.367165][ T1399] RIP: 0033:0x7f3916b9cdd9 [ 1330.367187][ T1399] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1330.367205][ T1399] RSP: 002b:00007f3917a61028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1330.367224][ T1399] RAX: ffffffffffffffda RBX: 00007f3916e15fa0 RCX: 00007f3916b9cdd9 [ 1330.367238][ T1399] RDX: 0000200000000080 RSI: 00000000000089a0 RDI: 0000000000000005 [ 1330.367251][ T1399] RBP: 00007f3917a61090 R08: 0000000000000000 R09: 0000000000000000 [ 1330.367263][ T1399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1330.367274][ T1399] R13: 00007f3916e16038 R14: 00007f3916e15fa0 R15: 00007fff42d77158 [ 1330.367340][ T1399] [ 1330.369024][ T1399] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1331.058644][ T1332] lo speed is unknown, defaulting to 1000 [ 1331.152505][ T1419] netlink: 16 bytes leftover after parsing attributes in process `syz.3.8325'. [ 1331.461643][ T1332] lo speed is unknown, defaulting to 1000 [ 1331.768757][ T1332] lo speed is unknown, defaulting to 1000 [ 1332.294111][ T1332] lo speed is unknown, defaulting to 1000 [ 1332.323072][ T1447] netlink: 12 bytes leftover after parsing attributes in process `syz.1.8335'. [ 1332.485740][ T1453] netlink: 16 bytes leftover after parsing attributes in process `syz.7.8337'. [ 1332.642832][ T1457] netlink: 12 bytes leftover after parsing attributes in process `syz.3.8340'. [ 1332.712466][ T1457] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8340'. [ 1333.441111][ T1480] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8348'. [ 1333.488404][ T1480] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8348'. [ 1333.537770][ T1482] netlink: 12 bytes leftover after parsing attributes in process `syz.7.8349'. [ 1333.745751][ T1489] netlink: 16 bytes leftover after parsing attributes in process `syz.1.8351'. [ 1335.653106][ T1536] __nla_validate_parse: 6 callbacks suppressed [ 1335.653128][ T1536] netlink: 8 bytes leftover after parsing attributes in process `syz.9.8371'. [ 1336.098663][ T1575] netlink: 12 bytes leftover after parsing attributes in process `syz.7.8383'. [ 1336.128766][ T1575] netlink: 8 bytes leftover after parsing attributes in process `syz.7.8383'. [ 1336.274285][ T1582] ªªªªª6: renamed from wg2 (while UP) [ 1336.580342][ T1596] netlink: 4 bytes leftover after parsing attributes in process `syz.9.8393'. [ 1337.006815][ T1608] gretap0 speed is unknown, defaulting to 1000 [ 1337.053521][ T1608] lo speed is unknown, defaulting to 1000 [ 1337.263837][ T1625] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8400'. [ 1338.023677][ T1652] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8409'. [ 1338.732665][ T1670] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8417'. [ 1339.037416][ T1684] netlink: 12 bytes leftover after parsing attributes in process `syz.3.8421'. [ 1339.098446][ T1684] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8421'. [ 1339.790951][ T1686] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8423'. [ 1340.675759][ T1728] __nla_validate_parse: 3 callbacks suppressed [ 1340.675797][ T1728] netlink: 12 bytes leftover after parsing attributes in process `syz.3.8437'. [ 1340.846287][ T1735] netlink: 60 bytes leftover after parsing attributes in process `syz.7.8440'. [ 1341.197847][ T1749] netlink: 12 bytes leftover after parsing attributes in process `syz.1.8447'. [ 1341.265695][ T1749] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8447'. [ 1341.518649][ T1762] netlink: 12 bytes leftover after parsing attributes in process `syz.9.8452'. [ 1341.573137][ T1758] netlink: 16 bytes leftover after parsing attributes in process `syz.2.8450'. [ 1341.596345][ T1762] netlink: 8 bytes leftover after parsing attributes in process `syz.9.8452'. [ 1341.998181][ T1770] netlink: 56 bytes leftover after parsing attributes in process `syz.7.8455'. [ 1342.028974][ T1785] netlink: 12 bytes leftover after parsing attributes in process `syz.9.8460'. [ 1342.080991][ T1785] netlink: 8 bytes leftover after parsing attributes in process `syz.9.8460'. [ 1343.247463][ T1830] FAULT_INJECTION: forcing a failure. [ 1343.247463][ T1830] name failslab, interval 1, probability 0, space 0, times 0 [ 1343.271702][ T1830] CPU: 1 UID: 0 PID: 1830 Comm: syz.3.8476 Not tainted syzkaller #0 PREEMPT(full) [ 1343.271728][ T1830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1343.271740][ T1830] Call Trace: [ 1343.271747][ T1830] [ 1343.271755][ T1830] dump_stack_lvl+0xe8/0x150 [ 1343.271788][ T1830] should_fail_ex+0x412/0x560 [ 1343.271818][ T1830] should_failslab+0xa8/0x100 [ 1343.271843][ T1830] __kmalloc_noprof+0xe8/0x760 [ 1343.271867][ T1830] ? bpf_test_init+0x9f/0x150 [ 1343.271897][ T1830] bpf_test_init+0x9f/0x150 [ 1343.271926][ T1830] bpf_prog_test_run_xdp+0x529/0x1160 [ 1343.271959][ T1830] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 1343.271982][ T1830] ? __fget_files+0x2a/0x420 [ 1343.272013][ T1830] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 1343.272032][ T1830] bpf_prog_test_run+0x2c7/0x340 [ 1343.272059][ T1830] __sys_bpf+0x643/0x950 [ 1343.272083][ T1830] ? __pfx___sys_bpf+0x10/0x10 [ 1343.272116][ T1830] ? ksys_write+0x242/0x270 [ 1343.272136][ T1830] ? __pfx_ksys_write+0x10/0x10 [ 1343.272157][ T1830] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1343.272176][ T1830] __x64_sys_bpf+0x7c/0x90 [ 1343.272196][ T1830] do_syscall_64+0x15f/0xf80 [ 1343.272218][ T1830] ? trace_irq_disable+0x3b/0x140 [ 1343.272239][ T1830] ? clear_bhb_loop+0x40/0x90 [ 1343.272261][ T1830] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1343.272279][ T1830] RIP: 0033:0x7f4cc2f9cdd9 [ 1343.272296][ T1830] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1343.272311][ T1830] RSP: 002b:00007f4cc11f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1343.272330][ T1830] RAX: ffffffffffffffda RBX: 00007f4cc3215fa0 RCX: 00007f4cc2f9cdd9 [ 1343.272343][ T1830] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 1343.272354][ T1830] RBP: 00007f4cc11f6090 R08: 0000000000000000 R09: 0000000000000000 [ 1343.272365][ T1830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1343.272375][ T1830] R13: 00007f4cc3216038 R14: 00007f4cc3215fa0 R15: 00007ffcb355e738 [ 1343.272403][ T1830] [ 1343.545723][ T1838] FAULT_INJECTION: forcing a failure. [ 1343.545723][ T1838] name failslab, interval 1, probability 0, space 0, times 0 [ 1343.561417][ T1838] CPU: 0 UID: 0 PID: 1838 Comm: syz.7.8478 Not tainted syzkaller #0 PREEMPT(full) [ 1343.561436][ T1838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1343.561442][ T1838] Call Trace: [ 1343.561447][ T1838] [ 1343.561453][ T1838] dump_stack_lvl+0xe8/0x150 [ 1343.561481][ T1838] should_fail_ex+0x412/0x560 [ 1343.561500][ T1838] should_failslab+0xa8/0x100 [ 1343.561515][ T1838] __kmalloc_noprof+0xe8/0x760 [ 1343.561527][ T1838] ? bpf_test_init+0x9f/0x150 [ 1343.561543][ T1838] ? __lock_acquire+0x6b5/0x2cf0 [ 1343.561561][ T1838] bpf_test_init+0x9f/0x150 [ 1343.561578][ T1838] bpf_prog_test_run_skb+0x392/0x2260 [ 1343.561592][ T1838] ? bpf_prog_test_run_skb+0x1e1/0x2260 [ 1343.561617][ T1838] ? __fget_files+0x3a0/0x420 [ 1343.561632][ T1838] ? __fget_files+0x2a/0x420 [ 1343.561649][ T1838] ? __pfx_bpf_prog_test_run_skb+0x10/0x10 [ 1343.561664][ T1838] bpf_prog_test_run+0x2c7/0x340 [ 1343.561681][ T1838] __sys_bpf+0x643/0x950 [ 1343.561696][ T1838] ? __pfx___sys_bpf+0x10/0x10 [ 1343.561716][ T1838] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1343.561730][ T1838] ? ksys_write+0x242/0x270 [ 1343.561742][ T1838] ? __pfx_ksys_write+0x10/0x10 [ 1343.561755][ T1838] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1343.561767][ T1838] __x64_sys_bpf+0x7c/0x90 [ 1343.561779][ T1838] do_syscall_64+0x15f/0xf80 [ 1343.561793][ T1838] ? trace_irq_disable+0x3b/0x140 [ 1343.561805][ T1838] ? clear_bhb_loop+0x40/0x90 [ 1343.561818][ T1838] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1343.561828][ T1838] RIP: 0033:0x7f79c199cdd9 [ 1343.561839][ T1838] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1343.561853][ T1838] RSP: 002b:00007f79c28f9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1343.561865][ T1838] RAX: ffffffffffffffda RBX: 00007f79c1c15fa0 RCX: 00007f79c199cdd9 [ 1343.561873][ T1838] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 1343.561879][ T1838] RBP: 00007f79c28f9090 R08: 0000000000000000 R09: 0000000000000000 [ 1343.561886][ T1838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1343.561892][ T1838] R13: 00007f79c1c16038 R14: 00007f79c1c15fa0 R15: 00007ffc9e064a38 [ 1343.561907][ T1838] [ 1345.751325][ T1897] netlink: 'syz.1.8506': attribute type 29 has an invalid length. [ 1346.279340][ T1916] __nla_validate_parse: 17 callbacks suppressed [ 1346.279363][ T1916] netlink: 8 bytes leftover after parsing attributes in process `syz.7.8514'. [ 1346.445333][ T1922] netlink: 64011 bytes leftover after parsing attributes in process `syz.9.8513'. [ 1346.603490][ T1929] netlink: 12 bytes leftover after parsing attributes in process `syz.3.8517'. [ 1346.646026][ T1929] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8517'. [ 1347.295384][ T1955] netlink: 12 bytes leftover after parsing attributes in process `syz.7.8526'. [ 1348.349343][ T1972] FAULT_INJECTION: forcing a failure. [ 1348.349343][ T1972] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1348.425514][ T1976] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8533'. [ 1348.428448][ T1972] CPU: 0 UID: 0 PID: 1972 Comm: syz.7.8529 Not tainted syzkaller #0 PREEMPT(full) [ 1348.428474][ T1972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1348.428485][ T1972] Call Trace: [ 1348.428493][ T1972] [ 1348.428501][ T1972] dump_stack_lvl+0xe8/0x150 [ 1348.428533][ T1972] should_fail_ex+0x412/0x560 [ 1348.428562][ T1972] _copy_from_user+0x2d/0xb0 [ 1348.428589][ T1972] sctp_setsockopt+0x1c4/0x12c0 [ 1348.428613][ T1972] ? sock_common_setsockopt+0x36/0xc0 [ 1348.428637][ T1972] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 1348.428666][ T1972] do_sock_setsockopt+0x17c/0x1b0 [ 1348.428690][ T1972] __x64_sys_setsockopt+0x13d/0x1b0 [ 1348.428710][ T1972] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1348.428729][ T1972] do_syscall_64+0x15f/0xf80 [ 1348.428750][ T1972] ? trace_irq_disable+0x3b/0x140 [ 1348.428774][ T1972] ? clear_bhb_loop+0x40/0x90 [ 1348.428795][ T1972] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1348.428813][ T1972] RIP: 0033:0x7f79c199cdd9 [ 1348.428830][ T1972] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1348.428845][ T1972] RSP: 002b:00007f79c28d8028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1348.428865][ T1972] RAX: ffffffffffffffda RBX: 00007f79c1c16090 RCX: 00007f79c199cdd9 [ 1348.428878][ T1972] RDX: 0000000000000025 RSI: 0000000000000084 RDI: 0000000000000003 [ 1348.428890][ T1972] RBP: 00007f79c28d8090 R08: 0000000020000010 R09: 0000000000000000 [ 1348.428902][ T1972] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1348.428914][ T1972] R13: 00007f79c1c16128 R14: 00007f79c1c16090 R15: 00007ffc9e064a38 [ 1348.428942][ T1972] [ 1348.662319][ T1976] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8533'. [ 1349.051894][ T1996] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8540'. [ 1349.275996][ T2006] netlink: 'syz.3.8545': attribute type 16 has an invalid length. [ 1349.297641][ T2006] netlink: 'syz.3.8545': attribute type 17 has an invalid length. [ 1349.809843][T28422] Bluetooth: hci5: Unable to find connection for big 0x00 [ 1349.945968][ T2006] bridge0: port 2(bridge_slave_1) entered disabled state [ 1349.955235][ T2006] bridge0: port 1(bridge_slave_0) entered disabled state [ 1350.322110][ T2021] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8549'. [ 1350.348662][ T2006] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1350.368333][ T2006] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1350.582673][ T2008] netlink: 'syz.9.8546': attribute type 29 has an invalid length. [ 1350.663463][ T2034] netlink: 12 bytes leftover after parsing attributes in process `syz.9.8552'. [ 1350.677864][ T9608] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1350.699652][ T9608] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1350.711197][ T9608] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1350.745841][ T9608] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1350.775924][ T2009] gretap0 speed is unknown, defaulting to 1000 [ 1350.813093][ T2009] lo speed is unknown, defaulting to 1000 [ 1351.641538][ T2050] __nla_validate_parse: 1 callbacks suppressed [ 1351.641557][ T2050] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8557'. [ 1351.829617][ T2067] netlink: 28 bytes leftover after parsing attributes in process `syz.9.8560'. [ 1351.979333][ T2078] netlink: 8 bytes leftover after parsing attributes in process `syz.7.8564'. [ 1352.232653][ T2086] netlink: 12 bytes leftover after parsing attributes in process `syz.1.8566'. [ 1352.253972][ T2086] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8566'. [ 1352.621003][ T2093] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8569'. [ 1353.263888][ T2120] netlink: 8 bytes leftover after parsing attributes in process `syz.9.8579'. [ 1353.415073][ T2126] netlink: 12 bytes leftover after parsing attributes in process `syz.3.8581'. [ 1353.444076][ T2126] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8581'. [ 1353.706822][ T2140] netlink: 'syz.2.8583': attribute type 46 has an invalid length. [ 1353.773576][ T2144] openvswitch: netlink: nsh attr 73 is out of range max 3 [ 1353.775811][ T2140] netlink: 'syz.2.8583': attribute type 28 has an invalid length. [ 1353.828491][ T2147] netlink: 16 bytes leftover after parsing attributes in process `syz.3.8586'. [ 1354.241587][T28422] Bluetooth: hci0: ISO packet for unknown connection handle 0 [ 1354.437056][ T2171] netlink: 'syz.3.8594': attribute type 29 has an invalid length. [ 1354.457873][ T2171] netlink: 'syz.3.8594': attribute type 29 has an invalid length. [ 1355.434766][ T2206] C: renamed from team_slave_0 [ 1355.455543][ T2206] netlink: 'syz.3.8605': attribute type 8 has an invalid length. [ 1355.478582][ T2206] A link change request failed with some changes committed already. Interface C may have been left with an inconsistent configuration, please check. [ 1355.504159][ T2215] FAULT_INJECTION: forcing a failure. [ 1355.504159][ T2215] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1355.551069][ T2215] CPU: 1 UID: 0 PID: 2215 Comm: syz.2.8609 Not tainted syzkaller #0 PREEMPT(full) [ 1355.551095][ T2215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1355.551107][ T2215] Call Trace: [ 1355.551115][ T2215] [ 1355.551123][ T2215] dump_stack_lvl+0xe8/0x150 [ 1355.551154][ T2215] should_fail_ex+0x412/0x560 [ 1355.551184][ T2215] strncpy_from_user+0x36/0x2b0 [ 1355.551212][ T2215] do_getname+0x77/0x250 [ 1355.551242][ T2215] do_sys_openat2+0xca/0x200 [ 1355.551267][ T2215] ? lapic_next_event+0x11/0x20 [ 1355.551288][ T2215] ? __pfx_do_sys_openat2+0x10/0x10 [ 1355.551319][ T2215] ? irqentry_exit+0x6ba/0x730 [ 1355.551350][ T2215] __x64_sys_openat+0x138/0x170 [ 1355.551388][ T2215] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1355.551409][ T2215] do_syscall_64+0x15f/0xf80 [ 1355.551433][ T2215] ? clear_bhb_loop+0x40/0x90 [ 1355.551456][ T2215] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1355.551474][ T2215] RIP: 0033:0x7f3916b9cdd9 [ 1355.551493][ T2215] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1355.551509][ T2215] RSP: 002b:00007f3917a61028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1355.551528][ T2215] RAX: ffffffffffffffda RBX: 00007f3916e15fa0 RCX: 00007f3916b9cdd9 [ 1355.551542][ T2215] RDX: 000000000000275a RSI: 0000200000000040 RDI: 0000000000000008 [ 1355.551552][ T2215] RBP: 00007f3917a61090 R08: 0000000000000000 R09: 0000000000000000 [ 1355.551563][ T2215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1355.551574][ T2215] R13: 00007f3916e16038 R14: 00007f3916e15fa0 R15: 00007fff42d77158 [ 1355.551612][ T2215] [ 1356.477160][ T2230] netlink: 'syz.7.8612': attribute type 29 has an invalid length. [ 1356.540517][ T2224] netlink: 'syz.7.8612': attribute type 29 has an invalid length. [ 1357.113571][ T2252] __nla_validate_parse: 8 callbacks suppressed [ 1357.113593][ T2252] netlink: 64011 bytes leftover after parsing attributes in process `syz.3.8623'. [ 1357.292071][ T2260] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8625'. [ 1357.308820][ T2261] netlink: 12 bytes leftover after parsing attributes in process `syz.3.8626'. [ 1357.345315][ T2261] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8626'. [ 1357.920962][ T2275] netlink: 'syz.9.8630': attribute type 29 has an invalid length. [ 1357.957676][ T2279] netlink: 12 bytes leftover after parsing attributes in process `syz.7.8632'. [ 1357.981200][ T2275] netlink: 'syz.9.8630': attribute type 29 has an invalid length. [ 1358.496164][ T2279] netlink: 8 bytes leftover after parsing attributes in process `syz.7.8632'. [ 1359.010129][ T2293] netlink: 64011 bytes leftover after parsing attributes in process `syz.2.8636'. [ 1359.858399][ T2301] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8639'. [ 1360.076688][ T2305] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8641'. [ 1360.215621][ T2305] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8641'. [ 1360.734604][ T2313] FAULT_INJECTION: forcing a failure. [ 1360.734604][ T2313] name failslab, interval 1, probability 0, space 0, times 0 [ 1360.794691][ T2313] CPU: 1 UID: 0 PID: 2313 Comm: syz.7.8644 Not tainted syzkaller #0 PREEMPT(full) [ 1360.794718][ T2313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1360.794735][ T2313] Call Trace: [ 1360.794750][ T2313] [ 1360.794773][ T2313] dump_stack_lvl+0xe8/0x150 [ 1360.794842][ T2313] should_fail_ex+0x412/0x560 [ 1360.794950][ T2313] should_failslab+0xa8/0x100 [ 1360.795012][ T2313] kmem_cache_alloc_node_noprof+0x8f/0x690 [ 1360.795058][ T2313] ? __alloc_skb+0x186/0x7d0 [ 1360.795090][ T2313] ? __alloc_skb+0x1d0/0x7d0 [ 1360.795112][ T2313] ? __local_bh_enable_ip+0xd0/0x130 [ 1360.795200][ T2313] __alloc_skb+0x1d0/0x7d0 [ 1360.795291][ T2313] netlink_sendmsg+0x5d4/0xb40 [ 1360.795427][ T2313] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1360.795505][ T2313] ? aa_sock_msg_perm+0xf1/0x1b0 [ 1360.795571][ T2313] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 1360.795650][ T2313] ____sys_sendmsg+0x972/0x9f0 [ 1360.795693][ T2313] ? __pfx_perf_trace_lock+0x10/0x10 [ 1360.795798][ T2313] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1360.795936][ T2313] ? import_iovec+0x73/0xa0 [ 1360.796085][ T2313] ___sys_sendmsg+0x2a5/0x360 [ 1360.796194][ T2313] ? __pfx____sys_sendmsg+0x10/0x10 [ 1360.796449][ T2313] ? __fget_files+0x2a/0x420 [ 1360.796591][ T2313] ? __fget_files+0x2a/0x420 [ 1360.796630][ T2313] ? __fget_files+0x3a0/0x420 [ 1360.796789][ T2313] __x64_sys_sendmsg+0x1bd/0x2a0 [ 1360.796867][ T2313] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 1360.797003][ T2313] ? __pfx_ksys_write+0x10/0x10 [ 1360.797135][ T2313] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1360.797185][ T2313] do_syscall_64+0x15f/0xf80 [ 1360.797220][ T2313] ? trace_irq_disable+0x3b/0x140 [ 1360.797266][ T2313] ? clear_bhb_loop+0x40/0x90 [ 1360.797337][ T2313] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1360.797367][ T2313] RIP: 0033:0x7f79c199cdd9 [ 1360.797407][ T2313] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1360.797423][ T2313] RSP: 002b:00007f79c28f9028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1360.797443][ T2313] RAX: ffffffffffffffda RBX: 00007f79c1c15fa0 RCX: 00007f79c199cdd9 [ 1360.797456][ T2313] RDX: 0000000020004010 RSI: 0000200000000280 RDI: 0000000000000007 [ 1360.797469][ T2313] RBP: 00007f79c28f9090 R08: 0000000000000000 R09: 0000000000000000 [ 1360.797481][ T2313] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1360.797492][ T2313] R13: 00007f79c1c16038 R14: 00007f79c1c15fa0 R15: 00007ffc9e064a38 [ 1360.797689][ T2313] [ 1361.652136][ T1304] ieee802154 phy0 wpan0: encryption failed: -22 [ 1361.663388][ T1304] ieee802154 phy1 wpan1: encryption failed: -22 [ 1363.245323][ T2338] __nla_validate_parse: 1 callbacks suppressed [ 1363.245345][ T2338] netlink: 64011 bytes leftover after parsing attributes in process `syz.1.8651'. [ 1363.748075][ T2348] netlink: 'syz.7.8653': attribute type 10 has an invalid length. [ 1363.811249][ T2347] netlink: 12 bytes leftover after parsing attributes in process `syz.9.8655'. [ 1363.884611][ T2348] team0: Device wg1 is of different type [ 1363.894255][ T2349] netlink: 12 bytes leftover after parsing attributes in process `syz.3.8654'. [ 1363.905301][ T2347] netlink: 8 bytes leftover after parsing attributes in process `syz.9.8655'. [ 1364.003347][ T2351] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8654'. [ 1364.390832][ T2356] netlink: 'syz.1.8656': attribute type 21 has an invalid length. [ 1364.427895][ T2356] IPv6: NLM_F_CREATE should be specified when creating new route [ 1364.500765][ T2356] IPv6: Can't replace route, no match found [ 1367.207503][ T2393] netlink: 64011 bytes leftover after parsing attributes in process `syz.7.8666'. [ 1367.301767][ T2391] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8664'. [ 1367.692144][ T2396] netlink: 'syz.1.8665': attribute type 29 has an invalid length. [ 1367.770997][ T2400] netlink: 'syz.1.8665': attribute type 29 has an invalid length. [ 1368.151661][ T2409] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8668'. [ 1368.344340][ T2409] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8668'. [ 1369.414694][ T2431] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8673'. [ 1369.978971][ T2441] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8676'. [ 1370.074868][ T2441] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8676'. [ 1370.168027][ T2443] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8677'. [ 1371.572639][ T2465] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 1371.975671][ T2472] netlink: 12 bytes leftover after parsing attributes in process `syz.3.8683'. [ 1372.068630][ T2472] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8683'. [ 1372.142800][ T2477] netlink: 12 bytes leftover after parsing attributes in process `syz.7.8682'. [ 1372.295966][ T2477] netlink: 8 bytes leftover after parsing attributes in process `syz.7.8682'. [ 1372.490902][ T2479] netlink: 'syz.9.8684': attribute type 6 has an invalid length. [ 1372.498754][ T2479] netlink: 3936 bytes leftover after parsing attributes in process `syz.9.8684'. [ 1372.509710][ T2479] netlink: 'syz.9.8684': attribute type 1 has an invalid length. [ 1373.707330][ T2506] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8689'. [ 1373.903899][ T2519] netlink: 'syz.1.8692': attribute type 13 has an invalid length. [ 1373.921301][ T2519] netlink: 'syz.1.8692': attribute type 58 has an invalid length. [ 1373.965383][ T2519] netlink: 136 bytes leftover after parsing attributes in process `syz.1.8692'. [ 1374.449229][ T2535] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8696'. [ 1374.550851][ T2535] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8696'. [ 1374.888770][ T2546] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 1375.116521][ T2560] netlink: 12 bytes leftover after parsing attributes in process `syz.1.8704'. [ 1375.271817][ T2560] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8704'. [ 1375.325383][ T2554] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8703'. [ 1376.090747][ T2593] netlink: 12 bytes leftover after parsing attributes in process `syz.9.8715'. [ 1376.102919][ T2594] netlink: 12 bytes leftover after parsing attributes in process `syz.1.8714'. [ 1376.154151][ T2594] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8714'. [ 1376.481166][ T2602] FAULT_INJECTION: forcing a failure. [ 1376.481166][ T2602] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1376.596747][ T2602] CPU: 0 UID: 0 PID: 2602 Comm: syz.2.8716 Not tainted syzkaller #0 PREEMPT(full) [ 1376.596773][ T2602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1376.596785][ T2602] Call Trace: [ 1376.596797][ T2602] [ 1376.596808][ T2602] dump_stack_lvl+0xe8/0x150 [ 1376.596857][ T2602] should_fail_ex+0x412/0x560 [ 1376.596919][ T2602] _copy_to_user+0x31/0xb0 [ 1376.596967][ T2602] simple_read_from_buffer+0xe1/0x170 [ 1376.597027][ T2602] proc_fail_nth_read+0x1bb/0x230 [ 1376.597079][ T2602] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1376.597134][ T2602] ? rw_verify_area+0x2a6/0x4d0 [ 1376.597164][ T2602] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1376.597219][ T2602] vfs_read+0x20c/0xa70 [ 1376.597278][ T2602] ? __pfx___mutex_lock+0x10/0x10 [ 1376.597323][ T2602] ? __pfx_vfs_read+0x10/0x10 [ 1376.597365][ T2602] ? __fget_files+0x2a/0x420 [ 1376.597423][ T2602] ? __fget_files+0x3a0/0x420 [ 1376.597453][ T2602] ? __fget_files+0x2a/0x420 [ 1376.597538][ T2602] ksys_read+0x150/0x270 [ 1376.597583][ T2602] ? __pfx_ksys_read+0x10/0x10 [ 1376.597660][ T2602] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1376.597692][ T2602] do_syscall_64+0x15f/0xf80 [ 1376.597719][ T2602] ? trace_irq_disable+0x3b/0x140 [ 1376.597751][ T2602] ? clear_bhb_loop+0x40/0x90 [ 1376.597794][ T2602] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1376.597818][ T2602] RIP: 0033:0x7f3916b5d60e [ 1376.597845][ T2602] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1376.597861][ T2602] RSP: 002b:00007f3917a3ffe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1376.597881][ T2602] RAX: ffffffffffffffda RBX: 00007f3917a406c0 RCX: 00007f3916b5d60e [ 1376.597895][ T2602] RDX: 000000000000000f RSI: 00007f3917a400a0 RDI: 0000000000000006 [ 1376.597907][ T2602] RBP: 00007f3917a40090 R08: 0000000000000000 R09: 0000000000000000 [ 1376.597919][ T2602] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1376.597930][ T2602] R13: 00007f3916e16128 R14: 00007f3916e16090 R15: 00007fff42d77158 [ 1376.598026][ T2602] [ 1377.108803][ T2608] netlink: 'syz.9.8719': attribute type 16 has an invalid length. [ 1377.197041][ T2608] netlink: 'syz.9.8719': attribute type 17 has an invalid length. [ 1377.298869][ T2608] bridge0: port 3(batadv0) entered disabled state [ 1377.378760][ T2608] bridge0: port 1(bridge_slave_0) entered disabled state [ 1377.405797][ T2608] bridge0: port 2(bridge_slave_1) entered disabled state [ 1377.695185][T22538] lo speed is unknown, defaulting to 1000 [ 1377.913068][ T2632] netlink: 'syz.2.8722': attribute type 10 has an invalid length. [ 1377.984037][ T2625] netlink: 'syz.2.8722': attribute type 10 has an invalid length. [ 1378.126363][ T2641] FAULT_INJECTION: forcing a failure. [ 1378.126363][ T2641] name failslab, interval 1, probability 0, space 0, times 0 [ 1378.149690][ T2641] CPU: 1 UID: 0 PID: 2641 Comm: syz.3.8725 Not tainted syzkaller #0 PREEMPT(full) [ 1378.149716][ T2641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1378.149728][ T2641] Call Trace: [ 1378.149737][ T2641] [ 1378.149745][ T2641] dump_stack_lvl+0xe8/0x150 [ 1378.149780][ T2641] should_fail_ex+0x412/0x560 [ 1378.149813][ T2641] should_failslab+0xa8/0x100 [ 1378.149840][ T2641] __kmalloc_cache_noprof+0x88/0x660 [ 1378.149863][ T2641] ? tcp_sendmsg_fastopen+0x1de/0x5e0 [ 1378.149894][ T2641] tcp_sendmsg_fastopen+0x1de/0x5e0 [ 1378.149926][ T2641] tcp_sendmsg_locked+0x4a88/0x5360 [ 1378.149949][ T2641] ? ktime_get+0x45/0x220 [ 1378.149978][ T2641] ? tcp_sendmsg_locked+0x2c1/0x5360 [ 1378.150005][ T2641] ? perf_trace_run_bpf_submit+0xee/0x170 [ 1378.150036][ T2641] ? perf_trace_preemptirq_template+0x26f/0x350 [ 1378.150062][ T2641] ? irqentry_exit+0x218/0x730 [ 1378.150087][ T2641] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1378.150112][ T2641] ? __pfx_clockevents_program_event+0x10/0x10 [ 1378.150133][ T2641] ? irqentry_exit+0x6a0/0x730 [ 1378.150169][ T2641] ? irqentry_exit+0x218/0x730 [ 1378.150200][ T2641] ? lockdep_hardirqs_on+0x7a/0x110 [ 1378.150223][ T2641] ? irqentry_exit+0x218/0x730 [ 1378.150244][ T2641] ? trace_irq_disable+0x3b/0x140 [ 1378.150271][ T2641] ? __pfx_tcp_sendmsg_locked+0x10/0x10 [ 1378.150314][ T2641] ? __local_bh_enable_ip+0xd8/0x130 [ 1378.150346][ T2641] tcp_sendmsg+0x2f/0x50 [ 1378.150370][ T2641] ____sys_sendmsg+0x80a/0x9f0 [ 1378.150392][ T2641] ? irqentry_exit+0x218/0x730 [ 1378.150423][ T2641] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1378.150456][ T2641] ? import_iovec+0x73/0xa0 [ 1378.150488][ T2641] ___sys_sendmsg+0x2a5/0x360 [ 1378.150508][ T2641] ? __lock_acquire+0x6b5/0x2cf0 [ 1378.150540][ T2641] ? __pfx____sys_sendmsg+0x10/0x10 [ 1378.150592][ T2641] ? __fget_files+0x2a/0x420 [ 1378.150633][ T2641] ? __fget_files+0x2a/0x420 [ 1378.150658][ T2641] ? __fget_files+0x3a0/0x420 [ 1378.150699][ T2641] __x64_sys_sendmsg+0x1bd/0x2a0 [ 1378.150724][ T2641] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 1378.150775][ T2641] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1378.150797][ T2641] do_syscall_64+0x15f/0xf80 [ 1378.150823][ T2641] ? clear_bhb_loop+0x40/0x90 [ 1378.150847][ T2641] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1378.150866][ T2641] RIP: 0033:0x7f4cc2f9cdd9 [ 1378.150886][ T2641] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1378.150902][ T2641] RSP: 002b:00007f4cc11f6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1378.150922][ T2641] RAX: ffffffffffffffda RBX: 00007f4cc3215fa0 RCX: 00007f4cc2f9cdd9 [ 1378.150937][ T2641] RDX: 0000000024004815 RSI: 0000200000000440 RDI: 0000000000000004 [ 1378.150950][ T2641] RBP: 00007f4cc11f6090 R08: 0000000000000000 R09: 0000000000000000 [ 1378.150961][ T2641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1378.150972][ T2641] R13: 00007f4cc3216038 R14: 00007f4cc3215fa0 R15: 00007ffcb355e738 [ 1378.151010][ T2641] [ 1378.788752][ T2654] __nla_validate_parse: 7 callbacks suppressed [ 1378.788773][ T2654] netlink: 12 bytes leftover after parsing attributes in process `syz.3.8728'. [ 1378.858120][ T2654] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8728'. [ 1378.967301][ T2658] netlink: 'syz.2.8729': attribute type 29 has an invalid length. [ 1378.999079][ T2658] netlink: 'syz.2.8729': attribute type 29 has an invalid length. [ 1379.068777][ T2667] netlink: 'syz.9.8732': attribute type 2 has an invalid length. [ 1379.086361][ T2667] netlink: 151 bytes leftover after parsing attributes in process `syz.9.8732'. [ 1379.104166][ T2669] FAULT_INJECTION: forcing a failure. [ 1379.104166][ T2669] name failslab, interval 1, probability 0, space 0, times 0 [ 1379.156722][ T2669] CPU: 0 UID: 0 PID: 2669 Comm: syz.3.8733 Not tainted syzkaller #0 PREEMPT(full) [ 1379.156748][ T2669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1379.156760][ T2669] Call Trace: [ 1379.156768][ T2669] [ 1379.156776][ T2669] dump_stack_lvl+0xe8/0x150 [ 1379.156810][ T2669] should_fail_ex+0x412/0x560 [ 1379.156842][ T2669] should_failslab+0xa8/0x100 [ 1379.156869][ T2669] __kmalloc_noprof+0xe8/0x760 [ 1379.156892][ T2669] ? bpf_test_init+0x9f/0x150 [ 1379.156926][ T2669] bpf_test_init+0x9f/0x150 [ 1379.156959][ T2669] bpf_prog_test_run_flow_dissector+0x209/0x610 [ 1379.157001][ T2669] ? __pfx_bpf_prog_test_run_flow_dissector+0x10/0x10 [ 1379.157026][ T2669] ? __fget_files+0x2a/0x420 [ 1379.157057][ T2669] ? __fget_files+0x2a/0x420 [ 1379.157081][ T2669] ? __fget_files+0x3a0/0x420 [ 1379.157105][ T2669] ? __fget_files+0x2a/0x420 [ 1379.157137][ T2669] ? __pfx_bpf_prog_test_run_flow_dissector+0x10/0x10 [ 1379.157160][ T2669] bpf_prog_test_run+0x2c7/0x340 [ 1379.157191][ T2669] __sys_bpf+0x643/0x950 [ 1379.157226][ T2669] ? __pfx___sys_bpf+0x10/0x10 [ 1379.157271][ T2669] ? ksys_write+0x242/0x270 [ 1379.157297][ T2669] ? __pfx_ksys_write+0x10/0x10 [ 1379.157329][ T2669] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1379.157351][ T2669] __x64_sys_bpf+0x7c/0x90 [ 1379.157374][ T2669] do_syscall_64+0x15f/0xf80 [ 1379.157397][ T2669] ? trace_irq_disable+0x3b/0x140 [ 1379.157421][ T2669] ? clear_bhb_loop+0x40/0x90 [ 1379.157452][ T2669] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1379.157470][ T2669] RIP: 0033:0x7f4cc2f9cdd9 [ 1379.157489][ T2669] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1379.157505][ T2669] RSP: 002b:00007f4cc11f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1379.157525][ T2669] RAX: ffffffffffffffda RBX: 00007f4cc3215fa0 RCX: 00007f4cc2f9cdd9 [ 1379.157539][ T2669] RDX: 000000000000004c RSI: 0000200000000640 RDI: 000000000000000a [ 1379.157551][ T2669] RBP: 00007f4cc11f6090 R08: 0000000000000000 R09: 0000000000000000 [ 1379.157563][ T2669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1379.157574][ T2669] R13: 00007f4cc3216038 R14: 00007f4cc3215fa0 R15: 00007ffcb355e738 [ 1379.157611][ T2669] [ 1379.477935][ T2671] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8734'. [ 1379.677914][ T2684] openvswitch: netlink: Flow actions may not be safe on all matching packets. [ 1379.829799][ T2690] netlink: 62999 bytes leftover after parsing attributes in process `syz.7.8739'. [ 1380.004204][ T2698] netlink: 65039 bytes leftover after parsing attributes in process `syz.2.8742'. [ 1380.024845][ T2699] netlink: 12 bytes leftover after parsing attributes in process `syz.9.8741'. [ 1380.049871][ T2698] netlink: 'syz.2.8742': attribute type 29 has an invalid length. [ 1380.062104][ T2698] netlink: 'syz.2.8742': attribute type 29 has an invalid length. [ 1380.073147][ T2698] netlink: 500 bytes leftover after parsing attributes in process `syz.2.8742'. [ 1380.088859][ T2699] netlink: 8 bytes leftover after parsing attributes in process `syz.9.8741'. [ 1380.393416][ T2701] netlink: 'syz.7.8743': attribute type 29 has an invalid length. [ 1380.416413][ T2701] netlink: 'syz.7.8743': attribute type 29 has an invalid length. [ 1381.291738][ T2746] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8754'. [ 1381.591176][ T2730] gretap0 speed is unknown, defaulting to 1000 [ 1381.631659][ T2730] lo speed is unknown, defaulting to 1000 [ 1382.146826][ T2765] FAULT_INJECTION: forcing a failure. [ 1382.146826][ T2765] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1382.250029][ T2765] CPU: 1 UID: 0 PID: 2765 Comm: syz.2.8759 Not tainted syzkaller #0 PREEMPT(full) [ 1382.250054][ T2765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1382.250065][ T2765] Call Trace: [ 1382.250074][ T2765] [ 1382.250082][ T2765] dump_stack_lvl+0xe8/0x150 [ 1382.250114][ T2765] should_fail_ex+0x412/0x560 [ 1382.250144][ T2765] _copy_from_user+0x2d/0xb0 [ 1382.250173][ T2765] __sys_bpf+0x229/0x950 [ 1382.250201][ T2765] ? __pfx___sys_bpf+0x10/0x10 [ 1382.250221][ T2765] ? perf_trace_lock+0xff/0x410 [ 1382.250260][ T2765] ? __might_fault+0xaf/0x130 [ 1382.250284][ T2765] ? __might_fault+0xaf/0x130 [ 1382.250303][ T2765] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1382.250323][ T2765] __x64_sys_bpf+0x7c/0x90 [ 1382.250346][ T2765] do_syscall_64+0x15f/0xf80 [ 1382.250366][ T2765] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1382.250383][ T2765] ? clear_bhb_loop+0x40/0x90 [ 1382.250407][ T2765] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1382.250425][ T2765] RIP: 0033:0x7f3916b9cdd9 [ 1382.250443][ T2765] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1382.250458][ T2765] RSP: 002b:00007f3917a61028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1382.250478][ T2765] RAX: ffffffffffffffda RBX: 00007f3916e15fa0 RCX: 00007f3916b9cdd9 [ 1382.250491][ T2765] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 1382.250503][ T2765] RBP: 00007f3917a61090 R08: 0000000000000000 R09: 0000000000000000 [ 1382.250515][ T2765] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1382.250525][ T2765] R13: 00007f3916e16038 R14: 00007f3916e15fa0 R15: 00007fff42d77158 [ 1382.250562][ T2765] [ 1383.797292][ T2793] FAULT_INJECTION: forcing a failure. [ 1383.797292][ T2793] name failslab, interval 1, probability 0, space 0, times 0 [ 1383.814785][ T2793] CPU: 0 UID: 0 PID: 2793 Comm: syz.9.8767 Not tainted syzkaller #0 PREEMPT(full) [ 1383.814813][ T2793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1383.814830][ T2793] Call Trace: [ 1383.814840][ T2793] [ 1383.814849][ T2793] dump_stack_lvl+0xe8/0x150 [ 1383.814895][ T2793] should_fail_ex+0x412/0x560 [ 1383.814947][ T2793] should_failslab+0xa8/0x100 [ 1383.814988][ T2793] kmem_cache_alloc_node_noprof+0x8f/0x690 [ 1383.815020][ T2793] ? __alloc_skb+0x186/0x7d0 [ 1383.815046][ T2793] ? __alloc_skb+0x1d0/0x7d0 [ 1383.815080][ T2793] ? __local_bh_enable_ip+0xd0/0x130 [ 1383.815131][ T2793] __alloc_skb+0x1d0/0x7d0 [ 1383.815170][ T2793] netlink_sendmsg+0x5d4/0xb40 [ 1383.815221][ T2793] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1383.815259][ T2793] ? aa_sock_msg_perm+0xf1/0x1b0 [ 1383.815294][ T2793] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 1383.815330][ T2793] ____sys_sendmsg+0x972/0x9f0 [ 1383.815356][ T2793] ? __pfx_perf_trace_lock+0x10/0x10 [ 1383.815400][ T2793] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1383.815453][ T2793] ? import_iovec+0x73/0xa0 [ 1383.815496][ T2793] ___sys_sendmsg+0x2a5/0x360 [ 1383.815521][ T2793] ? perf_trace_run_bpf_submit+0xee/0x170 [ 1383.815558][ T2793] ? __pfx____sys_sendmsg+0x10/0x10 [ 1383.815647][ T2793] ? __fget_files+0x2a/0x420 [ 1383.815704][ T2793] ? __fget_files+0x2a/0x420 [ 1383.815728][ T2793] ? __fget_files+0x3a0/0x420 [ 1383.815785][ T2793] __x64_sys_sendmsg+0x1bd/0x2a0 [ 1383.815818][ T2793] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 1383.815838][ T2793] ? perf_trace_preemptirq_template+0xb2/0x350 [ 1383.815893][ T2793] ? __pfx_ksys_write+0x10/0x10 [ 1383.815955][ T2793] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1383.815980][ T2793] do_syscall_64+0x15f/0xf80 [ 1383.816005][ T2793] ? trace_irq_disable+0x3b/0x140 [ 1383.816032][ T2793] ? clear_bhb_loop+0x40/0x90 [ 1383.816063][ T2793] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1383.816084][ T2793] RIP: 0033:0x7f5d21f9cdd9 [ 1383.816108][ T2793] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1383.816125][ T2793] RSP: 002b:00007f5d22ed0028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1383.816144][ T2793] RAX: ffffffffffffffda RBX: 00007f5d22215fa0 RCX: 00007f5d21f9cdd9 [ 1383.816159][ T2793] RDX: 0000000000000490 RSI: 0000200000009b40 RDI: 0000000000000004 [ 1383.816171][ T2793] RBP: 00007f5d22ed0090 R08: 0000000000000000 R09: 0000000000000000 [ 1383.816183][ T2793] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1383.816194][ T2793] R13: 00007f5d22216038 R14: 00007f5d22215fa0 R15: 00007ffd79c4ad68 [ 1383.816260][ T2793] [ 1384.183509][ T2797] __nla_validate_parse: 3 callbacks suppressed [ 1384.183529][ T2797] netlink: 8 bytes leftover after parsing attributes in process `syz.7.8766'. [ 1384.412137][ T2791] netlink: 'syz.3.8776': attribute type 29 has an invalid length. [ 1384.447979][ T2791] netlink: 'syz.3.8776': attribute type 29 has an invalid length. [ 1384.617002][ T2808] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8771'. [ 1384.664897][ T2808] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8771'. [ 1384.990639][ T2838] FAULT_INJECTION: forcing a failure. [ 1384.990639][ T2838] name failslab, interval 1, probability 0, space 0, times 0 [ 1385.008007][ T2838] CPU: 1 UID: 0 PID: 2838 Comm: syz.2.8779 Not tainted syzkaller #0 PREEMPT(full) [ 1385.008034][ T2838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1385.008045][ T2838] Call Trace: [ 1385.008053][ T2838] [ 1385.008062][ T2838] dump_stack_lvl+0xe8/0x150 [ 1385.008094][ T2838] should_fail_ex+0x412/0x560 [ 1385.008124][ T2838] should_failslab+0xa8/0x100 [ 1385.008150][ T2838] __kmalloc_noprof+0xe8/0x760 [ 1385.008172][ T2838] ? tomoyo_encode+0x28b/0x550 [ 1385.008203][ T2838] tomoyo_encode+0x28b/0x550 [ 1385.008233][ T2838] tomoyo_realpath_from_path+0x58d/0x5d0 [ 1385.008261][ T2838] ? tomoyo_domain+0xd7/0x130 [ 1385.008292][ T2838] ? tomoyo_path_number_perm+0x219/0x630 [ 1385.008315][ T2838] tomoyo_path_number_perm+0x246/0x630 [ 1385.008340][ T2838] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 1385.008373][ T2838] ? __lock_acquire+0x6b5/0x2cf0 [ 1385.008415][ T2838] ? __mutex_unlock_slowpath+0x1be/0x6f0 [ 1385.008464][ T2838] ? __fget_files+0x2a/0x420 [ 1385.008493][ T2838] ? __fget_files+0x2a/0x420 [ 1385.008516][ T2838] ? __fget_files+0x3a0/0x420 [ 1385.008545][ T2838] ? __fget_files+0x2a/0x420 [ 1385.008574][ T2838] security_file_ioctl+0xc3/0x2a0 [ 1385.008598][ T2838] __se_sys_ioctl+0x47/0x170 [ 1385.008620][ T2838] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1385.008640][ T2838] do_syscall_64+0x15f/0xf80 [ 1385.008661][ T2838] ? trace_irq_disable+0x3b/0x140 [ 1385.008685][ T2838] ? clear_bhb_loop+0x40/0x90 [ 1385.008708][ T2838] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1385.008726][ T2838] RIP: 0033:0x7f3916b9cdd9 [ 1385.008744][ T2838] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1385.008759][ T2838] RSP: 002b:00007f3917a61028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1385.008787][ T2838] RAX: ffffffffffffffda RBX: 00007f3916e15fa0 RCX: 00007f3916b9cdd9 [ 1385.008800][ T2838] RDX: 0000000000000000 RSI: 000000000000891c RDI: 0000000000000004 [ 1385.008811][ T2838] RBP: 00007f3917a61090 R08: 0000000000000000 R09: 0000000000000000 [ 1385.008822][ T2838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1385.008834][ T2838] R13: 00007f3916e16038 R14: 00007f3916e15fa0 R15: 00007fff42d77158 [ 1385.008866][ T2838] [ 1385.008902][ T2838] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1385.661670][ T2853] FAULT_INJECTION: forcing a failure. [ 1385.661670][ T2853] name failslab, interval 1, probability 0, space 0, times 0 [ 1385.674407][ T2853] CPU: 0 UID: 0 PID: 2853 Comm: syz.3.8784 Not tainted syzkaller #0 PREEMPT(full) [ 1385.674433][ T2853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1385.674445][ T2853] Call Trace: [ 1385.674453][ T2853] [ 1385.674461][ T2853] dump_stack_lvl+0xe8/0x150 [ 1385.674494][ T2853] should_fail_ex+0x412/0x560 [ 1385.674525][ T2853] should_failslab+0xa8/0x100 [ 1385.674550][ T2853] __kmalloc_noprof+0xe8/0x760 [ 1385.674572][ T2853] ? bpf_test_init+0x9f/0x150 [ 1385.674599][ T2853] ? __lock_acquire+0x6b5/0x2cf0 [ 1385.674629][ T2853] bpf_test_init+0x9f/0x150 [ 1385.674658][ T2853] bpf_prog_test_run_skb+0x392/0x2260 [ 1385.674683][ T2853] ? bpf_prog_test_run_skb+0x1e1/0x2260 [ 1385.674728][ T2853] ? __fget_files+0x3a0/0x420 [ 1385.674760][ T2853] ? __fget_files+0x2a/0x420 [ 1385.674790][ T2853] ? __pfx_bpf_prog_test_run_skb+0x10/0x10 [ 1385.674817][ T2853] bpf_prog_test_run+0x2c7/0x340 [ 1385.674846][ T2853] __sys_bpf+0x643/0x950 [ 1385.674871][ T2853] ? __pfx___sys_bpf+0x10/0x10 [ 1385.674909][ T2853] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 1385.674932][ T2853] ? ksys_write+0x242/0x270 [ 1385.674954][ T2853] ? __pfx_ksys_write+0x10/0x10 [ 1385.674979][ T2853] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1385.675000][ T2853] __x64_sys_bpf+0x7c/0x90 [ 1385.675022][ T2853] do_syscall_64+0x15f/0xf80 [ 1385.675047][ T2853] ? clear_bhb_loop+0x40/0x90 [ 1385.675069][ T2853] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1385.675087][ T2853] RIP: 0033:0x7f4cc2f9cdd9 [ 1385.675105][ T2853] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1385.675121][ T2853] RSP: 002b:00007f4cc11f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1385.675141][ T2853] RAX: ffffffffffffffda RBX: 00007f4cc3215fa0 RCX: 00007f4cc2f9cdd9 [ 1385.675155][ T2853] RDX: 0000000000000050 RSI: 00002000000000c0 RDI: 000000000000000a [ 1385.675167][ T2853] RBP: 00007f4cc11f6090 R08: 0000000000000000 R09: 0000000000000000 [ 1385.675179][ T2853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1385.675190][ T2853] R13: 00007f4cc3216038 R14: 00007f4cc3215fa0 R15: 00007ffcb355e738 [ 1385.675220][ T2853] [ 1385.712850][ T2856] netlink: 12 bytes leftover after parsing attributes in process `syz.9.8785'. [ 1388.877209][ T2879] netlink: 16 bytes leftover after parsing attributes in process `syz.3.8788'. [ 1388.889295][ T2878] FAULT_INJECTION: forcing a failure. [ 1388.889295][ T2878] name failslab, interval 1, probability 0, space 0, times 0 [ 1388.901947][ T2878] CPU: 0 UID: 0 PID: 2878 Comm: syz.7.8789 Not tainted syzkaller #0 PREEMPT(full) [ 1388.901972][ T2878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1388.901983][ T2878] Call Trace: [ 1388.901995][ T2878] [ 1388.902007][ T2878] dump_stack_lvl+0xe8/0x150 [ 1388.902058][ T2878] should_fail_ex+0x412/0x560 [ 1388.902119][ T2878] should_failslab+0xa8/0x100 [ 1388.902161][ T2878] kmem_cache_alloc_node_noprof+0x8f/0x690 [ 1388.902194][ T2878] ? __alloc_skb+0x186/0x7d0 [ 1388.902218][ T2878] ? __alloc_skb+0x1d0/0x7d0 [ 1388.902236][ T2878] ? __local_bh_enable_ip+0xd0/0x130 [ 1388.902306][ T2878] __alloc_skb+0x1d0/0x7d0 [ 1388.902363][ T2878] netlink_sendmsg+0x5d4/0xb40 [ 1388.902441][ T2878] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1388.902488][ T2878] ? aa_sock_msg_perm+0xf1/0x1b0 [ 1388.902532][ T2878] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 1388.902629][ T2878] ____sys_sendmsg+0x972/0x9f0 [ 1388.902662][ T2878] ? __pfx_perf_trace_lock+0x10/0x10 [ 1388.902724][ T2878] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1388.902805][ T2878] ? import_iovec+0x73/0xa0 [ 1388.902864][ T2878] ___sys_sendmsg+0x2a5/0x360 [ 1388.902928][ T2878] ? __pfx____sys_sendmsg+0x10/0x10 [ 1388.903098][ T2878] ? __fget_files+0x2a/0x420 [ 1388.903192][ T2878] ? __fget_files+0x2a/0x420 [ 1388.903229][ T2878] ? __fget_files+0x3a0/0x420 [ 1388.903367][ T2878] __x64_sys_sendmsg+0x1bd/0x2a0 [ 1388.903417][ T2878] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 1388.903439][ T2878] ? perf_trace_preemptirq_template+0xb2/0x350 [ 1388.903524][ T2878] ? __pfx_ksys_write+0x10/0x10 [ 1388.903601][ T2878] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1388.903636][ T2878] do_syscall_64+0x15f/0xf80 [ 1388.903665][ T2878] ? trace_irq_disable+0x3b/0x140 [ 1388.903698][ T2878] ? clear_bhb_loop+0x40/0x90 [ 1388.903745][ T2878] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1388.903770][ T2878] RIP: 0033:0x7f79c199cdd9 [ 1388.903800][ T2878] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1388.903817][ T2878] RSP: 002b:00007f79c28f9028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1388.903839][ T2878] RAX: ffffffffffffffda RBX: 00007f79c1c15fa0 RCX: 00007f79c199cdd9 [ 1388.903854][ T2878] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000006 [ 1388.903866][ T2878] RBP: 00007f79c28f9090 R08: 0000000000000000 R09: 0000000000000000 [ 1388.903879][ T2878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1388.903891][ T2878] R13: 00007f79c1c16038 R14: 00007f79c1c15fa0 R15: 00007ffc9e064a38 [ 1388.903999][ T2878] [ 1389.776518][ T2893] netlink: 'syz.3.8791': attribute type 4 has an invalid length. [ 1393.589016][ T2870] netlink: 'syz.2.8787': attribute type 29 has an invalid length. [ 1393.687919][ T2897] netdevsim netdevsim7: Direct firmware load for .net/syz1 failed with error -2 [ 1393.742116][ T2897] netdevsim netdevsim7: Falling back to sysfs fallback for: .net/syz1 [ 1393.823815][ T2908] netlink: 12 bytes leftover after parsing attributes in process `syz.1.8797'. [ 1393.852991][ T2908] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8797'. [ 1394.168976][ T2915] netlink: 12 bytes leftover after parsing attributes in process `syz.7.8798'. [ 1395.124960][ T2948] netlink: 'syz.9.8807': attribute type 2 has an invalid length. [ 1395.449710][ T2955] netlink: 12 bytes leftover after parsing attributes in process `syz.1.8811'. [ 1395.518926][ T2958] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8811'. [ 1395.951219][ T2973] netlink: 12 bytes leftover after parsing attributes in process `syz.1.8816'. [ 1395.968583][ T2970] netlink: 8 bytes leftover after parsing attributes in process `syz.9.8814'. [ 1396.112518][ T2973] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8816'. [ 1396.551663][ T2983] netlink: 68 bytes leftover after parsing attributes in process `syz.2.8819'. [ 1396.943423][ T2993] netlink: 12 bytes leftover after parsing attributes in process `syz.3.8822'. [ 1398.809955][ T3045] FAULT_INJECTION: forcing a failure. [ 1398.809955][ T3045] name failslab, interval 1, probability 0, space 0, times 0 [ 1398.822728][ T3045] CPU: 0 UID: 0 PID: 3045 Comm: syz.3.8840 Not tainted syzkaller #0 PREEMPT(full) [ 1398.822752][ T3045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1398.822763][ T3045] Call Trace: [ 1398.822771][ T3045] [ 1398.822779][ T3045] dump_stack_lvl+0xe8/0x150 [ 1398.822810][ T3045] should_fail_ex+0x412/0x560 [ 1398.822839][ T3045] should_failslab+0xa8/0x100 [ 1398.822863][ T3045] __kmalloc_noprof+0xe8/0x760 [ 1398.822891][ T3045] ? tomoyo_encode+0x28b/0x550 [ 1398.822921][ T3045] tomoyo_encode+0x28b/0x550 [ 1398.822952][ T3045] tomoyo_realpath_from_path+0x58d/0x5d0 [ 1398.822978][ T3045] ? tomoyo_domain+0xd7/0x130 [ 1398.823009][ T3045] ? tomoyo_path_number_perm+0x219/0x630 [ 1398.823030][ T3045] tomoyo_path_number_perm+0x246/0x630 [ 1398.823056][ T3045] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 1398.823077][ T3045] ? __lock_acquire+0x6b5/0x2cf0 [ 1398.823118][ T3045] ? __mutex_unlock_slowpath+0x1be/0x6f0 [ 1398.823165][ T3045] ? __fget_files+0x2a/0x420 [ 1398.823193][ T3045] ? __fget_files+0x2a/0x420 [ 1398.823217][ T3045] ? __fget_files+0x3a0/0x420 [ 1398.823240][ T3045] ? __fget_files+0x2a/0x420 [ 1398.823269][ T3045] security_file_ioctl+0xc3/0x2a0 [ 1398.823292][ T3045] __se_sys_ioctl+0x47/0x170 [ 1398.823313][ T3045] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1398.823334][ T3045] do_syscall_64+0x15f/0xf80 [ 1398.823355][ T3045] ? trace_irq_disable+0x3b/0x140 [ 1398.823383][ T3045] ? clear_bhb_loop+0x40/0x90 [ 1398.823407][ T3045] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1398.823425][ T3045] RIP: 0033:0x7f4cc2f9cdd9 [ 1398.823443][ T3045] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1398.823458][ T3045] RSP: 002b:00007f4cc11f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1398.823478][ T3045] RAX: ffffffffffffffda RBX: 00007f4cc3215fa0 RCX: 00007f4cc2f9cdd9 [ 1398.823492][ T3045] RDX: 00002000000000c0 RSI: 000000004008240b RDI: 0000000000000005 [ 1398.823504][ T3045] RBP: 00007f4cc11f6090 R08: 0000000000000000 R09: 0000000000000000 [ 1398.823515][ T3045] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1398.823526][ T3045] R13: 00007f4cc3216038 R14: 00007f4cc3215fa0 R15: 00007ffcb355e738 [ 1398.823558][ T3045] [ 1398.823580][ T3045] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1398.871095][ T3047] netlink: 'syz.2.8839': attribute type 29 has an invalid length. [ 1399.080873][ T3044] netlink: 'syz.2.8839': attribute type 29 has an invalid length. [ 1399.140412][ T3049] netlink: 'syz.2.8839': attribute type 29 has an invalid length. [ 1399.529449][ T3064] __nla_validate_parse: 3 callbacks suppressed [ 1399.539821][ T3064] netlink: 12 bytes leftover after parsing attributes in process `syz.9.8846'. [ 1399.564113][ T3064] netlink: 8 bytes leftover after parsing attributes in process `syz.9.8846'. [ 1399.598847][ T3059] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8844'. [ 1399.948076][ T3072] netlink: 12 bytes leftover after parsing attributes in process `syz.3.8849'. [ 1400.233739][ T3086] bridge0: port 3(veth0_to_bridge) entered blocking state [ 1400.250368][ T3086] bridge0: port 3(veth0_to_bridge) entered disabled state [ 1400.261114][ T3086] veth0_to_bridge: entered allmulticast mode [ 1400.354039][ T3086] veth0_to_bridge: entered promiscuous mode [ 1400.372017][ T3086] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1400.410821][ T3086] bridge0: port 3(veth0_to_bridge) entered blocking state [ 1400.421009][ T3086] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 1400.575277][ T3104] FAULT_INJECTION: forcing a failure. [ 1400.575277][ T3104] name failslab, interval 1, probability 0, space 0, times 0 [ 1400.588649][ T3104] CPU: 0 UID: 0 PID: 3104 Comm: syz.3.8860 Not tainted syzkaller #0 PREEMPT(full) [ 1400.588676][ T3104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1400.588688][ T3104] Call Trace: [ 1400.588699][ T3104] [ 1400.588709][ T3104] dump_stack_lvl+0xe8/0x150 [ 1400.588743][ T3104] should_fail_ex+0x412/0x560 [ 1400.588776][ T3104] should_failslab+0xa8/0x100 [ 1400.588803][ T3104] kmem_cache_alloc_node_noprof+0x8f/0x690 [ 1400.588826][ T3104] ? __alloc_skb+0x186/0x7d0 [ 1400.588844][ T3104] ? __alloc_skb+0x1d0/0x7d0 [ 1400.588859][ T3104] ? __local_bh_enable_ip+0xd0/0x130 [ 1400.588892][ T3104] __alloc_skb+0x1d0/0x7d0 [ 1400.588919][ T3104] netlink_sendmsg+0x5d4/0xb40 [ 1400.588953][ T3104] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1400.588979][ T3104] ? __pfx_bpf_lsm_socket_sendmsg+0x10/0x10 [ 1400.589005][ T3104] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 1400.589031][ T3104] ____sys_sendmsg+0x972/0x9f0 [ 1400.589066][ T3104] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1400.589101][ T3104] ? import_iovec+0x73/0xa0 [ 1400.589133][ T3104] ___sys_sendmsg+0x2a5/0x360 [ 1400.589153][ T3104] ? __lock_acquire+0x6b5/0x2cf0 [ 1400.589186][ T3104] ? __pfx____sys_sendmsg+0x10/0x10 [ 1400.589256][ T3104] ? __fget_files+0x2a/0x420 [ 1400.589281][ T3104] ? __fget_files+0x3a0/0x420 [ 1400.589322][ T3104] __x64_sys_sendmsg+0x1bd/0x2a0 [ 1400.589341][ T3104] ? ktime_get+0x1f5/0x220 [ 1400.589368][ T3104] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 1400.589386][ T3104] ? perf_trace_preemptirq_template+0xb2/0x350 [ 1400.589447][ T3104] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1400.589469][ T3104] do_syscall_64+0x15f/0xf80 [ 1400.589492][ T3104] ? clear_bhb_loop+0x40/0x90 [ 1400.589516][ T3104] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1400.589533][ T3104] RIP: 0033:0x7f4cc2f9cdd9 [ 1400.589552][ T3104] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1400.589569][ T3104] RSP: 002b:00007f4cc11d5028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1400.589589][ T3104] RAX: ffffffffffffffda RBX: 00007f4cc3216090 RCX: 00007f4cc2f9cdd9 [ 1400.589603][ T3104] RDX: 0000000000040000 RSI: 00002000000001c0 RDI: 0000000000000005 [ 1400.589616][ T3104] RBP: 00007f4cc11d5090 R08: 0000000000000000 R09: 0000000000000000 [ 1400.589627][ T3104] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1400.589639][ T3104] R13: 00007f4cc3216128 R14: 00007f4cc3216090 R15: 00007ffcb355e738 [ 1400.589677][ T3104] [ 1400.684293][ T3105] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8859'. [ 1401.734468][ T3134] netlink: 'syz.1.8870': attribute type 10 has an invalid length. [ 1401.767249][ T3134] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 1401.773024][ T3136] FAULT_INJECTION: forcing a failure. [ 1401.773024][ T3136] name failslab, interval 1, probability 0, space 0, times 0 [ 1401.780609][ T3134] team0: Port device netdevsim0 added [ 1401.803478][ T3136] CPU: 0 UID: 0 PID: 3136 Comm: syz.9.8872 Not tainted syzkaller #0 PREEMPT(full) [ 1401.803506][ T3136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1401.803518][ T3136] Call Trace: [ 1401.803527][ T3136] [ 1401.803536][ T3136] dump_stack_lvl+0xe8/0x150 [ 1401.803571][ T3136] should_fail_ex+0x412/0x560 [ 1401.803604][ T3136] should_failslab+0xa8/0x100 [ 1401.803632][ T3136] kmem_cache_alloc_node_noprof+0x8f/0x690 [ 1401.803655][ T3136] ? __alloc_skb+0x186/0x7d0 [ 1401.803672][ T3136] ? __alloc_skb+0x1d0/0x7d0 [ 1401.803687][ T3136] ? __local_bh_enable_ip+0xd0/0x130 [ 1401.803720][ T3136] __alloc_skb+0x1d0/0x7d0 [ 1401.803746][ T3136] netlink_sendmsg+0x5d4/0xb40 [ 1401.803780][ T3136] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1401.803805][ T3136] ? aa_sock_msg_perm+0xf1/0x1b0 [ 1401.803833][ T3136] ? bpf_lsm_socket_sendmsg+0x9/0x20 [ 1401.803861][ T3136] ____sys_sendmsg+0x972/0x9f0 [ 1401.803896][ T3136] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1401.803929][ T3136] ? import_iovec+0x73/0xa0 [ 1401.803962][ T3136] ___sys_sendmsg+0x2a5/0x360 [ 1401.803982][ T3136] ? __lock_acquire+0x6b5/0x2cf0 [ 1401.804015][ T3136] ? __pfx____sys_sendmsg+0x10/0x10 [ 1401.804067][ T3136] ? __fget_files+0x2a/0x420 [ 1401.804107][ T3136] ? __fget_files+0x2a/0x420 [ 1401.804132][ T3136] ? __fget_files+0x3a0/0x420 [ 1401.804178][ T3136] __x64_sys_sendmsg+0x1bd/0x2a0 [ 1401.804198][ T3136] ? irqentry_exit+0x218/0x730 [ 1401.804226][ T3136] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 1401.804260][ T3136] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1401.804294][ T3136] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1401.804315][ T3136] do_syscall_64+0x15f/0xf80 [ 1401.804341][ T3136] ? clear_bhb_loop+0x40/0x90 [ 1401.804366][ T3136] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1401.804386][ T3136] RIP: 0033:0x7f5d21f9cdd9 [ 1401.804405][ T3136] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1401.804421][ T3136] RSP: 002b:00007f5d22ed0028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1401.804441][ T3136] RAX: ffffffffffffffda RBX: 00007f5d22215fa0 RCX: 00007f5d21f9cdd9 [ 1401.804454][ T3136] RDX: 0000000024040110 RSI: 00002000000000c0 RDI: 0000000000000003 [ 1401.804467][ T3136] RBP: 00007f5d22ed0090 R08: 0000000000000000 R09: 0000000000000000 [ 1401.804478][ T3136] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1401.804490][ T3136] R13: 00007f5d22216038 R14: 00007f5d22215fa0 R15: 00007ffd79c4ad68 [ 1401.804527][ T3136] [ 1402.887155][ T3159] netlink: 144 bytes leftover after parsing attributes in process `syz.2.8875'. [ 1402.999615][ T3146] netlink: 8 bytes leftover after parsing attributes in process `syz.7.8874'. [ 1403.335217][ T3163] netlink: 'syz.1.8878': attribute type 29 has an invalid length. [ 1403.350603][ T3163] netlink: 'syz.1.8878': attribute type 29 has an invalid length. [ 1403.355630][ T3165] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8879'. [ 1403.630475][ T3176] netlink: 12 bytes leftover after parsing attributes in process `syz.7.8880'. [ 1404.426879][ T3199] netlink: 4 bytes leftover after parsing attributes in process `syz.9.8888'. [ 1404.605427][ T3212] FAULT_INJECTION: forcing a failure. [ 1404.605427][ T3212] name failslab, interval 1, probability 0, space 0, times 0 [ 1404.643703][ T3212] CPU: 1 UID: 0 PID: 3212 Comm: syz.1.8892 Not tainted syzkaller #0 PREEMPT(full) [ 1404.643731][ T3212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1404.643743][ T3212] Call Trace: [ 1404.643751][ T3212] [ 1404.643760][ T3212] dump_stack_lvl+0xe8/0x150 [ 1404.643794][ T3212] should_fail_ex+0x412/0x560 [ 1404.643826][ T3212] should_failslab+0xa8/0x100 [ 1404.643861][ T3212] __kmalloc_noprof+0xe8/0x760 [ 1404.643883][ T3212] ? bpf_test_init+0x9f/0x150 [ 1404.643918][ T3212] bpf_test_init+0x9f/0x150 [ 1404.643948][ T3212] bpf_prog_test_run_xdp+0x529/0x1160 [ 1404.643990][ T3212] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 1404.644016][ T3212] ? __fget_files+0x2a/0x420 [ 1404.644055][ T3212] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 1404.644077][ T3212] bpf_prog_test_run+0x2c7/0x340 [ 1404.644157][ T3212] __sys_bpf+0x643/0x950 [ 1404.644184][ T3212] ? __pfx___sys_bpf+0x10/0x10 [ 1404.644236][ T3212] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1404.644265][ T3212] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1404.644286][ T3212] __x64_sys_bpf+0x7c/0x90 [ 1404.644310][ T3212] do_syscall_64+0x15f/0xf80 [ 1404.644334][ T3212] ? clear_bhb_loop+0x40/0x90 [ 1404.644359][ T3212] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1404.644378][ T3212] RIP: 0033:0x7f64aed9cdd9 [ 1404.644397][ T3212] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1404.644414][ T3212] RSP: 002b:00007f64afbcb028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1404.644434][ T3212] RAX: ffffffffffffffda RBX: 00007f64af015fa0 RCX: 00007f64aed9cdd9 [ 1404.644448][ T3212] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 1404.644460][ T3212] RBP: 00007f64afbcb090 R08: 0000000000000000 R09: 0000000000000000 [ 1404.644472][ T3212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1404.644483][ T3212] R13: 00007f64af016038 R14: 00007f64af015fa0 R15: 00007ffe8f33be98 [ 1404.644521][ T3212] [ 1404.998994][ T3205] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8891'. [ 1405.105227][ T3219] netlink: 12 bytes leftover after parsing attributes in process `syz.1.8894'. [ 1405.211617][ T3221] netlink: 'syz.9.8893': attribute type 29 has an invalid length. [ 1405.285716][ T3221] netlink: 'syz.9.8893': attribute type 29 has an invalid length. [ 1405.382297][ T3230] netlink: 20 bytes leftover after parsing attributes in process `syz.3.8899'. [ 1405.396951][ T3230] netlink: 20 bytes leftover after parsing attributes in process `syz.3.8899'. [ 1405.592634][ T3239] netlink: 'syz.3.8899': attribute type 41 has an invalid length. [ 1408.521278][ T3243] netlink: 12 bytes leftover after parsing attributes in process `syz.9.8902'. [ 1408.860825][ T3261] netlink: 'syz.7.8908': attribute type 13 has an invalid length. [ 1409.061012][ T3259] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8906'. [ 1409.099678][ T3265] netlink: 12 bytes leftover after parsing attributes in process `syz.9.8909'. [ 1409.288589][ T3261] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1409.323827][T13786] gretap0 speed is unknown, defaulting to 1000 [ 1409.385832][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1409.399265][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1409.411866][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1409.424468][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1409.437101][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1409.449773][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1409.462335][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1409.474952][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1409.487549][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1410.607096][ T3277] netlink: 'syz.1.8913': attribute type 29 has an invalid length. [ 1410.615944][ T3277] netlink: 'syz.1.8913': attribute type 29 has an invalid length. [ 1411.743453][ T3294] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8918'. [ 1412.293263][ T3302] netlink: 12 bytes leftover after parsing attributes in process `syz.9.8921'. [ 1412.762879][ T3310] netlink: 64011 bytes leftover after parsing attributes in process `syz.3.8924'. [ 1413.008664][ T3318] netlink: 8 bytes leftover after parsing attributes in process `syz.9.8925'. [ 1413.134404][ T3320] netlink: 'syz.9.8925': attribute type 10 has an invalid length. [ 1413.428651][ T3320] veth0_vlan: left promiscuous mode [ 1413.487915][ T3320] veth0_vlan: entered promiscuous mode [ 1413.511569][ T3320] team0: Device veth0_vlan failed to register rx_handler [ 1413.600644][ T3307] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8923'. [ 1414.289756][ C0] net_ratelimit: 12080 callbacks suppressed [ 1414.289777][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1414.308303][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1414.320942][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1414.333540][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1414.346134][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1414.358724][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1414.371319][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1414.383956][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1414.396558][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1414.409234][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1415.220386][ T3330] netlink: 12 bytes leftover after parsing attributes in process `syz.3.8930'. [ 1415.606268][ T3336] netlink: 16 bytes leftover after parsing attributes in process `syz.3.8931'. [ 1416.125950][ T3343] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8934'. [ 1417.832103][ T3368] FAULT_INJECTION: forcing a failure. [ 1417.832103][ T3368] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1418.008170][ T3368] CPU: 1 UID: 0 PID: 3368 Comm: syz.1.8942 Not tainted syzkaller #0 PREEMPT(full) [ 1418.008198][ T3368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1418.008209][ T3368] Call Trace: [ 1418.008218][ T3368] [ 1418.008226][ T3368] dump_stack_lvl+0xe8/0x150 [ 1418.008260][ T3368] should_fail_ex+0x412/0x560 [ 1418.008289][ T3368] _copy_from_user+0x2d/0xb0 [ 1418.008317][ T3368] __copy_msghdr+0x3c5/0x5b0 [ 1418.008342][ T3368] ___sys_sendmsg+0x213/0x360 [ 1418.008361][ T3368] ? __lock_acquire+0x6b5/0x2cf0 [ 1418.008392][ T3368] ? __pfx____sys_sendmsg+0x10/0x10 [ 1418.008446][ T3368] ? __fget_files+0x2a/0x420 [ 1418.008471][ T3368] ? __fget_files+0x3a0/0x420 [ 1418.008506][ T3368] __x64_sys_sendmsg+0x1bd/0x2a0 [ 1418.008529][ T3368] ? __pfx___x64_sys_sendmsg+0x10/0x10 [ 1418.008548][ T3368] ? perf_trace_preemptirq_template+0xb2/0x350 [ 1418.008582][ T3368] ? __pfx_ksys_write+0x10/0x10 [ 1418.008612][ T3368] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1418.008632][ T3368] do_syscall_64+0x15f/0xf80 [ 1418.008655][ T3368] ? trace_irq_disable+0x3b/0x140 [ 1418.008677][ T3368] ? clear_bhb_loop+0x40/0x90 [ 1418.008699][ T3368] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1418.008717][ T3368] RIP: 0033:0x7f64aed9cdd9 [ 1418.008735][ T3368] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1418.008752][ T3368] RSP: 002b:00007f64afbaa028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1418.008772][ T3368] RAX: ffffffffffffffda RBX: 00007f64af016090 RCX: 00007f64aed9cdd9 [ 1418.008786][ T3368] RDX: 000000002600c055 RSI: 00002000000000c0 RDI: 0000000000000006 [ 1418.008798][ T3368] RBP: 00007f64afbaa090 R08: 0000000000000000 R09: 0000000000000000 [ 1418.008810][ T3368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1418.008821][ T3368] R13: 00007f64af016128 R14: 00007f64af016090 R15: 00007ffe8f33be98 [ 1418.008852][ T3368] [ 1418.836243][ T3374] netlink: 4 bytes leftover after parsing attributes in process `syz.9.8944'. [ 1419.264234][ T3381] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8943'. [ 1419.299548][ C0] net_ratelimit: 11872 callbacks suppressed [ 1419.299570][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1419.318162][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1419.330753][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1419.343405][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1419.356040][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1419.368636][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1419.381209][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1419.393798][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1419.406385][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1419.418981][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1423.121464][ T1304] ieee802154 phy0 wpan0: encryption failed: -22 [ 1423.130729][ T1304] ieee802154 phy1 wpan1: encryption failed: -22 [ 1424.309693][ C0] net_ratelimit: 11880 callbacks suppressed [ 1424.309713][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1424.328265][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1424.345523][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1424.358164][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1424.370719][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1424.383350][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1424.395998][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1424.408665][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1424.421216][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1424.433907][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1424.756352][ T3390] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8947'. [ 1425.533793][ C0] sched: DL replenish lagged too much [ 1427.296217][ T5831] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1427.321187][ T5831] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1427.340966][ T5831] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1427.367621][ T5831] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1427.382990][ T5831] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1427.684506][ T3411] gretap0 speed is unknown, defaulting to 1000 [ 1427.737777][ T3411] lo speed is unknown, defaulting to 1000 [ 1428.143840][ T3422] netlink: 'syz.2.8955': attribute type 13 has an invalid length. [ 1429.319733][ C0] net_ratelimit: 15417 callbacks suppressed [ 1429.319757][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1429.320805][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1429.326317][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1429.339318][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1429.350774][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1429.364176][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1429.375157][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1429.388031][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1429.399200][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1429.412172][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1429.714191][ T5831] Bluetooth: hci4: command tx timeout [ 1431.971830][ T5831] Bluetooth: hci4: command tx timeout [ 1434.329868][ C0] net_ratelimit: 15968 callbacks suppressed [ 1434.329891][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1434.330824][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1434.336713][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1434.350364][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1434.362837][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1434.376362][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1434.387794][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1434.400770][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1434.412724][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1434.425845][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1434.875971][T28422] Bluetooth: hci4: command tx timeout [ 1438.238840][T28422] Bluetooth: hci4: command tx timeout [ 1439.356072][ C0] net_ratelimit: 10005 callbacks suppressed [ 1439.356119][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1439.356778][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1439.364857][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1439.378222][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1439.389844][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1439.404181][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1439.416150][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1439.433956][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1439.441148][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1439.454687][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1444.359775][ C1] net_ratelimit: 18213 callbacks suppressed [ 1444.359797][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1444.360217][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1444.366145][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1444.378518][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1444.390245][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1444.402175][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1444.414534][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1444.427210][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1444.438809][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1444.450904][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1449.369668][ C0] net_ratelimit: 19006 callbacks suppressed [ 1449.369679][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1449.369690][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1449.370139][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1449.376029][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1449.388519][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1449.400183][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1449.412350][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1449.424365][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1449.436807][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1449.449283][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1452.811853][ T5831] Bluetooth: hci3: command 0x0406 tx timeout [ 1454.379775][ C1] net_ratelimit: 19519 callbacks suppressed [ 1454.379796][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1454.379800][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1454.380230][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1454.386996][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1454.399636][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1454.411796][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1454.423820][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1454.435872][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1454.448217][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1454.460051][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1459.389668][ C0] net_ratelimit: 19310 callbacks suppressed [ 1459.389692][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1459.390513][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1459.396159][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1459.408647][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1459.421854][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1459.433812][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1459.445747][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1459.457838][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1459.470226][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1459.481942][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1464.399634][ C1] net_ratelimit: 19621 callbacks suppressed [ 1464.399657][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1464.399796][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1464.406069][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1464.418212][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1464.430267][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1464.443237][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1464.454888][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1464.466962][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1464.478877][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1464.491260][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1469.409701][ C0] net_ratelimit: 19770 callbacks suppressed [ 1469.409723][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1469.409820][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1469.416189][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1469.428150][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1469.440482][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1469.452262][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1469.464382][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1469.476363][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1469.488727][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1469.500351][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1474.419523][ C0] net_ratelimit: 19593 callbacks suppressed [ 1474.419546][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1474.419672][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1474.426917][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1474.439381][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1474.452443][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1474.464960][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1474.477733][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1474.489792][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1474.502727][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1474.514984][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1479.429521][ C1] net_ratelimit: 19522 callbacks suppressed [ 1479.429544][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1479.429840][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1479.435888][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1479.448564][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1479.459988][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1479.471998][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1479.483937][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1479.496454][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1479.508131][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1479.520266][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1484.439520][ C1] net_ratelimit: 19575 callbacks suppressed [ 1484.439544][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1484.439948][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1484.445868][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1484.458021][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1484.470039][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1484.482322][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1484.494023][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1484.506184][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1484.518145][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1484.530462][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1484.804378][ T1304] ieee802154 phy0 wpan0: encryption failed: -22 [ 1485.542794][ T1304] ieee802154 phy1 wpan1: encryption failed: -22 [ 1489.449583][ C0] net_ratelimit: 19379 callbacks suppressed [ 1489.449604][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1489.449754][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1489.456734][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1489.468763][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1489.481181][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1489.492877][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1489.505039][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1489.517025][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1489.529364][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1489.541074][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1494.459567][ C1] net_ratelimit: 19455 callbacks suppressed [ 1494.459590][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1494.459648][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1494.465932][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1494.477975][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1494.490283][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1494.502737][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1494.514382][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1494.526348][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1494.538321][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1494.550694][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1499.469579][ C1] net_ratelimit: 19976 callbacks suppressed [ 1499.469601][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1499.469999][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1499.475935][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1499.488085][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1499.500018][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1499.512355][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1499.523961][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1499.536154][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1499.548118][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1499.560614][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1504.479561][ C0] net_ratelimit: 19990 callbacks suppressed [ 1504.479584][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1504.479581][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1504.479966][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1504.486371][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1504.498821][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1504.510856][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1504.522860][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1504.535213][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1504.546850][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1504.558976][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1509.489701][ C1] net_ratelimit: 19541 callbacks suppressed [ 1509.489701][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1509.489722][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1509.496087][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1509.508091][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1509.520430][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1509.532557][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1509.544558][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1509.557234][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1509.570055][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1509.582234][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1514.499514][ C0] net_ratelimit: 19226 callbacks suppressed [ 1514.499537][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1514.499721][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1514.506399][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1514.518105][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1514.530117][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1514.542174][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1514.555285][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1514.566955][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1514.579059][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1514.591132][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1519.509556][ C0] net_ratelimit: 19510 callbacks suppressed [ 1519.509580][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1519.509664][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1519.516304][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1519.528153][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1519.540137][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1519.552255][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1519.564728][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1519.576285][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1519.588201][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1519.600394][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1524.519692][ C0] net_ratelimit: 19542 callbacks suppressed [ 1524.519717][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1524.519847][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1524.526538][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1524.538628][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1524.551943][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1524.563792][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1524.575918][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1524.587941][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1524.600453][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1524.612159][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1529.529556][ C1] net_ratelimit: 20114 callbacks suppressed [ 1529.529575][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1529.529578][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1529.529949][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1529.536506][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1529.549114][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1529.562953][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1529.577551][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1529.591324][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1529.603793][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1529.618710][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1534.539527][ C1] net_ratelimit: 19794 callbacks suppressed [ 1534.539552][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1534.539669][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1534.546010][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1534.558107][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1534.570350][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1534.582844][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1534.594632][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1534.606708][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1534.618739][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1534.631208][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1539.549528][ C0] net_ratelimit: 19666 callbacks suppressed [ 1539.549550][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1539.549858][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1539.556112][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1539.568118][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1539.580584][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1539.592167][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1539.604193][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1539.616200][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1539.628775][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1539.640256][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1544.559855][ C1] net_ratelimit: 18643 callbacks suppressed [ 1544.559879][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1544.559887][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1544.560688][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1544.566339][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1544.578624][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1544.591713][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1544.604510][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1544.616569][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1544.630636][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1544.643024][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1546.134151][ T1304] ieee802154 phy0 wpan0: encryption failed: -22 [ 1546.152659][ T1304] ieee802154 phy1 wpan1: encryption failed: -22 [ 1549.569784][ C1] net_ratelimit: 19880 callbacks suppressed [ 1549.569807][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1549.569856][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1549.576226][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1549.588528][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1549.600615][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1549.613505][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1549.625539][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1549.638557][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1549.650454][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1549.663920][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1554.579642][ C0] net_ratelimit: 19162 callbacks suppressed [ 1554.579666][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1554.579739][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1554.586426][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1554.598138][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1554.611609][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1554.622796][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1554.635085][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1554.646727][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1554.658882][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1554.670934][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1556.555367][T32243] Bluetooth: hci4: command 0x0406 tx timeout [ 1559.589712][ C1] net_ratelimit: 19537 callbacks suppressed [ 1559.589735][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1559.589960][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1559.596364][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1559.608387][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1559.620565][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1559.633027][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1559.644597][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1559.656589][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1559.668951][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1559.682252][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1564.599893][ C1] net_ratelimit: 19148 callbacks suppressed [ 1564.599916][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1564.599923][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1564.600351][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1564.606283][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1564.618821][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1564.630562][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1564.642618][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1564.654720][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1564.667261][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1564.678883][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1569.609522][ C1] net_ratelimit: 19392 callbacks suppressed [ 1569.609543][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1569.609872][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1569.617943][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1569.632494][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1569.644681][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1569.657174][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1569.669873][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1569.682417][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1569.694840][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1569.707219][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1574.619555][ C0] net_ratelimit: 18810 callbacks suppressed [ 1574.619579][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1574.619877][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1574.626726][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1574.638503][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1574.650774][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1574.663545][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1574.676514][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1574.688850][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1574.702033][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1574.714216][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1579.629928][ C0] net_ratelimit: 18998 callbacks suppressed [ 1579.629953][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1579.631427][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1579.636438][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1579.648864][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1579.661504][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1579.673661][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1579.686130][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1579.698946][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1579.711279][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1579.723300][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1584.639513][ C1] net_ratelimit: 19339 callbacks suppressed [ 1584.639536][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1584.639824][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1584.645904][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1584.658310][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1584.670309][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1584.683598][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1584.695470][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1584.707605][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1584.719614][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1584.732052][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1589.649532][ C1] net_ratelimit: 19537 callbacks suppressed [ 1589.649556][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1589.649829][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1589.655960][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1589.668559][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1589.680608][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1589.692744][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1589.705136][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1589.718596][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1589.730175][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1589.742599][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1594.659534][ C1] net_ratelimit: 19459 callbacks suppressed [ 1594.659558][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1594.660415][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1594.666707][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1594.679412][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1594.691634][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1594.705148][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1594.718524][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1594.732200][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1594.743763][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1594.756366][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1599.669664][ C1] net_ratelimit: 19666 callbacks suppressed [ 1599.669687][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1599.669859][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1599.676045][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1599.688639][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1599.700578][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1599.714407][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1599.726015][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1599.738106][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1599.750520][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1599.763779][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1604.679798][ C1] net_ratelimit: 19556 callbacks suppressed [ 1604.679807][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1604.679822][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1604.680206][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1604.688230][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1604.701146][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1604.713931][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1604.727716][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1604.741703][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1604.755356][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1604.768248][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1607.432352][ T30] INFO: task kworker/R-ipv6_:3188 blocked for more than 143 seconds. [ 1607.612588][ T1304] ieee802154 phy0 wpan0: encryption failed: -22 [ 1607.631740][ T1304] ieee802154 phy1 wpan1: encryption failed: -22 [ 1609.689648][ C1] net_ratelimit: 18579 callbacks suppressed [ 1609.689671][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1609.690091][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1609.696165][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1609.708743][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1609.721385][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1609.733872][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1609.745795][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1609.758310][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1609.770882][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1609.784345][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1612.948276][ T30] Not tainted syzkaller #0 [ 1614.699797][ C1] net_ratelimit: 18397 callbacks suppressed [ 1614.699820][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1614.699903][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1614.706744][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1614.718867][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1614.731123][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1614.743864][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1614.755475][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1614.767552][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1614.779842][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:be:38:c0:74:e7:37, vlan:0) [ 1614.792184][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1616.902267][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.